From owner-freebsd-hackers@freebsd.org Sun Jul 26 05:06:45 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 365149ABFF1 for ; Sun, 26 Jul 2015 05:06:45 +0000 (UTC) (envelope-from hetakcoder@gmail.com) Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BB9E3C41 for ; Sun, 26 Jul 2015 05:06:44 +0000 (UTC) (envelope-from hetakcoder@gmail.com) Received: by wibxm9 with SMTP id xm9so76920665wib.1 for ; Sat, 25 Jul 2015 22:06:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=IQI8lmYMHFvNlQXv/ByPxtWkXXyiNwOPS9ZTE4ZxECg=; b=KTZsv67fwNGmMY7r9VgQHsjXXaHBCDdY/LejKfviqE7XflzWix/sWTGQajR6EI4M3W jEDlfFKg6NK2vrM6mHV2+yxUP68QrYmOhoHK/ao4mMMKpSyCyJPX3MgCeyecJ7JlWdEV j+7GA1KGe2hVsKHVy6d8VYsIITntO1OuxdeK2UcZcNjLSxSe+dg/cweICYLenju0Px9p KthrQomqhmO7qzkCb6uMVX79oPkBAyfJwuuZptNIlrPC4XidiTFl4WPKooMtjhhkPcOw JxDl3uVhqiql7ZRnm97SU3drFhRaRPYfQSR6CjlgB3peCWerfvPOUixBw3eMuHiuKTYU K9pQ== X-Received: by 10.194.61.175 with SMTP id q15mr1161431wjr.135.1437887202126; Sat, 25 Jul 2015 22:06:42 -0700 (PDT) MIME-Version: 1.0 Received: by 10.194.68.233 with HTTP; Sat, 25 Jul 2015 22:06:02 -0700 (PDT) In-Reply-To: References: <514DDE7F-CF61-461D-A9FF-232DC938BDF5@FreeBSD.org> From: HeTak Date: Sun, 26 Jul 2015 09:36:02 +0430 Message-ID: Subject: Re: Kernel Debug Howto To: Benjamin Kaduk Cc: freebsd-hackers , Mehmet Erol Sanliturk Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 05:06:45 -0000 Thank you, Mehmet and Benjamin, for the tips :) On Sun, Jul 26, 2015 at 12:27 AM, Benjamin Kaduk wrote: > On Sat, 25 Jul 2015, Kristof Provost wrote: > > > > > > On 25 Jul 2015, at 10:54, HeTak wrote: > > > I have recently started some developments on FreeBSD net section. > > Great! > > > > > But I am kinda new to this field. My base interest is to first > understand the > > > implementation structure via tracing the code and so. > > > > > > I have three major questions: > > > 1- how to debug changes made to FreeBSD kernel? > > > (You know, till some levels, I can even use uprintf or so, but, for > example > > > inside radix.c (where I wanna understand how a route is checked to be > > > unique and then inserted to the tree) I can't do such checks..) > > dtrace can be quite useful to understand flows. You can grab stack trac= es > > (i.e. figure out where things are called from), get function arguments,= =E2=80=A6 > > Remote kgdb over a serial line can also be useful for stepping through > execution in cases where that is appropriate, and of course kgdb on > coredumps when the kernel panics. > =E2=80=8BI'm working on VMs to use of snapshots and other facilities while = applying my changes. so i guess this serial line solution is not useful for me, btw, is this debugging tool really useful? don't you face possible kernel crashes after applying some changes on kernel which disconnects you from the system? =E2=80=8B > > > > 3- what is the fastest way to apply changes to FreeBSD kernel? > > > (For now, I just follow the normal build & install kernel & reboot.) > > I pretty much do that. Depending on what you=E2=80=99re working on it m= ight be > easier to run it in a VM. > > My work lately has been on the network code, so a VM is very convenient= . > > It=E2=80=99s not so useful if you=E2=80=99re working on drivers, of cou= rse. > > To speed up the build stage, you can 'make -DKERNFAST kernel' if you have > only made "normal" code changes. > =E2=80=8BI have seen this option before but I don't know what it means by "= normal" code changes. would you please explain it to me? Thank you :) --HeTak From owner-freebsd-hackers@freebsd.org Sun Jul 26 08:50:02 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 64EAC9A3E1A for ; Sun, 26 Jul 2015 08:50:02 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mail-wi0-x22d.google.com (mail-wi0-x22d.google.com [IPv6:2a00:1450:400c:c05::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F0E67C88 for ; Sun, 26 Jul 2015 08:50:01 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by wibxm9 with SMTP id xm9so79966027wib.1 for ; Sun, 26 Jul 2015 01:50:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :references:mime-version:content-type:content-disposition :in-reply-to:user-agent; bh=ke0DyEz+WRyNphF1h33azFjoyisnbbsNrmJQ2UOHU3g=; b=LbVq3oiFP/t0P/6rupKQBQwlUkzBCHYMnRYEGZCl8uCpkTNfz5rnOGCy5upGU//Wk8 BhCoXXJOoRopQUoDcD0JQ5OTFafDt7REpaWtEedB00/Dux65ZRiLnkxkslK0aouGK1J7 DQ8XbNZ8V7vfZEMHFWUW4CGcjlgJu7sHAkCmdvvWBelJtDrQV+2DHEQg2cPS4p7YM1k5 X2ItAB+yPhSNEyJIDelDFGO+/rceMbSSphbJOjVKdYOSk9OuZwbpxtYJfNvz2FyEz26V 1j91+nf8yF5xKo91QVO6NfJaqiVssFpwtP+rWlQRA18vRW72v2dxlks/khbCrN1eGB+s T5kw== X-Received: by 10.180.75.78 with SMTP id a14mr13110520wiw.43.1437900600435; Sun, 26 Jul 2015 01:50:00 -0700 (PDT) Received: from brick.home (abvt207.neoplus.adsl.tpnet.pl. [83.8.217.207]) by smtp.gmail.com with ESMTPSA id gc4sm7199914wib.23.2015.07.26.01.49.58 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 26 Jul 2015 01:49:59 -0700 (PDT) Sender: =?UTF-8?Q?Edward_Tomasz_Napiera=C5=82a?= Date: Sun, 26 Jul 2015 10:49:56 +0200 From: Edward Tomasz =?utf-8?Q?Napiera=C5=82a?= To: HeTak Cc: freebsd-hackers Subject: Re: Kernel Debug Howto Message-ID: <20150726084956.GA2289@brick.home> Mail-Followup-To: HeTak , freebsd-hackers References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 08:50:02 -0000 On 0725T1324, HeTak wrote: [..] > 3- what is the fastest way to apply changes to FreeBSD kernel? > (For now, I just follow the normal build & install kernel & reboot.) I have this in my ~/.zshrc: mbir='make -j4 buildkernel installkernel KERNFAST=1 && reboot' Together with MODULES_OVERRIDE set to only build the modules I need (see make.conf manual page) it makes the process pretty quick. From owner-freebsd-hackers@freebsd.org Sun Jul 26 16:29:26 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DEFF29A8FEB for ; Sun, 26 Jul 2015 16:29:26 +0000 (UTC) (envelope-from ps06756@gmail.com) Received: from mail-la0-x22f.google.com (mail-la0-x22f.google.com [IPv6:2a00:1450:4010:c03::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6615C2E7 for ; Sun, 26 Jul 2015 16:29:26 +0000 (UTC) (envelope-from ps06756@gmail.com) Received: by lahh5 with SMTP id h5so36563138lah.2 for ; Sun, 26 Jul 2015 09:29:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=1MPwhvxfC166uG8rMC+a1Ec9Z09tSu0+C75VO1ET6X8=; b=wRiaxZ41DNffRRpsJ9MRYLueyRAgtpGUccVi7ymoVAauafMJXVBHZLyQ+XqtGiqS6Q uSHCWEugTYJx/5aaVrOV9IUYbkr+fF+QgO+zaopboiekYdseuiVhqreLlVbQ2zvsmZoC uuoliy8wq55AVnsfnCcjoreFQsG4UsZ/Ahp8HYmr3Er6cG0Sg87mn+pSyl94VAz0xd8W q2k+0+rom+/CJEmaYUvkgl1Uk9oAlm0KWOoO0pivWRB5IMXhmZSCU8XlERGoqxoFJDSu 0n+K7vrF5vhOSwQyVcR2MRd90f/crsoV4ThTnLhub30dozZGv1jzOQe+cFjv0mvGQ8sc vdfQ== X-Received: by 10.152.4.163 with SMTP id l3mr23375860lal.35.1437928164380; Sun, 26 Jul 2015 09:29:24 -0700 (PDT) MIME-Version: 1.0 Received: by 10.25.87.194 with HTTP; Sun, 26 Jul 2015 09:29:05 -0700 (PDT) In-Reply-To: <20150725084058.Horde.VOuhK5_psS01pmYmg7IkQkZ@webmail.leidinger.net> References: <20150725084058.Horde.VOuhK5_psS01pmYmg7IkQkZ@webmail.leidinger.net> From: Pratik Singhal Date: Sun, 26 Jul 2015 21:59:05 +0530 Message-ID: Subject: Re: How to interface AC'97 codec driver with kernel ? To: Alexander Leidinger Cc: freebsd-hackers Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 16:29:27 -0000 Thanks, this was something I was looking for, the pci directory contains many good example from which I can learn! Regards, Pratik Singhal On Sat, Jul 25, 2015 at 12:10 PM, Alexander Leidinger < Alexander@leidinger.net> wrote: > > On Sat, 25 Jul 2015 11:24:11 +0530 > Pratik Singhal wrote: > > In the case of AC'97, what all files should I look at ? I have so far >> looked at sys/dev/sound/pcm/ directory, but can't seem to understand >> much there. >> > > sound/pcm contains generic code. > sound/pci is most probably the part you want to understand most. It > contains the hardware specific parts. Not all drivers there are on the > same quality/maturity level. No idea which is the best one to look at. > > Maybe the following link helps a little bit with understanding more > easy what is used where (automatically generated out of the FreeBSD > source): > http://www.leidinger.net/FreeBSD/dox/dev_sound/html/ > > Bye, > Alexander. > > -- > http://www.Leidinger.net Alexander@Leidinger.net: PGP 0xC773696B3BAC17DC > http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0xC773696B3BAC17DC > > -- > http://www.Leidinger.net Alexander@Leidinger.net: PGP 0xC773696B3BAC17DC > http://www.FreeBSD.org netchild@FreeBSD.org : PGP 0xC773696B3BAC17DC > -- Regards, Pratik Singhal From owner-freebsd-hackers@freebsd.org Sun Jul 26 18:43:28 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 45C1A9ABDDA; Sun, 26 Jul 2015 18:43:28 +0000 (UTC) (envelope-from tomek.cedro@gmail.com) Received: from mail-lb0-x22b.google.com (mail-lb0-x22b.google.com [IPv6:2a00:1450:4010:c04::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BFEE0160; Sun, 26 Jul 2015 18:43:27 +0000 (UTC) (envelope-from tomek.cedro@gmail.com) Received: by lbbzr7 with SMTP id zr7so41055983lbb.1; Sun, 26 Jul 2015 11:43:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type:content-transfer-encoding; bh=8tY4ABoTd+W6v3V035iXx7PRBE0Eff5rmHLqXtTlvt8=; b=i9NmFGdIn6XJRLSV7ifaWFrWvjNPnfNr6KlY8Ez2AqgOoxlQM75dTpPv7TaCejnXBf H4IGBx7aPsK4KvlKlDomKQEertgMmF6x4NlJBn3/qdfomBAZC8fR69cjmp4rlvhDXkls 9e01fZDAOZgYs2QOZ2lWZ2LYrLzt4mHU0ePXbwyAfQwltkyB8ZBY8nQXBh9V6nFVp6yk 83ZKg1Y8sUJ+Pxoy/hAO+paiHBYQbfqEdA3IX2BmMGfIs8kTMhkz5Mje65IFk1eusHHk fmzBnUOCGBhA3d1ncPv4oFW02ZSI7pgSlVYRfiBgoIXGd6E6hTrzFwGMm58ue5917H53 IPoA== MIME-Version: 1.0 X-Received: by 10.152.42.205 with SMTP id q13mr23141377lal.119.1437936205773; Sun, 26 Jul 2015 11:43:25 -0700 (PDT) Sender: tomek.cedro@gmail.com Received: by 10.152.45.5 with HTTP; Sun, 26 Jul 2015 11:43:25 -0700 (PDT) In-Reply-To: <55B5270E.5060306@kapsi.fi> References: <55B5270E.5060306@kapsi.fi> Date: Sun, 26 Jul 2015 20:43:25 +0200 X-Google-Sender-Auth: oYkwRxeWWKgNmaadWQ5M9ee7pVQ Message-ID: Subject: Re: 10.1-RELEASE UEFI RAID0 ASUS M5A97 R2.0 AMD64 PhenomIIx6 From: CeDeROM To: Arto Pekkanen Cc: "freebsd-hackers@freebsd.org" , freebsd-hardware@freebsd.org, freebsd-sysinstall@freebsd.org Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 18:43:28 -0000 On Sun, Jul 26, 2015 at 8:29 PM, Arto Pekkanen wrote: > Although, I think it would be possible with Linux but you would have to u= se a DIY distro like Gentoo that doesn't hide all the features behind a cas= cade of automagic system management UI-dialogs or scripts. That being said,= haven't done a customized Linux installation for years now, since FreeBSD = + documentation enable me to more easily create a customized FreeBSD instal= lation for spesific tasks. Well, I did not manage to install and boot Linux so far hahaha :-) Even Ubuntu install but does not boot! :-) > That must be because UEFI depends on kms.ko to get a framebuffer console.= In this case it would be the kms/VESA module. So probably there's some kin= d of race condition between the kms/VESA framebuffer and nVidia kmod. > Have you already checked if there's any PR about this? If not, you could = make one. I am sure this could be fixed easily. I have found some information over the net about buggy nvidia driver in UEFI mode. I have experienced repeatedly system crash when running Xorg+nVidia. I have made a PR :-) https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D201785 > Hmm, this is something you should definitely make a PR for, if you can. Y= our description makes it seem like the BSDInstall scripts are a bit behind = the actual UEFI boot stack. I will, thank you :-) > Thank you for describing your use case. This is valuable information :) You are most welcome :-) Thank you guys for great work! I really consider FreeBSD to be my favorite OS! Even after switching to OSX I came back to FreeBSD. Now I can safely work on OSX and FreeBSD and avoid Windows and Linux :-) :-) Best regards! :-) Tomek --=20 CeDeROM, SQ7MHZ, http://www.tomek.cedro.info From owner-freebsd-hackers@freebsd.org Sun Jul 26 19:01:02 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B9E659AB3F5; Sun, 26 Jul 2015 19:01:02 +0000 (UTC) (envelope-from tomek.cedro@gmail.com) Received: from mail-la0-x231.google.com (mail-la0-x231.google.com [IPv6:2a00:1450:4010:c03::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4170BC65; Sun, 26 Jul 2015 19:01:02 +0000 (UTC) (envelope-from tomek.cedro@gmail.com) Received: by lagw2 with SMTP id w2so37565782lag.3; Sun, 26 Jul 2015 12:01:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=xHo6WDFTW+8MOB8xwHyMz3nLhOSWjceqA3D9V44VzPc=; b=jpK7yXHYd5mCDIUOX5Bg7GTgi33lEjw+AJ5AHrOGfGGKWew6mr4FxIdI2yiwRq0zaN J6k3wUyBkmzbZBENIm5HDer6RLJsruPoPqLkOPSVE/7Oey4jdGBK6OphQxzkqy75TQZW VpiHIwtA3aCQsBkHZMZuLOTHN7a3S0xzLKcadZnugmhakUWAdA315n6M+gEtaRBxpBmU wvIdzjbGicvmkNS/vliPWpVys+G4juRXfMtVr6a1oU/Ab+1jYnxH4YETgY35zDdUGgHV u7hk00lhEcVY8i32JzgBSXSLKPqEZo6TT/mRioCp0pgfMDv9wNQgA6G84ODbwyUehBSE WZiA== MIME-Version: 1.0 X-Received: by 10.112.205.1 with SMTP id lc1mr23497693lbc.94.1437937260352; Sun, 26 Jul 2015 12:01:00 -0700 (PDT) Sender: tomek.cedro@gmail.com Received: by 10.152.45.5 with HTTP; Sun, 26 Jul 2015 12:01:00 -0700 (PDT) In-Reply-To: <55B5270E.5060306@kapsi.fi> References: <55B5270E.5060306@kapsi.fi> Date: Sun, 26 Jul 2015 21:01:00 +0200 X-Google-Sender-Auth: 0_-V_YK93Wckrbpx_m3Gs6Nmdf0 Message-ID: Subject: Re: 10.1-RELEASE UEFI RAID0 ASUS M5A97 R2.0 AMD64 PhenomIIx6 From: CeDeROM To: Arto Pekkanen Cc: "freebsd-hackers@freebsd.org" , freebsd-hardware@freebsd.org, freebsd-sysinstall@freebsd.org Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 19:01:02 -0000 On Sun, Jul 26, 2015 at 8:29 PM, Arto Pekkanen wrote: >> Also installing OS on UEFI is somewhat different. You need to create a >> dedicated EFI partition where boot code is loaded (using dd as >> presented on uefi wiki). BSDInstall creates such partition but its >> only 512k in size, while boot1.efifat is 800k. I have created separate >> partition that is 100M and it works fine as well. I think installed >> could increase the boot partition size, and then dd the boot1.efifat >> over there during install on UEFI platform..? > > Hmm, this is something you should definitely make a PR for, if you can. Your description makes it seem like the BSDInstall scripts are a bit behind the actual UEFI boot stack. Consider it done Sir! :-) https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201898 -- CeDeROM, SQ7MHZ, http://www.tomek.cedro.info From owner-freebsd-hackers@freebsd.org Sun Jul 26 19:14:17 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 40BE79AB72F for ; Sun, 26 Jul 2015 19:14:17 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from dmz-mailsec-scanner-7.mit.edu (dmz-mailsec-scanner-7.mit.edu [18.7.68.36]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DF0988CC for ; Sun, 26 Jul 2015 19:14:16 +0000 (UTC) (envelope-from kaduk@mit.edu) X-AuditID: 12074424-f79b46d000001e7f-71-55b530532fcb Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-7.mit.edu (Symantec Messaging Gateway) with SMTP id 3E.B1.07807.35035B55; Sun, 26 Jul 2015 15:09:07 -0400 (EDT) Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id t6QJ96h3028675; Sun, 26 Jul 2015 15:09:07 -0400 Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id t6QJ93bK022249 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sun, 26 Jul 2015 15:09:06 -0400 Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id t6QJ93AN028545; Sun, 26 Jul 2015 15:09:03 -0400 (EDT) Date: Sun, 26 Jul 2015 15:09:02 -0400 (EDT) From: Benjamin Kaduk To: HeTak cc: freebsd-hackers Subject: Re: Kernel Debug Howto In-Reply-To: Message-ID: References: <514DDE7F-CF61-461D-A9FF-232DC938BDF5@FreeBSD.org> User-Agent: Alpine 1.10 (GSO 962 2008-03-14) MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFuplleLIzCtJLcpLzFFi42IR4hRV1g022BpqcHWKuMX2zf8YLWbOe8fq wOQx49N8Fo+ds+6yBzBFcdmkpOZklqUW6dslcGX8X+hecI29YtH8mgbGuWxdjBwcEgImEhue +XYxcgKZYhIX7q0HCnNxCAksZpJ4fPINI4SzkVHiwOrtrBDOISaJfzdOMEE4DYwSN873sICM YhHQlrj9IBZkFJuAisTMNxvZQGwRAQWJrfP2MYPYzAKGEktW/QDqZecQFpCX6MgDiXIKBEr0 TeoGq+AVcJS48u0QC8T0f4wS/84+YAdJiAroSKzeP4UFokhQ4uTMJywQIwMlnt+axD6BUXAW ktQsJCkIW13iwKeLjBC2tsT9m21sCxhZVjHKpuRW6eYmZuYUpybrFicn5uWlFuma6+Vmluil ppRuYgSFNLuLyg7G5kNKhxgFOBiVeHgvqGwNFWJNLCuuzD3EKMnBpCTK+0Vyc6gQX1J+SmVG YnFGfFFpTmrxIUYJDmYlEd5aEaBy3pTEyqrUonyYlDQHi5I476YffCFCAumJJanZqakFqUUw WRkODiUJ3r16QI2CRanpqRVpmTklCGkmDk6Q4TxAw8X0QYYXFyTmFmemQ+RPMepyLPhxey2T EEtefl6qlDjvGZBBAiBFGaV5cHNgqegVozjQW8K8CiCjeIBpDG7SK6AlTEBLPHu2gCwpSURI STUwKrjVJ6tN+3h/684PCxN03C9ZtW9nXGbz70/Xr/lhr3ZoBf1bm3dzbVZ6itthkbuvcq4/ 3zXl8arFAWzLMz9s3pz17GlwVcq5Ovdc59fnUk9ek5ydvJ+9X56l5MEp1Ugjhl0lE9fOPyR6 1s51N/80hcWXUi91Tnv6+aik9ea2X06T3RgPWala9yqxFGckGmoxFxUnAgDvEjR0IAMAAA== Content-Type: TEXT/PLAIN; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 19:14:17 -0000 On Sun, 26 Jul 2015, HeTak wrote: > > To speed up the build stage, you can 'make -DKERNFAST kernel' if you ha= ve > > only made "normal" code changes. > > > =E2=80=8BI have seen this option before but I don't know what it means by= "normal" > code changes. would you please explain it to me? It is more easily explained in the things that it is not -- making changes to what the build dependencies are or how they are computed, adding new directories, and changing configuration options are all things that would make KERNFAST a bad idea. If you're just changing a couple of lines in a few source files, it should work great. -Ben From owner-freebsd-hackers@freebsd.org Sun Jul 26 18:29:46 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 351079AB9C0; Sun, 26 Jul 2015 18:29:46 +0000 (UTC) (envelope-from isoa@kapsi.fi) Received: from mail.kapsi.fi (mx1.kapsi.fi [IPv6:2001:1bc8:1004::1:25]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id E55BD84E; Sun, 26 Jul 2015 18:29:45 +0000 (UTC) (envelope-from isoa@kapsi.fi) Received: from 91-159-11-54.elisa-laajakaista.fi ([91.159.11.54] helo=[192.168.255.112]) by mail.kapsi.fi with esmtpsa (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from ) id 1ZJQg7-0000Hz-51; Sun, 26 Jul 2015 21:29:39 +0300 Subject: Re: 10.1-RELEASE UEFI RAID0 ASUS M5A97 R2.0 AMD64 PhenomIIx6 To: CeDeROM , "freebsd-hackers@freebsd.org" , freebsd-hardware@freebsd.org, freebsd-sysinstall@freebsd.org References: From: Arto Pekkanen X-Enigmail-Draft-Status: N1110 Message-ID: <55B5270E.5060306@kapsi.fi> Date: Sun, 26 Jul 2015 21:29:34 +0300 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="Vpr0WEXnxjDNlCG3XDPM1u3641uFADKhG" X-SA-Exim-Connect-IP: 91.159.11.54 X-SA-Exim-Mail-From: isoa@kapsi.fi X-SA-Exim-Scanned: No (on mail.kapsi.fi); SAEximRunCond expanded to false X-Mailman-Approved-At: Sun, 26 Jul 2015 19:53:05 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jul 2015 18:29:46 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --Vpr0WEXnxjDNlCG3XDPM1u3641uFADKhG Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 22.7.2015 10:57, CeDeROM wrote: > Hello there :-) >=20 > I have successfully installed and running FreeBSD 10.1-RELEASE AMD64 > on ASUS M5A97 R2.0 AMD64 PhenomIIx6 using RAID0 booting with UEFI. >=20 > UEFI and GPT seems replacement for BIOS+MBR in modern PC hardware. You > can forget about BIOS+MBR in case of UEFI which is tightly related to > hardware/firmware. >=20 > What is best about FreeBSD that I also could to the setup on older > ASUS M4A88TD/V EVO/USB3.0 which did NOT support UEFI at all. RAID0 was > possible to accomplish in 4TB size with no problem. GPT support was > already there in FreeBSD. I have installed MBR bootloader which then > switched to GPT support. This setup was not possible for Windows nor > Linux which were limited to see two 2TB devices, even on RAID. Hale to > the FreeBSD!! :-) Gratz :) Although, I think it would be possible with Linux but you would have to u= se a DIY distro like Gentoo that doesn't hide all the features behind a c= ascade of automagic system management UI-dialogs or scripts. That being s= aid, haven't done a customized Linux installation for years now, since Fr= eeBSD + documentation enable me to more easily create a customized FreeBS= D installation for spesific tasks. > However, FreeBSD Boot and Kernel seems to work somehow different on > UEFI. There is no loader menu, there is no OS prompt. There is problem > with Xorg-NVidia driver which hangs the boot process at loader (you > need to use kld_list in rc.conf instead), and then hangs the computer > somewhere on screen blank. All seems new but familiar :-) That must be because UEFI depends on kms.ko to get a framebuffer console.= In this case it would be the kms/VESA module. So probably there's some k= ind of race condition between the kms/VESA framebuffer and nVidia kmod. Have you already checked if there's any PR about this? If not, you could = make one. I am sure this could be fixed easily. > Also installing OS on UEFI is somewhat different. You need to create a > dedicated EFI partition where boot code is loaded (using dd as > presented on uefi wiki). BSDInstall creates such partition but its > only 512k in size, while boot1.efifat is 800k. I have created separate > partition that is 100M and it works fine as well. I think installed > could increase the boot partition size, and then dd the boot1.efifat > over there during install on UEFI platform..? Hmm, this is something you should definitely make a PR for, if you can. Y= our description makes it seem like the BSDInstall scripts are a bit behin= d the actual UEFI boot stack. > FreeBSD IS THE BEST!! THANK YOU!! :-) > Tomek >=20 Thank you for describing your use case. This is valuable information :) --Vpr0WEXnxjDNlCG3XDPM1u3641uFADKhG Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (MingW32) iF4EAREIAAYFAlW1JxIACgkQTBivhqtJa27TwQD8D8etc34KPc9Bw3/xjh4rjoRb LUSYIw5k2Ygz54JZs+sA/Aq2QEQG8ECfR8WkBPCAVHM6cFB4hsB4vJBWlAZ640kz =TeJ1 -----END PGP SIGNATURE----- --Vpr0WEXnxjDNlCG3XDPM1u3641uFADKhG-- From owner-freebsd-hackers@freebsd.org Mon Jul 27 02:38:49 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6A1DF9ABB8D; Mon, 27 Jul 2015 02:38:49 +0000 (UTC) (envelope-from kaduk@mit.edu) Received: from dmz-mailsec-scanner-5.mit.edu (dmz-mailsec-scanner-5.mit.edu [18.7.68.34]) by mx1.freebsd.org (Postfix) with ESMTP id 462FDF26; Mon, 27 Jul 2015 02:38:47 +0000 (UTC) (envelope-from kaduk@mit.edu) X-AuditID: 12074422-f79d26d0000026d6-51-55b599b6cb0c Received: from mailhub-auth-2.mit.edu ( [18.7.62.36]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-5.mit.edu (Symantec Messaging Gateway) with SMTP id F3.E6.09942.6B995B55; Sun, 26 Jul 2015 22:38:46 -0400 (EDT) Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) by mailhub-auth-2.mit.edu (8.13.8/8.9.2) with ESMTP id t6R2cj0m009213; Sun, 26 Jul 2015 22:38:45 -0400 Received: from multics.mit.edu (system-low-sipb.mit.edu [18.187.2.37]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id t6R2cgQr026128 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Sun, 26 Jul 2015 22:38:44 -0400 Received: (from kaduk@localhost) by multics.mit.edu (8.12.9.20060308) id t6R2cfse024980; Sun, 26 Jul 2015 22:38:41 -0400 (EDT) Date: Sun, 26 Jul 2015 22:38:41 -0400 (EDT) From: Benjamin Kaduk X-X-Sender: kaduk@multics.mit.edu To: freebsd-hackers@freebsd.org cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD Quarterly Status Report - Second Quarter 2015 Message-ID: User-Agent: Alpine 1.10 (GSO 962 2008-03-14) MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupileLIzCtJLcpLzFFi42IRYrdT0d02c2uowe6dwha7rp1mt5jz5gOT xfbN/xgtDjcLObB4zPg0nyWAMYrLJiU1J7MstUjfLoErY/667UwFmw6yViw93cvYwLh6MUsX IweHhICJxMW/cl2MnECmmMSFe+vZuhi5OIQEFjNJtBw/zgzhbGSUWLKlhRXCOcQkMXt+OxOE 08Ao8X7TMXaQfhYBbYnueV9ZQWw2ATWJx3ubWSHmKkpsPjWJGWSdiIC8xILz9iBhZgFribnr 1oOVCAvYSew51MUGYvMKOErMmTiTCcQWFdCRWL1/CgtEXFDi5MwnLBC9gRLvFq5gncAoMAtJ ahaSFIStLnHg00VGCFtb4v7NNrYFjCyrGGVTcqt0cxMzc4pTk3WLkxPz8lKLdE31cjNL9FJT SjcxgoPZRWkH48+DSocYBTgYlXh4NdS3hgqxJpYVV+YeYpTkYFIS5f0iuTlUiC8pP6UyI7E4 I76oNCe1+BCjBAezkgjv4yigct6UxMqq1KJ8mJQ0B4uSOO+mH3whQgLpiSWp2ampBalFMFkZ Dg4lCd7qGUCNgkWp6akVaZk5JQhpJg5OkOE8QMNFQGp4iwsSc4sz0yHypxh1OR5Nu7aWSYgl Lz8vVUqctwekSACkKKM0D24OLAm9YhQHekuYdx1IFQ8wgcFNegW0hAloiWfPFpAlJYkIKakG xqn51X/SmHzdbdkZvzixivRw+125Mvej5HfVjWv9X8S+cmTxfXuF7eYslairfHWZu9tZlK4v zJELecUbKL3iz31H0fBrESKPDigaxwm9yW3jF6yP2nlEsC9ubtgp8SQP+TTFgtWuUnM0n8x1 0TpqqsNb8+FzSd/LmSYyZ5I27dn/wP7N/jgvJZbijERDLeai4kQAqboxWx0DAAA= Content-Type: TEXT/PLAIN; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 02:38:49 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 FreeBSD Project Quarterly Status Report: April - June 2015 The second quarter of 2015, from April to June, was another period of busy activity for FreeBSD. This report is the largest we have published so far. The cluster and release engineering teams continued to improve the structures that support FreeBSD's build, maintenance, and installation. Projects ran the gamut from security and speed improvements to virtualization and storage appliances. New kernel drivers and capabilities were added, while work to make FreeBSD run on various ARM architectures continued at a rapid pace. The Ports Collection grew, even while adding capabilities and fixing problems. Outside projects like pkgsrc have become interested in adding support. Documentation was a major focus, one that is often complimented by people new to FreeBSD. BSDCan 2015 was a great success, turning many hours of sleep deprivation into an even greater amount of inspiration. As always, a great deal of this activity was directly sponsored by the Foundation. The project's status as a first-class operating system owes a great deal to the Foundation's past and ongoing work. The number and detail of these reports really gives only a tiny glimpse of all that is happening. A huge portion of FreeBSD development takes place all the time, including bug fixes, feature improvements, rewrites, and imports of new code. This ongoing work is difficult, time-consuming, and, far too often, unrecognized. We should take a moment to consider and thank not just the contributors listed here, but also the end users, bug submitters, port maintainers, coders, security analysts, infrastructure defenders, tinkerers, scientists, designers, questioners, answerers, rule makers, testers, documenters, sysadmins, dogmatists, iconoclasts, and crazed geniuses who make FreeBSD such an effective and useful operating system. If you are reading this, you are one of these people, too. Thank you. --Warren Block __________________________________________________________________ This status report was compiled by Benjamin Kaduk and Warren Block. Please submit status reports for the third quarter of 2015 (July to September) by October 7, 2015. __________________________________________________________________ FreeBSD Team Reports * FreeBSD Cluster Administration Team * FreeBSD Release Engineering Team * The FreeBSD Core Team Projects * Address Space Layout Randomization (ASLR) * bhyve * Linux Binary Emulation Layer Upgrade * Mellanox iSCSI Extensions For RDMA (iSER) Support * Multipath TCP for FreeBSD * OpenBSM * OPNsense * Root Remount * ZFSguru Kernel * 1-Wire Kernel Driver Implementation * Adding PCIe Hot-plug Support * CloudABI: Capability-Based Runtime Environment * Rewritten PCID Support * Sleep States Enhancements on x86 * Warner's ARMv6 Hard Float Experiment Architectures * FreeBSD on Cavium ThunderX (arm64) * FreeBSD/arm64 Userland Programs * Cleanup on pw(8) Ports * KDE on FreeBSD * Official Packages * Ports Collection * The Graphics Stack on FreeBSD * Wine/FreeBSD * Xfce on FreeBSD Documentation * Documentation Working Group at BSDCan * FreeBSD Mastery: ZFS Now Available * Leap Seconds Article * New Documentation Committers * The FreeBSD German Documentation Project Google Summer of Code * GSoC 2015: libc Security Extensions * Multiqueue Testing Miscellaneous * BSDCan 2015 * FreeBSD Support in pkgsrc * The FreeBSD Foundation * ZFS Support for UEFI Boot/Loader __________________________________________________________________ FreeBSD Cluster Administration Team Contact: FreeBSD Cluster Administration Team The FreeBSD Cluster Administration Team consists of the people responsible for administering the machines that the project relies on for its distributed work and communications to be synchronised. In this quarter, the team has been extremely busy with work both visible and invisible from outside of the FreeBSD infrastructure. * Migrated reference machines used by FreeBSD developers to the new machines purchased by the FreeBSD Foundation at New York Internet * Separated email services (and single-point-of-failure cases) from the machine that has been handling this task for over 18 years, to new, single-purpose service installations * Reorganized the infrastructure, serving repositories hosted by svn.freebsd.org to GeoDNS-backed mirrors, all with a single, official SSL certificate * Increased multi-site redundancy for public and non-public services throughout, at present, eight world-wide geographic sites While an enormous amount of this work was volunteer-driven, resources (time and hardware) were generously provided by the FreeBSD Foundation. This project is sponsored by The FreeBSD Foundation (time and hardware). __________________________________________________________________ FreeBSD Release Engineering Team Links FreeBSD 10.2-RELEASE schedule URL: https://www.freebsd.org/releases/10.2R/schedule.html FreeBSD development snapshots URL: http://ftp.freebsd.org/pub/FreeBSD/snapshots/ISO-IMAGES/ FreeBSD development snapshots announcements list URL: https://lists.freebsd.org/pipermail/freebsd-snapshots/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes, and maintaining the respective branches, among other things. The FreeBSD 10.2-RELEASE cycle began in mid-June, with the final release expected to be available in late August, and as this quarterly status update shows, FreeBSD 10.2-RELEASE is going to be a very exciting release. The FreeBSD Release Engineering Team has been extremely busy this quarter, with much of the focus targeted at adding support for additional hardware and integration with third-party hosting providers (aka "cloud" hosting). Following up on the work done by Andrew Turner to port FreeBSD to the arm64 (aarch64) architecture, the Release Engineering build tools were updated to produce FreeBSD/aarch64 memory stick images and virtual machine images for use with Qemu (emulators/qemu-devel). At present, the Qemu virtual machine images require an external EFI file to boot. Details on how to boot FreeBSD/aarch64 virtual machine images are available in the linked FreeBSD development snapshot announcement email archives. Last quarter, several parts of the build tools were rewritten to allow greater extensibility and granularity, which has simplified the code required for new virtual machine images. In collaboration with several developers, the Release Engineering build tools were updated to provide new support for several hosting providers, as well as provide mechanisms to automatically upload (and publish, where possible) FreeBSD virtual machine images. This quarter, in addition to the existing support for the Microsoft Azure platform, the build tools also natively support: * Amazon EC2 (thanks to Colin Percival) * Google Compute Engine (thanks to Steve Wills) * Vagrant/Hashicorp Atlas (thanks to Brad Davis) The FreeBSD Release Engineering Team would like to thank these developers for all of the work that went into making this possible, and would like to especially thank Marcel Moolenaar for all of his work on the mkimg(1) utility, especially for adding support for the various file formats requested. In addition to the enhancements to the virtual machine build tools, a significant amount of work went into refactoring the build code used to produce FreeBSD/arm images. With much of the logic resembling how the Crochet utility (written by Tim Kientzle) works, and a significant amount of work, input, and advice from Ian Lepore, Warner Losh, Andrew Turner, Luiz Otavio O Souza, and a large number of contributors on the freebsd-arm@FreeBSD.org mailing list, the FreeBSD Release Engineering tools now natively support producing FreeBSD/arm images without external build tools. At present, the build tools support building FreeBSD/arm images for: * BEAGLEBONE * CUBOX/HUMMINGBOARD * GUMSTIX * RPI-B * RPI2 (FreeBSD-CURRENT only) * PANDABOARD * WANDBOARD The FreeBSD Release Engineering Team would like to thank each of these people for their support and input, and would like to especially thank Tim Kientzle for his work on Crochet. Without it, we might not have been able to produce images for the various boards that we are able to now. For more information on what else has changed in FreeBSD since 10.1-RELEASE, see the FreeBSD 10.1-STABLE release notes (which will become the release notes for 10.2-RELEASE). Additionally, Glen Barber would like to thank Jim Thompson for providing a BeagleBone Black board (replacing one that no longer worked), and Benjamin Perrault for providing a PandaBoard ES, both of which are used for locally testing the images produced by the build tools. Last, and certainly not least, Glen Barber would also like to thank the FreeBSD Foundation for their support, and for providing the resources (time and hardware) required to make all of the items mentioned in this status report possible. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ The FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team constitutes the project's "Board of Directors", responsible for deciding the project's overall goals and direction as well as managing specific areas of the FreeBSD project landscape. In order to help attract fresh developer talent to FreeBSD, Core has a general policy to make available an up-to-the-minute suite of developer tools and services. Core has long been encouraging FreeBSD committers to make full use of the project's Phabricator instance at https://reviews.FreeBSD.org, and now has supported the Phabricator admins in opening access to anyone interested enough to sign up for an account. Further developments under consideration include setting up a FreeBSD.org OAuth 2 provider and permitting OAuth-style Single Sign-On access to most FreeBSD web-based services. Developers and members of the public would additionally be able to use credentials from other providers such as GitHub, Twitter, or Google to authenticate themselves to FreeBSD web services. Mark Murray raised a problem he has been having for some time with getting adequate security review of his proposed changes to random(9). This is an extremely security sensitive area of the kernel where errors can have disastrous consequences. Core has been able to drum up a number of reviewers and they have made significant progress in simplifying the design, eliminating some difficult portions of code, and reducing any potential attack surface. Work is still ongoing and Core remains open to the idea of bringing in external reviewers with specialist cryptographic knowledge. Dag-Erling Sm=C3=B8rgrav resigned as Security Officer towards the end of May. Core was sorry to see him step down, but unanimously pleased to welcome his nominee and former deputy, Xin Li, as his successor. Xin has since appointed Gleb Smirnoff (who also happens to be a current member of core) as his new deputy. Between them and Core they have some fairly radical ideas under discussion about how to improve the project's responsiveness to security issues. In mid-June, a change to style(9) was proposed, and resulted in much lively discussion. Warner Losh conducted an informal poll with Phabricator and the change was approved and committed within a couple of days. Unfortunately, complaints were raised about the timing and voting methods and Core was called upon to arbitrate. The change was backed out voluntarily, a new poll was held with more time to vote, and the change was approved. During this period we had two new commit bits awarded, and one taken in for safekeeping. Welcome aboard to Chris Torek and Mariusz Zaborski, and we were very sorry indeed to see Steve Kargl decide to call it a day. __________________________________________________________________ Address Space Layout Randomization (ASLR) Links HardenedBSD URL: https://hardenedbsd.org/ True Stack Randomization URL: https://hardenedbsd.org/article/shawn-webb/2015-06-30/introducing-= true-stack-randomization Announcing ASLR Completion URL: https://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-a= slr-completion Call for Donations URL: https://hardenedbsd.org/article/shawn-webb/2015-07-11/call-donatio= ns SoldierX URL: https://www.soldierx.com/ Contact: Shawn Webb Contact: Oliver Pinter Contact: HardenedBSD HardenedBSD is a downstream distribution of FreeBSD aimed at implementing exploit mitigation and security technologies. The HardenedBSD development team has focused on several key features, one being Address Space Layout Randomization (ASLR). ASLR is a computer security technique that aids in mitigating low-level vulnerabilities such as buffer overflows. ASLR randomizes the memory layout of running applications to prevent an attacker from knowing where a given vulnerability lies in memory. This last quarter, the HardenedBSD team has finalized the core implementation of ASLR. We implemented true stack randomization along with a random stack gap. This change allows us to apply 42 bits of entropy to the stack, the highest of any operating system. We bumped the hardening.pax.aslr.stack_len sysctl(8) to 42 by default on amd64. We also now randomize the Virtual Dynamic Shared Object (VDSO). The VDSO is one or more pages of memory shared between the kernel and the userland. On amd64, it contains the signal trampoline and timing code (gettimeofday(4), for example). With these two changes, the ASLR implementation is now complete. There are still tasks to work on, however. We need to update our documentation and enhance a few pieces of code. Our ASLR implementation is in use in production by HardenedBSD and is performing robustly. Additionally, we are currently running a fundraiser to help us establish a not-for-profit organization and for hardware updates. We have received a lot of help from the community and we greatly appreciate the help. We need further help to take the project to the next level. We look forward to working with the FreeBSD project in providing excellent security. This project is sponsored by SoldierX. Open tasks: 1. Update the aslr(4) manpage and the wiki page. 2. Improve the Shared Object load order feature with Michael Zandi's improvements. 3. Re-port the ASLR work to vanilla FreeBSD. Include the custom work requested by FreeBSD developers. 4. Close the existing review on Phabricator. 5. Open multiple smaller reviews for pieces of the ASLR patch that can be split out logically. 6. Perform a special backport to HardenedBSD 10-STABLE for OPNSense to pull in. 7. golang segfaults in HardenedBSD. Help would be nice in debugging. __________________________________________________________________ bhyve Links bhyve FAQ and talks URL: http://www.bhyve.org Contact: Peter Grehan Contact: Neel Natu Contact: Tycho Nightingale Contact: Allan Jude Contact: Alexander Motin Contact: Marcelo Araujo bhyve is a hypervisor that runs on the FreeBSD/amd64 platform. At present, it runs FreeBSD (8.x or later), Linux i386/x64, OpenBSD i386/amd64, and NetBSD/amd64 guests. Current development is focused on enabling additional guest operating systems and implementing features found in other hypervisors. bhyve BoF at BSDCan 2015 A bhyve BoF was held during lunch hour at BSDCan 2015. It was attended by approximately 60 people. Michael Dexter showed Windows Server 2012 running inside bhyve. Common themes that came up during the discussion were: bhyve configuration, libvirt and OpenStack integration, best practices, bhyve with ZFS, additional guest support and live migration. Google Summer of Code 2015 A number of bhyve-related proposals were submitted for GSoC 2015 and these four were accepted: * NE2000 device emulation * Porting bhyve to ARM * ptnetmap support in bhyve * PXE boot support in bhyveload A number of improvements were made to bhyve this quarter: * GEOM storage backend now works properly with bhyve. * Device model enhancements and new instruction emulations to support Windows guests. * Improve virtio-net performance by disabling queue notifications when not needed. * The dtrace FBT provider now works properly with vmm.ko. Marcelo Araujo and Allan Jude created a rough patch to make bhyve parse a config file to replace the existing method of configuration by command line invocation. The rapid pace of advancement in bhyve resulted in requiring a much more complex config file. A new design for the config file, with support for the plugin architecture that will eventually be introduced into bhyve, is now being discussed. Open tasks: 1. Improve documentation. 2. bhyveucl is a script for starting bhyve instances based on a libUCL config file. More information at https://github.com/allanjude/bhyveucl. 3. Add support for virtio-scsi. 4. Flexible networking backend: wanproxy, vhost-net 5. Support running bhyve as non-root. 6. Add filters for popular VM file formats (VMDK, VHD, QCOW2). 7. Implement an abstraction layer for video (no X11 or SDL in base system). 8. Suspend/resume support. 9. Live Migration. 10. Nested VT-x support (bhyve in bhyve). 11. Support for other architectures (ARM, MIPS, PPC). __________________________________________________________________ Linux Binary Emulation Layer Upgrade Links Emulation team on FreeBSD wiki URL: https://wiki.FreeBSD.org/Emulation Contact: Allan Jude Contact: Dmitry Chagin Contact: Ed Maste Contact: Edward Tomasz Napiera=C5=82a Contact: Johannes Meixner Contact: FreeBSD Emulation Team The FreeBSD emulation team has done extensive work on polishing FreeBSD's Linux emulation layer. After more than a year and a half, Dmitry Chagin's changes to the Linux binary emulation layer were merged into FreeBSD 11.0-CURRENT. Before merging the more than 115 individual changes into base/head, Ed Maste and Edward Tomasz Napiera=C5=82a were a= ble to help by reviewing and improving the code quality. Work has begun on backporting these changes into FreeBSD 10-STABLE, with the current 10.2 release cycle in mind. We hope to have that backport ready before 10.2-PRERELEASE turns into 10.2-RELEASE. In that same vein, Allan Jude was able to upload and improve a recent Differential Revision that will eventually lead to our having both 32-bit and 64-bit ports for CentOS 6. Port review activity started during the BSDCan conference's developer summit, and will be continued extensively during the Cambridge Developer Summit. We are currently expecting to have both Fedora 10, Centos 6 32-bit- and CentOS 6 64-bit-compatible frameworks available by Q4/2015. Call for Help: Contributing People can contribute to the Emulation team's efforts by testing the CentOS 64-bit changes on a FreeBSD 11.0-CURRENT system. Please use Bugzilla to report any bugs or oddities encountered. For the ambitious: we are planning to start working on a CentOS 7 framework. CentOS7 is 64-bit only, uses a newer kernel, and has systemd, so this work is highly experimental. We hope to have a usable port by Q2/2016. This project is sponsored by Perceivon Hosting Inc., ScaleEngine Inc., and The FreeBSD Foundation. Open tasks: 1. Test 64-bit Linux emulation on 11.0-CURRENT 2. Backport 64-bit Linux emulation to 10-STABLE 3. Review 64-bit CentOS 6 ports and merge changes 4. Create/heavily update existing 64-bit CentOS 7 ports 5. Anyone who would like to get in touch should not hesitate to contact any of the emulation@ team members. Similarly, a mail to emulation@FreeBSD.org is always welcome. __________________________________________________________________ Mellanox iSCSI Extensions For RDMA (iSER) Support Links iser-freebsd on GitHub URL: https://github.com/sagigrimberg/iser-freebsd Contact: Max Gurtovoy Contact: Sagi Grimberg Building on the new in-kernel iSCSI initiator stack released in FreeBSD 10.0 and the recently added iSCSI offload interface, Mellanox Technologies has begun developing iSCSI extensions for RDMA (iSER) initiator support to enable efficient data movement using the hardware offload capabilities of Mellanox's 10, 40, 56 and 100 Gigabit IB/Ethernet adapters. Remote Direct Memory Access (RDMA) has been shown to have a great value for storage applications. RDMA infrastructure provides benefits such as Zero-Copy, CPU offload, Reliable transport, Fabric consolidation, and many more. The iSER protocol eliminates some of the bottlenecks in the traditional iSCSI/TCP stack, provides low latency and high throughput, and is well suited for latency aware workloads. This work includes a new ICL module that implements the iSER initiator. The iSCSI stack is slightly modified to support some extra features such as asynchronous IO completions, unmapped data buffers, and data-transfer offloads. The user will be able to choose iSER as the iSCSI transport with iscsictl. The project is in its beta phase. Recent additions include: * Rebased on top of 11-CURRENT (r284921) * Added discovery over iSER support * HA and automatic session re-establishment support * Split iSER from iSCSI module In addition, the iser driver has been and continues to be thoroughly tested. The test suite includes: * traffic * FS tests * compliance tests * traffic failover/failback * session recovery * dynamic module load/unload The code is ready for inclusion and will be released under the BSD license. This project is sponsored by Mellanox Technologies. __________________________________________________________________ Multipath TCP for FreeBSD Links MPTCP Project Website URL: http://caia.swin.edu.au/newtcp/mptcp Contact: Nigel Williams Multipath TCP (MPTCP) is an extension to TCP that allows for the use of multiple network interfaces on a standard TCP session. The addition of new addresses and scheduling of data across these occurs transparently from the perspective of the TCP application. The goal of this project is to deliver an MPTCP kernel patch that interoperates with the reference MPTCP implementation, along with additional enhancements to aid network research. The patch now supports the core mechanisms of the MPTCP protocol (multi-address operation, data-level retransmission, etc). Recent additions include improved socket-option handling and the transfer of some logging output to DTRACE. The patch has been updated to build against r285254 of HEAD. A patch (v0.5) is currently being tested and will be made available to the public shortly, with a plan to release further patches on a more frequent basis following that. This project is sponsored by FreeBSD Foundation. Open tasks: 1. Complete documentation and testing for release of the v0.5 patch. 2. Release Technical Report describing the implementation of v0.5. __________________________________________________________________ OpenBSM Links OpenBSM: Open Source Basic Security Module (BSM) Audit Implementation URL: http://www.openbsm.org/ openbsm on GitHub URL: https://github.com/openbsm/openbsm Contact: Robert Watson Contact: Christian Brueffer Contact: TrustedBSD audit mailing list OpenBSM is a BSD-licensed implementation of Sun's Basic Security Module (BSM) API and file format. It is the user space side of the CAPP Audit implementations in FreeBSD and Mac OS X. Additionally, the audit trail processing tools are expected to work on Linux. After a period of dormancy, the project is slowly picking up steam again. The OpenBSM source code repository was migrated from FreeBSD's Perforce server to GitHub. We hope this will make the code more accessible and stimulate outside contributions. In addition to the repository migration, automated build testing using Travis CI has been enabled, and initial steps towards a new test release have been made. Open tasks: 1. Test the code on GitHub on different releases of Mac OS X and Linux. Especially testing on Mac OS X 10.9 (Mavericks) and newer would be greatly appreciated. __________________________________________________________________ OPNsense Links OPNsense website URL: https://opnsense.org OPNsense source code URL: https://github.com/opnsense Contact: Franco Fichtner Contact: Ad Schellevis Contact: Jos Schellevis OPNsense is a fork of pfSense that aims to follow FreeBSD's code base and ecosystem quickly and closely while retaining the parent's powerful firewall capabilities. The new 15.7 release includes efforts such as firmware upgrades and packaging fully based on pkg, weekly security updates, the replacement of ALTQ-based traffic shaping with IPFW/dummynet, and production-ready LibreSSL integration as an alternative to OpenSSL. Contributors and testers are welcome as we work on redesigning plugin support, rework the GUI according to modern coding standards (MVC) and privilege separation. This project is sponsored by Deciso. __________________________________________________________________ Root Remount Contact: Edward Tomasz Napiera=C5=82a One of the long missing features of FreeBSD was the ability to boot with a temporary rootfs, configure the kernel to be able to access the real rootfs, and then replace the temporary root with the real one. In Linux, the functionality is known as pivot_root. The reroot project aims to provide similar functionality in a different, slightly more user-friendly way: rerooting. Simply put, from the user point of view it looks like the system performs a partial shutdown, killing all processes and unmounting the rootfs, and then partial bringup, mounting the new rootfs, running init, and running the startup scripts as usual. The project is in the late implementation phase. A working prototype was written, and work is in process to rewrite it in an architecturally nicer way. This project is sponsored by The FreeBSD Foundation. Open tasks: 1. Complete debugging __________________________________________________________________ ZFSguru Links ZFSguru URL: http://zfsguru.com Contact: Jason Edwards ZFSguru is a multifunctional server appliance with a strong emphasis on storage. ZFSguru began as simple web-interface frontend to ZFS, but has since grown into a FreeBSD derivative with its own infrastructure. The scope of the project has also grown with the inclusion of add-on packages that add functionality beyond the traditional NAS functionality found in similar product like FreeNAS and NAS4Free. ZFSguru aims to be a true multifunctional server appliance that is extremely easy to set up and can unite both novice and more experienced users in a single user interface. The modular nature of the project combats the danger of bloat, whilst still allowing extended functionality to be easily deployed. The ZFSguru project is nearing the release of version 0.3, a major milestone for the project. In this new version, major work has been done on fundamentals. An overview: * New build infrastructure allows for frequent releases of system images and services in a semi-automated way. * New GuruDB database allows for a growing number of system images and servers, and provides good caching to accelerate pages. * Redesigned installation procedure, and addition of new distributions Root-on-RAM and Root-on-Media aside from the already supported Root-on-ZFS. * Both LiveCD and USB images will be provided. The USB image also has UEFI boot support working alongside the regular MBR boot support so both are available. * Many overhauled libraries and additions to the web interface. * Many improvements to services, such as the new Gnome 3 graphical environment. ZFSguru version 0.3 will be released on the first of August. __________________________________________________________________ 1-Wire Kernel Driver Implementation Links 1-Wire Stuff: Basics and Temperature URL: https://reviews.freebsd.org/D2956 Contact: Warner Losh This is a kernel driver implemetation of the Dallas Semiconductor 1-Wire bus in a generic fashion. While temperature sensors are the only devices initially supported, other devices should be easy to add. Multiple devices on one bus are supported. Both normal and overdrive modes are supported. Multiple temperature sensors have been well tested, but there is a high bit error rate. There are indications that this is due to bad bit-read times. The code is written with enough resilience to cope with the problem by retrying, and the error rate is low enough that a couple of retries paper over many marginal issues. Open tasks: 1. Implement the overdrive device. Add overdrive capability to owc and provide an own method to allow the presentation drivers to know when it is safe to use the overdrive ROM commands. 2. Implement the Identification device. This device just has a class of 1 and no registers. 3. Implement non-FDT gpiobus attachment. 4. Test overdrive timings. 5. Implement other attachments for things like serial port or specialized 1-Wire controllers. 6. Use the system clock to implement more precise delays to improve the error rate. 7. Use interrupt mode for GPIO pins to time the transitions of the line to determine the bit values without busy waiting. Use FreeBSD's fine-grained sleeping to do the same for write-one and write-zero routines. 8. Review the code at the URL above. 9. Test the code on a device other than a RPi, RPi 2, or BeagleBone Black. 10. Test the code on architectures besides armv6. 11. Implement streamlined temperature mode where the convert_t command is broadcast and a callback reads the values for all the devices detected on the bus. 12. Implement parasitic power mode. __________________________________________________________________ Adding PCIe Hot-plug Support Links PCIe Hot-plug P4 Branch URL: http://p4db.freebsd.org/depotTreeBrowser.cgi?FSPC=3D//depot/projec= ts/pciehotplug Commit adding bridge save/restore. URL: https://svnweb.freebsd.org/changeset/base/r281874 Github branch with patches URL: https://github.com/FreeBSDFoundation/freebsd/tree/pciehp Contact: John-Mark Gurney PCI Express (PCIe) hot-plug is used on both laptops and servers to allow peripheral devices to be added or removed while the system is running. Laptops commonly include hot-pluggable PCIe as either an ExpressCard slot or a Thunderbolt interface. ExpressCard has built in USB support that is already supported by FreeBSD, but ExpressCard PCIe devices like Gigabit Ethernet adapters and eSATA cards are only supported when they are present at boot, and removal may cause FreeBSD to crash. The goal of this project is to allow these devices to be inserted and removed while FreeBSD is running. The work will provide the basic infrastructure to support adding and removing devices, though it is expected that additional work will be needed to update individual drivers to support hot-plug. Current testing is focused on getting a simple UART device functional. Basic hot swap is functional. A set of the patches is now available on github.com. This project is sponsored by The FreeBSD Foundation. Open tasks: 1. Get suspend/resume functional by save/restoring necessary registers. This should be addressed by r281874. 2. Make sure that upon suspend, devices are removed so that any hardware changes made while the machine is suspended are correctly handled. 3. Improve how state transitions are handled, possibly by using a proper state machine. __________________________________________________________________ CloudABI: Capability-Based Runtime Environment Links CloudABI on GitHub URL: https://github.com/NuxiNL/cloudlibc FreeBSD patchset on GitHub URL: https://github.com/NuxiNL/freebsd Contact: Ed Schouten CloudABI is a compact UNIX-like runtime environment that is purely based on capability-based security (Capsicum). All features that are incompatible with this model have been removed. Advantages of using a pure capability-based environment include improved security, testability, and reusability. CloudABI should make it possible to run arbitrary third-party executables directly on top of FreeBSD without any impact on system security, making it a good building block for a cluster/cloud computing setup. See the project on GitHub for a more detailed explanation. Last month I added a number of packages for the FreeBSD Ports tree. We now have a full C/C++ cross compiler that can be installed very easily (devel/cloudabi-toolchain). I also imported a tool called cloudabi-run that can be used to start programs safely, only granting access to files and network sockets listed in the program's configuration file (sysutils/cloudabi-utils). I have also imported some kernelspace modifications into the FreeBSD source tree for executing CloudABI programs. After all of these changes have been imported, just loading a kernel module will allow executing CloudABI programs. Right now, the "cloudabi" branch on GitHub is still required. This project is sponsored by Nuxi, the Netherlands. Open tasks: 1. Polish up the kernelspace modifications and send them out for review. 2. Complete the Linux and NetBSD kernel patchsets and send those out to the respective maintainers. __________________________________________________________________ Rewritten PCID Support Links Commit r282684 URL: https://svnweb.freebsd.org/base?view=3Drevision&revision=3D282684 Contact: Konstantin Belousov A Process-Context Identifier (PCID) is a performance-enhancing feature of the Translation Lookaside Buffer (TLB) on Intel processors, introduced with the Sandy Bridge micro-architecture. It allows the TLB to simultaneously cache translation information for several address spaces, and gives an opportunity for the operating system context switch code to avoid flushing the TLB upon process switch. Each cached translation is tagged with some context identifier, and at context switch time, the operating system instructs the processor which context is becoming active. The feature slightly reduces context switch time by avoiding TLB flushes, and more importantly, reduces the warm-up period for a thread after context switch. FreeBSD already used PCID, but the existing implementation had several shortcomings. The amd64 pmap (the machine-dependent portion of the virtual memory subsystem) maintained a bitmap of all CPUs which ever loaded a translation for the given address space, and avoided TLB flush on the context switch. The bitmap was used to direct Inter-Processor Interrupts to the marked CPU when the operating system needed to perform TLB invalidation. The most significant deficiency of the old implementation was the increase of TLB invalidation IPIs, since the bitmap could only grow until a full TLB shootdown was performed. It increased the TLB rate, which negated the positive effects of avoiding TLB flushes on large machines. Secondarily, the bitmap maintenance in both the pmap and the context code was quite complicated, leading to bugs. These issues resulted in the PCID feature being disabled by default. The new PCID implementation uses an algorithm described in the U. Vahalia book "UNIX Internals: The New Frontiers". The algorithm is already used, for example, by the MIPS pmap for assigning Address Space Identifiers (ASIDs) to software-managed TLB entries. The pmap maintains a per-CPU generation count, which is assigned to the next unused PCID when the context is activated on CPU. TLB invalidation includes resetting the generation count, which causes reallocation of the PCID when a context switch is performed. As result, the new implementation issues exactly the same amount of shootdown IPIs as a pmap which does not utilize PCID. Another change included with the PCID rewrite is a move of the address space switching code from assembler to C source, making the algorithm easier to understand and validate. Measurements done with hwpmc(4) on a Haswell machine indicated that the new implementation reduced the TLB miss rate by up to 10 times, without an increase in TLB shootdown IPIs. The rewrite was committed to HEAD at r282684. Note: AMD processors do not have the PCID feature for host paging (AMD provides ASIDs for SVM use). But it is likely that AMD processors do cache TLB translations for different address spaces transparently, and snoop writes to the page tables to invalidate the caches. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ Sleep States Enhancements on x86 Links Commit r282678 URL: https://svnweb.freebsd.org/base?view=3Drevision&revision=3D282678 Contact: Konstantin Belousov The ACPI specication defines CPU Cx states, which are idle states. Methods to enter the state and miscellaneous information like the state-leave latency are returned by the _CST ACPI method. To save energy and reduce useless heating, the operating system enters a Cx state when the CPU has no work to do. C0 is the non-idle state, while C1, C2, and C3 (defined by ACPI) each represent an idle state with sequentially more energy saving, but also with higher latency of leave and possibly greater secondary costs. For example, C1 is entered by executing the HLT instruction and has no architecturally visible side effects, while entering C3 drops the CPU cache and usually requires special chipset programming to correctly handle requests from I/O devices to the CPU. Do not confuse Cx, Px and Sx: Cx states are only meaningful when the system is in the fully operational state S0; Px states are only meaningful when the system is not in the idle state, C0. Modern Intel CPUs enter Cx (x >=3D 1) states with the dedicated instruction MWAIT, which enters a specified low-power state until a specific write is observed by the CPU bus logic. There is a complimentary MONITOR instruction to set the monitored bus address. The legacy port I/O method of entering Cx state is emulated by CPU microcode, which intercepts the port I/O and executes MWAIT internally. Using MWAIT as the method of entering Cx requires following processor-specific procedures, which are communicated to the operating system by the vendor-specific extensions in _CST. The operating system must indicate readiness to support MWAIT when calling _CST. Claimed benefits of using MWAIT are reduced latencies of leaving the idle state, and visibility of more deep states than defined by the common ACPI specification. Still, modern Intel platforms report deep states as C2 to avoid the not needed bus-mastering avoidance. The new code asks ACPI for the Intel vendor-specific _CST extensions, parses them, and uses MWAIT Cx entrance methods when available. The change was committed as r282678 to HEAD. For Linux, Intel provides a driver which does not depend on the ACPI tables to use MWAIT for entering Cx states. For all Intel CPUs after Core2, the driver contains the description of the Cx mode latencies and quirks, eliminating dependency on correct BIOS information, since the BIOS information is often incorrect. The approach of porting the Linux driver was considered by several people, but all evaluators independently concluded that the project cannot maintain such an approach without direct involvement from Intel. During the work, around 500 lines of identical code between the i386 and amd64 versions of idle handling were moved to a common location x86/x86/cpu_machdep.c. Now the i386 and amd64 machdep.c files contain only unique machine-dependent routines. This advance depended on John Baldwin's elimination of the unmaintained Xen PVM i386 port. This project is sponsored by The FreeBSD Foundation. __________________________________________________________________ Warner's ARMv6 Hard Float Experiment Links Moving armv6 from Soft Float to Hard Float URL: https://wiki.freebsd.org/armv6tohardfloat Contact: Warner Losh The plan for the transition to hard float on ARMv6 involved having a new MACHINE_ARCH. That seemed expedient, but inelegant to me. The kernel can easily run both soft and hard floating point binaries, assuming that the proper libraries are available. As an experiment, I have been investigating how hard it would be to just start generating hard float binaries starting with FreeBSD 11.0 and what issues this causes. I am most interested in the source, the effects on ports, and any binary/package upgrade issues from FreeBSD 10.X to 11. If successful, this will allow the project to move more quickly away from a soft-floating point default. Users upgrading from FreeBSD 10 will automatically be upgraded to hard float. All supported ARMv6 and ARMv7 processors have hardware floating point, so this will not be a problem for the vast majority of users. In addition, many of the build scripts know about all values of MACHINE_ARCH, and not changing the MACHINE_ARCH will allow those scripts to continue to function without additional changes. I am about three fourths of the way through investigating this possibility and coding up solutions to the problems encountered so far. The risks from this experiment are that it will encounter unforseen dependencies. This could force us to go with the original plan for migration to hard floating point. The hope for this experiment is to pave the way for using the superior hard floating point in FreeBSD 11 with minimal impact to our users and their current build scripts and processes. Backwards compatibility will be ensured with the libsoft tasks if users need to run FreeBSD 10.X ARMv6 softfloat binaries on FreeBSD 11.0 with its new hardfloat libraries. Packages should automatically update once the new hardfloat packages are put into place. Open tasks: 1. Building seat belts into ld.so to not cross-thread libraries of differing floating point implementations. 2. Clang should properly mark hard versus soft floating point .os. This is a minor issue, since ld handles things correctly. 3. libsoft, the analog of lib32, needs to be completed. 4. Patches to flip the switch from soft to hard for builds for armv6. Some additional code needed to build soft float may be needed for the prior task. __________________________________________________________________ FreeBSD on Cavium ThunderX (arm64) Links FreeBSD Wiki: arm64 page URL: http://wiki.freebsd.org/arm64 Video: FreeBSD on the 48-core ThunderX (ARMv8) URL: https://youtu.be/lLgc4FJLJ3Y Contact: Dominik Ermel Contact: Wojciech Macek Contact: Michal Stanek Contact: Zbigniew Bodek Since the previous report, ThunderX gained SMP support and FreeBSD is now running on 48 real-life ARMv8 CPU cores! The newly introduced functionality was based on initial foundational work submitted by Andrew Turner and Robin Randhawa, with emulation as the primary target. Semihalf's efforts focused on hardware, and include: * Multicore support for the newer Generic Interrupt Controller GICv3 * Numerous bug fixes for: + pmap(9) - memory attributes and TLB management + locore.S - secondary core initialization + IPI (inter-processor interrupts) + Per-CPU timers + Size of early UMA allocations + Cache maintenance + Exceptions handling + Stack issues * ThunderX-specific changes and quirks This support was introduced to the public at the FreeBSD 2015 Developer Summit in Ottawa at a demo held by Semihalf and the FreeBSD Foundation. Cavium's ThunderX server CRB (Customer Reference Board) is now capable of booting SMP FreeBSD from both the hard disk and from an NFS root using a PCIe networking card. The example setup is now available on the FreeBSD test cluster hosted at Sentex Communications. ThunderX support changes are currently being reviewed and integrated into mainline FreeBSD. This project is sponsored by The FreeBSD Foundation, ARM Ltd., Cavium, and Semihalf. Open tasks: 1. Upstream ThunderX support to FreeBSD HEAD 2. Support for multi-socket configuration of ThunderX (96 CPUs connected through coherent fabric) 3. Implement VNIC support (ThunderX networking controller) __________________________________________________________________ FreeBSD/arm64 Links FreeBSD arm64 wiki URL: https://wiki.freebsd.org/arm64 Contact: Andrew Turner Contact: Ed Maste Contact: Ruslan Bukin Since the last status report, support for building FreeBSD for AArch64 (arm64) has been committed to Subversion. This has initially been targeting qemu, with more hardware support being added after review. Support for ACPI, SMP, DTrace, and hwpmc has been added. ACPI is able to enumerate devices and get to the mountroot prompt. Further work is needed to get into userland. SMP has been tested on qemu with two cores, and work is under way to support SMP on hardware. The hwpmc driver includes support for the Cortex-A53, Cortex-A57, and Cortex-A72 cores from ARM. Poudriere has been used with user-mode qemu to test building packages. Over 14,000 ports were successfully built. A number of issues have been found and fixed from this first run. These fixes should unblock about 5,000 additional ports. This project is sponsored by The FreeBSD Foundation, ABT Systems Ltd, and ARM Ltd. Open tasks: 1. Port to more SoCs 2. Test Poudriere on native hardware __________________________________________________________________ Cleanup on pw(8) Contact: Baptiste Daroussin pw(8) is the utility to create, delete, and modify users. This tool has remained mostly untouched since its creation, but needed updating. Lots of cleanup has been done: * Deduplication of code * Reduction of complexity by splitting into smaller functions * Reuse of existing code in base: + sbuf(9) for buffered string + stringlist(3) for string arrays + gr_utils (from libutil) instead of homemade group manipulation + strptime(3) to parse time strings * Added validation on most input options, fixing some serious bugs due to bad usage of atoi(3) * many regression tests added to test for regressions due to all of these changes A new feature was added: pw -R rootdir cmd which allows cross manipulation of users. Open tasks: 1. More cleanup. 2. More regression tests. 3. LDAP support? __________________________________________________________________ KDE on FreeBSD Links KDE on FreeBSD website URL: https://freebsd.kde.org/ KDE ports staging area URL: https://freebsd.kde.org/area51.php KDE on FreeBSD wiki URL: https://wiki.freebsd.org/KDE KDE/FreeBSD mailing list URL: https://mail.kde.org/mailman/listinfo/kde-freebsd Development repository for integrating KDE 5 URL: https://github.com/tcberner/kde5 Contact: KDE on FreeBSD team The KDE on FreeBSD team focuses on packaging and making sure that the experience of KDE and Qt on FreeBSD is as good as possible. Brad Davis has been working on CMake, resulting in an update to version 3.2.3 being committed to ports. Overall, we have updated the following ports in this quarter: * CMake 3.2.3 (committed to ports) * Qt 4.8.7 (committed to area51) * Qt 5.4.1 (refinements committed to ports) Open tasks: 1. Put more effort into the Qt5-related ports: KDE Frameworks 5 (currently worked on by Tobias Berner) and PyQt 5. __________________________________________________________________ Official Packages Links Package Status URL: http://pkg-status.FreeBSD.org Contact: Bryan Drewery Contact: Ports Management Team Contact: Sean Bruno x86 Packages With the help of the FreeBSD Foundation providing more build servers, we have increased the build frequency of packages from weekly to about every other day. Packages are provided for all currently supported releases and head on i386 and amd64 from the ports head branch, and quarterly packages for FreeBSD 10.1 and 9.3 release branches. We are using eight different systems for building packages. The build process has been fully automated and is more fault tolerant now. More details on this will be available in an upcoming FreeBSD Journal article. About eleven servers are used for daily test builds. To make it simpler for everyone to find the status and results of these builds, pkg-status.FreeBSD.org has been developed by Bryan Drewery. Its intent is to show all systems and builds in nearly real-time. It is currently in a beta stage and will be improved over time. At the time of this writing, it is temporarily down, but will be restored soon. ARM/MIPS Packages The FreeBSD Foundation purchased servers for the project to begin building and providing ARM and MIPS packages. These packages are currently built from x86 systems using QEMU. More details on this can be found in the BSDCan 2015 Presentation. The work to do this has been shepherded by Sean Bruno and has had help from many people including but not limited to Juergen Lock, Stacey Son, Ed Maste, Peter Wemm, Alexander Kabaev, Adrian Chadd, Baptiste Daroussin, Bryan Drewery, Dimitry Andric, Andrew Turner, Warner Losh, Ian Lapore, and Brooks Davis. We are currently targeting packages for head on mips, mips64 and armv6. Each set takes one to two weeks to build on QEMU. They will be provided on a best effort basis for now on the default repository of pkg.FreeBSD.org. This project is sponsored by FreeBSD Foundation (package building hardware). Open tasks: 1. Portmgr met at BSDCan and decided that the default package set should be provided based on the Ports Quarterly branch. This will provide more stable packages by default and allow users who wish to have the bleeding edge to use the head packages. The Quarterly branch is currently updated in full every three months from head and otherwise receives security and critical fixes. Moving towards this plan will also require a change to how we update the Quarterly branch. More details will be provided later. 2. Performance and stability of QEMU continues to improve. Native cross-building support in ports needs more work and testing to be viable. 3. The package builds currently run from a crontab every other day. Some of the builds take two hours (incremental), while others can take up to 30 hours for a full build. An open task here is to implement a better OS ABI check to see if incremental builds can be done, or if a full rebuild is needed when an SA/EN comes out. The plan for this is detailed at https://lists.freebsd.org/pipermail/freebsd-arch/2015-April/017025. html. Another open task is to implement a master queue coordinator to start the next builds as soon as all others are done. This will also allow improving the pkg-status site's view of everything. __________________________________________________________________ Ports Collection Links The Ports Collection URL: http://www.FreeBSD.org/ports/ Contributing to Ports URL: http://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing-p= orts/ FreeBSD Ports Monitoring System URL: http://portsmon.freebsd.org/index.html Ports Management Team URL: http://www.freebsd.org/portmgr/index.html portmgr Blog URL: http://blogs.freebsdish.org/portmgr/ portmgr on Twitter URL: http://www.twitter.com/freebsd_portmgr/ portmgr on Facebook URL: http://www.facebook.com/portmgr portmgr on Google+ URL: http://plus.google.com/communities/108335846196454338383 Contact: Frederic Culot Contact: FreeBSD Ports Management Team As of the end of the second quarter, the ports tree holds nearly 25,000 ports and the PR count is about 1,800. Once again, the tree saw more activity than during the previous quarter, with almost 8,000 commits performed by 153 active committers. On the other hand, the number of problem reports closed decreased slightly, with a bit less than 1,700 problem reports fixed. In the second quarter, several commit bits were taken in for safekeeping, following an inactivity period of more than 18 months (clsung, dhn, obrien, tmseck), or on committer's request (sahil). Two new developers were granted a ports commit bit (Michael Moll - mmoll@, and Bernard Spil - brnrd@). On the management side, pgollucci@ started his four-month term as portmgr-lurker in June, and no changes were made to the portmgr team during the second quarter. This quarter also saw the release of the second quarterly branch, namely 2015Q2. On this branch, 39 committers applied 305 patches, which is more than twice as many updates as during the last quarter. On the quality assurance side, 30 exp-runs were performed to validate sensitive updates or cleanups. Amongst those noticeable changes are the update to pkg 1.5.4, three new USES (waf, gnustep, jpeg), the Perl default switch to 5.20, Ruby to 2.1.6, Firefox 38.0.6, and Chromium 43.0.2357.130. Open tasks: 1. As in the previous quarter, a tremendous amount of work was done on the tree to update major ports and to close even more PRs than in 2015 Q1, but as always, any additional help is greatly appreciated! __________________________________________________________________ The Graphics Stack on FreeBSD Links Graphics stack roadmap and supported hardware matrix URL: https://wiki.freebsd.org/Graphics Graphics stack team blog URL: http://blogs.freebsdish.org/graphics/ Ports development tree on GitHub URL: https://github.com/freebsd/freebsd-ports-graphics Contact: FreeBSD Graphics Team The members of the graphics team were lacking spare time during this quarter, and only few things could be improved. Our ports development tree still holds an update to Mesa 10.6 along with many cleanups and bug fixes. (It was 10.5 in the previous quarterly report.) Initially, we planned to commit it in early July, just after the FreeBSD 8.4-RELEASE end-of-life date, but the EOL was delayed to the 31st of July. Therefore, we will send a Call For Testers near the end of July, with the update to be committed in early August. Of course, the update can still be obtained and tested directly from the Ports development tree by using the mesa-next branch. Several smaller updates to X.Org-related ports were committed to the Ports tree. The work on the i915 kernel driver update made no progress during this quarter due to the lack of free time. Fortunately, it can resume in Q3 with the hope to have something ready to test in September 2015. The update to the DRM device-independent code was merged to stable/10. This means it will be available in the upcoming FreeBSD 10.2-RELEASE. Recently, the website hosting our blog has been down frequently. It is again the case at the time of this writing. We exported the data the last time it was up, so we will probably move to another system. Of course, the URL will change as well. Open tasks: 1. See the Graphics wiki page for up-to-date information. __________________________________________________________________ Wine/FreeBSD Links Wine wiki URL: http://wiki.FreeBSD.org/Wine Wine on amd64 wiki URL: http://wiki.FreeBSD.org/i386-Wine Wine homepage URL: http://www.winehq.org Contact: Gerald Pfeifer Contact: David Naylor This quarter has seen seven updates to the wine-devel port that closely tracks upstream development as well as updates to its helper ports (wine-gecko-devel and wine-mono-devel): * Stable releases: 1.6.2 (1 port revision) * Development releases: 1.7.40 through 1.7.46 The i386-wine-devel port has packages built for amd64 for FreeBSD 8.4, 9.1+, 10.1+ and CURRENT. Accomplishments include: * Rename wine-compholio to wine-staging (to match upstream developments). Future development on Wine will focus on: * Add the getdirentries(2) patch to the wine-devel port. * Redevelop and upstream the getdirentries(2) patch. * Redevelop and upstream the kernel32 Makefile patch. * Add support to the i386-wine port for pkg 1.5 (library conflicts currently prevent support). * Add support for Windows 32-bit on Windows 64-bit (WoW64): + Reduce the i386-wine port to just the components required for WoW64. + Rename the i386-wine port to wow64. + Make the wine ports depend on the wow64 ports when built on amd64. + Investigate and verify the interactions between Wine64 and WoW64. + Investigate possible update approaches for the wow64 ports (that have to be pre-compiled) and how updating with the wine ports will work. Maintaining and improving Wine is a major undertaking that directly impacts end-users on FreeBSD (including many gamers). If you are interested in helping please contact us. We will happily accept patches, suggest areas of focus or have a chat. Open tasks: 1. Open Tasks and Known Problems (see the Wine wiki) 2. FreeBSD/amd64 integration (see the i386-Wine wiki) 3. Porting Windows 32-bit on Windows 64-bit (WoW64) __________________________________________________________________ Xfce on FreeBSD Links FreeBSD Xfce Project URL: https://wiki.freebsd.org/Xfce FreeBSD Xfce Repository URL: https://www.assembla.com/code/xfce4/subversion/nodes Contact: FreeBSD Xfce Team Xfce is a free software desktop environment for Unix and Unix-like platforms, such as FreeBSD. It aims to be fast and lightweight, while still being visually appealing and easy to use. During this quarter, the team has kept these applications up-to-date: * audio/xfce4-pulseaudio-plugin 0.2.3 * deskutils/orage 4.12.1 * deskutils/xfce4-notes-plugin 1.8.1 * misc/xfce4-weather-plugin 0.8.6 * science/xfce4-equake-plugin 1.3.7 * sysutils/xfburn 0.5.4 * sysutils/xfce4-power-manager 1.5.0 (committed to ports), 1.5.2 (committed to devel repository) * x11/libexo 0.10.6 * x11/xfce4-dashboard 0.4.2 * x11-fm/thunar 1.6.10 * x11-wm/xfce4-desktop 4.12.2 * x11-wm/xfce4-wm 4.12.3 * www/midori 0.5.10 Mathieu Arnold (mat@) committed PR 197878, updating the Xfce section in the Porter's Handbook. We also follow the unstable releases (available in our experimental repository) of: * sysutils/garcon 0.5.0 (supports both GTK2 and GTK3 toolkits) * x11/xfce4-dashboard 0.5.0 * x11/xfce4-hotcorner-plugin 0.0.2 (new plugin) Open tasks: 1. Create documentation for the usage of sysutils/xfce4-power-manager (it needs some love, PR 199166). Some hidden features were introduced in the 1.5.1 release, and as we also support ConsoleKit2 (a fork of sysutils/consolekit), help for users is required. __________________________________________________________________ Documentation Working Group at BSDCan Links BSDCan URL: http://www.bsdcan.org/ reStructured Text URL: http://docutils.sourceforge.net/rst.html Markdown URL: http://daringfireball.net/projects/markdown/ AsciiDoc URL: http://asciidoc.org/ FreeBSD Wiki URL: https://wiki.freebsd.org/ FreeBSD Web Site URL: https://www.freebsd.org/ Annotator URL: http://annotatorjs.org/ Annotator Backend Stores URL: https://github.com/openannotation/annotator/wiki#backend-stores Contact: FreeBSD Documentation Team During the Developer Summit held in the two days before BSDCan, a documentation working group meeting was held. We discussed some of the biggest opportunities available to the documentation team. Modernizing our translation system was, again, a major topic. Making it easier for translators to do their work is vitally important. Translations make FreeBSD much more accessible for non-English speakers, and those people and the translators themselves often become valuable technical contributors in other areas. Progress was made in this area, and we hope to have more news soon. Methods of making it easier for people to contribute to documentation was another major topic. At present, we use DocBook XML for articles and books, and mdoc(7) for man pages. These markup languages are not very welcoming for new users. There are simpler documentation markup languages like reStructured Text (RST), Markdown, and AsciiDoc that take less time to learn and use. In fact, these markup systems are all similar to each other. These systems tend to be more oriented towards visual appearance rather than the semantic markup of our present systems, although there might be ways to work around that. Following the theme of making contributing easier, we also discussed whether access to the FreeBSD Wiki can be more easily granted, facilitating user contributions. After the wiki was set up, automated account creation abuse forced access to be limited. It is tricky to allow submissions yet keep the quality of submitted information usefully high. Due to the markup systems used, it is difficult to review documents for the quality of their information. Annotator is a Javascript system that allows adding notes to an existing web page. This would allow us to hold content-only reviews of documentation web pages. Reviewers would not see markup, so they could concentrate only on whether the information was accurate and complete. To use this as desired, we need some help with ports and testing. Open tasks: 1. Complete a port for the backend storage component of Annotator. Preferably this would be the lowest overhead and most open-licensed version available. Assistance from those familiar with Python and Javascript web development is welcome. __________________________________________________________________ FreeBSD Mastery: ZFS Now Available Links FreeBSD Mastery: ZFS URL: http://www.zfsbook.com Michael W. Lucas URL: https://www.michaelwlucas.com Contact: Michael Lucas The first ZFS book is now available at your favorite bookstore. Find a whole bunch of links at zfsbook.com. Work is proceeding apace on "FreeBSD Mastery: Advanced ZFS" and "FreeBSD Mastery: Specialty Filesystems." Lucas hopes to have FMAZ complete and available before the next status report. __________________________________________________________________ Leap Seconds Article Links Leap Seconds Article URL: https://www.freebsd.org/doc/en_US.ISO8859-1/articles/leap-seconds/= article.html Contact: Warren Block As the leap second scheduled for the end of June approached, Bartek Rutkowski and others raised questions about how FreeBSD handled leap seconds. Leap seconds have caused serious problems for other operating systems in the last few years, and there was understandable concern. It was reasonably pointed out that FreeBSD had encountered leap seconds before, and would be fine this time also. Still, the absence of reported problems is not really a substitute for a description of what to expect and how to know if a system is prepared. To address concerns and also provide a resource for future leap seconds, several experts were pestered relentlessly, with the results compiled into a short article. Beyond merely allaying fears about what might happen, this article received positive responses on the web for how it demonstrated FreeBSD's maturity and preparedness. Great thanks for their patience and expertise are owed to Peter Jeremy, Poul-Henning Kamp, Ian Lepore, Xin LI, Warner Losh, and George Neville-Neil. Open tasks: 1. Compile other short articles on things that FreeBSD does really well. Of particular interest are features that make life easier for sysadmins, or how problems on other systems are dealt with or even made non-problems on FreeBSD. __________________________________________________________________ New Documentation Committers Links FreeBSD Porter's Handbook URL: https://www.freebsd.org/doc/en_US.ISO8859-1/books/porters-handbook= / FreeBSD Web Site URL: https://www.freebsd.org/ FreeBSD Foundation Web Site URL: https://www.freebsdfoundation.org/ Contact: FreeBSD Documentation Engineering Team Two new documentation committers were added to the team in the second quarter of 2015. Mathieu Arnold is a member of the FreeBSD Ports Management Team. Over the past year, he has worked on many large and complex updates to keep the Porter's Handbook current, and continues to update this important document. Anne Dickison is Marketing Director for the FreeBSD Foundation. She will focus on updating and improving the FreeBSD main web site. We welcome both new committers and look forward to their additional contributions! __________________________________________________________________ The FreeBSD German Documentation Project Links Main German Documentation Project page URL: https://www.freebsd.org/de/docs.html How you can help with German translations URL: https://people.freebsd.org/~jkois/FreeBSDde/de/ Contact: Bj=C3=B6rn Heidotting Contact: Johann Kois Contact: Benedict Reuschling The FreeBSD German Documentation project maintains the German translations of FreeBSD's documents such as the Handbook and the website. In the second quarter of 2015, we managed to catch up with the translation work of the Handbook. Two chapters are now back in sync with their English reference chapters: filesystems and ZFS. The former was mainly done by Bj=C3=B6rn Heidotting as part of his mentee process. = The latter was done by Benedict Reuschling, with valuable corrections by Bj=C3=B6rn. Additionally, we updated many of our translation markers from pre-SVN times. This will help us get an overview of the outstanding work in each chapter. We are working on integrating this into our website using a script, so people can see which chapters need the most work or are most up-to-date. Johann made efforts to update the FreeBSD Documentation Project Primer as well, so that translators willing to help us can read the information in German. He also made efforts to revive the Documentation Project website, which was previously hosted elsewhere, but disappeared. Now, it is tied into the German FreeBSD.org website again and has the same look and feel. Occasionally, people contact us and offer their help with the translation effort. We are happy to help newcomers get to know everything about the translation process and look forward to more contributions. Even small updates make a big difference and if you are considering helping, please contact us. Open tasks: 1. Continue translating the Handbook and website into German. 2. Integrate a script that shows outstanding work into the German documentation webpages. __________________________________________________________________ GSoC 2015: libc Security Extensions Links Project Wiki Page URL: https://wiki.freebsd.org/SummerOfCode2015/FreeBSDLibcSecurityExten= sions Code Review Differential URL: https://reviews.freebsd.org/D3043 Contact: Pedro Giffuni Contact: Oliver Pinter As part of this year's Google Summer of Code, we have been adding support for the _FORTIFY_SOURCE extension to libc. This extension uses the GCC builtin_object_size information to prevent buffer overflows in existing code. The compiler and the C library can effectively detect a set of common programming mistakes. A mixed version of the NetBSD and Android implementations has been ported and is currently undergoing heavy testing. On FreeBSD, this code has already found two small bugs. On the other hand, the FreeBSD codebase is extremely useful to test the framework. This project is sponsored by Google Summer of Code Program. Open tasks: 1. Code review and more buildworld testing with GCC. 2. Integration tests, especially on non-x86 platforms. 3. Documentation: the framework is relatively popular on GNU libc but we still have to work on better documentation. 4. Testing and possibly integrating with ports. 5. We will have to re-schedule the GSoC project, as we were expecting to spend less time on this. __________________________________________________________________ Multiqueue Testing Links Multiqueue Testing Project URL: https://wiki.freebsd.org/SummerOfCode2015/MultiqueueTestingProject Contact: Tiwei Bie Contact: Hiren Panchasara The aim of this project is to design and implement an infrastructure to validate that a number of the network stack's multiqueue behaviours are as expected. It mainly consists of extending tap(4) to provide the same RSS behaviours as the hardware multiqueue network cards, developing simple test applications using multiqueue tap(4) and socket(2), adding hooks in each layer of the network stack to collect the per-ring per-cpu per-layer statistics, and extending netstat(1) to report these statistics. At present, most parts of this project have been implemented. The focus is on the code review, and API/KPI freeze. This project is sponsored by Google Summer of Code 2015. __________________________________________________________________ BSDCan 2015 Links BSDCan 2015 URL: http://www.bsdcan.org/2015/ BSDCan 2015 Video Playlist URL: https://www.youtube.com/playlist?list=3DPLWW0CjV-TafY0NqFDvD4k31Ct= nX-CGn8f Contact: Dan Langille BSDCan, a conference for people working on and with 4.4BSD-based operating systems and related projects, was held in Ottawa, Ontario on June 12 and 13. A two-day FreeBSD developer summit event preceded it on June 10 and 11. This was the largest BSDCan ever, with over 280 attendees, up by more than 40 people over the 2014 event. There were a record number of speakers and talks. An additional room and "track" was added to provide even more choices for concurrent talks on both days of the conference. Social media response to the whole conference has been very positive. The keynote talk by Stephen Bourne was very popular. So popular, in fact, that the main conference room could not hold all the attendees. An overflow room with live video was set up to hold the extra people. The video of the presentation has had over 6300 views in the first twelve days. Andrew Tanenbaum's talk on reimplementing NetBSD using a MicroKernel was so well-attended it was standing room only. There were many other excellent talks, and we recommend browsing through the playlist in the links above. Activity was not limited to the talks. Each night, the "Hacker Lounge" was used by developers to cooperate and interact on projects. Embedded projects were popular this year, as FreeBSD was installed directly on wireless routers. The very successful and well-attended closing event, held at the Lowerton Brewery, provided an elegant closure to the whole conference. We would like to thank everyone who made BSDCan 2015 such a success, and look forward to next year! __________________________________________________________________ FreeBSD Support in pkgsrc Links pkgsrc home page URL: https://www.pkgsrc.org BulkTracker: Track bulk build status URL: http://bulktracker.appspot.com Blog posts on pkgsrc URL: https://www.geeklan.co.uk/?tag=3Dpkgsrc Contact: Sevan Janiyan pkgsrc is a fork of the FreeBSD Ports Collection by the NetBSD project with a focus on portability and multi-platform support. At present, pkgsrc supports building packages on 23 different platforms from a single tree, including FreeBSD While pkgsrc is not a replacement for ports in most use cases, it holds a unique position in mixed-platform environments where software needs to be the same version across all systems and built in a consistent manner, saving the user from having to resort to manually building programs or re-implementing a mechanism to do so. With the recent 2015Q2 release earlier this month, it is now possible to generate over 14000 packages on FreeBSD 10.1-RELEASE (up from 12800 last quarter). Work is in progress to add pkg support to pkgsrc. Open tasks: 1. Improve platform support to skip libusb on FreeBSD where libusb is bundled in base. This is causing the biggest breakage at the moment. 2. Expand the effort to the -STABLE and -CURRENT branches and, if possible, architectures other than amd64. Contributing shell access to such machines would be helpful (an unprivileged account is sufficient). __________________________________________________________________ The FreeBSD Foundation Links Foundation website URL: http://www.FreeBSDFoundation.org/ FreeBSD Journal URL: http://freebsdjournal.com/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage development projects, conferences and developer summits, and provide travel grants to FreeBSD developers. The Foundation purchases hardware to improve and maintain FreeBSD infrastructure and publishes FreeBSD white papers and marketing material to promote, educate, and advocate for the FreeBSD Project. The Foundation also represents the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. Here are some highlights of what we did to help FreeBSD during the last quarter: * We were a Platinum Sponsor for BSDCan 2015 and the sponsor for the Ottawa developer and vendor summits. We were pleased to provide 12 travel grants for FreeBSD contributors to attend the conference and have opportunities to meet face-to-face with other FreeBSD contributors. You can read some of their trip reports here. In celebration of our 15th anniversary we provided a delicious FreeBSD cake, which was happily devoured by conference attendees. Various Foundation team members gave talks, attended talks, participated in doc sprints, worked on efforts to improve FreeBSD, worked at our booth, and spent time talking to our constituents about areas where we can help with FreeBSD. Foundation members gave these talks: + Anne Dickison: "FreeBSD Advocacy: How you can spread the word" + Kirk McKusick: "An Introduction to the Implementation of ZFS" + George Neville-Neil: "Measure Twice, Code Once" and "Cambridge L41: Teaching Advanced Operating Systems with FreeBSD" + Ed Maste: "The LLDB Debugger in FreeBSD" and Ed Maste also ran the Vendor Summit. * We held our annual board meeting in Ottawa. We are pleased to announce the addition of Benedict Reuschling to our board of directors. Read his interview here. The current board of directors and officers were all re-elected. You can find out who is on our board here. We spent the day planning our 12-month goals, project roadmapping, FreeBSD education offerings, fundraising, and advocacy efforts. * Dru Lavigne promoted and gave a presentation on FreeBSD at LinuxFest Northwest 2015. * We have committed to sponsoring several upcoming conferences: vBSDCon, womENcourage 2015, EuroBSDCon 2015, Grace Hopper conference, BSDCon Brasil, Cambridge Developer Summit, and OpenZFS. You'll also find us at OSCON, July 21-23, and the SNIA Storage Developer Conference, Sept 21-24. * Fundraising So far, we have raised $361,000 for 2015 from over 500 donors. Juniper became a Gold level donor. We are actively approaching commercial FreeBSD users for Silver-plus donations, and asking large tech companies for separate women in tech funding, to help us recruit more women to the FreeBSD Project. We are also asking companies for funding to help with our FreeBSD education efforts. * We had the pleasure of hosting Groff the BSD Goat here in Colorado in April. * Infrastructure Support The Foundation funded almost $50,000 of equipment to support FreeBSD infrastructure. Most of this went towards new and upgraded servers at the NYI facility. We sent Glen Barber there to install the new servers. You can read all about his trip. * Advocacy Work The FreeBSD Journal has over 9200 subscribers, with a 98% renewal rate. Our marketing director, Anne Dickison, was busy providing advocacy work for the Project. She helped provide more FreeBSD marketing literature and material. This included the cool I Choose FreeBSD sticker and very popular I Love FreeBSD temporary tattoos that are available at conferences. We published April, May, and June Foundation Newsletters to highlight the work being done by the Foundation to support FreeBSD. These newsletters also include company FreeBSD testimonials, upcoming events where FreeBSD will be promoted, and the new From the Trenches articles from FreeBSD contributor experiences working with FreeBSD. * One of the Foundation's responsibilities is to protect FreeBSD intellectual property (IP). This includes protecting the FreeBSD trademarks. We granted trademark usage permission to various companies who want to show their support for FreeBSD. To get permission to use the trademarks, interested parties must agree to our Trademark Usage Terms and Conditions. * Project Development Work George Neville-Neil signed up new universities to look at the FreeBSD course including George Washington University, Johns Hopkins, and UC Santa Cruz. He is working with Verisign on the DevSummit that will be held at vBSDCon. He also worked with ARM to set up meeting with 18 hardware and silicon vendors at the ARM Partner Meeting in August. Ed Maste continued managing the FreeBSD/arm64 porting project. He also continued with updates to the ELF Toolchain tools in the FreeBSD base system and incorporated a set of fixes from the upstream project to fix issues with the strip tool. Ed investigated and fixed a set of outstanding issues with the new vt(4) console in the FreeBSD installer. Staff member Edward Napiera=C5=82a committed a number of bug fix mer= ges to the stable/10 branch for inclusion in FreeBSD 10.2, and continued investigation of a project to support runtime switching of the root file system. He merged a large number of improvements to the autofs automount daemon. He also supported FreeBSD developer Dmitry Chagin's work on 64-bit Linux binary emulation support by reviewing the extensive patch set. Those changes are now committed to FreeBSD's Subversion tree, and will arrive in FreeBSD 11.0. Staff member Konstantin Belousov continued development on the Intel DMA remap (DMAR) and Process Context Identifier (PCID) infrastructure projects. Kostik also contributed an extensive set of changes to multiple aspects of FreeBSD: stability improvements in the virtual memory subsystem, improved compatibility in options handling in the runtime loader, thread library improvements, and GDB debugger enhancements. Glen Barber, who is a Foundation employee, is also a release engineer for the Project. Here are some highlights of what he did to help the Project: + Added support to the release build code in 11-CURRENT for producing FreeBSD/aarch64 (arm64) memory stick images and virtual machine disk images for use within Qemu. + Worked with Colin Percival and Brad Davis on testing and refining the release build code to support building Amazon EC2 images, and Vagrant images for Hashicorp Atlas, respectively. + Reworked the FreeBSD/arm build code to provide a fully-native build infrastructure for the existing images (BEAGLEBONE, RPI-B, PANDABOARD, WANDBOARD), and add support for additional images (GUMSTIX, CUBOX/HUMMINGBOARD). + Wrote several additional utilities to reduce human error in several areas of Release Engineering, including producing the filesystem hierarchy used by the FTP mirrors, enhancements to the internal build scripts used by Release Engineering, and support for automatically uploading and publishing virtual machine images. + While attending BSDCan 2015, Glen worked with several developers and teams on various items, such as discussing packaging the base system with pkg(8), migrating internal FreeBSD servers to the new machines the Foundation purchased for the NYI facility, and discussing further possible future enhancements to the FreeBSD build infrastructure. + Started the 10.2-RELEASE cycle. __________________________________________________________________ ZFS Support for UEFI Boot/Loader Contact: Eric McCorkle UEFI-enabled boot1.efi and loader.efi have been modified to support loading and booting from a ZFS filesystem. The patch currently works with buildworld, and successfully boots on a test machine with a ZFS partition. In addition, the ZFS-enabled loader.efi can be treated as a chainloader using ZFS-enabled GRUB. The work on boot1.efi also reorganizes the code somewhat, splitting out the filesystem-specific parts into a modular framework. Open tasks: 1. More testing is needed for the following use cases: ZFS with GRUB+loader.efi, ZFS with boot1+loader.efi, UFS with boot1+loader.efi (to test the modularization of boot1.efi) 2. Have boot1.efi check partition type GUIDs before probing for filesystems. 3. Get patch accepted upstream and committed. __________________________________________________________________ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQGgBAEBCgAGBQJVtZjoAAoJECjZpvNk63USYBEMILUlzfPMfNdW7MnlKxVft5WE sZ2DS04wfIHAEHDAjScZHKN0rAgyOHT72VTRvO2KEkpm2OEtMnIVY5sH31NbnFUy m90iYXWksXBDzYHGNiNbkYKprjIp0Rz0gGefCxQrDrA2tt4HPjIyuwdl1xmhT8O6 vt3AJPCEz5MjQL42ETQ78fn117i5iSECCkOgRC4H4vH//n4zxjJWgmkhrc6gXljf 9b3rOw/A3fVTvaDR7pzhrnQ+QjGsW7BgTMh7JZybbCKT+Yj7n29iVWpEVp7FQcgB sPJ4Rcei8BUBaCfvoND6bzWKEfuxteqriJFKNazlMRQFDEuHl6jHYH5QXfJsZFr/ etHrPnIWO9qOveNs7ANYQyT6LaFEyKLz2osi63uvVIjS3DBNZ8v9C7jEzvAmKEpl G8j9nOMKwMDqMpRNlDfD8Utu+0eQDveqCaqer8utgjMH8UgkAhmNP9oLNXhb38Dp URmZunSSZOVxmXioxTiro3/1TxUvu+I1LS8asLfho1zpDgM=3D =3DOj0n -----END PGP SIGNATURE----- From owner-freebsd-hackers@freebsd.org Mon Jul 27 04:27:35 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 50AF19AC37E for ; Mon, 27 Jul 2015 04:27:35 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 338AEDA8; Mon, 27 Jul 2015 04:27:34 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (ppp121-45-248-13.lns20.per4.internode.on.net [121.45.248.13]) (authenticated bits=0) by vps1.elischer.org (8.14.9/8.14.9) with ESMTP id t6R4RTAP049314 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Sun, 26 Jul 2015 21:27:32 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: Kernel Debug Howto To: HeTak , Kristof Provost References: <514DDE7F-CF61-461D-A9FF-232DC938BDF5@FreeBSD.org> Cc: freebsd-hackers From: Julian Elischer Message-ID: <55B5B32B.8060709@freebsd.org> Date: Mon, 27 Jul 2015 12:27:23 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 04:27:35 -0000 On 7/25/15 5:24 PM, HeTak wrote: > On Sat, Jul 25, 2015 at 1:41 PM, Kristof Provost wrote: With VMs you can (in some systems) wire two VMs back-to-back using serial port support, and run kgdb (kernel gdb) as a remote server on the target system and the kgdb binary on the second system this works well. if you are using virtualbox or bhyve on a FreeBSD host you can just run kgdb from the host (assuming you have sources there) bhyve has a gdb connection built in that allows a suitably compiled kernel to have a direct tcp socket conneciton, however it's deadly slow (because it does a VM switch for every byte transfered). I've been slowly working on a replacement that works faster but $JOB keep ssapping all mu free time. You can also use the nmdm driver (virtual nullmodem) to give gdb a 'tty' to debg through that actually is a port on the VM. Once you have kgdb running you can try the 'xxgdb' and 'ddd' as frontends. My memory is that for xxgdb you need to set some variables to let it know to call kdgb instead of gdb. > >>> On 25 Jul 2015, at 10:54, HeTak wrote: >>> I have recently started some developments on FreeBSD net section. >> Great! >> > ​Thank you Kristof, b > oth for your fast answering and your welcome.​ :) > >>> But I am kinda new to this field. My base interest is to first >> understand the >>> implementation structure via tracing the code and so. >>> >>> I have three major questions: >>> 1- how to debug changes made to FreeBSD kernel? >>> (You know, till some levels, I can even use uprintf or so, but, for >> example >>> inside radix.c (where I wanna understand how a route is checked to be >>> unique and then inserted to the tree) I can't do such checks..) >> dtrace can be quite useful to understand flows. You can grab stack traces >> (i.e. figure out where things are called from), get function arguments, … > >>> 2- are there standards there for freebsd kernel developments of which I >> can >>> follow so my job gets a bit simplified? >>> (Any development guides or so?I prospect it to be some differences >> between >>> system developments and normal coding, but I don't have an idea on how to >>> get that). >> There’s style(9) for coding style. >> I’d also recommend "The Design and Implementation of the FreeBSD Operating >> System” >> (the second edition). >> >>> 3- what is the fastest way to apply changes to FreeBSD kernel? >>> (For now, I just follow the normal build & install kernel & reboot.) >> I pretty much do that. Depending on what you’re working on it might be >> easier to run it in a VM. >> My work lately has been on the network code, so a VM is very convenient. >> It’s not so useful if you’re working on drivers, of course. >> > ​ > ​Great to hear of such a tool as Dtrace and also the book. and actually I'm > using a VM as well. ​ > > ​I'll check these and hope to be successful through my way. > >> Regards, >> Kristof > > ​Cheerio, > HeTak​ > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > > From owner-freebsd-hackers@freebsd.org Mon Jul 27 14:20:00 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3538E9AC6CC; Mon, 27 Jul 2015 14:20:00 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from smtp.digiware.nl (unknown [IPv6:2001:4cb8:90:ffff::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id ED7166BA; Mon, 27 Jul 2015 14:19:59 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id 7058615344D; Mon, 27 Jul 2015 16:19:55 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vepn3sywimPg; Mon, 27 Jul 2015 16:14:55 +0200 (CEST) Received: from [192.168.101.176] (vpn.ecoracks.nl [31.223.170.173]) by smtp.digiware.nl (Postfix) with ESMTPA id 2A1051534C0; Mon, 27 Jul 2015 16:14:55 +0200 (CEST) Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 To: freebsd-hackers@freebsd.org References: Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org From: Willem Jan Withagen Message-ID: <55B63CDE.9040803@digiware.nl> Date: Mon, 27 Jul 2015 16:14:54 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 14:20:00 -0000 On 27/07/2015 04:39, Benjamin Kaduk wrote: > * Separated email services (and single-point-of-failure cases) from > the machine that has been handling this task for over 18 years, to > new, single-purpose service installations Hi, This sort of sounds like the system that a former company (IAE) donated to Jordan when he was here in Arnhem at a FreeBSD meeting organized by Wilco Bulte. I think it was called freefall?? There used to be pictures of the meeting online, but I can't seem to find them. Would be nice to know if that is the case, because then I'm really impressed with the life time of that system... Does anybody know if this is actually the case? --WjW From owner-freebsd-hackers@freebsd.org Mon Jul 27 14:25:58 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 96EFD9AC8E9; Mon, 27 Jul 2015 14:25:58 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 83EEBDDB; Mon, 27 Jul 2015 14:25:58 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by freefall.freebsd.org (Postfix) with ESMTP id CAB221189; Mon, 27 Jul 2015 14:25:57 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Date: Mon, 27 Jul 2015 14:25:56 +0000 From: Glen Barber To: Willem Jan Withagen Cc: freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 Message-ID: <20150727142556.GD54478@FreeBSD.org> References: <55B63CDE.9040803@digiware.nl> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="jCrbxBqMcLqd4mOl" Content-Disposition: inline In-Reply-To: <55B63CDE.9040803@digiware.nl> X-Operating-System: FreeBSD 11.0-CURRENT amd64 X-SCUD-Definition: Sudden Completely Unexpected Dataloss X-SULE-Definition: Sudden Unexpected Learning Event X-PEKBAC-Definition: Problem Exists, Keyboard Between Admin/Computer User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 14:25:58 -0000 --jCrbxBqMcLqd4mOl Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jul 27, 2015 at 04:14:54PM +0200, Willem Jan Withagen wrote: > On 27/07/2015 04:39, Benjamin Kaduk wrote: > > * Separated email services (and single-point-of-failure cases) from > > the machine that has been handling this task for over 18 years, to > > new, single-purpose service installations >=20 > Hi, >=20 > This sort of sounds like the system that a former company (IAE) donated > to Jordan when he was here in Arnhem at a FreeBSD meeting organized by > Wilco Bulte. I think it was called freefall?? > There used to be pictures of the meeting online, but I can't seem to > find them. >=20 > Would be nice to know if that is the case, because then I'm really > impressed with the life time of that system... > Does anybody know if this is actually the case? >=20 Based on what I've recently learned of the machine's history, it was originally freefall, then became known as 'hub'. Glen --jCrbxBqMcLqd4mOl Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVtj90AAoJEAMUWKVHj+KTWPIP/001JhiV0NyiKuPvkv6SgWB9 UC9UEwC2gYYDfzFK6LL+f+iMJipMH3iZwPcHwMUqMpPOwmSD8kQgMYjQx1tisdln VOzlbNCVfwex7oFj+VsysnqT3Z/H9+5D/+pk6pjCTHG1NNcrM7PXcFLBNqywnhg/ bssr4i888YUnBVTNIIMFvcS0GbHx72jiDGSwqjzmSDYtYLN09FhXEzlFrcWRDoQq Qb6qk3spIE5kqWuY35mWwKmqKYH/vocEJ2Uhw0JZh7klkwhez5di3rTRtLfudMTM ErKY3u/hSb0VIzJYP84poGWbrY+sqJKwhqDLEGV6Ga5jLyjEP1klxnK3FePcGG65 gqdWq6xoXQAXIdNBcDlcHh2zkOzSE1kspoEbfiofC5I0ewHGcwPrTeFJUg/yiSlg sH42p+b6Q4qargEDA+91uSJmY7NIGi7R7Yn4FrV/77wCxXhWtD0U388zs/dAtSvo FQKSDGdmIg/QC8dTTTYn5b7Wy3p+zvOu+kEiCMBa7wcl1F9w4pjBXApSW+02NwID OKseJjN0ZFtfXG0F6QexU6k7uNiypgNSd56ZWembRlx2O589/MZ6+8FIAAMnh8J4 BMDtz9fwszlP6CeuxDSwdHl+Hs68o+tlVtr2qlLgXM30WKPsMc0tL9/kg/t5PjtJ njz3qxTWmFA1ZZcvqyM5 =x921 -----END PGP SIGNATURE----- --jCrbxBqMcLqd4mOl-- From owner-freebsd-hackers@freebsd.org Mon Jul 27 14:32:54 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D4AA19ACAB8; Mon, 27 Jul 2015 14:32:54 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from smtp.digiware.nl (smtp.digiware.nl [31.223.170.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 8FA843EC; Mon, 27 Jul 2015 14:32:54 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id 133CA15340A; Mon, 27 Jul 2015 16:32:45 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MtKGLVNhN1Ui; Mon, 27 Jul 2015 16:32:35 +0200 (CEST) Received: from [192.168.101.176] (vpn.ecoracks.nl [31.223.170.173]) by smtp.digiware.nl (Postfix) with ESMTPA id 1E34D153408; Mon, 27 Jul 2015 16:32:35 +0200 (CEST) Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 To: Glen Barber References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> Cc: freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org From: Willem Jan Withagen Message-ID: <55B64102.4090408@digiware.nl> Date: Mon, 27 Jul 2015 16:32:34 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <20150727142556.GD54478@FreeBSD.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 14:32:54 -0000 On 27/07/2015 16:25, Glen Barber wrote: > On Mon, Jul 27, 2015 at 04:14:54PM +0200, Willem Jan Withagen wrote: >> On 27/07/2015 04:39, Benjamin Kaduk wrote: >>> * Separated email services (and single-point-of-failure cases) from >>> the machine that has been handling this task for over 18 years, to >>> new, single-purpose service installations >> >> Hi, >> >> This sort of sounds like the system that a former company (IAE) donated >> to Jordan when he was here in Arnhem at a FreeBSD meeting organized by >> Wilco Bulte. I think it was called freefall?? >> There used to be pictures of the meeting online, but I can't seem to >> find them. >> >> Would be nice to know if that is the case, because then I'm really >> impressed with the life time of that system... >> Does anybody know if this is actually the case? >> > > Based on what I've recently learned of the machine's history, it was > originally freefall, then became known as 'hub'. You have any idea what is/was actual the hardware that was in the box? If I remember correctly we gave Jordan a check for like 5000 guilders. Which I guess would be 2500 us$ at that time. Which was not an enormous amount of money, so even more impressive that the system lasted 18 years :) --WjW From owner-freebsd-hackers@freebsd.org Mon Jul 27 14:42:21 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F0B919AC02C; Mon, 27 Jul 2015 14:42:20 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id D4627EBC; Mon, 27 Jul 2015 14:42:20 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by freefall.freebsd.org (Postfix) with ESMTP id 33A0E17D8; Mon, 27 Jul 2015 14:42:20 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Date: Mon, 27 Jul 2015 14:42:18 +0000 From: Glen Barber To: Willem Jan Withagen Cc: freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 Message-ID: <20150727144218.GE54478@FreeBSD.org> References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> <55B64102.4090408@digiware.nl> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="ytoMbUMiTKPMT3hY" Content-Disposition: inline In-Reply-To: <55B64102.4090408@digiware.nl> X-Operating-System: FreeBSD 11.0-CURRENT amd64 X-SCUD-Definition: Sudden Completely Unexpected Dataloss X-SULE-Definition: Sudden Unexpected Learning Event X-PEKBAC-Definition: Problem Exists, Keyboard Between Admin/Computer User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 14:42:21 -0000 --ytoMbUMiTKPMT3hY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jul 27, 2015 at 04:32:34PM +0200, Willem Jan Withagen wrote: > On 27/07/2015 16:25, Glen Barber wrote: > > On Mon, Jul 27, 2015 at 04:14:54PM +0200, Willem Jan Withagen wrote: > >> On 27/07/2015 04:39, Benjamin Kaduk wrote: > >>> * Separated email services (and single-point-of-failure cases) from > >>> the machine that has been handling this task for over 18 years, to > >>> new, single-purpose service installations > >> > >> Hi, > >> > >> This sort of sounds like the system that a former company (IAE) donated > >> to Jordan when he was here in Arnhem at a FreeBSD meeting organized by > >> Wilco Bulte. I think it was called freefall?? > >> There used to be pictures of the meeting online, but I can't seem to > >> find them. > >> > >> Would be nice to know if that is the case, because then I'm really > >> impressed with the life time of that system... > >> Does anybody know if this is actually the case? > >> > >=20 > > Based on what I've recently learned of the machine's history, it was > > originally freefall, then became known as 'hub'. >=20 > You have any idea what is/was actual the hardware that was in the box? >=20 > If I remember correctly we gave Jordan a check for like 5000 guilders. > Which I guess would be 2500 us$ at that time. Which was not an enormous > amount of money, so even more impressive that the system lasted 18 years = :) >=20 The physical hardware did not last this long, and I do not recall the physical specs of the recently deprecated hardware, but as far as "handling this task for 18 years", that could have been clarified a bit more (my fault). The system moved chassis several times, but was never reinstalled (as far as we can tell) - it was originally a FreeBSD 2-STABLE install, and was upgraded constantly throughout its lifetime, and finally ran 11-CURRENT before being decommissioned. Glen --ytoMbUMiTKPMT3hY Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJVtkNKAAoJEAMUWKVHj+KTYqkQAJBD6PN/eQUEKta7H9xjG+xH tZIE3cPHGV3967i4/BF7cJaUGzKJo3X2A0HI4uQj5DY8D0iLd3nj5p7Q5WUNjbfq CeqE1cVphcsL3keE6dwzoJpCELE46RqZfvTNUXaUh9+Jt5F50ckwSeQTZtQSc3kK wP7JGo4qUEgJX4+ykYly1Sn/CM3aCfQIsWjg2eSneoxZ5LyuNxong/mSnBJ1XlXG y81CjohrdpQo2y0WPMtrPEmf/ofu+iLeY1Gi64qgu0fkilrg4Bb1XscKn+PI/v9s h1Q3OzWB9srEowYZ0GS0N7TYtNe2MnMnevi4wrkL/qNpWfv2m/rXa/nP5HuqOTLL 2hKJHDOwW8knQ3OzgjM1rTo2c6z8pZdE4u9f1hup5ku7GVINvCYRnl6nmOZDj7RM AZdPqOhfN8KXHB4buhHuzzs2o76sMho0UgYCmw+fLHL0FpupqHgRh45F8tbLrxuT 6GO+DoKFIY76L0dw8YRiFvfxlCnYgyVxeub1yEZ0071357kjGD4YIqcQw70ikAHf sFrzVUdTC+UyvJWTTjtM5FPDCtdH7L0oyFf/UThGuybPDyC2Ub1UYWDr+7G1vrWA hDlhwP3vN/lMLKi+/nRLTtC/vdvASmREn+C0sWhlq7Y3YVV+eUtLZ2ADns/l+dQK R8KsYvaxItGNLfguOQX9 =U/y7 -----END PGP SIGNATURE----- --ytoMbUMiTKPMT3hY-- From owner-freebsd-hackers@freebsd.org Mon Jul 27 15:46:20 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D1B139AC0FD; Mon, 27 Jul 2015 15:46:20 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from smtp.digiware.nl (smtp.digiware.nl [31.223.170.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 934C5825; Mon, 27 Jul 2015 15:46:20 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id 59D8E153401; Mon, 27 Jul 2015 17:46:18 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0czKSQpC_1LX; Mon, 27 Jul 2015 17:45:49 +0200 (CEST) Received: from [192.168.101.176] (vpn.ecoracks.nl [31.223.170.173]) by smtp.digiware.nl (Postfix) with ESMTPA id CCF7815340A; Mon, 27 Jul 2015 17:45:49 +0200 (CEST) Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 To: Glen Barber References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> <55B64102.4090408@digiware.nl> <20150727144218.GE54478@FreeBSD.org> Cc: freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org From: Willem Jan Withagen Message-ID: <55B6522D.9040907@digiware.nl> Date: Mon, 27 Jul 2015 17:45:49 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <20150727144218.GE54478@FreeBSD.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 15:46:20 -0000 On 27/07/2015 16:42, Glen Barber wrote: > On Mon, Jul 27, 2015 at 04:32:34PM +0200, Willem Jan Withagen wrote: >> On 27/07/2015 16:25, Glen Barber wrote: >>> On Mon, Jul 27, 2015 at 04:14:54PM +0200, Willem Jan Withagen wrote: >>>> On 27/07/2015 04:39, Benjamin Kaduk wrote: >>>>> * Separated email services (and single-point-of-failure cases) from >>>>> the machine that has been handling this task for over 18 years, to >>>>> new, single-purpose service installations >>>> >>>> Hi, >>>> >>>> This sort of sounds like the system that a former company (IAE) donated >>>> to Jordan when he was here in Arnhem at a FreeBSD meeting organized by >>>> Wilco Bulte. I think it was called freefall?? >>>> There used to be pictures of the meeting online, but I can't seem to >>>> find them. >>>> >>>> Would be nice to know if that is the case, because then I'm really >>>> impressed with the life time of that system... >>>> Does anybody know if this is actually the case? >>>> >>> >>> Based on what I've recently learned of the machine's history, it was >>> originally freefall, then became known as 'hub'. >> >> You have any idea what is/was actual the hardware that was in the box? >> >> If I remember correctly we gave Jordan a check for like 5000 guilders. >> Which I guess would be 2500 us$ at that time. Which was not an enormous >> amount of money, so even more impressive that the system lasted 18 years :) >> > > The physical hardware did not last this long, and I do not recall the > physical specs of the recently deprecated hardware, but as far as > "handling this task for 18 years", that could have been clarified a bit > more (my fault). The system moved chassis several times, but was never > reinstalled (as far as we can tell) - it was originally a FreeBSD > 2-STABLE install, and was upgraded constantly throughout its lifetime, > and finally ran 11-CURRENT before being decommissioned. Right, that makes more sense. And I'm sort of more "relaxed" that there is not that much commodity hardware capable to survive that long running 24*7 ... The oldest servers here in the basement are like 10 years old, and on the brink of being thrashed... --WjW From owner-freebsd-hackers@freebsd.org Mon Jul 27 18:32:38 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6C1AC9AC932; Mon, 27 Jul 2015 18:32:38 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 29B8FAEA; Mon, 27 Jul 2015 18:32:37 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (ppp121-45-239-102.lns20.per1.internode.on.net [121.45.239.102]) (authenticated bits=0) by vps1.elischer.org (8.14.9/8.14.9) with ESMTP id t6RIWQB4051787 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Mon, 27 Jul 2015 11:32:29 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 To: Willem Jan Withagen , Glen Barber References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> <55B64102.4090408@digiware.nl> Cc: freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org From: Julian Elischer Message-ID: <55B67935.3040604@freebsd.org> Date: Tue, 28 Jul 2015 02:32:21 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <55B64102.4090408@digiware.nl> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 18:32:38 -0000 On 7/27/15 10:32 PM, Willem Jan Withagen wrote: > On 27/07/2015 16:25, Glen Barber wrote: >> On Mon, Jul 27, 2015 at 04:14:54PM +0200, Willem Jan Withagen wrote: >>> On 27/07/2015 04:39, Benjamin Kaduk wrote: >>>> * Separated email services (and single-point-of-failure cases) from >>>> the machine that has been handling this task for over 18 years, to >>>> new, single-purpose service installations >>> Hi, >>> >>> This sort of sounds like the system that a former company (IAE) donated >>> to Jordan when he was here in Arnhem at a FreeBSD meeting organized by >>> Wilco Bulte. I think it was called freefall?? >>> There used to be pictures of the meeting online, but I can't seem to >>> find them. >>> >>> Would be nice to know if that is the case, because then I'm really >>> impressed with the life time of that system... >>> Does anybody know if this is actually the case? >>> >> Based on what I've recently learned of the machine's history, it was >> originally freefall, then became known as 'hub'. > You have any idea what is/was actual the hardware that was in the box? > > If I remember correctly we gave Jordan a check for like 5000 guilders. > Which I guess would be 2500 us$ at that time. Which was not an enormous > amount of money, so even more impressive that the system lasted 18 years :) I think it was a bit like my grandfather's axe.. A really great axe. we replaced the handle 3 times, the head four times and put in a couple of new wedges, but it's a great axe that one! > > --WjW > > _______________________________________________ > freebsd-current@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Mon Jul 27 18:39:54 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EFC7E9ACAED for ; Mon, 27 Jul 2015 18:39:54 +0000 (UTC) (envelope-from mashtizadeh@gmail.com) Received: from mail-ig0-x233.google.com (mail-ig0-x233.google.com [IPv6:2607:f8b0:4001:c05::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BF237119 for ; Mon, 27 Jul 2015 18:39:54 +0000 (UTC) (envelope-from mashtizadeh@gmail.com) Received: by iggf3 with SMTP id f3so89298709igg.1 for ; Mon, 27 Jul 2015 11:39:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=d/QHrlzDl5NDDHFZbxG6O7qtJrcLbqgC+46Lrt6QmjM=; b=B5g7vQ6T+g3Sg9wRK43ZzhEN66DZW71zS0HKOCCpx/jie7yb1ZMMOc3tpqrlye3nxU BiVfIm5qfWG3wmudcN9xggc5hsK3Bul8LfBNHiULPzOzhbpbIira4xd1iPrZ0ILkU4zD uZd77vID7ymToZ/VL9mOD8RWknuTI9GXijgRUY7WyoEoY2fMBQfhyAv276X81VVxEHD6 Zw6GDZUvqMVWbrHjiV/C0q3STHtp7P7LuGWwlm9cyl3feA+81pq7L97idarMAxDWNQrc 4IIgXSRmFBYUmA8yJN7GK/lgZo2GT5xwhhg3i/UAZ/8bdr+iZ1bniHTolaQhz9frjQcu ncpw== MIME-Version: 1.0 X-Received: by 10.107.47.34 with SMTP id j34mr48811104ioo.136.1438022394218; Mon, 27 Jul 2015 11:39:54 -0700 (PDT) Received: by 10.107.30.80 with HTTP; Mon, 27 Jul 2015 11:39:54 -0700 (PDT) Date: Mon, 27 Jul 2015 11:39:54 -0700 Message-ID: Subject: SPEC CPU2006 Benchmarks From: Ali Mashtizadeh To: FreeBSD Hackers Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jul 2015 18:39:55 -0000 Hey Folks, I was curious if anyone has been working with SPEC CPU2006 on FreeBSD 10? Seems like several benchmarks crash or fail to build depending if you try V1.1 or V1.2 of the benchmarks. In version 1.2: perlbench coredumps, gcc exits prematurely, and dealII fails to build. -- Ali Mashtizadeh From owner-freebsd-hackers@freebsd.org Wed Jul 29 16:01:13 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D8A0D9AE587; Wed, 29 Jul 2015 16:01:13 +0000 (UTC) (envelope-from jordan.hubbard@gmail.com) Received: from mail-pd0-x22b.google.com (mail-pd0-x22b.google.com [IPv6:2607:f8b0:400e:c02::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A4AC81ADD; Wed, 29 Jul 2015 16:01:13 +0000 (UTC) (envelope-from jordan.hubbard@gmail.com) Received: by pdrg1 with SMTP id g1so8135445pdr.2; Wed, 29 Jul 2015 09:01:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:content-type:mime-version:subject:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=v5mTbh3Zjf8mK7phj5T4WVjWv1gi6u5MP0jOdFbaJUE=; b=qx1gr1NCQ8ZPbi0ZWz33RL44KaQzpDG8CrMbL3/FGAVD/ZCEumoTumwOxwzZi2kI0O sat6FsZ3f4BhDxkxEqupxmFWz0Vfyius/DyDw/fu17pD5bV7Pc/uGHo0pDCwkojScCvm E4IT2cjmDMUunkKkMaNmTEyH3v4YIRdSjkVzIsM015MAbdstLeET1FtyJHPhQ5aAVwSx hYgOhoVHrA754f5fsivXVleDZYMYbEx2vByh93PlM41uV5QyVO3zodyQa6flygsSxC1C kcs3J/rl3BozLnU5JDSMA0QzQlhqRWO51LTUCOzkhWYUmYzAelVETHx2/1Rcyez7fwwO jpgg== X-Received: by 10.70.94.98 with SMTP id db2mr96235516pdb.130.1438185673196; Wed, 29 Jul 2015 09:01:13 -0700 (PDT) Received: from [10.20.30.52] (75-101-82-48.static.sonic.net. [75.101.82.48]) by smtp.gmail.com with ESMTPSA id kk6sm41507868pdb.94.2015.07.29.09.01.10 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 29 Jul 2015 09:01:11 -0700 (PDT) From: Jordan Hubbard X-Google-Original-From: Jordan Hubbard Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2102\)) Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 In-Reply-To: <55B64102.4090408@digiware.nl> Date: Wed, 29 Jul 2015 09:01:07 -0700 Cc: Glen Barber , freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-stable@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <1C044E26-0C59-491F-8779-38CAC1D7D66C@mail.turbofuzz.com> References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> <55B64102.4090408@digiware.nl> To: Willem Jan Withagen X-Mailer: Apple Mail (2.2102) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jul 2015 16:01:14 -0000 > On Jul 27, 2015, at 7:32 AM, Willem Jan Withagen = wrote: >=20 > You have any idea what is/was actual the hardware that was in the box? >=20 > If I remember correctly we gave Jordan a check for like 5000 guilders. > Which I guess would be 2500 us$ at that time. Which was not an = enormous > amount of money, so even more impressive that the system lasted 18 = years :) And thank you again for that donation! We should have another = conference at that place - I remember it was unusual to have a = conference at a location that also supplied tools for hacking our = Librettos. :) I believe those original funds purchased a Pentium Pro system of fairly = reasonable configuration. As Julian says, however, the individual parts = were replaced over the years, including the motherboard, and the = freefall of today likely bore little resemblance to the one we purchased = at the local PC shop in Walnut Creek, California! - Jordan From owner-freebsd-hackers@freebsd.org Wed Jul 29 16:22:50 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BF6019AED47; Wed, 29 Jul 2015 16:22:50 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from smtp.digiware.nl (smtp.digiware.nl [31.223.170.169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7F150F1C; Wed, 29 Jul 2015 16:22:50 +0000 (UTC) (envelope-from wjw@digiware.nl) Received: from rack1.digiware.nl (unknown [127.0.0.1]) by smtp.digiware.nl (Postfix) with ESMTP id 9023B153408; Wed, 29 Jul 2015 18:22:46 +0200 (CEST) X-Virus-Scanned: amavisd-new at digiware.nl Received: from smtp.digiware.nl ([127.0.0.1]) by rack1.digiware.nl (rack1.digiware.nl [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NVWG-q5C0udh; Wed, 29 Jul 2015 18:22:45 +0200 (CEST) Received: from [IPv6:2001:4cb8:3:1:e05d:5471:f6d0:12e4] (unknown [IPv6:2001:4cb8:3:1:e05d:5471:f6d0:12e4]) by smtp.digiware.nl (Postfix) with ESMTP id 38EC9153413; Wed, 29 Jul 2015 18:10:10 +0200 (CEST) Message-ID: <55B8FADA.4070204@digiware.nl> Date: Wed, 29 Jul 2015 18:10:02 +0200 From: Willem Jan Withagen Organization: Digiware Management b.v. User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0 MIME-Version: 1.0 To: Jordan Hubbard CC: Glen Barber , freebsd-current@freebsd.org, freebsd-stable@freebsd.org, freebsd-hackers@freebsd.org Subject: Re: FreeBSD Quarterly Status Report - Second Quarter 2015 References: <55B63CDE.9040803@digiware.nl> <20150727142556.GD54478@FreeBSD.org> <55B64102.4090408@digiware.nl> <1C044E26-0C59-491F-8779-38CAC1D7D66C@mail.turbofuzz.com> In-Reply-To: <1C044E26-0C59-491F-8779-38CAC1D7D66C@mail.turbofuzz.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jul 2015 16:22:50 -0000 On 29-7-2015 18:01, Jordan Hubbard wrote: > >> On Jul 27, 2015, at 7:32 AM, Willem Jan Withagen >> wrote: >> >> You have any idea what is/was actual the hardware that was in the >> box? >> >> If I remember correctly we gave Jordan a check for like 5000 >> guilders. Which I guess would be 2500 us$ at that time. Which was >> not an enormous amount of money, so even more impressive that the >> system lasted 18 years :) > > And thank you again for that donation! We should have another > conference at that place - I remember it was unusual to have a > conference at a location that also supplied tools for hacking our > Librettos. :) It was a fun weekend. I think Robert demonstrated a heavy system @work, where he could compile the kernel (or was it world) within 20 minutes.... We were all amasted that the lines went by faster than we could read. > I believe those original funds purchased a Pentium Pro system of > fairly reasonable configuration. As Julian says, however, the > individual parts were replaced over the years, including the > motherboard, and the freefall of today likely bore little resemblance > to the one we purchased at the local PC shop in Walnut Creek, > California! If it went anything like here in the workshed, only the metal box is more or less still there. But all other parts have gone. Some 4U 19" frames have the fronts cut out, to make room for diskbays. :) Exactly like Julian suggests. I'd like his phrasing thou. --WjW From owner-freebsd-hackers@freebsd.org Wed Jul 29 23:31:11 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3062D9AE693 for ; Wed, 29 Jul 2015 23:31:11 +0000 (UTC) (envelope-from rdarbha@juniper.net) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0121.outbound.protection.outlook.com [65.55.169.121]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "MSIT Machine Auth CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id CD085E00 for ; Wed, 29 Jul 2015 23:31:10 +0000 (UTC) (envelope-from rdarbha@juniper.net) Received: from DM2PR0501MB1150.namprd05.prod.outlook.com (10.160.245.152) by DM2PR0501MB1551.namprd05.prod.outlook.com (10.160.133.141) with Microsoft SMTP Server (TLS) id 15.1.225.19; Wed, 29 Jul 2015 23:31:03 +0000 Received: from DM2PR0501MB1150.namprd05.prod.outlook.com ([10.160.245.152]) by DM2PR0501MB1150.namprd05.prod.outlook.com ([10.160.245.152]) with mapi id 15.01.0225.018; Wed, 29 Jul 2015 23:31:03 +0000 From: Raviprakash Darbha To: "freebsd-hackers@freebsd.org" CC: Steve Kiernan , Simon Gerraty Subject: getting a disk structure given a device name Thread-Topic: getting a disk structure given a device name Thread-Index: AQHQylaiWAQweQ0eCEqSdk6fBJ7DWQ== Date: Wed, 29 Jul 2015 23:31:03 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: freebsd.org; dkim=none (message not signed) header.d=none; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [66.129.239.10] x-microsoft-exchange-diagnostics: 1; DM2PR0501MB1551; 5:wF2iDCaGwBH30s6SQoosK1dr8+yVk6xpZfzV+2YE0SHl5CVzwehJLdm/Ca7f0EFrvDFtQq1N2/NASiP0TBqnFQ9ZaacftvHfVncbThJd6znRnEHlZ5HWsLGe6z16SdH3yViEV/vjrWofVhdItQDA9w==; 24:23GyzkbDZsfkNeGOVMxT/9Rym/g/jJRSgGrq1OGIo/NZtLGY6gIclui/k0Vxxs7wE0TdXkpOEM7yYOS9Dq8amh7g2sSkROX+afsHJNqGNnU=; 20:veOHozo55TMR9r7hD1DaDvG2ArrD9HWUzG4zEAw1CKTNHAQh2m/UXIafL+TiT34+vSllvEBIYpVwYHUKdBiOOA== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:DM2PR0501MB1551; dm2pr0501mb1551: X-MS-Exchange-Organization-RulesExecuted x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:DM2PR0501MB1551; BCL:0; PCL:0; RULEID:; SRVR:DM2PR0501MB1551; x-forefront-prvs: 0652EA5565 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(53754006)(86362001)(82746002)(87936001)(66066001)(110136002)(107886002)(19580395003)(2351001)(62966003)(450100001)(50986999)(2501003)(46102003)(2900100001)(77156002)(83716003)(5001960100002)(122556002)(102836002)(92566002)(40100003)(77096005)(36756003)(189998001)(33656002)(2656002)(229853001)(54356999)(5002640100001)(106116001)(99286002)(4001430100001); DIR:OUT; SFP:1102; SCL:1; SRVR:DM2PR0501MB1551; H:DM2PR0501MB1150.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: juniper.net X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jul 2015 23:31:03.3038 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR0501MB1551 X-Mailman-Approved-At: Wed, 29 Jul 2015 23:39:08 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jul 2015 23:31:11 -0000 Hello All=20 I am trying to write a filter driver for the ata block on freebsd 6.2 to si= mulate failed reads and writes. For this i would like to know if there is a= call to convert a given device path (ex /dev/ad0) to a disk structure (ad= p->disk) which has the strategy function so that i could modify that and po= int it to my filter.=20 There is a similar function in linux kernel blk_get_by_path and would like = to know if there is something similar on freebsd too. The other option is to write a function to traverse through the list of de= vs and return the disk which has the disk->d_name as the given device path.= This is a bit laborious but not sure if thats the only option.=20 Any help is appreciated.=20 Thanks Ravi=20 = From owner-freebsd-hackers@freebsd.org Thu Jul 30 04:27:07 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 40D0A9AED50 for ; Thu, 30 Jul 2015 04:27:07 +0000 (UTC) (envelope-from gerryw@compvia.com) Received: from mail01.compvia.com (mail01.compvia.com [108.174.62.107]) (using TLSv1.1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 159B41449 for ; Thu, 30 Jul 2015 04:27:06 +0000 (UTC) (envelope-from gerryw@compvia.com) X-Footer: Y29tcHZpYS5jb20= Received: from [108.252.2.26] ([108.252.2.26]) by mail01.compvia.com (Kerio Connect 8.5.0) for freebsd-hackers@freebsd.org; Tue, 28 Jul 2015 22:56:02 -0500 Date: Tue, 28 Jul 2015 22:55:51 -0500 Subject: Custom point-to-point tunnel protocol Importance: Normal X-Priority: 3 Thread-Index: AdDJsTKSZtjRp7U5SNyGbvtW9uuDww== Message-ID: <50125924-97cf-4d24-a992-64c700ece17e@compvia.com> X-Mailer: Kerio Outlook Connector (Offline Edition) (8.5.0.4416 T0) From: Gerry Weaver To: freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 04:27:07 -0000 Hello All, I need to create a secure point-to-point tunnel protocol for a project that I'm working on. I have several questions related to the security aspect of that protocol. I'm looking for a place or resource where I can ask those type of questions. Could anyone please recommend a good mailing list or other resource for this kind of thing? I've checked this out on Google, but I haven't been able to find exactly what I'm looking for. Thanks, -G From owner-freebsd-hackers@freebsd.org Thu Jul 30 15:15:01 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3683C9AFD6D for ; Thu, 30 Jul 2015 15:15:01 +0000 (UTC) (envelope-from asomers@gmail.com) Received: from mail-oi0-x22e.google.com (mail-oi0-x22e.google.com [IPv6:2607:f8b0:4003:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F04E3EF for ; Thu, 30 Jul 2015 15:15:00 +0000 (UTC) (envelope-from asomers@gmail.com) Received: by oixx19 with SMTP id x19so23396089oix.0 for ; Thu, 30 Jul 2015 08:15:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:date:message-id:subject :from:to:cc:content-type; bh=E1wlhp6LWXbR4HidUsqALDTBKoLFS5ly+jjASRPfr0k=; b=ed+lBdkwSDFpj8lkOVPZIFCN152NP1voP+gC1CdgOgSASlm8C6bokO/E/m0FRjmnjq ff0iPYRpaIYJETw5rDn/CzMdEqo8iFL2rvcLicpDTZSoxGSmh3LfR29Wf+FabBiulnu1 JLhfhKyNwLFFLrAdUWGt95GRv48GxMmEJUimnE1dOSz36rhUgGPszwIkOXZb6yYXV3BZ S6nesjtLADiTc+jKzLOWElTwLetbfe1Pi3VnTrG5oDtVTtcouSugdcpE3XWd9yKztJ/A Kk6ubCD1CwkSKuutXXhy/IyDa88tdiAXRXi1j0ojwJOu1LCOt01KiPa4/B2TnLzx4Wa4 5FkA== MIME-Version: 1.0 X-Received: by 10.202.209.71 with SMTP id i68mr10440220oig.109.1438269300210; Thu, 30 Jul 2015 08:15:00 -0700 (PDT) Sender: asomers@gmail.com Received: by 10.202.80.4 with HTTP; Thu, 30 Jul 2015 08:15:00 -0700 (PDT) In-Reply-To: <50125924-97cf-4d24-a992-64c700ece17e@compvia.com> References: <50125924-97cf-4d24-a992-64c700ece17e@compvia.com> Date: Thu, 30 Jul 2015 09:15:00 -0600 X-Google-Sender-Auth: R_2lBNb2vYtfiAGxz-n9n_Ty7d8 Message-ID: Subject: Re: Custom point-to-point tunnel protocol From: Alan Somers To: Gerry Weaver Cc: "freebsd-hackers@freebsd.org" Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.20 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 15:15:01 -0000 Why design a custom protocol when you could use an off-the-shelf one? Check out stunnel. Or, you can probably make do with ssh if you figure out the right command-line options. https://www.stunnel.org/index.html On Tue, Jul 28, 2015 at 9:55 PM, Gerry Weaver wrote: > Hello All, > > I need to create a secure point-to-point tunnel protocol for a project > that I'm working on. I have several questions related to the security > aspect of that protocol. I'm looking for a place or resource where I can > ask those type of questions. Could anyone please recommend a good mailing > list or other resource for this kind of thing? I've checked this out on > Google, but I haven't been able to find exactly what I'm looking for. > > Thanks, > -G > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Thu Jul 30 15:22:32 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 776D19AFE89 for ; Thu, 30 Jul 2015 15:22:32 +0000 (UTC) (envelope-from rpokala@panasas.com) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0100.outbound.protection.outlook.com [207.46.100.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "MSIT Machine Auth CA 2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3D540780 for ; Thu, 30 Jul 2015 15:22:31 +0000 (UTC) (envelope-from rpokala@panasas.com) Received: from CY1PR08MB1803.namprd08.prod.outlook.com (10.162.218.25) by CY1PR08MB1803.namprd08.prod.outlook.com (10.162.218.25) with Microsoft SMTP Server (TLS) id 15.1.225.19; Thu, 30 Jul 2015 15:22:23 +0000 Received: from CY1PR08MB1803.namprd08.prod.outlook.com ([10.162.218.25]) by CY1PR08MB1803.namprd08.prod.outlook.com ([10.162.218.25]) with mapi id 15.01.0225.018; Thu, 30 Jul 2015 15:22:23 +0000 From: "Pokala, Ravi" To: "freebsd-hackers@freebsd.org" Subject: Re: getting a disk structure given a device name Thread-Topic: getting a disk structure given a device name Thread-Index: AQHQytuHO8XJBMwAhUqHp7B79j2JNQ== Date: Thu, 30 Jul 2015 15:22:22 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.5.3.150624 authentication-results: freebsd.org; dkim=none (message not signed) header.d=none; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [24.6.178.251] x-microsoft-exchange-diagnostics: 1; CY1PR08MB1803; 5:iL6dLK/im0IOgn5pWKixA7TYHbSNycbQQzPhkXD0EmgNjlR52QXEn10TePrveSxoDWq+ys+oUzFbYIEKr6LFt5xKtA839Z0pvIou71UNoOpMwndv5iGXF82K+2GQ43gFv4iz4LZJbdk9j9l//HHa3A==; 24:dhOU1oADMbFPd7CGCapE60CrLburu4XKN1KFQl3mhF6X9Sef+SHid2Brqq85NkirnexbFR923mbAk+dOvKL0qae2e1dzMBzmywqnNRfgbX0=; 20:MtC+OtkD2tGkqHCT/US0RlCBjeABEBlg/DH9TM0Nprg0URo2VZKqBUM0ON1P6rWHzF7SoilXOP78qnkfal1W4A== x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:CY1PR08MB1803; cy1pr08mb1803: X-MS-Exchange-Organization-RulesExecuted x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(601004)(5005006)(3002001); SRVR:CY1PR08MB1803; BCL:0; PCL:0; RULEID:; SRVR:CY1PR08MB1803; x-forefront-prvs: 06530126A4 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(53754006)(86362001)(106116001)(110136002)(102836002)(50986999)(107886002)(77156002)(2656002)(62966003)(5001960100002)(83506001)(40100003)(450100001)(512954002)(87936001)(122556002)(92566002)(2501003)(66066001)(19580395003)(4001350100001)(19580405001)(46102003)(2351001)(99286002)(5002640100001)(189998001)(77096005)(2900100001)(54356999)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:CY1PR08MB1803; H:CY1PR08MB1803.namprd08.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: panasas.com X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Jul 2015 15:22:22.7900 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: acf01c9d-c699-42af-bdbb-44bf582e60b0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR08MB1803 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 15:22:32 -0000 >Date: Wed, 29 Jul 2015 23:31:03 +0000 >From: Raviprakash Darbha >To: "freebsd-hackers@freebsd.org" >Cc: Steve Kiernan , Simon Gerraty > >Subject: getting a disk structure given a device name >Message-ID: >Content-Type: text/plain; charset=3D"us-ascii" > >Hello All=20 > >I am trying to write a filter driver for the ata block on freebsd 6.2 to >simulate failed reads and writes. We originally did something like that at Panasas, but by hacking ata(4) and ad(4) directly. :-P Later on, we created a GEOM class to do error injection. Currently, I prefer using the WRITE_UNCORRECTABLE48 command, to tell the drive to actually return errors on subsequent reads. That has the benefit of being indistinguishable from an actual read failure - the drive spends the time to do error recovery, and sends the actual error code back. -Ravi From owner-freebsd-hackers@freebsd.org Thu Jul 30 16:02:45 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DE8839AE865 for ; Thu, 30 Jul 2015 16:02:45 +0000 (UTC) (envelope-from gerryw@compvia.com) Received: from mail01.compvia.com (mail01.compvia.com [108.174.62.107]) (using TLSv1.1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id ADC221FF6; Thu, 30 Jul 2015 16:02:45 +0000 (UTC) (envelope-from gerryw@compvia.com) X-Footer: Y29tcHZpYS5jb20= Subject: Re[2]: Custom point-to-point tunnel protocol Date: Thu, 30 Jul 2015 11:02:27 -0500 Message-Id: In-Reply-To: User-Agent: eM_Client/6.0.22344.0 Mime-Version: 1.0 Importance: Normal X-Priority: 3 Thread-Index: AdDK4SrnuBu2IrifRg2eIOmd6dWiiA== From: Gerry Weaver To: Alan Somers Cc: "freebsd-hackers@freebsd.org" Reply-To: Gerry Weaver Content-Type: text/plain; charset="utf-8" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 16:02:46 -0000 Hi Alan, Unfortunately, there are some project requirements and constraints that make the currently available solutions impractical. I was hoping to find a place where I could bounce some ideas off of some folks that are familiar with the security aspect this kind of thing and what type of optimizations may be possible. For example, one of the requirements is the use of the Rust language. Thanks, -G ------ Original Message ------ From: "Alan Somers" To: "Gerry Weaver" Cc: "freebsd-hackers@freebsd.org" Sent: 7/30/2015 10:15:00 AM Subject: Re: Custom point-to-point tunnel protocol >Why design a custom protocol when you could use an off-the-shelf one? >Check out stunnel. Or, you can probably make do with ssh if you figure >out >the right command-line options. > >https://www.stunnel.org/index.html > >On Tue, Jul 28, 2015 at 9:55 PM, Gerry Weaver >wrote: > >> Hello All, >> >> I need to create a secure point-to-point tunnel protocol for a >>project >> that I'm working on. I have several questions related to the security >> aspect of that protocol. I'm looking for a place or resource where I >>can >> ask those type of questions. Could anyone please recommend a good >>mailing >> list or other resource for this kind of thing? I've checked this out >>on >> Google, but I haven't been able to find exactly what I'm looking for. >> >> Thanks, >> -G >> _______________________________________________ >> freebsd-hackers@freebsd.org mailing list >> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers >> To unsubscribe, send any mail to >>"freebsd-hackers-unsubscribe@freebsd.org" >> >_______________________________________________ >freebsd-hackers@freebsd.org mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-hackers >To unsubscribe, send any mail to >"freebsd-hackers-unsubscribe@freebsd.org" From owner-freebsd-hackers@freebsd.org Thu Jul 30 16:06:28 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5C8569AE920 for ; Thu, 30 Jul 2015 16:06:28 +0000 (UTC) (envelope-from allanjude@freebsd.org) Received: from mx1.scaleengine.net (mx1.scaleengine.net [209.51.186.6]) by mx1.freebsd.org (Postfix) with ESMTP id 3BEA72FC for ; Thu, 30 Jul 2015 16:06:27 +0000 (UTC) (envelope-from allanjude@freebsd.org) Received: from [10.1.1.2] (unknown [10.1.1.2]) (Authenticated sender: allanjude.freebsd@scaleengine.com) by mx1.scaleengine.net (Postfix) with ESMTPSA id EC3C898C2 for ; Thu, 30 Jul 2015 16:06:26 +0000 (UTC) Subject: Re: Custom point-to-point tunnel protocol To: freebsd-hackers@freebsd.org References: <50125924-97cf-4d24-a992-64c700ece17e@compvia.com> From: Allan Jude Message-ID: <55BA4B7E.6060306@freebsd.org> Date: Thu, 30 Jul 2015 12:06:22 -0400 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: <50125924-97cf-4d24-a992-64c700ece17e@compvia.com> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="cNjeDbP7CNLcFfPPDXGuWOF6kL15600d9" X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 16:06:28 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --cNjeDbP7CNLcFfPPDXGuWOF6kL15600d9 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 2015-07-28 23:55, Gerry Weaver wrote: > Hello All, > =20 > I need to create a secure point-to-point tunnel protocol for a project = that I'm working on. I have several questions related to the security asp= ect of that protocol. I'm looking for a place or resource where I can ask= those type of questions. Could anyone please recommend a good mailing li= st or other resource for this kind of thing? I've checked this out on Goo= gle, but I haven't been able to find exactly what I'm looking for. > =20 > Thanks, > -G > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.o= rg" >=20 You might want to checkout Colin Percival's spiped. http://www.tarsnap.com/spiped.html It was designed to be light weight and avoid the complexity (and error prone-ness) of SSL/TLS. It would likely make a good starting point for a custom implementation if you needed to change it too. --=20 Allan Jude --cNjeDbP7CNLcFfPPDXGuWOF6kL15600d9 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQIcBAEBAgAGBQJVukuFAAoJEBmVNT4SmAt+WU8QAMomVgRjN3lENmma0cijGA8+ QsxWY5MWIUTXDlXKJGGF7JCeksri52iU4MEaOT9RB3Km2Xy2Y8XWly4cI4PCEIf6 QnxYYWIdP85zojZOPQbQWPFNw0mGvQ0b4b6KAX74l+AekgylJDXiGhTb3Qvr7aD9 CYTYNvRMHIZcrCUz6jZyYkDkmRbwmhxZmpA7cnr4HLReLlkIQz15EQvdyrYjguli 7+RjHcXlWfUjttENw3ij+vUmyUIW0eXFior74CggxuZJnH0LDIX5SX7NCRRBLb3t 5+HkeAUPm/iM+PvRbjjAGyN211MT3GT1ZMDz8qOBPy/1cevLl3X9GzgCRg7KFCe5 /8s4URGJlW+w/6ExY+CQViLHVUPXYSb4CSPRBC+d9j5P0kcws8rrF2enpSKyVZAX uI6FwB1iR9YyE0aJ2Zcc0hULLJZ4iFZJbe1LTEBXLTyUzbLe+vdIIjha24o47HpR /0WoFH5725encqPFrQv0uOkeDarY60Z4RcwaSnNR5jvwJcOIfTwhTFS8of9DfE7V f4Gf3A1PqniRXShiUZml4JSNo8c4NTETgNZEmM2iS6JI6LgPu2LPy57UOkW6CkLX myNVlnS4AUzBayBeyZpTRrjF0yefsiyEEh3WN3lQwVWeE3MiuoaPrzFZKTMiRNqB 8dISZVwchWe1Vb8U7v69 =fHTo -----END PGP SIGNATURE----- --cNjeDbP7CNLcFfPPDXGuWOF6kL15600d9-- From owner-freebsd-hackers@freebsd.org Thu Jul 30 21:07:49 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6E4C49AE6A9 for ; Thu, 30 Jul 2015 21:07:49 +0000 (UTC) (envelope-from phk@phk.freebsd.dk) Received: from phk.freebsd.dk (phk.freebsd.dk [130.225.244.222]) by mx1.freebsd.org (Postfix) with ESMTP id 338D837E; Thu, 30 Jul 2015 21:07:48 +0000 (UTC) (envelope-from phk@phk.freebsd.dk) Received: from critter.freebsd.dk (unknown [192.168.48.2]) by phk.freebsd.dk (Postfix) with ESMTP id BE3203BB88; Thu, 30 Jul 2015 21:07:41 +0000 (UTC) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.15.2/8.15.2) with ESMTP id t6UL7dr0012610; Thu, 30 Jul 2015 21:07:40 GMT (envelope-from phk@phk.freebsd.dk) To: Gerry Weaver cc: Alan Somers , "freebsd-hackers@freebsd.org" Subject: Re: Re[2]: Custom point-to-point tunnel protocol In-reply-to: From: "Poul-Henning Kamp" References: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <12608.1438290459.1@critter.freebsd.dk> Content-Transfer-Encoding: quoted-printable Date: Thu, 30 Jul 2015 21:07:39 +0000 Message-ID: <12609.1438290459@critter.freebsd.dk> X-Mailman-Approved-At: Thu, 30 Jul 2015 21:23:37 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 30 Jul 2015 21:07:49 -0000 -------- In message , Gerry Weaver w= rites : >Unfortunately, there are some project requirements and constraints that = >make the currently available solutions impractical. = Checked security/tinc ? -- = Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe = Never attribute to malice what can adequately be explained by incompetence= . From owner-freebsd-hackers@freebsd.org Fri Jul 31 05:57:16 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E08AE9ADE78 for ; Fri, 31 Jul 2015 05:57:16 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from vps1.elischer.org (vps1.elischer.org [204.109.63.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "vps1.elischer.org", Issuer "CA Cert Signing Authority" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id A4AC21434 for ; Fri, 31 Jul 2015 05:57:15 +0000 (UTC) (envelope-from julian@freebsd.org) Received: from Julian-MBP3.local (ppp121-45-239-102.lns20.per1.internode.on.net [121.45.239.102]) (authenticated bits=0) by vps1.elischer.org (8.14.9/8.14.9) with ESMTP id t6V5v2Lb068430 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Thu, 30 Jul 2015 22:57:05 -0700 (PDT) (envelope-from julian@freebsd.org) Subject: Re: getting a disk structure given a device name To: "Pokala, Ravi" , "freebsd-hackers@freebsd.org" References: From: Julian Elischer Message-ID: <55BB0E29.3060408@freebsd.org> Date: Fri, 31 Jul 2015 13:56:57 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Jul 2015 05:57:17 -0000 On 7/30/15 11:22 PM, Pokala, Ravi wrote: >> Date: Wed, 29 Jul 2015 23:31:03 +0000 >> From: Raviprakash Darbha >> To: "freebsd-hackers@freebsd.org" >> Cc: Steve Kiernan , Simon Gerraty >> >> Subject: getting a disk structure given a device name >> Message-ID: >> Content-Type: text/plain; charset="us-ascii" >> >> Hello All >> >> I am trying to write a filter driver for the ata block on freebsd 6.2 to >> simulate failed reads and writes. 6.2!!!?? I thought I was in trouble being stuck on 8.0! > We originally did something like that at Panasas, but by hacking ata(4) > and ad(4) directly. :-P Later on, we created a GEOM class to do error > injection. Currently, I prefer using the WRITE_UNCORRECTABLE48 command, to > tell the drive to actually return errors on subsequent reads. That has the > benefit of being indistinguishable from an actual read failure - the drive > spends the time to do error recovery, and sends the actual error code back. > > -Ravi > > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org" > From owner-freebsd-hackers@freebsd.org Fri Jul 31 18:20:18 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 29AF89B0B1A for ; Fri, 31 Jul 2015 18:20:18 +0000 (UTC) (envelope-from patrick.mooney@joyent.com) Received: from mail-ob0-f179.google.com (mail-ob0-f179.google.com [209.85.214.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F2B5610CD for ; Fri, 31 Jul 2015 18:20:17 +0000 (UTC) (envelope-from patrick.mooney@joyent.com) Received: by obdeg2 with SMTP id eg2so59767276obd.0 for ; Fri, 31 Jul 2015 11:20:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:date:message-id:subject:from:to :content-type; bh=wDU+jMtRlaAYN16NdOIgpJ90txj+tGwBToKbDf5JLEM=; b=UJ7YEWgsMTZZABD1TR3BN+aB4TYguAB3TsczziZm15Scn25v4E51v16a6ICc+HgWwY NNv+8WF18/vfjPoFjs8LlzqstQv7hCezy6gOBa1P13/4wldgUHRCFCCLnvNi5kBGPSA5 4490w61g5tiEiV+tLPsfX3TuKeNlITTyNVxgXYfA4yZ68mAPSDi6fUgighBq3fHO+OKM CnrRfeHRvnFvIn5JGs5vNps0NUgPdyxGBS4tyn/1GNRQzUwHCivGp4BUDPw/luoejnXg gz2BpirWrX+K9Gz/ZwjyJpwCaXiHMl/MbCWUiTNc7Ut/s+l4nM26BuZtqAWvPH0RdRuV 1QTg== X-Gm-Message-State: ALoCoQm93Yor7syWPlSlmUX49Dm5v5PodmqLWyDWIRVnqK5/CEU7euZtiPAPvSbD0avxRa/1ml/f MIME-Version: 1.0 X-Received: by 10.60.78.104 with SMTP id a8mr4670090oex.58.1438366811033; Fri, 31 Jul 2015 11:20:11 -0700 (PDT) Received: by 10.202.206.17 with HTTP; Fri, 31 Jul 2015 11:20:10 -0700 (PDT) Date: Fri, 31 Jul 2015 13:20:10 -0500 Message-ID: Subject: Interpretation of POSIX.1-2008 for recvmsg From: Patrick Mooney To: freebsd-hackers@freebsd.org Content-Type: text/plain; charset=UTF-8 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Jul 2015 18:20:18 -0000 Greetings, I have been researching differences in recvmsg() behavior across platforms (namely Illumos and Linux) with respect to MSG_PEEK and 0-length buffers. Certain Linux software I am attempting to run under Illumos makes a recvmsg() call with a 0-length iovec and flags set to MSG_PEEK in order to interrogate the size of a queued dgram. On native Linux, recvmsg() returns the size of the queued dgram (with the MSG_TRUNC flag set). On both Illumos and FreeBSD, a size of 0 is returned (with MSG_TRUNC set as well). In reading the POSIX spec (http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvmsg.html), it is not clear that returning 0 in this case is correct behavior. Here is a small test program I wrote up to display the differences in behavior: https://us-east.manta.joyent.com/patrick.mooney/public/recvmsg/peektest.c The output on Linux: peek len: 20 errno: 0 flags: 20 recv len: 20 errno: 0 flags: 0 ... versus BSD and Illumos: peek len: 0 errno: 2 flags: 12 recv len: 20 errno: 2 flags: 0 I am interested in your opinions on the matter. With regards, --Patrick From owner-freebsd-hackers@freebsd.org Fri Jul 31 23:59:06 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C816D9B06CD for ; Fri, 31 Jul 2015 23:59:06 +0000 (UTC) (envelope-from saper@saper.info) Received: from m.saper.info (m.saper.info [IPv6:2a01:4f8:a0:7383::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "m.saper.info", Issuer "Marcin Cieslak 2011" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4706F354 for ; Fri, 31 Jul 2015 23:59:05 +0000 (UTC) (envelope-from saper@saper.info) Received: from m.saper.info (saper@m.saper.info [IPv6:2a01:4f8:a0:7383::]) by m.saper.info (8.14.9/8.14.9) with ESMTP id t6VNx1OX057627 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 31 Jul 2015 23:59:01 GMT (envelope-from saper@saper.info) Received: from localhost (saper@localhost) by m.saper.info (8.14.9/8.14.9/Submit) with ESMTP id t6VNx0Of057563; Fri, 31 Jul 2015 23:59:01 GMT (envelope-from saper@saper.info) X-Authentication-Warning: m.saper.info: saper owned process doing -bs Date: Fri, 31 Jul 2015 23:59:00 +0000 From: Marcin Cieslak To: Patrick Mooney cc: freebsd-hackers@freebsd.org Subject: Re: Interpretation of POSIX.1-2008 for recvmsg In-Reply-To: Message-ID: References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Jul 2015 23:59:06 -0000 On Fri, 31 Jul 2015, Patrick Mooney wrote: > Greetings, > I have been researching differences in recvmsg() behavior across platforms > (namely Illumos and Linux) with respect to MSG_PEEK and 0-length buffers. > Certain Linux software I am attempting to run under Illumos makes a recvmsg() > call with a 0-length iovec and flags set to MSG_PEEK in order to interrogate > the size of a queued dgram. On native Linux, recvmsg() returns the size of the > queued dgram (with the MSG_TRUNC flag set). On both Illumos and FreeBSD, a > size of 0 is returned (with MSG_TRUNC set as well). In reading the POSIX spec > (http://pubs.opengroup.org/onlinepubs/9699919799/functions/recvmsg.html), it is > not clear that returning 0 in this case is correct behavior. > > Here is a small test program I wrote up to display the differences in behavior: > https://us-east.manta.joyent.com/patrick.mooney/public/recvmsg/peektest.c > > The output on Linux: > peek len: 20 errno: 0 flags: 20 > recv len: 20 errno: 0 flags: 0 > ... versus BSD and Illumos: > peek len: 0 errno: 2 flags: 12 > recv len: 20 errno: 2 flags: 0 errno does not has to be reset to 0 to indicate success. You should check return value < 0 before using errno. I set errno to 0 before invoking recvmsg() and it stays 0 (that means it is just not modified). Also setting MSG_TRUNC in the input flags is not specified by POSIX (use just MSG_PEEK). MSG_TRUNC is the output flag. What you are expecting is the non-standard Linux behaviour with this flag set as input: MSG_TRUNC (since Linux 2.2) For raw (AF_PACKET), Internet datagram (since Linux 2.4.27/2.6.8), netlink (since Linux 2.6.22) and UNIX datagram (since Linux 3.4) sockets: return the real length of the packet or datagram, even when it was longer than the passed buffer. Not implemented for UNIX domain (unix(7)) sockets. Be aware that recvmsg(x, y, MSG_PEEK) *also* reads data - so Solaris and BSD consitently return what was saved into the buffer. In short - to check how large the message is, supply the buffer that is large enough (or try MSG_PEEK until it is large enough). Here are the result of my modified peektest.c[1]: peek buflen: 0x02 peek len: 0x02 errno: 0 flags: 0x12 peek read: [AB ] read buflen: 0x20 recv len: 0x20 errno: 0 flags: 0x00 recv read: [ABCD] On Linux: Using port 18399 peek buflen: 0x02 peek len: 0x02 errno: 0 flags: 0x20 peek read: [AB ] read buflen: 0x20 recv len: 0x20 errno: 0 flags: 0x00 recv read: [ABCD] MSG_TRUNC in the input flags is not POSIX. //Marcin From owner-freebsd-hackers@freebsd.org Sat Aug 1 00:00:57 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 540239B0803 for ; Sat, 1 Aug 2015 00:00:57 +0000 (UTC) (envelope-from saper@saper.info) Received: from m.saper.info (m.saper.info [IPv6:2a01:4f8:a0:7383::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "m.saper.info", Issuer "Marcin Cieslak 2011" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id C8A387B6 for ; Sat, 1 Aug 2015 00:00:56 +0000 (UTC) (envelope-from saper@saper.info) Received: from m.saper.info (saper@m.saper.info [IPv6:2a01:4f8:a0:7383::]) by m.saper.info (8.14.9/8.14.9) with ESMTP id t7100saR060906 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sat, 1 Aug 2015 00:00:54 GMT (envelope-from saper@saper.info) Received: from localhost (saper@localhost) by m.saper.info (8.14.9/8.14.9/Submit) with ESMTP id t7100sgB060902; Sat, 1 Aug 2015 00:00:54 GMT (envelope-from saper@saper.info) X-Authentication-Warning: m.saper.info: saper owned process doing -bs Date: Sat, 1 Aug 2015 00:00:54 +0000 From: Marcin Cieslak To: Patrick Mooney cc: freebsd-hackers@freebsd.org Subject: Re: Interpretation of POSIX.1-2008 for recvmsg In-Reply-To: Message-ID: References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 01 Aug 2015 00:00:57 -0000 On Fri, 31 Jul 2015, Marcin Cieslak wrote: > Here are the result of my modified peektest.c[1]: http://github.com/saper/peektest