From owner-freebsd-current@freebsd.org Sun Aug 2 08:24:04 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 60B943752D9 for ; Sun, 2 Aug 2020 08:24:04 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4BKDZD0BNbz4DB2 for ; Sun, 2 Aug 2020 08:24:04 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: by mailman.nyi.freebsd.org (Postfix) id 05938375651; Sun, 2 Aug 2020 08:24:04 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 055793752D7 for ; Sun, 2 Aug 2020 08:24:04 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from sonic316-22.consmr.mail.ne1.yahoo.com (sonic316-22.consmr.mail.ne1.yahoo.com [66.163.187.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BKDZB6CN3z4D7W for ; Sun, 2 Aug 2020 08:24:02 +0000 (UTC) (envelope-from filippomore@yahoo.com) X-YMail-OSG: iLm0wdAVM1nYTU747F7GD5wNBW1rsV0pPVn7oP71Z.0V465Ia4ooZqJyJsS0h02 ceXrMtDtl3UxfEIQq26H.g1ZXQn_yv8iClHtQeceUg3qxFz.RF_O1Lese5N.9qHvSwYsVeN1rJyt R2IZxkAlaYIPwboBttFjiV_cKGNgAVS53sy5clA9uZnWxAIpZvNCbFektnR_ECEV60KaD6JCU1pQ 1.u6_rbQeydcPDVtInL7SR2A1GwBpsbXa3ozcipwrBQhwSp1u5HF5zW.JLWfEhA2sgSyqXbTjGte AP5oVGZyf.djEQ2giOcyrFVLQsVWQQVXJg171RoN1j8gHub84oIDunU79mhN63q1qvwiHDa4yfBU pyFdgTGbg5F1ClxN7d8pTuxnDDhZs03bKFiUiyqwMLZc2rFUU0H_a1jLKk3fwpUmOU5vZgz4Epa5 OxcatDP7BQcOx_5yIhxhRr0vRnwbOAnPfuLpLsuf1zVEzQY3WQlTadaS4hFo0x8X.cfn8rK.KlIP wyB1hhD5.tf_ggGNMW48p9dTZ.pxwXkpKTQQ9rdSuDfduW5JhFMk3SkD9Xi_.tyFVeZTEIIc7teM vZupRZONGlaZSc73qOVZ2ySWsjLRmmGsebyCiRg33PQ7sTbnNk4pQVuPkM4ZO829WIKey.QBgb0q mBjim94ujxfFmgOmR5jwM19D9_zkH75BBzqHWrGKbtMnNu8FMD38FSncEdQxMHDuRAFh1odLyzm2 7FDNRd.zOlkjQBVLjc2Ni3uLR31ZfBf7QmZq8prWq0AU1P0ulx.FPtO7sVruvsAZswdxePBypTux hRnJEzKu0p3Wz76zEUgc6e8ZFLt_yZxjz_09IpChpmecVQ4rFng1FiXvsX12clYpc3ldSkaEXx22 GU3BC3..yGrAJ6yl_1yGzeimDHKzPnmpDp3wXt3ZRSnb38YgOUoFtCDEyiSaU.IeNU3t0laKOLZY di5pm9mAUlEJUbTScGYzbXLIHqQNgJxlL6558.aV1iHspByFvc5A0Znz6JYI7ud2_AUFHeukyhFD 8csfoHs0hNYHUA..__ye6I3bOvlcaOiJuY0FmK1sb5euZh3r5K8EKNkqyu8osEyVRNoNgJjqdGlR TBocgWm0z5DRncOh4ldx3LNa_E1uH9WhELa295ETrbFDiegyBJxZ.Dcw9g223.fdhOD9KIj5Aj6q 3JARSzwHsNhux37LV03tMIeeiZCZ1jqrkL_5S2qhSrSZPFHD7o08utcnllJsp3TSr8eP0V3uhszb A82QCBn1ci2SWUFAqKYkI.fQmDSMANsvu6zx0M_NAdCmpvbWOpg-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic316.consmr.mail.ne1.yahoo.com with HTTP; Sun, 2 Aug 2020 08:24:01 +0000 Date: Sun, 2 Aug 2020 08:23:59 +0000 (UTC) From: Filippo Moretti To: FreeBSD Current Cc: "flz@freebsd.org" Message-ID: <1582441101.10722462.1596356639024@mail.yahoo.com> Subject: Problem compiling chromium MIME-Version: 1.0 References: <1582441101.10722462.1596356639024.ref@mail.yahoo.com> X-Mailer: WebService/1.1.16271 YMailNorrin Mozilla/5.0 (X11; FreeBSD amd64; rv:79.0) Gecko/20100101 Firefox/79.0 X-Rspamd-Queue-Id: 4BKDZB6CN3z4D7W X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.99 / 15.00]; TO_DN_EQ_ADDR_SOME(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; RWL_MAILSPIKE_POSSIBLE(0.00)[66.163.187.148:from]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; RCVD_TLS_LAST(0.00)[]; NEURAL_HAM_LONG(-0.98)[-0.984]; NEURAL_HAM_MEDIUM(-0.97)[-0.974]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[66.163.187.148:from]; NEURAL_HAM_SHORT(-1.03)[-1.032]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36646, ipnet:66.163.184.0/21, country:US]; RCVD_COUNT_TWO(0.00)[2]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim] Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Aug 2020 08:24:04 -0000 This is the last eror I get attempting to compile chromium on amd64 arch R3= 63570[263/38159] python ../../mojo/public/tools/mojom/mojom_parser.py --inp= ut-root /usr/ports/www/chromium/work/chromium-84.0.4147.105/ --input-root /= usr/ports/www/chromium/work/chromium-84.0.4147.105/out/Release/gen --output= -root /usr/ports/www/chromium/work/chromium-84.0.4147.105/out/Release/gen -= -mojom-file-list=3D__mojo_public_mojom_base_base__parser___build_toolchain_= linux_clang_x64__rule..rsp --check-imports /usr/ports/www/chromium/work/chr= omium-84.0.4147.105/out/Release/gen/mojo/public/mojom/base/base.build_metad= ata --enable-feature file_path_is_string --enable-feature is_posix --enable= -feature is_linux [264/38159] python ../../tools/licenses.py --target-os=3Dfreebsd --depfile = gen/components/resources/about_credits.d credits gen/components/resources/a= bout_credits.html FAILED: gen/components/resources/about_credits.html=20 python ../../tools/licenses.py --target-os=3Dfreebsd --depfile gen/componen= ts/resources/about_credits.d credits gen/components/resources/about_credits= .html Traceback (most recent call last): =C2=A0 File "../../tools/licenses.py", line 807, in =C2=A0=C2=A0=C2=A0 sys.exit(main()) =C2=A0 File "../../tools/licenses.py", line 792, in main =C2=A0=C2=A0=C2=A0 args.gn_target, args.depfile):=C2=A0File "../../tools/li= censes.py", line 720, in GenerateCredits =C2=A0=C2=A0=C2=A0 license_file_list + ['build.ninja']) =C2=A0 File "/usr/ports/www/chromium/work/chromium-84.0.4147.105/build/andr= oid/gyp/util/build_utils.py", line 619, in WriteDepfile =C2=A0=C2=A0=C2=A0 inputs =3D ComputePythonDependencies() + inputs =C2=A0 File "/usr/ports/www/chromium/work/chromium-84.0.4147.105/build/andr= oid/gyp/util/build_utils.py", line 557, in ComputePythonDependencies =C2=A0=C2=A0=C2=A0 p for p in abs_module_paths if p.startswith(abs_dir_sour= ce_root) =C2=A0 File "/usr/ports/www/chromium/work/chromium-84.0.4147.105/build/andr= oid/gyp/util/build_utils.py", line 557, in =C2=A0=C2=A0=C2=A0 p for p in abs_module_paths if p.startswith(abs_dir_sour= ce_root) =C2=A0 File "/usr/ports/www/chromium/work/.bin/../../../../../local/lib/pyt= hon3.7/posixpath.py", line 378, in abspath =C2=A0=C2=A0=C2=A0 path =3D os.fspath(path) TypeError: expected str, bytes or os.PathLike object, not NoneType ninja: build stopped: subcommand failed. *** Error code 1 Stop. make[1]: stopped in /usr/ports/www/chromium From owner-freebsd-current@freebsd.org Sun Aug 2 15:35:47 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 074703A10BF for ; Sun, 2 Aug 2020 15:35:47 +0000 (UTC) (envelope-from se@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BKQ8L6Qfnz4bRh; Sun, 2 Aug 2020 15:35:46 +0000 (UTC) (envelope-from se@freebsd.org) Received: from Stefans-MBP-WLAN.fritz.box (p200300cd5f277400050cd3adce410cd2.dip0.t-ipconnect.de [IPv6:2003:cd:5f27:7400:50c:d3ad:ce41:cd2]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: se/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 5A89B1EDDB; Sun, 2 Aug 2020 15:35:46 +0000 (UTC) (envelope-from se@freebsd.org) Subject: Re: bc and dc -e/-f and Copyright To: Walter von Entferndt , freebsd-current@freebsd.org References: <1943238.4WAli8B44Z@t450s.local.lan> From: Stefan Esser Autocrypt: addr=se@freebsd.org; keydata= mQENBFVxiRIBCADOLNOZBsqlplHUQ3tG782FNtVT33rQli9EjNt2fhFERHIo4NxHlWBpHLnU b0s4L/eItx7au0i7Gegv01A9LUMwOnAc9EFAm4EW3Wmoa6MYrcP7xDClohg/Y69f7SNpEs3x YATBy+L6NzWZbJjZXD4vqPgZSDuMcLU7BEdJf0f+6h1BJPnGuwHpsSdnnMrZeIM8xQ8PPUVQ L0GZkVojHgNUngJH6e21qDrud0BkdiBcij0M3TCP4GQrJ/YMdurfc8mhueLpwGR2U1W8TYB7 4UY+NLw0McThOCLCxXflIeF/Y7jSB0zxzvb/H3LWkodUTkV57yX9IbUAGA5RKRg9zsUtABEB AAG0J1N0ZWZhbiBFw59lciAoRnJlZUJTRCkgPHNlQGZyZWVic2Qub3JnPokBVAQTAQoAPgIb AwULCQgHAwUVCgkICwUWAwIBAAIeAQIXgBYhBKNx6mWcC+zIK3FTE0frte9a/fVEBQJa8u+q BQkLJQETAAoJEEfrte9a/fVEOeMH/icmdK1eZQvB3U8quJo9VMaZsaTuCMbUE4NThyfsIvIm MCd+rb/yULmMYwqNfjyKB1x4ikR4x+94l+yJoz7K0Usks+eNKDmMGJM6pWWssTigaJubFdVd hVVC+C1QJi7JshYSib08uONoPmO4lv5Az0TDYGtsMzsES2sIlc62c9go5WPGYhQFRbX3Lk6y V6m8OHh+G9XGSj3oPO4UteRwu+SzTdOLunZBWG1wu34+IeZm663D+2gOppQLWpLa2qaTerqw THu377ayZ2B2LPJ5JkvkZeHYPkwDQ+b5PGn0UhfkxPnDVYki5F7qKxvQ5uq1/q9YaCX7mmOl H2yO7tgVsrW5AQ0EVXGJEgEIALEj9qCXMZVucjpcd3QxM/TlUr98m5viEd1z4tCnPUyRWcIC EVtj2h5xMH+2iB0q1+KWhq+NsWtvScmEmfHnsr7dJ1K677OdpDhKVaJk61eeRulFY1R4yb6C 1MMxK+WgYB+vvpG0UeyR0M4uBewcPvRsq4yGUHFQKtLAbMdoPTSryJA+ElnmK1vdY+rPcHgi OIMBZM7ahsPXC0C9K4e5SP9clGyIoMpbfHXdx9q+Rp3zVtlbhyk3BS/xccu/+9pk9ICXL6GR js2sNnJ0wxdU1DsAlC59a5MnSruwiZFwRnkQhr3x6wk97Lg7sLS9jjTnCN7LGlVmSmpOEMy6 uq1AWfUAEQEAAYkBPAQYAQoAJgIbDBYhBKNx6mWcC+zIK3FTE0frte9a/fVEBQJa8u+rBQkL JQEZAAoJEEfrte9a/fVEuesH/2DNxGWnHvWwMyiyhlQtafvDKwEn/wAgR8gHJFodB7emf8rA TnukH7MVttCoHtjN5lvv9RSBHjNTZls5wR/ANlwdRuPQHd8ZGxLe3S6IuUB3zDSwFltLGurO N2kOMhs5mTGyypSa+uw3rtQbUAVYf1oPbiR4FLtiM8FLyEvE95hX5fPq9Qvx9FmN79kmCIEw jDKPqDaUf/OR2fEF0LSIbXHEk4tNqCEwx5DIJ0fp5/z5UzICUAmwxyRs5O/Hre1jzPsMVyud Ml9t7UTOJGKVWwRory1PMnOFxN+iz5/d4FhYSKXF7kfMiFgol4LuWaxJRwbBrr71VGBrRy2a L1nw6Bc= Message-ID: <5918dc1a-6874-920f-af44-1d712b2ea45a@freebsd.org> Date: Sun, 2 Aug 2020 17:35:44 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <1943238.4WAli8B44Z@t450s.local.lan> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Aug 2020 15:35:47 -0000 Am 31.07.20 um 19:44 schrieb Walter von Entferndt: > Hi, innocent user here. > At Freitag, 31. Juli 2020, 14:00:00 CEST, Gavin Howard > wrote: >> 3. I could restore the expected behavior of -e and -f and add -E and >> -F options that do the same thing but do not exit. I think I like this > +1 > This is the most intuitive & natural choice. An even better alternative has been suggested and implemented, I'm waiting for that version to be tagged in the repository and will then update our base version: The -e and -f option will in general exit after all input has been processed, but an additional "-f -" following those options will allow to supply additional commands via stdin (and thus reproduce the current behavior, if desired). Regards, STefan From owner-freebsd-current@freebsd.org Mon Aug 3 17:36:27 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id ABCC33A216B for ; Mon, 3 Aug 2020 17:36:27 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smarthost1.greenhost.nl (smarthost1.greenhost.nl [195.190.28.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BL4n61gTkz48WZ for ; Mon, 3 Aug 2020 17:36:25 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smtp.greenhost.nl ([213.108.110.112]) by smarthost1.greenhost.nl with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1k2eNr-0001oW-4U for freebsd-current@freebsd.org; Mon, 03 Aug 2020 19:36:23 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=klop.ws; s=mail; h=Message-ID:From:Content-Transfer-Encoding:MIME-Version:Subject:Date :To:Content-Type:Sender:Reply-To:Cc:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=cDDRr4OIFv1vH/PKAcnTFqTvHBnwG0eRDojY/6IDwa4=; b=GTQhFCoCCRaVZBI938flVX1bJX 1q/I0Fub/+i1WJfKIzIvzUcVMr2izQ5z2GNI5muQ7PLUWTZmocY1/RegJOI8E/RKYjqiMb2ynyTRA 4Lawn3NEkf15mUjwoJWwt84TO4xujjZakP0j65XmT9tgoMlTljZDGLP3zv5YBZplXSHY=; Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: freebsd-current@freebsd.org Date: Mon, 03 Aug 2020 19:36:22 +0200 Subject: vnet/jail crashdump MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Ronald Klop" Message-ID: User-Agent: Opera Mail/12.16 (FreeBSD) X-Authenticated-As-Hash: 398f5522cb258ce43cb679602f8cfe8b62a256d1 X-Virus-Scanned: by clamav at smarthost1.samage.net X-Spam-Level: / X-Spam-Score: -0.4 X-Spam-Status: No, score=-0.4 required=5.0 tests=ALL_TRUSTED, BAYES_50, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF autolearn=disabled version=3.4.2 X-Scan-Signature: 353bb18b0f14186cd389c275975c39f5 X-Rspamd-Queue-Id: 4BL4n61gTkz48WZ X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=klop.ws header.s=mail header.b=GTQhFCoC; dmarc=none; spf=pass (mx1.freebsd.org: domain of ronald-lists@klop.ws designates 195.190.28.88 as permitted sender) smtp.mailfrom=ronald-lists@klop.ws X-Spamd-Result: default: False [-1.94 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.87)[-0.875]; R_DKIM_ALLOW(-0.20)[klop.ws:s=mail]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[195.190.28.88:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:195.190.28.64/27]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[klop.ws]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.04)[-1.043]; DKIM_TRACE(0.00)[klop.ws:+]; NEURAL_HAM_SHORT(-0.02)[-0.021]; RCVD_IN_DNSWL_NONE(0.00)[195.190.28.88:from]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:47172, ipnet:195.190.28.0/24, country:NL]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Aug 2020 17:36:27 -0000 Hi, After stopping a jail I get a crashdump. core.txt: https://www.klop.ws/core_2eef39c581f90f2f0c4921e43f1998c1/core.txt.0 Jail.conf: ---------- exec.stop = "/bin/sh /etc/rc.shutdown"; exec.clean; exec.prestart = "ifconfig bridge0 > /dev/null 2> /dev/null || ( ifconfig bridge0 create && ifconfig bridge0 addm vtnet0 && ifconfig bridge0 up)"; exec.consolelog = "/var/log/jail_${name}_console.log"; mount.devfs; path = "/data/jails/$name"; host.hostname = "$name"; mount.fstab = "/data/jails/fstab.$name"; vnet; allow.mlock; devfs_ruleset="110"; freebsd12 { osrelease = 12.1-RELEASE-p4; osreldate = 1201000; vnet.interface = "epair0b"; # make sure the exec.prestart has a "+=" as we de it in the global definition # when checking for the bridge exec.prestart += "ifconfig epair0 create up"; exec.prestart += "ifconfig bridge0 addm epair0a"; exec.prestart += "ifconfig epair0b link 02:xxxxxx:0c"; exec.start = "dhclient epair0b"; exec.start += "/bin/sh /etc/rc"; exec.poststop = "ifconfig bridge0 deletem epair0a"; exec.poststop += "ifconfig epair0a destroy"; } freebsd13 { vnet.interface = "epair1b"; # make sure the exec.prestart has a "+=" as we de it in the global definition # when checking for the bridge exec.prestart += "ifconfig epair1 create up"; exec.prestart += "ifconfig bridge0 addm epair1a"; exec.prestart += "ifconfig epair1b link 02:xxxxxx:0d"; exec.start = "dhclient epair1b"; exec.start += "/bin/sh /etc/rc"; exec.poststop = "ifconfig bridge0 deletem epair1a"; exec.poststop += "ifconfig epair1a destroy"; } ---------- What can I do to help debug? Regards, Ronald. From owner-freebsd-current@freebsd.org Mon Aug 3 18:04:20 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CF8953A37BB; Mon, 3 Aug 2020 18:04:20 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BL5PJ56Ypz4BtD; Mon, 3 Aug 2020 18:04:20 +0000 (UTC) (envelope-from lwhsu@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 1129) id 9FE26162BF; Mon, 3 Aug 2020 18:04:20 +0000 (UTC) Date: Mon, 3 Aug 2020 18:04:20 +0000 From: Li-Wen Hsu To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD CI Weekly Report 2020-08-02 Message-ID: <20200803180420.GA25391@freefall.freebsd.org> Reply-To: freebsd-testing@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Aug 2020 18:04:20 -0000 (Please send the followup to freebsd-testing@ and note Reply-To is set.) FreeBSD CI Weekly Report 2020-08-02 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2020-07-27 to 2020-08-02. During this period, we have: * 1744 builds (95.4% (-0.3) passed, 4.6% (+0.3) failed) of buildworld and buildkernel (GENERIC and LINT) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 207 test runs (69.0% (-21.8) passed, 30.0% (+21.2) unstable, 1.0% (+0.6) exception) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 26 doc and www builds (100% (+0.0) passed) Test case status (on 2020-08-02 23:59): | Branch/Architecture | Total | Pass | Fail | Skipped | | ------------------- | -------- | --------- | ------ | ------- | | head/amd64 | 7872 (0) | 7781 (-1) | 1 (+1) | 90 (0) | | head/i386 | 7870 (0) | 7772 (+2) | 1 (+1) | 97 (-3) | | 12-STABLE/amd64 | 7619 (0) | 7562 (0) | 0 (0) | 57 (0) | | 12-STABLE/i386 | 7617 (0) | 7552 (+3) | 0 (0) | 65 (-3) | | 11-STABLE/amd64 | 6912 (0) | 6861 (+3) | 0 (0) | 51 (-3) | | 11-STABLE/i386 | 6910 (0) | 6854 (-3) | 0 (0) | 56 (+3) | (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/@FreeBSD-CI/report-20200802 and archive is available at https://hackmd.io/@FreeBSD-CI/ , any help is welcomed. ## Failing jobs * https://ci.freebsd.org/job/FreeBSD-head-amd64-gcc6_build/ ``` /usr/local/bin/x86_64-unknown-freebsd12.1-ld: /tmp/obj/workspace/src/amd64.amd64/lib/clang/liblldb/liblldb.a(IOHandlerCursesGUI.o): in function `curses::Window::Box(unsigned int, unsigned int)': /workspace/src/contrib/llvm-project/lldb/source/Core/IOHandlerCursesGUI.cpp:361: undefined reference to `box' /usr/local/bin/x86_64-unknown-freebsd12.1-ld: /workspace/src/contrib/llvm-project/lldb/source/Core/IOHandlerCursesGUI.cpp:361: undefined reference to `box' collect2: error: ld returned 1 exit status ``` From kevans@: one of ncurses' scripts that generates box and a bunch of other symbols is shooting blanks with gcc6, however it seems fine on gcc9. Patch by jhb@: https://reviews.freebsd.org/D25731 ## Regressions * lib.libexecinfo.backtrace_test.backtrace_fmt_basic starts failing on amd64 after r360915 https://bugs.freebsd.org/246537 * lib.msun.ctrig_test.test_inf_inputs starts failing after llvm10 import https://bugs.freebsd.org/244732 * Lock-order reversals triggered by tests under sys.net.if_lagg_test.* on i386 https://bugs.freebsd.org/244163 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) * sys.net.if_lagg_test.lacp_linkstate_destroy_stress panics i386 kernel https://bugs.freebsd.org/244168 Discovered by newly endabled sys.net.* tests. ([r357857](https://svnweb.freebsd.org/changeset/base/357857)) Fix in review: https://reviews.freebsd.org/ * lib.googletest.gtest_main.googletest-port-test.main https://bugs.freebsd.org/248452 ## Failing and Flaky tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * cddl.usr.sbin.dtrace.common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237641 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * There are ~13 failing and ~109 skipped cases, including flakey ones, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details * Work for cleaning these failing cass are in progress * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_ltp/ * Total 3749 tests, 2277 success, 647 failures, 825 skipped ## Disabled Tests * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * sys.kern.ptrace_test.ptrace__PT_KILL_competing_stop https://bugs.freebsd.org/220841 * lib.libc.regex.exhaust_test.regcomp_too_big (i386 only) https://bugs.freebsd.org/237450 * sys.netinet.socket_afinet.socket_afinet_bind_zero https://bugs.freebsd.org/238781 * sys.netpfil.pf.names.names * sys.netpfil.pf.synproxy.synproxy https://bugs.freebsd.org/238870 * sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger https://bugs.freebsd.org/239292 * sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger https://bugs.freebsd.org/239397 * sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger https://bugs.freebsd.org/239399 * sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger https://bugs.freebsd.org/239425 * sys.sys.qmath_test.qdivq_s64q https://bugs.freebsd.org/240219 * sys.kern.ptrace_test.ptrace__getppid https://bugs.freebsd.org/240510 * lib.libc.sys.stat_test.stat_socket https://bugs.freebsd.org/240621 * lib.libarchive.functional_test.test_write_filter_zstd https://bugs.freebsd.org/240683 * lib.libcasper.services.cap_dns.dns_test.main https://bugs.freebsd.org/241435 * local.kyua.* (31 cases) & local.lutok.* (3 cases) on 11-i386 https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/2278/testReport/ * sys.kern.ptrace_test.ptrace__procdesc_reparent_wait_child https://bugs.freebsd.org/243605 * sys.kern.ptrace_test.ptrace__parent_wait_after_attach https://bugs.freebsd.org/244055 * sys.kern.ptrace_test.ptrace__parent_exits_before_child https://bugs.freebsd.org/244056 * sys.net.if_lagg_test.witness (i386) https://bugs.freebsd.org/244163 * PipePdfork.WildcardWait in sys.capsicum.capsicum-test.main https://bugs.freebsd.org/244165 * sys.net.if_lagg_test.lacp_linkstate_destroy_stress (i386) https://bugs.freebsd.org/244168 * sys.netinet6.frag6.frag6_07.frag6_07 https://bugs.freebsd.org/244170 * sys.netinet.fibs_test.udp_dontroute6 https://bugs.freebsd.org/244172 * sys.netpfil.pf.nat.exhaust https://bugs.freebsd.org/244703 * sys.geom.class.gate.ggate_test.ggated (i386) https://bugs.freebsd.org/244737 * sys.kern.sysv_test.msg https://bugs.freebsd.org/233649 ## Issues ### Cause build fails * https://bugs.freebsd.org/233769 Possible build race: ld: error: unable to find library -lgcc_s ### Cause kernel panics * https://bugs.freebsd.org/238870 sys.netpfil.pf.names.names and sys.netpfil.pf.synproxy.synproxy cause panic ### Open * https://bugs.freebsd.org/237403 Tests in sys/opencrypto should be converted to Python3 Fixed in head in https://svnweb.freebsd.org/changeset/base/363361 * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/238781 sys.netinet.socket_afinet.socket_afinet_bind_zero does not work when mac_portacl(4) loaded * https://bugs.freebsd.org/239292 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_child_detached_unrelated_debugger * https://bugs.freebsd.org/239397 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_both_attached_unrelated_debugger * https://bugs.freebsd.org/239399 Flakey test case: sys.kern.ptrace_test.ptrace__parent_sees_exit_after_child_debugger * https://bugs.freebsd.org/239425 Flakey test case: sys.kern.ptrace_test.ptrace__follow_fork_parent_detached_unrelated_debugger * https://bugs.freebsd.org/241662 Flakey test case: lib.libarchive.functional_test.test_fuzz_iso9660 * https://bugs.freebsd.org/246443 sys.net.if_clone_test.epair_stress sometimes exceeds timeout limit but not caught by kyua * https://bugs.freebsd.org/247510 sys.net.if_lagg_test.status_stress panics kernel on i386 ### Others * [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) From owner-freebsd-current@freebsd.org Mon Aug 3 18:19:11 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6CBE93A4360 for ; Mon, 3 Aug 2020 18:19:11 +0000 (UTC) (envelope-from peter@libassi.se) Received: from smtp.outgoing.loopia.se (smtp.outgoing.loopia.se [93.188.3.37]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BL5kQ2N2sz4DYG for ; Mon, 3 Aug 2020 18:19:09 +0000 (UTC) (envelope-from peter@libassi.se) Received: from s807.loopia.se (localhost [127.0.0.1]) by s807.loopia.se (Postfix) with ESMTP id BB67830A6E57 for ; Mon, 3 Aug 2020 20:19:06 +0200 (CEST) Received: from s630.loopia.se (unknown [172.22.191.5]) by s807.loopia.se (Postfix) with ESMTP id 9D200308C884; Mon, 3 Aug 2020 20:19:06 +0200 (CEST) Received: from s471.loopia.se (unknown [172.22.191.5]) by s630.loopia.se (Postfix) with ESMTP id 9400D13ABF26; Mon, 3 Aug 2020 20:19:06 +0200 (CEST) X-Virus-Scanned: amavisd-new at amavis.loopia.se X-Spam-Flag: NO X-Spam-Score: -0.999 X-Spam-Level: X-Spam-Status: No, score=-0.999 tagged_above=-999 required=6.2 tests=[ALL_TRUSTED=-1, HTML_MESSAGE=0.001] autolearn=disabled Received: from s645.loopia.se ([172.22.191.6]) by s471.loopia.se (s471.loopia.se [172.22.190.11]) (amavisd-new, port 10024) with LMTP id xu4fx003xuxg; Mon, 3 Aug 2020 20:19:05 +0200 (CEST) X-Loopia-Auth: user X-Loopia-User: peter@libassi.se X-Loopia-Originating-IP: 217.31.161.79 Received: from [10.0.2.62] (h-161-79.A444.priv.bahnhof.se [217.31.161.79]) (Authenticated sender: peter@libassi.se) by s645.loopia.se (Postfix) with ESMTPSA id 9F531156E4BE; Mon, 3 Aug 2020 20:19:05 +0200 (CEST) From: Peter Libassi Message-Id: <0D73201E-8956-4085-81E0-C50FA96C6657@libassi.se> Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: vnet/jail crashdump Date: Mon, 3 Aug 2020 20:19:05 +0200 In-Reply-To: Cc: freebsd-current@freebsd.org To: Ronald Klop References: X-Mailer: Apple Mail (2.3608.80.23.2.2) X-Rspamd-Queue-Id: 4BL5kQ2N2sz4DYG X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of peter@libassi.se has no SPF policy when checking 93.188.3.37) smtp.mailfrom=peter@libassi.se X-Spamd-Result: default: False [-1.04 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_FIVE(0.00)[6]; NEURAL_HAM_MEDIUM(-0.99)[-0.986]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; MV_CASE(0.50)[]; NEURAL_HAM_LONG(-0.86)[-0.858]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RWL_MAILSPIKE_VERYGOOD(0.00)[93.188.3.37:from]; AUTH_NA(1.00)[]; DMARC_NA(0.00)[libassi.se]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.59)[-0.592]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[93.188.3.37:from]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:39570, ipnet:93.188.2.0/23, country:SE]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Aug 2020 18:19:11 -0000 Looks like bug: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D234985 = = > and=20 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D238326 = = > The workaround in Bug 238326 comment 7 worked for me. /Peter > 3 aug. 2020 kl. 19:36 skrev Ronald Klop : >=20 > Hi, >=20 > After stopping a jail I get a crashdump. > core.txt: = https://www.klop.ws/core_2eef39c581f90f2f0c4921e43f1998c1/core.txt.0 >=20 > Jail.conf: > ---------- > exec.stop =3D "/bin/sh /etc/rc.shutdown"; > exec.clean; >=20 > exec.prestart =3D "ifconfig bridge0 > /dev/null 2> /dev/null || ( = ifconfig bridge0 create && ifconfig bridge0 addm vtnet0 && ifconfig = bridge0 up)"; >=20 > exec.consolelog =3D "/var/log/jail_${name}_console.log"; >=20 > mount.devfs; > path =3D "/data/jails/$name"; > host.hostname =3D "$name"; > mount.fstab =3D "/data/jails/fstab.$name"; > vnet; > allow.mlock; > devfs_ruleset=3D"110"; >=20 > freebsd12 { > osrelease =3D 12.1-RELEASE-p4; > osreldate =3D 1201000; > vnet.interface =3D "epair0b"; > # make sure the exec.prestart has a "+=3D" as we de it in the = global definition > # when checking for the bridge > exec.prestart +=3D "ifconfig epair0 create up"; > exec.prestart +=3D "ifconfig bridge0 addm epair0a"; > exec.prestart +=3D "ifconfig epair0b link 02:xxxxxx:0c"; > exec.start =3D "dhclient epair0b"; > exec.start +=3D "/bin/sh /etc/rc"; > exec.poststop =3D "ifconfig bridge0 deletem epair0a"; > exec.poststop +=3D "ifconfig epair0a destroy"; >=20 > } > freebsd13 { > vnet.interface =3D "epair1b"; > # make sure the exec.prestart has a "+=3D" as we de it in the = global definition > # when checking for the bridge > exec.prestart +=3D "ifconfig epair1 create up"; > exec.prestart +=3D "ifconfig bridge0 addm epair1a"; > exec.prestart +=3D "ifconfig epair1b link 02:xxxxxx:0d"; > exec.start =3D "dhclient epair1b"; > exec.start +=3D "/bin/sh /etc/rc"; > exec.poststop =3D "ifconfig bridge0 deletem epair1a"; > exec.poststop +=3D "ifconfig epair1a destroy"; > } > ---------- >=20 > What can I do to help debug? >=20 > Regards, > Ronald. > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to = "freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Mon Aug 3 18:27:09 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EA5D43A4753 for ; Mon, 3 Aug 2020 18:27:09 +0000 (UTC) (envelope-from luzar722@gmail.com) Received: from mail-qk1-x72f.google.com (mail-qk1-x72f.google.com [IPv6:2607:f8b0:4864:20::72f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BL5vd18KTz4FNk for ; Mon, 3 Aug 2020 18:27:08 +0000 (UTC) (envelope-from luzar722@gmail.com) Received: by mail-qk1-x72f.google.com with SMTP id l6so36041335qkc.6 for ; Mon, 03 Aug 2020 11:27:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-transfer-encoding; bh=JAjfI37UCwO0ReSoLF+q44InJD20sgpF4bYdQI+Hjsg=; b=KFt0KQ3IKVt6APGWYjmUdgmuAnfIVNutepzFcsxXSq34Y2kEh05Q9++lDpcWzhGHr+ SEsMT0tejA6JfWqeccwjFoSn+7e4jVurt51ctit34wCEtTTnWFsKPbMNZCd+5FAwOT6d w4qDBt0acGyxrlwjBTt0GypYsstB/dlpHXx3O+Um5VKjdgdCkpBlQMISukHBA497YuY5 MZ4rqEj/RquUceynDzWFrbqIqOBgj4c138z9CyjQiaKOZkiUQ+88txzve3uimPhRAyxh WcKajW2jPgnqdS2RR2AtDb2Z3TeFoYB7wfSvUtoSOeKOy7vE/Fa+zjChcjoTpZDUpAla QMiQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to :cc:subject:references:in-reply-to:content-transfer-encoding; bh=JAjfI37UCwO0ReSoLF+q44InJD20sgpF4bYdQI+Hjsg=; b=XLA5YDmBhl/qJizSndzQv0L+0YFzk3mttW2SbRQcR9H3cnvAM7m0JfmyNSXsQP6M1l FqHAni74ykW+lXT2ToQ478lmJeNcT0BISSFHJtYeRHXs6MvCazf4MhZJqE5K3b8GkkLV cHlEvZpG6KfTmD8JDNob5HfgLJaZlp6WlHRAosc90fFyo+6cRsvyZA2vZqrdQ1XweOaW 3xlQOJCwhHD1X9JuAsgwGv5XH69ilpqgbGVOJa+82e8dyydj/Pd8KBgo9xdxzyGz1lB9 LcpTkFP6yg5NaAskyPmo8mQrLpmjcE5Lado4eugSBVUsp7+utc/XYwnjGiXK0/RMz+d0 mEKQ== X-Gm-Message-State: AOAM532xSX+llh5wri3UZqbxhxxDhY4aNiIjCoA2ULnhX1EWju6dDOAi tn3jq/X40PVEFLptG9oZAj4OTb0h X-Google-Smtp-Source: ABdhPJzYTQk62H6VUG+98RpmcYdkkCkwDb27HcC5tAwKW0UXECL4e7Dt6t1rSq/TFO9syN3daD6qsg== X-Received: by 2002:a05:620a:62f:: with SMTP id 15mr16828822qkv.483.1596479228084; Mon, 03 Aug 2020 11:27:08 -0700 (PDT) Received: from [10.0.10.8] (cpe-65-25-51-0.neo.res.rr.com. [65.25.51.0]) by smtp.googlemail.com with ESMTPSA id a67sm13960429qkd.40.2020.08.03.11.27.06 (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 03 Aug 2020 11:27:07 -0700 (PDT) Message-ID: <5F2856FB.1010305@gmail.com> Date: Mon, 03 Aug 2020 14:27:07 -0400 From: Ernie Luzar User-Agent: Thunderbird 2.0.0.24 (Windows/20100228) MIME-Version: 1.0 To: Ronald Klop CC: freebsd-current@freebsd.org Subject: Re: vnet/jail crashdump References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4BL5vd18KTz4FNk X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=KFt0KQ3I; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of luzar722@gmail.com designates 2607:f8b0:4864:20::72f as permitted sender) smtp.mailfrom=luzar722@gmail.com X-Spamd-Result: default: False [-2.81 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RECEIVED_SPAMHAUS_PBL(0.00)[65.25.51.0:received]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.02)[-1.019]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; NEURAL_SPAM_SHORT(0.18)[0.182]; NEURAL_HAM_LONG(-0.97)[-0.974]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::72f:from]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Aug 2020 18:27:10 -0000 Ronald Klop wrote: > Hi, > > After stopping a jail I get a crashdump. > core.txt: > https://www.klop.ws/core_2eef39c581f90f2f0c4921e43f1998c1/core.txt.0 > > Jail.conf: > ---------- > exec.stop = "/bin/sh /etc/rc.shutdown"; > exec.clean; > > exec.prestart = "ifconfig bridge0 > /dev/null 2> /dev/null || ( ifconfig > bridge0 create && ifconfig bridge0 addm vtnet0 && ifconfig bridge0 up)"; > > exec.consolelog = "/var/log/jail_${name}_console.log"; > > mount.devfs; > path = "/data/jails/$name"; > host.hostname = "$name"; > mount.fstab = "/data/jails/fstab.$name"; > vnet; > allow.mlock; > devfs_ruleset="110"; > > freebsd12 { > osrelease = 12.1-RELEASE-p4; > osreldate = 1201000; > vnet.interface = "epair0b"; > # make sure the exec.prestart has a "+=" as we de it in the global > definition > # when checking for the bridge > exec.prestart += "ifconfig epair0 create up"; > exec.prestart += "ifconfig bridge0 addm epair0a"; > exec.prestart += "ifconfig epair0b link 02:xxxxxx:0c"; > exec.start = "dhclient epair0b"; > exec.start += "/bin/sh /etc/rc"; > exec.poststop = "ifconfig bridge0 deletem epair0a"; > exec.poststop += "ifconfig epair0a destroy"; > > } > freebsd13 { > vnet.interface = "epair1b"; > # make sure the exec.prestart has a "+=" as we de it in the global > definition > # when checking for the bridge > exec.prestart += "ifconfig epair1 create up"; > exec.prestart += "ifconfig bridge0 addm epair1a"; > exec.prestart += "ifconfig epair1b link 02:xxxxxx:0d"; > exec.start = "dhclient epair1b"; > exec.start += "/bin/sh /etc/rc"; > exec.poststop = "ifconfig bridge0 deletem epair1a"; > exec.poststop += "ifconfig epair1a destroy"; > } > ---------- > > What can I do to help debug? > Don't understand why you have these 2 statements exec.prestart += "ifconfig epair1b link 02:xxxxxx:0d"; exec.start = "dhclient epair1b"; There is a well known bug with bridge vnet tear down since release 9.0. Their is a rewrite of if_bridge going on right now to fix the problem and increase the performance of if_bridge. As of today this fix is not in 12.2 stable or 13.0 current. There also looks like a bug in jail(8) when you have both vnet jails and non-vnet jails being started on the same host at the same time. In most cases the host just loses internet access until all the jails are stopped. Some times you will get a system crash. This jail.conf def seems to work around the bridge tear down problem # vnet jail using the bridge/epair method on 12.1 v0jail1 { host.hostname = "v0jail1"; path = "/usr/jails/v0jail1"; mount.fstab = "/usr/local/etc/fstab/v0jail1"; exec.consolelog = "/var/log/v0jail1.console.log"; mount.devfs; devfs_ruleset = "4"; vnet = "new"; vnet.interface = "epair55b"; exec.prestart = "ifconfig epair55 create up"; exec.prestart += "ifconfig bridge0 addm epair55a"; exec.prestart += "ifconfig epair55a descr vnet-v0jail1"; exec.prestart += "ifconfig bridge0 inet 10.0.48.2 netmask 255.255.255.0 alias"; exec.start = "/bin/sh /etc/rc"; exec.start += "ifconfig epair55b inet 10.0.48.1 netmask 255.255.255.0"; exec.start += "route add default 10.0.48.2"; exec.prestop = "ifconfig epair55b -vnet v0jail1"; exec.stop = "/bin/sh /etc/rc.shutdown"; exec.poststop = "ifconfig bridge0 deletem epair55a"; exec.poststop += "sleep 2"; exec.poststop += "ifconfig epair55a destroy"; exec.poststop += "ifconfig bridge0 inet 10.0.48.2 -alias"; } Remember that your host firewall processes all traffic in & out of the host including any vnet jail traffic. Yes a vnet jail has its own stack and can have its own firewall, but the host firewall still has the last say. The host must NAT any private ip addresses used by the vnet jails. jail.conf jail definitions are based on hard codded ip addresses. You can not use the host dhcp to assign local lan private ip addresses to a jail. You may find this helpful https://forums.freebsd.org/threads/vnet-jail-with-public-internet-access-using-the-bridge-epair-method.76071/ From owner-freebsd-current@freebsd.org Mon Aug 3 20:12:28 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DD59C3A6463 for ; Mon, 3 Aug 2020 20:12:28 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smarthost1.greenhost.nl (smarthost1.greenhost.nl [195.190.28.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BL8F66p3vz4Ly5 for ; Mon, 3 Aug 2020 20:12:26 +0000 (UTC) (envelope-from ronald-lists@klop.ws) Received: from smtp.greenhost.nl ([213.108.110.112]) by smarthost1.greenhost.nl with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1k2gop-0005U8-Gj; Mon, 03 Aug 2020 22:12:24 +0200 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=klop.ws; s=mail; h=In-Reply-To:Message-ID:From:Content-Transfer-Encoding:MIME-Version: Date:References:Subject:Cc:To:Content-Type:Sender:Reply-To:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=3pKrqkewy5Dq0loaEIBU4N9V84c4eWIgAD2JEPCm5pc=; b=YjO99PaG6r1jfDyX/McxabdSra 4uQ1NcG8Z7ggOQCJTj2ubG8+S8iu2Ca6I6iE2kvbxmBGObPi8dcQnUFZu8Tpfovx9RuFpigILklis Zfncd5MkNCu8si35pCTF6OVrHn6kju6ao3S9QZZuio3ajuUzvyh5YhKJ0obcy3rV7DAY=; Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes To: "Ernie Luzar" Cc: freebsd-current@freebsd.org Subject: Re: vnet/jail crashdump References: <5F2856FB.1010305@gmail.com> Date: Mon, 03 Aug 2020 22:12:19 +0200 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: "Ronald Klop" Message-ID: In-Reply-To: <5F2856FB.1010305@gmail.com> User-Agent: Opera Mail/12.16 (FreeBSD) X-Authenticated-As-Hash: 398f5522cb258ce43cb679602f8cfe8b62a256d1 X-Virus-Scanned: by clamav at smarthost1.samage.net X-Spam-Level: / X-Spam-Score: -0.4 X-Spam-Status: No, score=-0.4 required=5.0 tests=ALL_TRUSTED, BAYES_50, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF autolearn=disabled version=3.4.2 X-Scan-Signature: 1621a07189ffd89c587b37d28d532eca X-Rspamd-Queue-Id: 4BL8F66p3vz4Ly5 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=klop.ws header.s=mail header.b=YjO99PaG; dmarc=none; spf=pass (mx1.freebsd.org: domain of ronald-lists@klop.ws designates 195.190.28.88 as permitted sender) smtp.mailfrom=ronald-lists@klop.ws X-Spamd-Result: default: False [-2.35 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.989]; R_DKIM_ALLOW(-0.20)[klop.ws:s=mail]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; RWL_MAILSPIKE_GOOD(0.00)[195.190.28.88:from]; R_SPF_ALLOW(-0.20)[+ip4:195.190.28.64/27]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[klop.ws]; NEURAL_HAM_LONG(-1.02)[-1.021]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[klop.ws:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[195.190.28.88:from]; NEURAL_HAM_SHORT(-0.34)[-0.336]; FREEMAIL_TO(0.00)[gmail.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:47172, ipnet:195.190.28.0/24, country:NL]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Aug 2020 20:12:28 -0000 On Mon, 03 Aug 2020 20:27:07 +0200, Ernie Luzar wrote: > Ronald Klop wrote: >> Hi, >> After stopping a jail I get a crashdump. >> core.txt: >> https://www.klop.ws/core_2eef39c581f90f2f0c4921e43f1998c1/core.txt.0 >> Jail.conf: >> ---------- >> exec.stop = "/bin/sh /etc/rc.shutdown"; >> exec.clean; >> exec.prestart = "ifconfig bridge0 > /dev/null 2> /dev/null || ( >> ifconfig bridge0 create && ifconfig bridge0 addm vtnet0 && ifconfig >> bridge0 up)"; >> exec.consolelog = "/var/log/jail_${name}_console.log"; >> mount.devfs; >> path = "/data/jails/$name"; >> host.hostname = "$name"; >> mount.fstab = "/data/jails/fstab.$name"; >> vnet; >> allow.mlock; >> devfs_ruleset="110"; >> freebsd12 { >> osrelease = 12.1-RELEASE-p4; >> osreldate = 1201000; >> vnet.interface = "epair0b"; >> # make sure the exec.prestart has a "+=" as we de it in the global >> definition >> # when checking for the bridge >> exec.prestart += "ifconfig epair0 create up"; >> exec.prestart += "ifconfig bridge0 addm epair0a"; >> exec.prestart += "ifconfig epair0b link 02:xxxxxx:0c"; >> exec.start = "dhclient epair0b"; >> exec.start += "/bin/sh /etc/rc"; >> exec.poststop = "ifconfig bridge0 deletem epair0a"; >> exec.poststop += "ifconfig epair0a destroy"; >> } >> freebsd13 { >> vnet.interface = "epair1b"; >> # make sure the exec.prestart has a "+=" as we de it in the global >> definition >> # when checking for the bridge >> exec.prestart += "ifconfig epair1 create up"; >> exec.prestart += "ifconfig bridge0 addm epair1a"; >> exec.prestart += "ifconfig epair1b link 02:xxxxxx:0d"; >> exec.start = "dhclient epair1b"; >> exec.start += "/bin/sh /etc/rc"; >> exec.poststop = "ifconfig bridge0 deletem epair1a"; >> exec.poststop += "ifconfig epair1a destroy"; >> } >> ---------- >> What can I do to help debug? >> > > > Don't understand why you have these 2 statements > > exec.prestart += "ifconfig epair1b link 02:xxxxxx:0d"; > exec.start = "dhclient epair1b"; Using dhcp on a fixed MAC is much faster in my network. This might be written in a better way. Please enlighten me. After a lot of twiddling with settings this worked. > There is a well known bug with bridge vnet tear down since release 9.0. > Their is a rewrite of if_bridge going on right now to fix the problem > and increase the performance of if_bridge. As of today this fix is not > in 12.2 stable or 13.0 current. Ah ok, so it is a known issue. > There also looks like a bug in jail(8) when you have both vnet jails and > non-vnet jails being started on the same host at the same time. In most > cases the host just loses internet access until all the jails are > stopped. Some times you will get a system crash. Ok. Not my use case, but good to know. > This jail.conf def seems to work around the bridge tear down problem > > # vnet jail using the bridge/epair method on 12.1 > v0jail1 { > host.hostname = "v0jail1"; > path = "/usr/jails/v0jail1"; > mount.fstab = "/usr/local/etc/fstab/v0jail1"; > exec.consolelog = "/var/log/v0jail1.console.log"; > mount.devfs; > devfs_ruleset = "4"; > vnet = "new"; > vnet.interface = "epair55b"; > exec.prestart = "ifconfig epair55 create up"; > exec.prestart += "ifconfig bridge0 addm epair55a"; > exec.prestart += "ifconfig epair55a descr vnet-v0jail1"; > exec.prestart += "ifconfig bridge0 inet 10.0.48.2 netmask 255.255.255.0 > alias"; > exec.start = "/bin/sh /etc/rc"; > exec.start += "ifconfig epair55b inet 10.0.48.1 netmask > 255.255.255.0"; > exec.start += "route add default 10.0.48.2"; > exec.prestop = "ifconfig epair55b -vnet v0jail1"; > exec.stop = "/bin/sh /etc/rc.shutdown"; > exec.poststop = "ifconfig bridge0 deletem epair55a"; > exec.poststop += "sleep 2"; > exec.poststop += "ifconfig epair55a destroy"; > exec.poststop += "ifconfig bridge0 inet 10.0.48.2 -alias"; > } > > Remember that your host firewall processes all traffic in & out of the > host including any vnet jail traffic. Yes a vnet jail has its own stack > and can have its own firewall, but the host firewall still has the last > say. The host must NAT any private ip addresses used by the vnet jails. > > jail.conf jail definitions are based on hard codded ip addresses. You > can not use the host dhcp to assign local lan private ip addresses to a > jail. > > You may find this helpful > > https://forums.freebsd.org/threads/vnet-jail-with-public-internet-access-using-the-bridge-epair-method.76071/ > Thanks for all the info. Ronald. From owner-freebsd-current@freebsd.org Tue Aug 4 00:24:58 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6BDA23AAB0C; Tue, 4 Aug 2020 00:24:58 +0000 (UTC) (envelope-from mmacy@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BLFrV202Hz4Z5g; Tue, 4 Aug 2020 00:24:58 +0000 (UTC) (envelope-from mmacy@freebsd.org) Received: from mail-lj1-f171.google.com (mail-lj1-f171.google.com [209.85.208.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) (Authenticated sender: mmacy) by smtp.freebsd.org (Postfix) with ESMTPSA id 22EF12D9BB; Tue, 4 Aug 2020 00:24:58 +0000 (UTC) (envelope-from mmacy@freebsd.org) Received: by mail-lj1-f171.google.com with SMTP id v9so7142414ljk.6; Mon, 03 Aug 2020 17:24:58 -0700 (PDT) X-Gm-Message-State: AOAM532SYEzVxv4cpg+N8Eicu2Lwtfcmj/kAwiOSlTQZ/Rb/1zoZrsA3 JgVVYIXVmt7U4cYHxz7sG8jQz/sVa2PC4qOVs6s= X-Google-Smtp-Source: ABdhPJwFOeuJmIr/AK29TNzeiUK22+qGXeOoe9ZHThgpLIG3qtx4OKeXBKSkYnD2B2JR0co9BXFKm3WeiML0//zORww= X-Received: by 2002:a05:651c:307:: with SMTP id a7mr8245161ljp.297.1596500696675; Mon, 03 Aug 2020 17:24:56 -0700 (PDT) MIME-Version: 1.0 From: Matthew Macy Date: Mon, 3 Aug 2020 17:24:45 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: CFT for vendor openzfs - week 5 reminder + memdisk images To: freebsd-current , freebsd-fs , freebsd-hackers@freebsd.org Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Aug 2020 00:24:58 -0000 On Wednesday, July 8th I issued the initial call for testing for the update to HEAD to vendored openzfs. We'd like to give users roughly a month to test before merging. The tentative merge date is August 17th. Again, I hope it's not terribly controversial to point out that it really rests with users of non amd64 platforms to test to avoid any unpleasant surprises the next time they update their trees following the merge. amd64, i386, and aarch64 memdisk images can be found at: https://people.freebsd.org/~freqlabs/freebsd-openzfs/latest/ If you're using a platform not listed above and would be inclined to test if you had an image to work with, let us know. Alternatively, you can still build following the instructions below. The review for merging in to base can be found at: https://reviews.freebsd.org/D25872 ========================================================== NB: Do NOT zpool upgrade unless you are willing to live without the ability to ever rollback to the legacy zfs kmod. Checkout updated HEAD: % git clone https://github.com/mattmacy/networking.git -b projects/openzfs_vendor freebsd Checkout updated openzfs in to sys/contrib: % git clone https://github.com/zfsonfreebsd/ZoF.git -b projects/openzfs_vendor freebsd/sys/contrib/openzfs Build world and kernel with whatever your usual configuration is. Where possible the openzfs kmod is backward compatible with the cmd utils in HEAD so common operations work with existing tools and the new kmod. In the projects/openzfs_vendor branch of ZoF ozfs libraries are backward compatible with the zfs kmod in HEAD. Although ideally one would test this in a separate boot environment, the interoperability should allow one to rollback without too much difficulty. NB: The patch updates /etc/rc.d/zfs - so if you skip mergemaster pools other than the root pool will not be imported at boot. Thanks in advance for your time. -M From owner-freebsd-current@freebsd.org Tue Aug 4 15:06:42 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A1930376B89; Tue, 4 Aug 2020 15:06:42 +0000 (UTC) (envelope-from hps@selasky.org) Received: from mail.turbocat.net (turbocat.net [88.99.82.50]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BLdPs59Syz4SyJ; Tue, 4 Aug 2020 15:06:41 +0000 (UTC) (envelope-from hps@selasky.org) Received: from hps2020.home.selasky.org (unknown [178.17.145.105]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.turbocat.net (Postfix) with ESMTPSA id F22AA26051F; Tue, 4 Aug 2020 17:06:33 +0200 (CEST) Subject: Re: somewhat reproducable vimage panic To: Kristof Provost , "Bjoern A. Zeeb" , freebsd-net@freebsd.org, freebsd-current@freebsd.org References: <38F5A3A6-B578-4BA4-8F69-C248163CB6E0@libassi.se> <20200722060514.GF4213@funkthat.com> <20200722193443.GG4213@funkthat.com> <6C149617-55BB-4A87-B993-195E5E133790@lists.zabbadoz.net> <20200722221509.GI4213@funkthat.com> <2FFC49F9-83DE-4FA1-A47F-1D8A7AF4B241@FreeBSD.org> <6847FB6B-0B1A-43C7-B567-15BF21AB5D56@FreeBSD.org> <8B72C0B9-9CF0-4557-81D7-77190775805C@lists.zabbadoz.net> <20200723234925.GL4213@funkthat.com> <20200725192129.GN4213@funkthat.com> From: Hans Petter Selasky Message-ID: <7d5bbb63-02e0-ec4a-0ce7-4f5b7babb4fc@selasky.org> Date: Tue, 4 Aug 2020 17:06:11 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200725192129.GN4213@funkthat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4BLdPs59Syz4SyJ X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of hps@selasky.org designates 88.99.82.50 as permitted sender) smtp.mailfrom=hps@selasky.org X-Spamd-Result: default: False [-3.00 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+a:mail.turbocat.net]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[selasky.org]; NEURAL_HAM_LONG(-1.02)[-1.019]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-0.68)[-0.679]; NEURAL_HAM_MEDIUM(-1.00)[-0.999]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:88.99.0.0/16, country:DE]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Aug 2020 15:06:42 -0000 On 2020-07-25 21:21, John-Mark Gurney wrote: > So far so good... I am getting these on occasion: > in6_purgeaddr: err=65, destination address delete failed Maybe you could add a "kdb_backtrace()" call when that error happens? --HPS From owner-freebsd-current@freebsd.org Wed Aug 5 02:12:18 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3EECC3A6518 for ; Wed, 5 Aug 2020 02:12:18 +0000 (UTC) (envelope-from yasu@utahime.org) Received: from gate.utahime.jp (gate.utahime.jp [183.180.29.210]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4BLw9r70qRz48nw for ; Wed, 5 Aug 2020 02:12:16 +0000 (UTC) (envelope-from yasu@utahime.org) Received: from eastasia.home.utahime.org (eastasia.home.utahime.org [192.168.174.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by gate.utahime.jp (Postfix) with ESMTPS id E42BF3B527 for ; Wed, 5 Aug 2020 11:12:06 +0900 (JST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=utahime.org; s=maybe2019112701; t=1596593526; bh=Id4EkHTgEUVHDwXAHRA9PbI1sCo1KQHayFmUU3+3QPk=; h=Date:To:Subject:From; b=hL+bxvf6gMMTbhJqfAlu8StOCFDB3uMWlMxAFvsy9zqcwwgbSOuqUgx4bdO/0XTHx sl8H50O393RliC3xpb+uSoi0nzfyf6mwYWlmtYka2rbn+I9orqfSx1Nm6kCxNY2VH+ v6X5tXYrRciRIIlj1I9GjRf9lMFCHp0FSJeBIl6BviM4SbL/5gzscSFecF4yPnC2U6 f4KiD8NOpeLjeFEd2ZC5xuwOK1tXu7tgWT2+9vGA3amBwB+cXo0crsg4w+B+SAx9hC GljwEjVrXPxKDJh18JV2u3x8CgA8TscUR/2+2QXtdWHixPy6p6ZgreyVHNBOVDmo/O 1lFriYrpFWv5g== Received: from localhost (rolling.home.utahime.org [192.168.174.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by eastasia.home.utahime.org (Postfix) with ESMTPSA id E66F2487F4; Wed, 5 Aug 2020 11:12:05 +0900 (JST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.102.4 at eastasia.home.utahime.org Date: Wed, 05 Aug 2020 11:11:48 +0900 (JST) Message-Id: <20200805.111148.1054885205951365130.yasu@utahime.org> To: freebsd-current@freebsd.org Subject: Why ld-elf32.so.1 is included not in lib32.txz but in base.txz? From: Yasuhiro KIMURA X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: 4BLw9r70qRz48nw X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=pass header.d=utahime.org header.s=maybe2019112701 header.b=hL+bxvf6; dmarc=none; spf=pass (mx1.freebsd.org: domain of yasu@utahime.org designates 183.180.29.210 as permitted sender) smtp.mailfrom=yasu@utahime.org X-Spamd-Result: default: False [0.52 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[utahime.org:s=maybe2019112701]; NEURAL_HAM_MEDIUM(-0.97)[-0.973]; FROM_HAS_DN(0.00)[]; MV_CASE(0.50)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.01)[-1.006]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[utahime.org]; R_SPF_ALLOW(-0.20)[+a:spf-authorized.utahime.org]; DKIM_TRACE(0.00)[utahime.org:+]; MID_CONTAINS_FROM(1.00)[]; NEURAL_SPAM_SHORT(0.50)[0.501]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:2519, ipnet:183.180.0.0/16, country:JP]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Aug 2020 02:12:18 -0000 Hello. Let me assume I make clean install of 13-CURRENT amd64 by using latest snapshot install media (right now 20200730-r363681). At "Distribution Selection" stage I unselect "lib32". Then 32bit libraries are not installed after installation is completed. Next, I add 'WITHOUT_LIB32=yes' to /etc/src.conf, check out base source tree to /usr/src, cd there and execute 'make delete-old'. Then following files and directories are asked to be removed. /etc/mtree/BSD.lib32.dist /libexec/ld-elf32.so.1 /usr/lib32/libxo/encoder /usr/lib32/libxo /usr/lib32/i18n /usr/lib32/geom /usr/lib32/engines /usr/lib32/dtrace /usr/lib32 I accept to remove all of them and they are removed. After that I reboot system. Then it starts up without any error. Now I have one question. Why ld-elf32.so.1 is included not in lib32.txz but in base.txz? Is there any reason it is necessary when installing OS even if 32bit libraries aren't instlled? Best Regards. --- Yasuhiro KIMURA From owner-freebsd-current@freebsd.org Wed Aug 5 21:19:21 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D80B73A8E74 for ; Wed, 5 Aug 2020 21:19:21 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x72f.google.com (mail-qk1-x72f.google.com [IPv6:2607:f8b0:4864:20::72f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BMPdN6pgjz4FGZ for ; Wed, 5 Aug 2020 21:19:20 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x72f.google.com with SMTP id x69so43135473qkb.1 for ; Wed, 05 Aug 2020 14:19:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=KCSoVCpsgolMPvVU82NmjTfTqXEoW2npPiPThJhHgSU=; b=X1RASR2PSyrAPZKqWp99CGssQ/fEiy+6DzGnBK0ez9xcyZmJdvMf+Pwb65mXvfqHgQ djodMD0meXK/5rnWhCKxDugpl2tOgA0O27g13oCZK5UkTvrR2ojQccuSxFLK85iWann4 CI3oEbk87RcUt6Hur1OrGvvmyTbcjcVmqdS2V02vjD/Oqv370DGJhUgcxBsAULOnqWRj Rgryjb6gL+TD+FQOEUwcKAQ1kWuNT+4+by3cQ5pg9Kma/F4KOWYQQwUM+jie++uW/t0o 5+/JRLaZWb+nZ7WwM44r2goR17coYrgZdlaTfyLufV/ezXYZcN/pEWykWfyH9DC+G+ZB fG0Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=KCSoVCpsgolMPvVU82NmjTfTqXEoW2npPiPThJhHgSU=; b=mhWltxTiBzbl8VQvt5i8jYDV9Ykx2r1jhc/77n5qSt6QxvU9PpjGF7lLPstGEtGwZs 2s8w6dtKUZg2oH3cZAupfBbfbeAeP+osj0sRTXnb8pBOysh+4aPSffh0tGBEc+yrwGt3 AenAfUNTuiZjzKXYDE6sjiXL63UnWunQ8x+7Yg0Ykip98Sns3fH1Pai/aWHPbs+oAi8x AW9D7x7uR9ZjsAbQ+GOiZdvRBDwEaKtjDvP/QDiBNXcvj9AWCL2lXetz2kuPuMpQQI+J px7XAQ/GyESZgGGaaQWKetSUfWgl95rmQ9CXPJXGHRhECxZ3RRrlHDsWqFhu62AaHv+f wsBQ== X-Gm-Message-State: AOAM531AA1DVAy+5HzOGqP7PC9OnCtfCc8ymGF8ihpJWlHdCDZVJT6AF V2CsdpKWKq+SEYoYGEs5krym6sAVlul/OCp8B52Ftf+bCaI= X-Google-Smtp-Source: ABdhPJz8zV+q81yq6OO1CEqJmzW48sqJOs3y83l8N0MA+EXf1N8MacEh9xUQL91UjFJP30v3iNIUiDVPH9yM2VTMelk= X-Received: by 2002:a37:4015:: with SMTP id n21mr4886426qka.240.1596662359038; Wed, 05 Aug 2020 14:19:19 -0700 (PDT) MIME-Version: 1.0 From: Warner Losh Date: Wed, 5 Aug 2020 15:19:08 -0600 Message-ID: Subject: To people upgrading from before r363679 To: FreeBSD Current X-Rspamd-Queue-Id: 4BMPdN6pgjz4FGZ X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=X1RASR2P; dmarc=none; spf=none (mx1.freebsd.org: domain of wlosh@bsdimp.com has no SPF policy when checking 2607:f8b0:4864:20::72f) smtp.mailfrom=wlosh@bsdimp.com X-Spamd-Result: default: False [-0.67 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.05)[-0.047]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.78)[-0.783]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::72f:from]; NEURAL_SPAM_SHORT(0.16)[0.156]; R_SPF_NA(0.00)[no SPF record]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.33 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Aug 2020 21:19:21 -0000 If you are upgrading across r363679, you may have installworld fail, as documented in UPDATING. I have a fix (that requires a trip through buildworld) that's under review at https://reviews.freebsd.org/D25967 . The changes are likely good, but comments likely need updating. The short version is that we purposely use old libraries to install the system. We created a symbolic link to a bunch of binaries on the system and once installworld installs one of them, we get the error. The workaround works because we copy libc.so before doing the installworld, so now we're running with a new libc.so with new binaries, which works. My fix always copies and never symlinks. The symbolic link stuff is too fragile. With it, I've done one system, but I'd appreciate reports (on the code review if possible, to me in email if not) of people who have success upgrading with this. If you've already run installworld and hit the undefined symbol, it's too late for you to help me test (since re-running is the same as hitting to test is the same as the workaround and so it will work even if my workaround is busted). Some history: This was introduced about 2 years ago. Prior to that, we always copied binaries for the install. Warner From owner-freebsd-current@freebsd.org Thu Aug 6 20:46:01 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D77853AA96D for ; Thu, 6 Aug 2020 20:46:01 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-eopbgr670076.outbound.protection.outlook.com [40.107.67.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BN0rS30YPz4ZLM for ; Thu, 6 Aug 2020 20:46:00 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SwUBsyPt6b1mtp7NGAKQRIf95Vp4dODUiPFZIEk+vRMdmFBY/481inDhP06RhaiwJRm9esxuhpksfd2B2csTJwf3tFyCb3YVzSD/BmtsSHgFAoJFyBMwb33CFrL7GF1n8WtHAwY5eJj0SS0lpqeulgalOsPEdG9poRg1ma3KDUNxVlJzxWgJdAAGi3WdXfpXGRaIcMXB6Cmv+25I2f1bkQTHzSLbjvwlIbuJpW5jFmDylH5WPU1SJwWLL5nvt/Xo4hjt7XoW5Javv05jCGdbuPGEhB9/yjH8shag2TqPRIQvCXNTn9jswfrNssgXusW/bfeA13NTX/82/iT9qT3QhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6HDy0PBT9KtyCFGLAE8M+VBrEMb5O+RHOXwjqXJmdwo=; b=ifQBswHY6g+iOOiuqqSM5rr1GGjr5pmd1Gwn/qgUHr9LGe/c1EIKd9bMpK/SVgcAOpeWu/LCVuNcjryIAMiYjwwMtvGV+uM2SH2X/Tojl3u/YEtHzS9yNaqruKjGpJwpj8nQjbTaicrVas4ffI2EDrBVIaJwhXfSNwn4r5GDd556sP9UnoLOh2WXHj8X8mcYkpd9LXLyLlC4JcW+fqlb1DlOIiQFwcyEh36iBg9IF10WCstRWdIT3J1o2gCY4UZC3/gwkbpuPvmpfand7jDBslCEE7WBIRoh+aOAaypE8lqeQ+f0p0VVkolg9yegaMc1ez7m75pk6XgtBcZEYv1rjw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uoguelph.ca; dmarc=pass action=none header.from=uoguelph.ca; dkim=pass header.d=uoguelph.ca; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uoguelph.ca; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6HDy0PBT9KtyCFGLAE8M+VBrEMb5O+RHOXwjqXJmdwo=; b=kNNzxgShzGimIvdevnEY9PwWclIqxzBG0GF30xoh7N2YrsUjQDgkYtdmwcF3nkNz/qnFnskaahx/z148MvHSDFrO2TPSdZMDVhEtthMWKC55PD/O8pAnpP94kdAigF8gXuUviESjpGYlz6r+eQOmi07A6TjToT/p+dQqad3kKIEHeGrU3KWQyjXqb2EktzQ64Y1gwhMEEw9TXjH16CPIxEWMWQSWFLzRqOa9kKvdqSN5+FKAvcP9qY7KhrDW/Fj23awhi1gvPGQyP21fOX8/giCU8TRuGgqd5AwE6W21t4fvroosKPRtqTjJ0kuqaCrURu9z85NAozpohX9MHOpUCw== Received: from QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:38::14) by QB1PR01MB3060.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:c00:3b::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3239.21; Thu, 6 Aug 2020 20:45:58 +0000 Received: from QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM ([fe80::e89a:a655:91ca:4e63]) by QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM ([fe80::e89a:a655:91ca:4e63%5]) with mapi id 15.20.3261.019; Thu, 6 Aug 2020 20:45:58 +0000 From: Rick Macklem To: "freebsd-current@FreeBSD.org" Subject: can buffer cache pages be used in ext_pgs mbufs? Thread-Topic: can buffer cache pages be used in ext_pgs mbufs? Thread-Index: AQHWbC7TP/nOu8hGHE+IVczIn5RP+g== Date: Thu, 6 Aug 2020 20:45:58 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6484fe06-8371-4cd3-cecd-08d83a49b932 x-ms-traffictypediagnostic: QB1PR01MB3060: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: reHhTM34dHqtNV2BQlSuIMYiutGZuSOyqzJDRkLwGn3Jb0d6wWnhLkVZpWg62MmtdSrO6ugDngFLjJ5ZLKmJ92C1wUGQqvWju/sVl+K4BJgy0GBtMEwVcxB+QrOrSx7KMeBDHOxvFi61/JwZLr0+kmeKlViluGhOElGQTCVeAJxuAQlOFQiL6AC5vd2d3iKmcbFTOrjsyG44VgZIq5vlbChTRw8ZQVNz9fOzZP3tyNYSJhilICTzoMuAar33CTzcPmoG+ylQ+2RFZioIptIQyrfte5dwwmKgXTOscywlXp0TaEk9eDU1qW6R/vvKIGA7 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(396003)(366004)(39860400002)(346002)(136003)(376002)(7696005)(83380400001)(6916009)(186003)(33656002)(52536014)(66946007)(5660300002)(64756008)(66556008)(316002)(86362001)(9686003)(786003)(55016002)(8676002)(91956017)(8936002)(76116006)(71200400001)(6506007)(478600001)(2906002)(66476007)(66446008); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: 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 x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: QB1PR01MB3364.CANPRD01.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 6484fe06-8371-4cd3-cecd-08d83a49b932 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Aug 2020 20:45:58.6084 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 1gvZPidXqMsyOeYve/Nqb/F24BNjRHMpNBdrwbUOLXuvnC/KiS7UDq19wHmYM85xY22NQwtpcfPKtyrojFPcdQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: QB1PR01MB3060 X-Rspamd-Queue-Id: 4BN0rS30YPz4ZLM X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=uoguelph.ca header.s=selector1 header.b=kNNzxgSh; dmarc=none; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.67.76 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-4.18 / 15.00]; NEURAL_HAM_MEDIUM(-1.05)[-1.049]; R_DKIM_ALLOW(-0.20)[uoguelph.ca:s=selector1]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[uoguelph.ca]; NEURAL_HAM_LONG(-0.99)[-0.993]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1]; RCPT_COUNT_ONE(0.00)[1]; DWL_DNSWL_LOW(-1.00)[uoguelph.ca:dkim]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[uoguelph.ca:+]; NEURAL_HAM_SHORT(-0.64)[-0.636]; RCVD_IN_DNSWL_NONE(0.00)[40.107.67.76:from]; TO_DN_EQ_ADDR_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:8075, ipnet:40.104.0.0/14, country:US]; RCVD_TLS_LAST(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[40.107.67.76:from] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Aug 2020 20:46:01 -0000 Hi,=0A= =0A= I've been at this game for a while and one of the axioms is...=0A= "Everything is harder than it at first looks."=0A= =0A= Currently, when the FreeBSD NFS client does a write, it does:=0A= - VOP_WRITE() copies the data into buffer cache block(s).=0A= --> An nfsiod thread (or sometimes the thread that called VOP_WRITE()),=0A= copies the data from the buffer cache block into a list of mbuf clusters= ,=0A= prepends the NFS and RPC headers, then passes it down to TCP via sosend(= ).=0A= =0A= After the RPC reply is received (or the RPC fails due to timeout):=0A= - m_freem() is called on the mbuf list.=0A= - bufdone()/brelse() is called for the buffer cache block.=0A= =0A= For TLS, the mbuf list passed into sosend() must be ext_pgs mbufs, so the= =0A= mbuf clusters get copied to ext_pgs mbufs with anonymous pages before=0A= the sosend() call.=0A= =0A= So, what if the pages associated with the buffer cache block (b_pages)=0A= were entered in the m_epg_pa[] array for the ext_pgs mbufs, instead of=0A= copying the data into mbuf clusters?=0A= - At a glance, this just seems like it would work.=0A= It looks like the buffer cache pages are wired down until bufdone()/brels= e(),=0A= which happens after m_freem() on the mbuf list.=0A= - There would need to be a custom m__ext.ext_free, but it looks like a no-o= p.=0A= (ie. does nothing, since the buffer cache code deals with the pages later= .)=0A= =0A= The only thing I can think of (and I don't understand the vm/memory cache= =0A= parts of FreeBSD) is that, since the buffer cache pages are written via cop= ying=0A= into their kva addresses and then read via the direct map of their physical= =0A= pages, there might be some sort of memory cache flush needed to ensure the= =0A= physical pages are up to date (no data still working its way through write-= back).=0A= - Is this a problem and how is it handled?=0A= =0A= In summary, what am I missing that makes this difficult/impossible to do?= =0A= =0A= If no one has an answer, I'll just code it up and see what happens.=0A= =0A= Thanks for any comments, rick=0A= =0A=