From owner-freebsd-bugs@FreeBSD.ORG Sun Nov 3 13:10:00 2013 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id D77AD188 for ; Sun, 3 Nov 2013 13:10:00 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id B78142DB5 for ; Sun, 3 Nov 2013 13:10:00 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id rA3DA009034323 for ; Sun, 3 Nov 2013 13:10:00 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id rA3DA02q034322; Sun, 3 Nov 2013 13:10:00 GMT (envelope-from gnats) Resent-Date: Sun, 3 Nov 2013 13:10:00 GMT Resent-Message-Id: <201311031310.rA3DA02q034322@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Florian Heigl Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id A94B5EFE for ; Sun, 3 Nov 2013 13:02:16 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from oldred.freebsd.org (oldred.freebsd.org [8.8.178.121]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 7D0BE2D8A for ; Sun, 3 Nov 2013 13:02:16 +0000 (UTC) Received: from oldred.freebsd.org ([127.0.1.6]) by oldred.freebsd.org (8.14.5/8.14.7) with ESMTP id rA3D2Gbq010313 for ; Sun, 3 Nov 2013 13:02:16 GMT (envelope-from nobody@oldred.freebsd.org) Received: (from nobody@localhost) by oldred.freebsd.org (8.14.5/8.14.5/Submit) id rA3D2GpW010312; Sun, 3 Nov 2013 13:02:16 GMT (envelope-from nobody) Message-Id: <201311031302.rA3D2GpW010312@oldred.freebsd.org> Date: Sun, 3 Nov 2013 13:02:16 GMT From: Florian Heigl To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Subject: kern/183615: linprocfs: emulate /proc/sys/kernel/random/uuid X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 03 Nov 2013 13:10:01 -0000 >Number: 183615 >Category: kern >Synopsis: linprocfs: emulate /proc/sys/kernel/random/uuid >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Nov 03 13:10:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Florian Heigl >Release: 9.1-STABLE#0 >Organization: >Environment: FreeBSD freebsd1 9.1-STABLE FreeBSD 9.1-STABLE #0: Sun Jul 7 23:12:23 EEST 2013 root@freebsd:/usr/obj/usr/src/sys/XENHVM amd64 FreeBSD freebsd1 9.1-STABLE FreeBSD 9.1-STABLE #0: Sun Jul 7 23:12:23 EEST 2013 root@freebsd:/usr/obj/usr/src/sys/XENHVM amd64 >Description: I followed (somewhat) the debian document about setting up a Debian Jail on FreeBSD at https://wiki.debian.org/Debian_GNU/kFreeBSD/Jails Using the Linux module and mounting some filesystems I have this working OK and can ssh into it. With this, I'm trying to make some software available to FreeBSD. linprocfs 4 4 0 100% /srv/jail/debjail/proc linsysfs 4 4 0 100% /srv/jail/debjail/sys tmpfs 36068 60 36008 0% /srv/jail/debjail/run devfs 1 1 0 100% /srv/jail/debjail/dev linprocfs 4 4 0 100% /usr/compat/linux/proc A problem I hit is that some application (in this case: Check_MK multisite) uses the procfs to gain easy access to uuid's for session handling and object id's. What they do is: root@debjail:/omd/sites/freemon# grep -R "random/uuid" * share/check_mk/web/htdocs/weblib.py: sel_id = file('/proc/sys/kernel/random/uuid').read().strip() In linprocfs we don't have this file available, or actually the whole directory ain't there: builder@debjail:/build$ ls /proc/sys/kernel/ msgmni osrelease ostype pid_max sem version The following things are in there on Linux: $ ls /proc/sys/kernel/random boot_id poolsize uuid entropy_avail read_wakeup_threshold write_wakeup_threshold Could anyone look into this? in case of "uuid" it seems there's a FreeBSD system call that gives back an uuid. Myself I'll try and see if i can create a pipe or something in that place that gives back a uuid on read? >How-To-Repeat: mount linux procfs, check for existance of /proc/sys/kernel/random/uuid should be accessible like this: $ cat /proc/sys/kernel/random/uuid bee78388-ce08-450a-be12-dcbbc6c4f3f1 (but isn't since we don't got it) >Fix: >Release-Note: >Audit-Trail: >Unformatted: