From owner-freebsd-current@freebsd.org Fri Sep 4 12:06:18 2020 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 91DC73DF60F; Fri, 4 Sep 2020 12:06:18 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass Class 2 CA" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4BjbxN3Sbkz3g3V; Fri, 4 Sep 2020 12:06:15 +0000 (UTC) (envelope-from ohartmann@walstatt.org) X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.94.26]) by mail.gmx.com (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MfYPY-1klJN80lzM-00fwRz; Fri, 04 Sep 2020 14:06:14 +0200 Date: Fri, 4 Sep 2020 14:06:12 +0200 From: "O. Hartmann" To: Matthew Macy Cc: freebsd-current , freebsd-fs , freebsd-hackers@freebsd.org Subject: Re: OpenZFS support merged: problem mounting ZFS within JAILs Message-ID: <20200904140612.7a7c517a@freyja> In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:RzCnQsfjgzZGnL150j98qhdJ3UBkFkkcbFkHVoZDVNk22XAOIim 68eAOrVhtSQSyQkTW/8AcsDeWXvYCM44sV7fSoY0I49iIpJ6MyC6qA0WkuLpSPAmrGgnZLK 0PNxPQZUzhJE95x0nL49l8y75sdE/b2tPd5suiqN6eZSbBWXTA24EajdDux6zPnD5Pbw3kN UNHpTqUPPloPfDiOFUlzA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:2OKKhEQRfDA=:DtSaYEPuslsFMweaAPKfAp xi0zVNA5UeK+2gy+GJ/rJ2UpWsg1K1h6NaugwriuqzVY0h7E1Y44ksn7LWho1lugwIqo9TOeV 3ahYzkArzqSoT+61ej+U5sDbwwIs5DmwiKDYMDIEdwtGJJaj5pSBGcGYeB/ktDBs4OA3IpTW3 2BnMSLLG2NAo6aU2qZbj0FC1R9ByxC3zi3lzEr5cUxdTMQftw93jUiNWaFy3RPvz1mS0c4evs Lu4zG8y+I0HSTYgQZr1swju0NrG/rYhOWyJHA3A9Km5Oyd1PTW1eRLrVkd0pJLoHCRn8ZcM4u 3kRloOrrlACUeLbr4x2lgLLT/PH37DQ+0rPjdHAuOdDVs2otrbeb4CALk00Hj9fBSGEeSINzu PiZ0Ic4GSCEYwmMQo1C6YKESBk2M9GJRPJPnCOJRTOQuzr7jiWPUeUG9c0kkGSn7kCtH9CTAC vq1uNqudQ50OGSLxgcQvKBNqzZSfm9gd4a631DOVUNQeixZ/KyG0OQJ7lW2pDstBbMBQsDyl3 yY0KG3VFCLaYssppLrvDE5AEHNj2HWVD3zumHIkEBAGT98+K1cUnwQhzcpWPaMcAGU0+GKpFT kKTEMHaNOaLIB1gjSre9JOQZYiv7rVxXSy7qSf9NfA7ydwPO0tiwV9N+/4J867sp+nXrkQlP1 fCll2yKtAy7WNdBP4o0MI/9K48MYrSq40xbnNEU1tloKP20z618vFw299Mmngh5Me6qENmS2a R0jUoZfICwLpVevkkt9V9mujeI9X5fZxYeMTSYwJyxVrDzgYqHkIUnfn75HFUEgNvr8Qo5dNS 6+lOdMwLmAynEW12+RPmT7v3Kq7yMH71qkJlpEJJaOHdtv9HqYTF2Z8mBBJdySoxTIhmiZesR VsPrtMPkPFXX31p0JtWmgjfEJo9A7LVhow9rbenoleYOXbUd4ktwV8GvaSCYynTvidnD2MVs3 xlqPqz4egmRl/rIQmzMqoTS0FEklHYchSOo9YBBbHDnmwdgC9/1l+ZlASD2HzgzAQFtSqB5tm sH8VrDwj+E67HeNNtfypasLuoLJw5XAc3MLWyU0nNUHikioyxFlwCSdsREZNHAZx0vS0JNKoC jSL36+EnvJKJ88JMV8ze2ysGYLEXgk+qfWbIcDOkf/trL8qc2a1QDjwlLlq/+DAyf0Ea2xDCq kB21OPaoAYCiT5nAXnUBtRH4A/YPCnYIclwz9Ybu5D4UsiC2HVcV4pqQfVPn29qGWAPrWseDa HqpaZ72YqSx7SEQrPMnGfM2ryiTe2H/oMEZJxMA== X-Rspamd-Queue-Id: 4BjbxN3Sbkz3g3V X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.43 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; RCVD_IN_DNSWL_LOW(-0.10)[212.227.17.21:from]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[walstatt.org]; NEURAL_HAM_LONG(-0.93)[-0.931]; RWL_MAILSPIKE_POSSIBLE(0.00)[212.227.17.21:from]; NEURAL_HAM_MEDIUM(-0.94)[-0.936]; DKIM_TRACE(0.00)[gmx.net:+]; NEURAL_HAM_SHORT(-0.67)[-0.665]; RECEIVED_SPAMHAUS_PBL(0.00)[46.88.94.26:received]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; RCVD_TLS_ALL(0.00)[]; MAILMAN_DEST(0.00)[freebsd-hackers,freebsd-fs,freebsd-current]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Sep 2020 12:06:18 -0000 On Mon, 24 Aug 2020 19:38:53 -0700 Matthew Macy wrote: > r364746 merged OpenZFS support in to HEAD. > > The change should be transparent unless you want to use new features. > I caution against 'zpool upgrade' for the next few weeks. > > https://svnweb.freebsd.org/base?view=3Drevision&revision=3D364746 > > If you encounter problems please report them to me, Ryan Moeller, and > -current. _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.or= g" Hello. We just upgraded several boxes running CURRENT to r365325. These systems a= re running customized kernels with ZFS statically compiled in. the host's OS = is derived from "make buildworld buildkernel" in /usr/src. Jails on that hosts are maintained vi /etc/jail.conf, but system is instal= led by misusage of ezjail. So far the environemnt. One of the jails is a dedicated poudriere jail using ZFS. This worked so f= ar. Every pool this specific jail or any other jail is mounting is located bel= ow POOL/ezjail therefore we consider enforce_statfs=3D "1"; in /etc/jail.conf as sufficient. After updating all /etc/default/ and /etc/rc.d of those poudriere-jails with ZFS everything should be inline regarding new requests for OpenZFS . But now enforce_statfs=3D "1"; isn't sufficient anymore, the jais fail to = startup with a mount error complaining about insufficient access rights. The probl= em partially disappear by setting enforce_statfs=3D "0";, but this isn't what= we want and personally I consider it a risk. But furthermore, several ZFS dat= asets prior to the upgrade successfully being exported from the hosts pools and = mount from withing the jail are now invisible within the jail. According to /usr/src/UPDATING, tag 20200824, the features of the ZFS pool= s of the main hosts have been left untouched so far, no feature upgrade has bee= n performed. Some hints would be nice. Kind regards, oh