[Bug 245541] [panic ] fault code = supervisor read data, page not present

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=245541

Sebastian S  changed:

   What|Removed |Added

 Status|New |Closed
 Resolution|--- |FIXED

--- Comment #3 from Sebastian S  ---
Swapping the memory solved the issue.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251372] fetch(1) silently accepts invalid options

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251372

Bug ID: 251372
   Summary: fetch(1) silently accepts invalid options
   Product: Base System
   Version: 12.2-RELEASE
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Some People
  Priority: ---
 Component: bin
  Assignee: b...@freebsd.org
  Reporter: ltning-free...@anduin.net

The fetch(1) command silently accepts certain invalid options given on the
command line.

E.g.
  fetch -no-verify-hostname -o - https://freebsd.org/
is expected to return an error, given the mistyped (-)-no-verify-hostname
option.

Silently ignoring invalid/unknown options is potentially dangerous.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251372] fetch(1) silently accepts invalid options

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251372

Eirik Oeverby  changed:

   What|Removed |Added

 Resolution|--- |Not A Bug
   Severity|Affects Some People |Affects Only Me
 Status|New |Closed

--- Comment #1 from Eirik Oeverby  ---
Turns out -n is a valid option, -o takes an argument, so this gave an output
file called '-verify-hostname'.

Apologies.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251376] Regression in lid switch behavior on Toshiba Satellite

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251376

Bug ID: 251376
   Summary: Regression in lid switch behavior on Toshiba Satellite
   Product: Base System
   Version: 12.2-RELEASE
  Hardware: amd64
OS: Any
Status: New
  Severity: Affects Only Me
  Priority: ---
 Component: kern
  Assignee: b...@freebsd.org
  Reporter: j...@freebsd.org

Since upgrading to 12.2-RELEASE, the lid switch does not trigger S3 mode on my
Toshiba Satellite, only after a fresh boot.  Instead, the machine keeps running
while closed.

Manually putting it to sleep via the Lumina exit menu works, and the lid switch
then works fine on subsequent closes until the next reboot.

This is a regression from 12.1-RELEASE.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251376] Regression in lid switch behavior on Toshiba Satellite

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251376

Mark Linimon  changed:

   What|Removed |Added

   Keywords||regression

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251274] panic: recursive fpu_kern_enter while in PCB_FPUNOSAVE state

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251274

--- Comment #2 from Juraj Lutter  ---
With today's CURRENT and openzfs (sysutils/openzfs-kmod) I'm getting:

nda21: 1526185MB (3125627568 512 byte sectors)


Fatal trap 12: page fault while in kernel mode
cpuid = 27; apic id = 1b
fault virtual address   = 0x58
fault code  = supervisor read data, page not present
instruction pointer = 0x20:0x80bc1f09
stack pointer   = 0x28:0xfe01a3f59b80
frame pointer   = 0x28:0xfe01a3f59bc0
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 1 (kernel)
trap number = 12
panic: page fault
cpuid = 27
time = 115
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfe01a3f59830
vpanic() at vpanic+0x181/frame 0xfe01a3f59880
panic() at panic+0x43/frame 0xfe01a3f598e0
trap_fatal() at trap_fatal+0x387/frame 0xfe01a3f59940
trap_pfault() at trap_pfault+0x97/frame 0xfe01a3f599a0
trap() at trap+0x2ab/frame 0xfe01a3f59ab0
calltrap() at calltrap+0x8/frame 0xfe01a3f59ab0
--- trap 0xc, rip = 0x80bc1f09, rsp = 0xfe01a3f59b80, rbp =
0xfe01a3f59bc0 ---
__mtx_lock_flags() at __mtx_lock_flags+0x49/frame 0xfe01a3f59bc0
zone_dataset_visible() at zone_dataset_visible+0x6b/frame 0xfe01a3f59c10
zfs_mount() at zfs_mount+0x26c/frame 0xfe01a3f59d90
vfs_domount() at vfs_domount+0x89c/frame 0xfe01a3f5a000
vfs_donmount() at vfs_donmount+0x872/frame 0xfe01a3f5a0a0
kernel_mount() at kernel_mount+0x57/frame 0xfe01a3f5a0f0
parse_mount() at parse_mount+0x4a1/frame 0xfe01a3f5a230
vfs_mountroot() at vfs_mountroot+0x589/frame 0xfe01a3f5a3a0
start_init() at start_init+0x1f/frame 0xfe01a3f5a430
fork_exit() at fork_exit+0x80/frame 0xfe01a3f5a470
fork_trampoline() at fork_trampoline+0xe/frame 0xfe01a3f5a470
--- trap 0, rip = 0, rsp = 0, rbp = 0 ---
KDB: enter: panic
[ thread pid 1 tid 12 ]
Stopped at  kdb_enter+0x37: movq$0,0x10ac246(%rip)

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251274] panic: recursive fpu_kern_enter while in PCB_FPUNOSAVE state

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251274

--- Comment #3 from Juraj Lutter  ---
And this is happening on boot.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #5 from Gunther Schadow  ---
Updated the stackexchange link with a draft design to allow to use rm and rmdir
to evict entries from the cache, new whitemode UNIONFS_WHITE_NEVER would do
that. I love how the kernel sources seem to be quite clean and it is easy to
add these improvements. At least that's my impression before actually having
run any of them (kernel is still compiling on a AWS EC2 t2.micro instance with
no remaining CPU credits -- reminds me of compiling the 386BSD kernel in 1992
on my i486 PC (or the Ultix 4.2 kernel on the VAX 6000-340 ;-) )

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Was wäre, wenn Wohlstand Garantiert wäre und ohne Risiko?

2020-11-25 Thread M_L_M_Verteiler24
Endlich automatisiertes System, das echten Wohlstand schafft
Hier geht es zur Onlineversion Hier klicken

Ausgabe 783 vom 25.11.20

 


Was wäre, wenn Wohlstand Garantiert wäre und ohne Risiko? Vermögens 
Bildungssystem Endlich automatisiertes System, das echten Wohlstand schafft 
Lass mich Ihnen ein paar Fragen stellen?
1 - Was wäre, wenn es eine GLOBAL COMPANY gäbe, die Garantiert ein Home Based 
Business für Sie Aufbaut?
2 - Ran Targeted Traffic (KUNDEN) und Verkaufte Digitale Produkte auf dem 
neuesten Stand der Technik für Sie?
3 - Hat gesamte KUNDEN SERVICE FÜR SIE?
4 - Alles, was Sie tun müssen, ist, täglich Wöchentlich, Monatlich Geld zu 
sammeln? ** VOLLSTÄNDIG AUTOMATISIERTES HAND FREIES SYSTEM !!
Hallo liebe/er Geschäftsfreund/in Mein name ist Toni Zeyko V. Ich bin seit 2018 
ein Early Bird Founder von Onpassive LLC. Was Onpassive ist könnte ich Ihnen 
ein Text schreiben der sehr lange werden könnte. Wir haben uns Entschlossen 
zwei Video^s die kurz und Effektiv wirken. Es ist einmal auf Deutsche und 
Englische Sprache verfügbar. ( Bitte schauen Sie sich beide Videos an!)

Deutschesprachige Präsentation: https://trimurl.co/DeutschsprachigePraesentation

Englishe Presentation https://trimurl.co/EnglishPresentations

Hier noch paar Punkte bezogen auf Onpassive: LLC
- Onpassive ist Registriert bei BBB
- Über 212 Länder Registriert und Lizenziert
- Hauptsitz in Orlando/Florida, zwei weitere Büros in Bangalore und Hyderbad 
(Indien)
- Bis ende 2020 1000 Mitarbeiter (Onpassive ist noch in Prelaunch)
- OnPassive hat derzeit einen Wert von 3 Milliarden US
-Dollar aufgrund der Produkte
- 100% Risikolos..
- Wenn Onpassive Startet wird es nie wieder eine Founder position Angeboten
- Onpassive hat sein eigenes persönliches Kommunikations Chat für Founder
- Wöchentliche Webinare mit Führungskräfte und CEO(Founder Mr. Ash Mufareh) 
werden veranstaltet
- Öffentliche Webinar veranstaltungen von Onpassive jede Woche, mehrmals auf 
Englische Sprache
- OnPassive wird von Generation zu vererbbar sein
- OnPassive wird nach zweites Geschäftsjahres eine Unicorn Company werden
- Uvm

Wenn Sie Founder werden,werde ich Sie und mein Team unterstützen:
1. Wir haben ein Telegramm Chat nur für Founder
2. Falls Sie ein Team aufbauen möchten (nicht pflicht bei Onpassive),wir 
unterstützen Sie durch Zoom Call,Sie müssen nur ihre Interessenten einladen zum 
Zoom Call . Später müssen Sie Ihren Interessenten bei registrieren helfen. Ist 
das ein DEAL für Sie ?
3. Uvm

Werden Sie jetzt ein Early Bird Founder für 97$.
Sehr bald wird Founder Spot auf 149$ erhöht und das auch nur für kurze Zeit

Zum Registrieren: https://trimurl.co/Zukunftorentiert 
Zur direct registration: https://trimurl.co/WfGeJYr 

Die 97$ können mit BTC,Kredit Karte und mit Debit Karte bezahlen. Wir würden 
uns sehr freuen Sie in Founder Kommunikation Chat, Sie zu begrüßen persönlich. 
Warten Sie nicht lange,Onpassive startet noch dieses Jahr. Es lohnt sich für 
beide seiten!! Für Selbständige,Networker, Firmen usw UND auch für die kein 
Business betreiben, dan wird ganz einfach Onpassive das Business heissen.

Mit besten Grüßen,
Toni Zeyko V. - Early Bird Founder seit 2018 (Admin von TeamElite - Onpassive)
Kontakt: Email: onpassivet...@email.de (Betreff: Founder)

Cortisol – Warum blockiert ein zu hoher Cortisolspiegel das Abnehmen?


Cortisol – Warum blockiert ein zu hoher Cortisolspiegel das Abnehmen? Was sind 
die Zeichen für eine zu hohe Cortisolausschüttung im Körper? Welchen Einfluss 
hat die Trainingsintensität und Dauer auf den Cortisolspiegel und was kann man 
bei erhöhtem Cortisolspiegel tun um ihn zu senken?

Die "Cortisol Lösung"


FGF2 ist die scheinbar geniale Lösung zur
Senkung des Cortisol-Spiegels und die gleichzeitige Erhöhung des 
Serotonin-Spiegels sowie der Spiegel folgender Neurotransmitter: Dopamin, 
Acetylcholin und GABA. Das führt zu – gehobener Stimmung – weniger Ängsten und 
mehr Mut – weniger Heißhunger – schnellere Denkprozesse und geistige Klarheit. 
Dem gegenüber führt ein zu hoher Cortisol-Spiegel zu – verfrühten 
Alterungsprozessen – Entstehung chronischer Krankheiten (z.B. Diabetes Typ 2) – 
Übergewicht – Verhinderung der Produktion körpereigener Hormone, was man u.a. 
in den Wechseljahren merkt.“

 

MLM Verteiler-24 & MLM-Anzeiger-24

Der Newsletter für die Network Marketing Branche

| mlm-verteiler24.de | Email

MLM-Verteiler24- Lake Forest 92630 - USA

Unsere registrierten User erhalten 1-2 mal monatlich den www.MLM-Verteiler24.de

Du möchtest dich vom Newsletter abmelden? Dann klickst du bitte Unsubscribe.

©2020 MLM Verteiler 24. All rights reserved.

 
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251347] NFS hangs on client side when mounted from outside in Jail Tree (BROKEN NFS SERVER OR MIDDLEWARE)

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251347

Konstantin Belousov  changed:

   What|Removed |Added

 CC||k...@freebsd.org

--- Comment #5 from Konstantin Belousov  ---
First, switch to 12.2.  There were fixes for some NFS client issues that might
be
relevant (could be not).

I am sure that NFS client is not VNET-aware, i.e. it does not switch context
to the proper VNET as needed.  Esp. when offloading async io to nfsiod daemons.
In other words, I do not expect the scenario 3 to work.

For the second scenario, nullfs remount of NFS mount, VNET jail should be
irrelevant.  When the hang occurs, gather the procstat -kk -a output (on the
host).  Also it might worth a try to '-o nocache' for nullfs mounts, I remember
there were some problems with nullfs+nfs+caching.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251347] NFS hangs on client side when mounted from outside in Jail Tree (BROKEN NFS SERVER OR MIDDLEWARE)

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251347

Rick Macklem  changed:

   What|Removed |Added

 CC||rmack...@freebsd.org

--- Comment #6 from Rick Macklem  ---
I am not a jails guy, so I don't know if that was a factor.
W.r.t "..BROKEN MIDDLEWARE.."
It refers to a case where something between the NFS server
and client tries to cache Getattr replies, but doesn't get
it right.

Try testing where the NFS client connects to the server
without anything like a cisco switch in between. Just a wire
or a really dumb no frills switch.

Also, try an NFSv4 mount, since the NFSv4 RPCs are much
harder to cache and send replies.

If the problem persists, add another comment to this bug
report and we can try some other stuff.
(The error is generated because a file's fileno has changed
 and that should never happen.)
My guess is that having the two mounts for the same file
system has somehow triggered the generation of a bogus cached
reply.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251347] NFS hangs on client side when mounted from outside in Jail Tree (BROKEN NFS SERVER OR MIDDLEWARE)

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251347

--- Comment #7 from Arne Steinkamm  ---
(In reply to Rick Macklem from comment #6)

Thanks Rick,

as said before:
Using NFSv4 changes nothing :-(

I'm unable to change the wiring because the complete setup is in a computer
center 600km from here but I have access to all lights out service processors,
the switches, etc.

I have the same problem now with a Linux NFS server so I think the problem is
not on the server side.

To make the picture clearer:

two main administrative servers: adm001 and adm002
Both have a couple of VNET jails (if_bridge, not netgraph) running nameserver
etc.
And both have so called login server jails. Just a jail where the people can
ssh too and jump (ssh) inside the development networks.

Two fileserver, one Linux one FreeBSD share the $HOMEs and a pool share.

These are mounted at adm001 and amd002 to /l/home and /l/pool.

NULLFS mounts forward these in the two login jails:

/l/home --> /l/prison/login1/l/home and
/l/pool --> /l/prison/login1/l/pool.

Same procedure on adm002 with login002.

After 30 seconds to 60 minutes one of the two NFS mounts freezes.
df, ls, umount etc. hang.

And now the strange part:

  "sh /etc/rc.d/jail stop login1"

immediately unfreezes the NFS mount and everything is working normal again but,
of course, without the jail.

In the second the Jail is dead the "BROKEN NFS..." text is displayed only on
the console, not in dmesg buffer or log files and, this is strange, only on
adm001.
adm001 and adm002 are different hardware (other CPU) but there are clones, real
clones made with zfs send/receive. Of course the hostids are different.

The workaround is to allow the users to use adm001 and adm002 directly. But
this is not the way we want to have it.

When I don't use the NULLFS and make two independent NFS mounts to /l/home and
/l/prison/login1/l/home then only the second freezes.

I guess this is not normal and a real bug... 

Any help?

Thanks in advance
.//. Arne

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #6 from Gunther Schadow  ---
Success! Here is my full diff in /usr/src/sys/fs/unionfs
# svnlite diff -x-w
Index: union.h
===
--- union.h (revision 368012)
+++ union.h (working copy)
@@ -40,6 +40,12 @@

 #ifdef _KERNEL

+/* copy policy from lower to upper layer */
+typedef enum _unionfs_copypolicy {
+UNIONFS_COPY_ON_WRITE = 0,
+UNIONFS_COPY_ALWAYS
+} unionfs_copypolicy;
+
 /* copy method of attr from lower to upper */
 typedef enum _unionfs_copymode {
UNIONFS_TRADITIONAL = 0,
@@ -57,6 +63,7 @@
struct vnode   *um_lowervp; /* VREFed once */
struct vnode   *um_uppervp; /* VREFed once */
struct vnode   *um_rootvp;  /* ROOT vnode */
+unionfs_copypolicy um_copypolicy;
unionfs_copymode um_copymode;
unionfs_whitemode um_whitemode;
uid_t   um_uid;
Index: union_vfsops.c
===
--- union_vfsops.c  (revision 368012)
+++ union_vfsops.c  (working copy)
@@ -89,6 +89,7 @@
gid_t   gid;
u_short udir;
u_short ufile;
+   unionfs_copypolicy copypolicy;
unionfs_copymode copymode;
unionfs_whitemode whitemode;
struct nameidata nd, *ndp;
@@ -102,6 +103,7 @@
gid = 0;
udir = 0;
ufile = 0;
+   copypolicy = UNIONFS_COPY_ON_WRITE;
copymode = UNIONFS_TRANSPARENT; /* default */
whitemode = UNIONFS_WHITE_ALWAYS;
ndp = &nd;
@@ -190,6 +192,20 @@
return (EINVAL);
}
}
+   if (vfs_getopt(mp->mnt_optnew, "copypolicy", (void **)&tmp,
+  NULL) == 0) {
+ if (tmp == NULL) {
+   vfs_mount_error(mp, "Invalid copy policy");
+   return (EINVAL);
+ } else if (strcasecmp(tmp, "always") == 0)
+   copypolicy = UNIONFS_COPY_ALWAYS;
+ else if (strcasecmp(tmp, "onwrite") == 0)
+   copypolicy = UNIONFS_COPY_ON_WRITE;
+ else {
+   vfs_mount_error(mp, "Invalid copy policy");
+   return (EINVAL);
+ }
+   }
if (vfs_getopt(mp->mnt_optnew, "copymode", (void **)&tmp,
NULL) == 0) {
if (tmp == NULL) {
@@ -229,7 +245,7 @@

UNIONFSDEBUG("unionfs_mount: uid=%d, gid=%d\n", uid, gid);
UNIONFSDEBUG("unionfs_mount: udir=0%03o, ufile=0%03o\n", udir, ufile);
-   UNIONFSDEBUG("unionfs_mount: copymode=%d\n", copymode);
+UNIONFSDEBUG("unionfs_mount: copypolicy=%d, copymode=%d,
whitemode=%d\n", copypolicy, copymode, whitemode);

/*
 * Find upper node
@@ -265,6 +281,7 @@
ump->um_gid = gid;
ump->um_udir = udir;
ump->um_ufile = ufile;
+   ump->um_copypolicy = copypolicy;
ump->um_copymode = copymode;
ump->um_whitemode = whitemode;

Index: union_vnops.c
===
--- union_vnops.c   (revision 368012)
+++ union_vnops.c   (working copy)
@@ -464,6 +464,7 @@
 {
int error;
struct unionfs_node *unp;
+   struct unionfs_mount *ump;
struct unionfs_node_status *unsp;
struct vnode   *uvp;
struct vnode   *lvp;
@@ -477,6 +478,7 @@

error = 0;
unp = VTOUNIONFS(ap->a_vp);
+   ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
uvp = unp->un_uppervp;
lvp = unp->un_lowervp;
targetvp = NULLVP;
@@ -498,7 +500,7 @@
}
if (targetvp == NULLVP) {
if (uvp == NULLVP) {
-   if ((ap->a_mode & FWRITE) && lvp->v_type == VREG) {
+   if (((ap->a_mode & FWRITE) || (ump->um_copypolicy ==
UNIONFS_COPY_ALWAYS)) && lvp->v_type == VREG) {
error = unionfs_copyfile(unp,
!(ap->a_mode & O_TRUNC), cred, td);
if (error != 0)
r


Testing:

# mdconfig -a -t vnode /data/cachfs
md0
newfs /dev/md0
/dev/md0: 1024.0MB (2097152 sectors) block size 32768, fragment size 4096
using 4 cylinder groups of 256.03MB, 8193 blks, 32896 inodes.
super-block backups (for fsck_ffs -b #) at:
 192, 524544, 1048896, 1573248
# mkdir /cache
# mount /dev/md0 /cache
# mount_unionfs -o copypolicy=always /cache /worker-efs
# /efs/bin/less
...
# /efs/local/bin/python3.7
...
# find /cache
cache
cache/.snap
cache/bin
cache/bin/less
cache/sbin
cache/local
cache/local/bin
cache/local/bin/python3.7
cache/local/lib
cache/local/lib/python3.7
cache/local/lib/python3.7/lib-dynload
cache/local/lib/python3.7/lib-dynload/readline.so
cache/local/lib/python3.7/encodings
ca

[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #7 from Gunther Schadow  ---
Erratum: I said "I can evict from the cache by writing to the unionfs" -- I
meant by removing files from that /cache file system. I wasn't clear that in
order to mount a unionfs, you must already have the upper layer file system
mounted somewhere. And then you can access just the upper layer, where we can
clear the cache. So I do not need that UNIONFS_WHITE_NEVER option at all.

What might be cool was some kind of hook to register if the unionfs_copyfile
errors with no space left on device, we could call that evictor hook, which
then would delete from the upper layer by oldest atime.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251389] linuxkpi malloc is not strictly compatible with Linux

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251389

Bug ID: 251389
   Summary: linuxkpi malloc is not strictly compatible with Linux
   Product: Base System
   Version: CURRENT
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Some People
  Priority: ---
 Component: kern
  Assignee: b...@freebsd.org
  Reporter: jhibb...@freebsd.org

Linux's kmalloc seems to provide the following guarantees:

* GPF_KERNEL returns memory in the lower 4GB physical space
* Allocations are physically contiguous

malloc(9) does not make either of these guarantees.  This ends up breaking DRM
modules on powerpc64 platforms, where even if memory happens to be contiguous
it may not be in the bottom 4GB physical address space, and it may even be in a
different NUMA domain, where NUMA domains are physically indexed at 1<<45, such
that the bottom 4GB of the second NUMA domain doesn't fit into the 40-bit PA
range accessible to Radeon GPUs.

Contiguity can be emulated with contigmalloc(9), but that's not a viable
solution for replacing all calls, as it's very possible for the size to not be
known and traceable through the lifetime of a pointer.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 250580] VMware UEFI guests crash in virtual hardware after r366691

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250580

--- Comment #17 from Hongbo He  ---
(In reply to Christian Ullrich from comment #13)

> 6. Delete the VM's .nvram file.

That's interesting!

Besides the trick that entering the EFI shell before boot, I've tried removing
the VM's .nvram file in ESXi's datastore file browser, which will also result
in a successful boot, but only once. 

After a reboot (inc. cold boot and hot reboot) it will fail again and needs
another purge of its NVRAM file, or entering the EFI shell as I mentioned in
comment #5.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 250580] VMware UEFI guests crash in virtual hardware after r366691

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=250580

--- Comment #18 from Hongbo He  ---
In addition to comment #17, I've just tried purging NVRAM with 12.2 RC3 (Which
TrueNAS 12.0 shipped as it's kernel) with no luck. 

12.2-RELEASE will boot as normal while 12.2 RC3 will result in a reboot(not a
shutdown of the VM), and then a firmware crash that leads to the VM being
shutdown.

"Entering the EFI Shell" trick works for both, however.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #8 from Gunther Schadow  ---
Another erratum, I didn't realize at first the unionfs doesn't even require a
block device nor a mount-point directory, but rather, it can use any directory.
This is awesome, so none of this mdconfig and newfs suff is needed at all.
Forget that part of my test.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #9 from Gunther Schadow  ---
For completeness sake, I updated the mount_unionfs.8 man file also.

Full diff out of /usr/src with svnlite diff -x-w:

Index: sbin/mount_unionfs/mount_unionfs.8
===
--- sbin/mount_unionfs/mount_unionfs.8  (revision 368012)
+++ sbin/mount_unionfs/mount_unionfs.8  (working copy)
@@ -83,6 +83,16 @@
 However,
 .Ar uniondir
 remains the mount point.
+.It Cm copypolicy No = Cm onwrite | always
+The normal behavior is copy-on-write with
+.Cm onwrite
+this is the standaed unionfs behavior. If
+.Cm always
+is spefied, then the a copy is made on the upper layer even if the
+file or directory is accessed only for reading. This effectively
+turns the upper layer into a cache which is an easy way to implement
+a disk cache over an NFS filesystem, speeding up all subsequent accesses,
+very useful for network booted systems.
 .It Cm copymode No = Cm traditional | transparent | masquerade
 Specifies the way to create a file or a directory in the upper layer
 automatically when needed.
Index: sys/fs/unionfs/union.h
===
--- sys/fs/unionfs/union.h  (revision 368012)
+++ sys/fs/unionfs/union.h  (working copy)
@@ -40,6 +40,12 @@

 #ifdef _KERNEL

+/* copy policy from lower to upper layer */
+typedef enum _unionfs_copypolicy {
+UNIONFS_COPY_ON_WRITE = 0,
+UNIONFS_COPY_ALWAYS
+} unionfs_copypolicy;
+
 /* copy method of attr from lower to upper */
 typedef enum _unionfs_copymode {
UNIONFS_TRADITIONAL = 0,
@@ -57,6 +63,7 @@
struct vnode   *um_lowervp; /* VREFed once */
struct vnode   *um_uppervp; /* VREFed once */
struct vnode   *um_rootvp;  /* ROOT vnode */
+unionfs_copypolicy um_copypolicy;
unionfs_copymode um_copymode;
unionfs_whitemode um_whitemode;
uid_t   um_uid;
Index: sys/fs/unionfs/union_vfsops.c
===
--- sys/fs/unionfs/union_vfsops.c   (revision 368012)
+++ sys/fs/unionfs/union_vfsops.c   (working copy)
@@ -89,6 +89,7 @@
gid_t   gid;
u_short udir;
u_short ufile;
+   unionfs_copypolicy copypolicy;
unionfs_copymode copymode;
unionfs_whitemode whitemode;
struct nameidata nd, *ndp;
@@ -102,6 +103,7 @@
gid = 0;
udir = 0;
ufile = 0;
+   copypolicy = UNIONFS_COPY_ON_WRITE;
copymode = UNIONFS_TRANSPARENT; /* default */
whitemode = UNIONFS_WHITE_ALWAYS;
ndp = &nd;
@@ -190,6 +192,20 @@
return (EINVAL);
}
}
+   if (vfs_getopt(mp->mnt_optnew, "copypolicy", (void **)&tmp,
+  NULL) == 0) {
+ if (tmp == NULL) {
+   vfs_mount_error(mp, "Invalid copy policy");
+   return (EINVAL);
+ } else if (strcasecmp(tmp, "always") == 0)
+   copypolicy = UNIONFS_COPY_ALWAYS;
+ else if (strcasecmp(tmp, "onwrite") == 0)
+   copypolicy = UNIONFS_COPY_ON_WRITE;
+ else {
+   vfs_mount_error(mp, "Invalid copy policy");
+   return (EINVAL);
+ }
+   }
if (vfs_getopt(mp->mnt_optnew, "copymode", (void **)&tmp,
NULL) == 0) {
if (tmp == NULL) {
@@ -229,7 +245,7 @@

UNIONFSDEBUG("unionfs_mount: uid=%d, gid=%d\n", uid, gid);
UNIONFSDEBUG("unionfs_mount: udir=0%03o, ufile=0%03o\n", udir, ufile);
-   UNIONFSDEBUG("unionfs_mount: copymode=%d\n", copymode);
+UNIONFSDEBUG("unionfs_mount: copypolicy=%d, copymode=%d,
whitemode=%d\n", copypolicy, copymode, whitemode);

/*
 * Find upper node
@@ -265,6 +281,7 @@
ump->um_gid = gid;
ump->um_udir = udir;
ump->um_ufile = ufile;
+   ump->um_copypolicy = copypolicy;
ump->um_copymode = copymode;
ump->um_whitemode = whitemode;

Index: sys/fs/unionfs/union_vnops.c
===
--- sys/fs/unionfs/union_vnops.c(revision 368012)
+++ sys/fs/unionfs/union_vnops.c(working copy)
@@ -464,6 +464,7 @@
 {
int error;
struct unionfs_node *unp;
+   struct unionfs_mount *ump;
struct unionfs_node_status *unsp;
struct vnode   *uvp;
struct vnode   *lvp;
@@ -477,6 +478,7 @@

error = 0;
unp = VTOUNIONFS(ap->a_vp);
+   ump = MOUNTTOUNIONFSMOUNT(ap->a_vp->v_mount);
uvp = unp->un_uppervp;
lvp = unp->un_lowervp;
targetvp = NULLVP;
@@ -498,7 +500,7 @@
}
if (targetvp == NULLVP) {
if (uvp == NULL

[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

Gunther Schadow  changed:

   What|Removed |Added

Version|Unspecified |12.2-RELEASE
   Severity|Affects Only Me |Affects Some People

--- Comment #10 from Gunther Schadow  ---
(forget the r in last line above)

I read the Handbook about how contributions are submitted and I am glad to have
found out that they are submitted on bug tickets. So that is what I did.

I think you want to include this in some of the next releases. It's such a
useful and inoffensive new feature!

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251363] use unionfs as a disk-cache for NFS [feature]

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251363

--- Comment #11 from Gunther Schadow  ---
Created attachment 219985
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=219985&action=edit
the patch as a separate file

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251347] NFS hangs on client side when mounted from outside in Jail Tree (BROKEN NFS SERVER OR MIDDLEWARE)

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251347

--- Comment #8 from Rick Macklem  ---
Ok, I took a quick look and I don't think
an NFS mount within a vnet jail is going to work.

When the kernel RPC does a socreate() it passes
the argument cred as curthread->cred.
If this is done by an nfsiod thread, the credential
won't be for the correct vnet.

This can be fixed by adding cred arguments to assorted
functions so that the credential used at mount time can
be passed in, but the fix is not trivial.

I've never used a vnet jail, so there might be other
issues.
Sorry, but the short answer is that you will need to
figure out a way to do what you are doing without an
NFS mount in a vnet jail, I think.

I'll take this bug, but don't expect a quick fix.

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251347] NFS hangs on client side when mounted from outside in Jail Tree (BROKEN NFS SERVER OR MIDDLEWARE)

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251347

--- Comment #9 from Arne Steinkamm  ---
(In reply to Rick Macklem from comment #8)

Yes, we know that NFS does not work from inside a jail.
This is the reason using NULLFS is best practice for years now to give a jail
(vnet or not) access to a NFS mount point.

The real NFS mountpoint is outside the jail.
And nullfs should cover this. Or?

And:
I have no idea what the freeze triggers...
I simulate heavy (!) load from inside the jail and it works up to ca. one hour
and tons of gigabyte without problems...

Really, the answer can't be to use a fuse'ed NTFS filesystem to share
mountpoints between two FreeBSD server...

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251149] SynPS/2 Synaptics TouchPad: Failed to create a device for ... after upgrade from 12.1 to 12.2

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251149

--- Comment #7 from Jens Grassel  ---
Hi,

reading about the successful solutions with setting `kern.evdev.rcpt_mask = 3`
I tried again but with no success.
The only thing I can get working with that setting is the console mouse (via
moused) which works as expected but under X it does not work and the error
message in the logs ("... was rejected") stays the same. :-(

Kind regards,

Jens

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


[Bug 251395] rc.d/nfsclient: hangs at shutdown because of non-empty /var/db/mounttab

2020-11-25 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251395

Bug ID: 251395
   Summary: rc.d/nfsclient: hangs at shutdown because of non-empty
/var/db/mounttab
   Product: Base System
   Version: 12.2-RELEASE
  Hardware: Any
OS: Any
Status: New
  Severity: Affects Only Me
  Priority: ---
 Component: bin
  Assignee: b...@freebsd.org
  Reporter: d8zne...@aon.at

Scenario:
- multiple machines using NFS and autofs (automount)
- some of them running FreeBSD 12.2, the others 12.1
- at the end of the day they are shut down simultaneously; before that, it is
ensured that all NFS mounts are unmounted (using automount -u and checking via
"df -t nfs")

Result:
- The 12.2 machine hangs in the rc.d/nfsclient script with repeated error
messages indicating it cannot contact the remote portmapper: the remote
portmapper does not reply anymore because that machine is also going down.
- This happens because the file /var/db/mounttab is non-empty and still
indicates the remote NFS servers despite the fact that all NFS mounts have
already been unmounted.

Expected result:
- After the last NFS mount from a server has been unmounted, the corresponding
entry in /var/db/mounttab, and the complete file if empty, should be removed.
- This should enable rc.d/nfsclient to skip any further NFS server notification
during shutdown.

-- Martin

-- 
You are receiving this mail because:
You are the assignee for the bug.
___
freebsd-bugs@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"