Re: Writing large build logs to NFS extremely slow?

2021-10-09 Thread Rick Macklem
Rick Macklem wrote: ?Felix Palmen wrote: [stuff snipped] >>Ok, thanks for the insight here! So maybe, I could have a look at >>poudriere's code? If I understand you correctly, keeping the file open >>and just issuing more write() calls wouldn't trigger that problem? >Nope,

Re: Writing large build logs to NFS extremely slow?

2021-10-09 Thread Rick Macklem
Felix Palmen wrote: [stuff snipped] >Ok, thanks for the insight here! So maybe, I could have a look at >poudriere's code? If I understand you correctly, keeping the file open >and just issuing more write() calls wouldn't trigger that problem? Nope, I don't think keeping the file open would help

Re: Writing large build logs to NFS extremely slow?

2021-10-09 Thread Rick Macklem
Felix Palmen wrote: >* Rick Macklem [20211009 15:35]: >> Felix Palmen wrote: >> Assuming your NFS performance is acceptable for other things and it >> is only this log file that is a problem, then I doubt there is much you >> can do to improve it. > >Yes, that'

Re: Writing large build logs to NFS extremely slow?

2021-10-09 Thread Rick Macklem
Felix Palmen wrote: >I use a -CURRENT bhyve vm for testing port builds with poudriere. As >this vm is only running when needed, but I want to always have access to >the build logs, I use NFS to mount /usr/local/poudriere/data/logs from >the host. > >I noticed some few ports take ridiculously long

Re: [HEADSUP] making /bin/sh the default shell for root

2021-09-23 Thread Rick Macklem
Dirk Meyer wrote: >Baptiste Daroussin schrieb:, [stuff snipped] > >We have already "toor" for sh. As an aside, I will note that having multiple passwd entries for the same uid somewhat breaks the mapping done by nfsuserd(8), since it will map the uid to one of the names. It is not a big issue,

git MFC/cherry-pick question

2021-06-03 Thread Rick Macklem
Hi, I am trying to MFC a commit to stable/12. The cherry-pick works, but the resultant code is not correct and won't build. --> I broke the build yesterday and manually reverted the breakage. So, how do I do this? Do I have to manually edit the file after the cherry-pick and then do

Re: Panics in recent NFS server

2021-05-31 Thread Rick Macklem
Mateusz Guzik wrote: >I reproduced the panic, things work for me with the patch below. >However, there may be more to it so I'm going to ask Rick to weigh in. >but short version is that length returned by nfsrv_parsename is off by >one compared to copyinstr. Yes, it appears that, now, ni_pathlen

Re: Panics in recent NFS server

2021-05-31 Thread Rick Macklem
Mateusz Guzik wrote: >On 5/31/21, Mateusz Guzik wrote: >> It's probably my commit d81aefa8b7dd8cbeffeda541fca9962802404983 , >> I'll look at this later. > >Well let me rephrase. While the panic was added in said commit, I >suspect the bug is on nfs side -- it has its own namei variant which I

Re: RFC: changing the default NFSv4 minor version?

2021-05-14 Thread Rick Macklem
Rodney W. Grimes wrote: [stuff snipped] >Daniel Ebdrup Jensen wrote: >> Hi Rick, >> >> If I understand your plans correctly, you're not going to be making >> it so that minorversion=N complains? > >Ah, I think that if you specify a minorversion and the server >does not support that

Re: RFC: changing the default NFSv4 minor version?

2021-05-14 Thread Rick Macklem
Daniel Ebdrup Jensen wrote: >On Thu, May 13, 2021 at 11:02:35PM +0000, Rick Macklem wrote: >>Hi, >> >>I believe that NFSv4.1 and NFSv4.2 are now mature in freebsd-current/main. >>I also believe that NFSv4.1/4.2 is a better protocol than NFSv4.0. >>(In p

RFC: changing the default NFSv4 minor version?

2021-05-13 Thread Rick Macklem
Hi, I believe that NFSv4.1 and NFSv4.2 are now mature in freebsd-current/main. I also believe that NFSv4.1/4.2 is a better protocol than NFSv4.0. (In particular, the sessions mechanism for "exactly once RPC semantics" is a significant improvement over the duplicate request cache for NFSv4.0,

Re: NFS issues since upgrading to 13-RELEASE

2021-04-25 Thread Rick Macklem
Chris Roose wrote: > Jason Unovitch wrote: > > Does anything change if you set -tso -lro on the serving NIC on your > > FreeBSD server side? Do the Linux clients remain responsive then? > > Thank you, Jason. This seems to have cleared the problem up for me. > Since disabling TSO and LRO on the

Re: NFS issues since upgrading to 13-RELEASE

2021-04-19 Thread Rick Macklem
stead of reply all. There is also a reddit thread about this https://www.reddit.com/r/freebsd/comments/mqol4o/nfs_issues_since_upgrading_to_13release/ On Sat, Apr 17, 2021 at 1:10 AM Rick Macklem mailto:rmack...@uoguelph.ca>> wrote: Just fyi, I just got a "recursed on non-r

Re: NFS issues since upgrading to 13-RELEASE

2021-04-16 Thread Rick Macklem
Just fyi, I just got a "recursed on non-recursed mutex" panic in socantrcvmore() with the D29690 patch, so you might not want to test with that one yet. rick From: owner-freebsd-curr...@freebsd.org on behalf of Olav Gjerde Sent: Thursday, April 15,

Re: NFS issues since upgrading to 13-RELEASE

2021-04-15 Thread Rick Macklem
Stupid Outlook... I wrote: [stuff snipped] >- Alternately you can try rscheff@'s alternate proposed patch that is at > https://reviews.freebsd.og/D29690. Oops, that's https:/reviews.freebsd.org/D29690 But you can figure out the link;-), rick rick I have not yet had time to test this one,

Re: NFS issues since upgrading to 13-RELEASE

2021-04-15 Thread Rick Macklem
I wrote: [stuff snipped] >- Alternately you can try rscheff@'s alternate proposed patch that is at > https://reviews.freebsd.og/D29690. Oops, that's https:/reviews.freebsd.org/D29690 rick I have not yet had time to test this one, but since I cannot reproduce the hang, I can only do

Re: NFS issues since upgrading to 13-RELEASE

2021-04-15 Thread Rick Macklem
Allan Jude wrote: >On 4/15/2021 9:22 AM, Chris Roose wrote: >> I posted this in -questions and someone suggested I post here as well. >> >> I'm having NFS availability issues between my Proxmox client and FreeBSD >> server (10G link) since upgrading to 13->RELEASE. And unfortunately I >>

review of NFSv4.1/4.2 client side patch D29475

2021-03-28 Thread Rick Macklem
Hi, If anyone would like to review D29475, which adds required support for BindConnectionToSession, please do so. --> Needed to make callbacks to continue working after a TCP reconnect occurs, due to a networking partition. Until this patch is in a client, it is recommended to not run the

Re: Getting started with ktls

2021-03-25 Thread Rick Macklem
AM To: freebsd-current@freebsd.org Subject: Re: Getting started with ktls On Fri, Mar 19, 2021 at 09:37:30PM +, Rick Macklem wrote: >J. wrote: >>on the (main/14) server, /etc/rpc.tlsservd was not already there; I had >>to create it. Is this correct? >> >>version is

testers for NFS server patch needed

2021-03-23 Thread Rick Macklem
Hi, A thread over on freebsd-net@ discusses a situation where Linux clients seem to get stuck when the TCP connection is partially torn down. (FIN_WAIT_2 on the client and CLOSE_WAIT on the server.) The thread is here: http://docs.FreeBSD.org/cgi/mid.cgi?YQXPR0101MB0968FB1FF0FC481CE37E9A81DD649

Re: Getting started with ktls

2021-03-19 Thread Rick Macklem
J. wrote: >on the (main/14) server, /etc/rpc.tlsservd was not already there; I had >to create it. Is this correct? > >version is main-n245454 I'll admit I have no idea what n245454 means, but the daemons were committed to main on Feb 18, 2021. Installing them from ports should be fine. rick --

Re: Getting started with ktls

2021-03-17 Thread Rick Macklem
J. wrote: >On Tue, Mar 16, 2021 at 11:46:27PM +0000, Rick Macklem wrote: >>Well, if you do "sysctl -a | fgrep kern.ipc.tls.stats" and it is working, >>you should see the count for at least one of the "crypts" ticking up. >>If they are all zero, it isn

Re: Getting started with ktls

2021-03-16 Thread Rick Macklem
J. wrote: >On Sun, Mar 14, 2021 at 08:55:18PM +0000, Rick Macklem wrote: >>Alan explains how to set it up, below. >>However, I thought I'd note that maybe one person has tested KTLS >>on arm64, so you should consider doing this for test purposes only. >>If you do d

Re: Getting started with ktls

2021-03-14 Thread Rick Macklem
[stuff snipped] > J. wrote: >> >> I'd like to have it (ktls) available on the ARM64 >> stable/13-n244876-0b45290603b. Is it just a matter of adding the option, >> and then the sysctls become available? Is it "better" with openssl[-devel] >> in ports or openssl in base? >> >> thanks, >> -- >> J.\

Re: Getting started with ktls

2021-03-11 Thread Rick Macklem
I'm going to cheat and top post (the discussion looks pretty convoluted). - The kernel must be built with "options KERN_TLS" - OpenSSL must be built with KTLS enabled - These two sysctls need to be set to 1 kern.ipc.tls.enable kern.ipc.mb_use_ext_pgs then it all happens "behind the

Re: -CURRENT panics in NFS

2021-02-27 Thread Rick Macklem
I reproduced the problem and the attached trivial patch seems to fix it. Please test the patch if you can. Mateusz, I assume the directory shouldn't try and add a cache entry for itself? I don't test NFSv3 much and I don't test "rdirplus" much, so it slipped through the cracks. Thanks for

Re: KTLS with zfs recv

2021-02-26 Thread Rick Macklem
Warner Losh wrote: >On Fri, Feb 26, 2021 at 11:16 AM Rodney W. Grimes < >freebsd-...@gndrsh.dnsmgr.net> wrote: > >> > On Fri, Feb 26, 2021 at 9:24 AM Rodney W. Grimes < >> > freebsd-...@gndrsh.dnsmgr.net> wrote: >> > >> > > > My understanding is that KTLS works very well with OpenSSL for >>

Any ideas on this bug related to aesni + sha?

2021-02-04 Thread Rick Macklem
Crypto is way out of my area of expertise. Anyone have ideas on this? Thanks, rick From: Peter Eriksson Sent: Thursday, February 4, 2021 6:56 AM To: Rick Macklem Subject: Have you seen this bug? CAUTION: This email originated from outside

Re: openssl in head returning "certificate expired" when it has not expired

2021-02-02 Thread Rick Macklem
Benjamin Kaduk wrote: >On Tue, Feb 02, 2021 at 03:48:06AM +0000, Rick Macklem wrote: >> Benjamin Kaduk wrote: >> >On Tue, Feb 02, 2021 at 12:46:25AM +, Rick Macklem wrote: >> >> I've recently been testing the daemons that do the >> >> n

Re: openssl in head returning "certificate expired" when it has not expired

2021-02-01 Thread Rick Macklem
Benjamin Kaduk wrote: >On Tue, Feb 02, 2021 at 12:46:25AM +0000, Rick Macklem wrote: >> I've recently been testing the daemons that do the >> non-application data stuff for nfs-over-tls with the >> openssl in head. >> >> These daemons work fine with both ports

openssl in head returning "certificate expired" when it has not expired

2021-02-01 Thread Rick Macklem
I've recently been testing the daemons that do the non-application data stuff for nfs-over-tls with the openssl in head. These daemons work fine with both ports/security/openssl (openssl-1.1.1h) and ports/security/openssl-devel (openssl3-alpha). However, when linked to the openssl in head, the

Re: (n244517-f17fc5439f5) svn stuck forever in /usr/ports?

2021-01-31 Thread Rick Macklem
Rick Macklem wrote: >Guido Falsi wrote: >[good stuff snipped] >>Performed a full bisect. Tracked it down to commit aa906e2a4957, adding >>KTLS support to embedded OpenSSL. >> >>I filed a bug report about this: >> >>https://bugs.freebsd.org/bugzilla

Re: (n244517-f17fc5439f5) svn stuck forever in /usr/ports?

2021-01-31 Thread Rick Macklem
Guido Falsi wrote: [good stuff snipped] >Performed a full bisect. Tracked it down to commit aa906e2a4957, adding >KTLS support to embedded OpenSSL. > >I filed a bug report about this: > >https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=253135 > > >Apart from switching to svn:// scheme, another

Re: Can In-Kernel TLS (kTLS) work with any OpenSSL Application?

2021-01-25 Thread Rick Macklem
Benjamin Kaduk wrote: >On Sat, Jan 23, 2021 at 03:25:59PM +0000, Rick Macklem wrote: >> Ronald Klop wrote: >> >On Wed, 20 Jan 2021 21:21:15 +0100, Neel Chauhan wrote: >> >But I think for Tor to support KTLS it needs to implement some things >> >itself. More i

Re: Can In-Kernel TLS (kTLS) work with any OpenSSL Application?

2021-01-23 Thread Rick Macklem
Ronald Klop wrote: >On Wed, 20 Jan 2021 21:21:15 +0100, Neel Chauhan wrote: > >> Hi freebsd-current@, >> >> I know that In-Kernel TLS was merged into the FreeBSD HEAD tree a while >> back. >> >> With 13.0-RELEASE around the corner, I'm thinking about upgrading my >> home server, well if I can

Re: Bug 252358 - cp(1) of large files is causing 100% CPU utilization and poor transfer of ~168M/minute

2021-01-03 Thread Rick Macklem
Well, it depends on what "stressdisk" (never heard of it) does. If it: 1 - Reads a large non-sparse file on a UFS file system. 2 - Uses lseek(SEEK_DATA/SEEK_HOLE) with a small blocksize or copy_file_range(2) with a small length. (copy_file_range(2) does SEEK_DATA/SEEK_HOLE internally.)

Re: cp(1) of large files is causing 100% CPU utilization and poor transfer

2021-01-02 Thread Rick Macklem
the content is safe. If in doubt, forward suspicious emails to ith...@uoguelph.ca El día sábado, enero 02, 2021 a las 11:29:36a. m. -0700, Alan Somers escribió: > > El día sábado, enero 02, 2021 a las 05:06:05p. m. +, Rick Macklem > > escribió: > > > > >

Re: cp(1) of large files is causing 100% CPU utilization and poor transfer

2021-01-02 Thread Rick Macklem
Just fyi, I've reproduced the problem. All I did was create a 20Gbyte file on UFS on a slow (4Gbyte or RAM, slow spinning disk) laptop. (The UFS file system is just what the installer creates these days.) cp still hasn't finished and is definitely taking a looott longer than dd did. I'll start

Re: r367672 broke the NFS server

2021-01-01 Thread Rick Macklem
The patches that I believe fix this are now committed to head. Have a good 2021, rick From: owner-freebsd-curr...@freebsd.org on behalf of Rick Macklem Sent: Thursday, December 31, 2020 5:56 PM To: Konstantin Belousov Cc: freebsd-current@freebsd.org

Re: r367672 broke the NFS server

2020-12-31 Thread Rick Macklem
le of days, given the FreeBSD release schedule. From: owner-freebsd-curr...@freebsd.org on behalf of Konstantin Belousov Sent: Thursday, December 31, 2020 6:40 AM To: Rick Macklem Cc: freebsd-current@freebsd.org; Alan Somers; Kirk McKusick; Mark Johnst

Re: r367672 broke the NFS server

2020-12-30 Thread Rick Macklem
Rick Macklem wrote: >Kostik wrote: > > > >Idea of the change is to restart the syscall at top level. So for NFS > >server the right approach is to not send a response and also to not > >free the request mbuf chain, but to restart processing. > Yes. I took

Re: r367672 broke the NFS server

2020-12-30 Thread Rick Macklem
Kostik wrote: >On Wed, Dec 30, 2020 at 02:02:48AM +0000, Rick Macklem wrote: >> Hi, >> >> Post r367671... >> When multiple files are being created by an NFS client in the same >> directory, the VOP_CREATE()/ufs_create() can fail with ERELOOKUP. >> This re

if you are exporting UFS file systems via NFS on a post Nov. 15 system, there is a problem

2020-12-29 Thread Rick Macklem
If you are exporting UFS file systems via NFS and your kernel is built from head/current sources newer than Nov. 15 (r367672 or newer), the NFS service will be broken. The only workaround is to turn both SU and SU+j off for the exported file systems via tunefs. rick

r367672 broke the NFS server

2020-12-29 Thread Rick Macklem
Hi, Post r367671... When multiple files are being created by an NFS client in the same directory, the VOP_CREATE()/ufs_create() can fail with ERELOOKUP. This results in a EIO return to the NFS client. --> This causes "nfsv4 client/server protocol prob err=10026" on the client for NFSv4.0

referencing one commit in another for git

2020-12-23 Thread Rick Macklem
Hi, So I just did my first git commit. Pretty scary, but it looks ok. Now, how do I reference one commit in another related commit's log? By the long winded hash or ?? I'm not sure if I should ask here or on the git mailing list, but I figured this isn't a technical git question... Thanks for

rc.d scripts patch needs review

2020-10-24 Thread Rick Macklem
Hi, I've put D26938 up on phabricator. The patch applies to the /etc/rc.d scripts mountd and nfsd, to make use of the new mountd "-R" option committed via r376026. If anyone can review this, please do so. (Is there a group review for rc scripts?) Thanks, rick

Re: copyright notice question

2020-10-21 Thread Rick Macklem
Mehmet Erol Sanliturk wrote: >On Wed, Oct 21, 2020 at 4:04 AM Rick Macklem >mailto:rmack...@uoguelph.ca>> wrote: >>Warner Losh wrote: >>>On Mon, Oct 19, 2020, 7:25 PM Rick Macklem >>>mailto:rmack...@uoguelph.ca><mailto:rmack...@uoguelph.ca<mailto:rmac

Re: copyright notice question

2020-10-20 Thread Rick Macklem
Warner Losh wrote: >On Mon, Oct 19, 2020, 7:25 PM Rick Macklem >mailto:rmack...@uoguelph.ca>> wrote: >>I'll admit I've hesitated to ask this for a long time, but I guess I have >>to;-) >>I've created two daemons for NFS-over-TLS, using the code in >>/usr/sr

Re: review of new mountd option disabling use of rpcbind

2020-10-20 Thread Rick Macklem
nfsd does. I don't have a strong opinion either way. What do others think? Thanks for the comment, rick - Peter > On 20 Oct 2020, at 02:56, Rick Macklem wrote: > > Hi, > > I've put a patch up on phabricator that adds a new option to mountd > which disables use of rpcbind. Th

copyright notice question

2020-10-19 Thread Rick Macklem
I'll admit I've hesitated to ask this for a long time, but I guess I have to;-) I've created two daemons for NFS-over-TLS, using the code in /usr/src/usr.sbin/gssd/gssd.c as a starting point. --> As such, I left the copyright notice from this file on the two files. (As you can see, it is a 2

review of new mountd option disabling use of rpcbind

2020-10-19 Thread Rick Macklem
Hi, I've put a patch up on phabricator that adds a new option to mountd which disables use of rpcbind. This can be done for NFSv4 only servers. It appears that rpcbind is now considered a security risk by some. I listed freqlabs@ as a reviewer, but if anyone else would like to review it, please

RFC: gssd needs /usr mounted to start up

2020-10-10 Thread Rick Macklem
Meowthink reported a problem on freebsd-hackers@ where the gssd would not start up because /usr was not yet mounted. (I moved the discussion here, hoping to catch more comments.) He has a separately mounted /usr and, recently, gssd was failing to start since /usr was not yet mounted when

Re: RFC: should copy_file_range(2) remain Linux compatible or support special files?

2020-10-01 Thread Rick Macklem
Mateusz Guzik wrote: >On 9/27/20, Alan Somers wrote: >> On Sun, Sep 27, 2020 at 7:49 AM Wall, Stephen >> wrote: >> >>> >>> > I'll assume you are referring to the "flags" argument when you say >>> "param" above. >>> >>> Correct, I was misremembering the man page. >>> >>> > However, since the

Re: RFC: should copy_file_range(2) remain Linux compatible or support special files?

2020-09-26 Thread Rick Macklem
Wall, Stephen wrote: > Could the as yet unused options param have a bit assigned to trigger the new > behavior? Inform the linux community of the addition and let them decide if > they > would like to adopt it as well. I'll assume you are referring to the "flags" argument when you say "param"

RFC: should copy_file_range(2) remain Linux compatible or support special files?

2020-09-26 Thread Rick Macklem
I know cross-posting is frowned upon, but I wanted everyone who might like to comment to see this. Currently copy_file_range(2) only supports regular files, which is compatible with the Linux one, where EINVAL is returned when either file descriptor refers to a non-regular file. Alan Somers

review of mountd.c change

2020-09-21 Thread Rick Macklem
Hi, I just put a patch up in phabricator (D26521) which avoids always malloc()'ng a large MAX_NGROUPS sized groups list by having a small one in the structure and then only malloc()'ng when a large groups list is needed. I've listed kib@ and freqlabs@ as reviewers, but anyone else is welcome to

Re: Plans for git

2020-09-20 Thread Rick Macklem
Christian Weisgerber wrote: > On 2020-09-19, Zaphod Beeblebrox wrote: > > > Hrm. Maybe what I hear others saying, tho, and not entirely being replied > > to is just a nice concise document of the why. What I hear you saying is > > that GIT has momentum and that it's popular... (and I accept

Re: Documentation regarding NFSv4

2020-09-18 Thread Rick Macklem
Russell L. Carter wrote: >On 2020-09-18 16:28, Rick Macklem wrote: > > Oh, and I forgot to mention name<->id# mapping. > > If using AUTH_SYS (not kerberos), then you have the > > choice of running "nfsuserd" or setting these two sysctls t

Re: Documentation regarding NFSv4

2020-09-18 Thread Rick Macklem
ed, you'll see lots of files owned by "nobody" on the client mounts. rick ________ From: Rick Macklem Sent: Friday, September 18, 2020 7:21 PM To: Shawn Webb; freebsd-current@freebsd.org; freebsd-sta...@freebsd.org Subject: Re: Documentation regarding NFSv

Re: Documentation regarding NFSv4

2020-09-18 Thread Rick Macklem
Shawn Webb wrote: >Hey all, > >It appears the Handbook and the nfsv4 manpages don't really agree, >leading to some confusion as to how to properly set up an NFSv4 server >on FreeBSD. > >Any guidance would be appreciated. 1 - I never look at the Handbook, but do try and maintain the man pages.

Re: rfc: should extant TLS connections be closed when a CRL is updated?

2020-09-16 Thread Rick Macklem
John-Mark Gurney wrote: >Rick Macklem wrote this message on Fri, Sep 04, 2020 at 01:20 +: >> The server side NFS over TLS daemon (rpc.tlsservd) can reload an updated >> CRL (Certificate Revocation List) when a SIGHUP is posted to it. >> However, it does not SSL_shutdown

Re: rfc: should extant TLS connections be closed when a CRL is updated?

2020-09-04 Thread Rick Macklem
John-Mark Gurney wrote: >Rick Macklem wrote this message on Fri, Sep 04, 2020 at 01:20 +: >> The server side NFS over TLS daemon (rpc.tlsservd) can reload an updated >> CRL (Certificate Revocation List) when a SIGHUP is posted to it. >> However, it does not SSL_shutdown

rfc: should extant TLS connections be closed when a CRL is updated?

2020-09-03 Thread Rick Macklem
Hi, The server side NFS over TLS daemon (rpc.tlsservd) can reload an updated CRL (Certificate Revocation List) when a SIGHUP is posted to it. However, it does not SSL_shutdown()/close() extant TCP connections using TLS. (Those would only be closed if the daemon is restarted.) I am now thinking

Re: /sys/modules/ nfscl & nfsd

2020-09-01 Thread Rick Macklem
Julian H. Stacey wrote: >Hi curr...@freebsd.org, > >/sys/modules/ nfscl & nfsd >With .ctm_status src-cur 14656 .svn_revision 364986 > >/usr/src/sys/fs/nfsclient/nfs_clkrpc.c:40:10: fatal error: 'opt_kern_tls.h' >file not found ># #include "opt_kern_tls.h" > ># /usr/src/sys/modules/nfsd >#

Re: should rpctlssd be called rpc.tlssd?

2020-09-01 Thread Rick Macklem
Gary Jennejohn wrote:On Tue, 1 Sep 2020 13:00:33 +0200 (CEST) >Ronald Klop wrote: >> Van: Rick Macklem >> Datum: dinsdag, 1 september 2020 04:37 >> Aan: "freebsd-current@FreeBSD.org" >> Onderwerp: should rpctlssd be called rpc.tlssd? >> > &

should rpctlssd be called rpc.tlssd?

2020-08-31 Thread Rick Macklem
This sounds trivial, but I thought I'd ask, in case anyone has a preference? The NFS over TLS code includes two daemons, one for the client and one for the server. I have called them rpctlscd and rpctlssd. There was/is a tradition in Sun RPC of putting a "." in the names. So, should I be calling

Re: Does FreeBSD have an assigned Internet OID?

2020-08-30 Thread Rick Macklem
Poul-Henning Kamp wrote: >Rick Macklem writes: >> Poul-Henning Kamp wrote: > >> Is https://reviews.freebsd.org/D26225 >> sufficient to allow me to use 1.3.6.1.4.1.2238.1.1.1 for a user@domain >> name in this otherName component of subjAltName in the X.509 cert?

Re: Does FreeBSD have an assigned Internet OID?

2020-08-28 Thread Rick Macklem
Poul-Henning Kamp wrote: >Rick Macklem writes: >> For the NFS over TLS work, I have a need for an Internet OID. >> (I understand that IETF assigns ones for things like SNMP under >> 1.3.6.1.4.1...) > >See: > >/usr/share/snmp/mibs/FREEBSD-MIB.txt Is h

Does FreeBSD have an assigned Internet OID?

2020-08-27 Thread Rick Macklem
For the NFS over TLS work, I have a need for an Internet OID. (I understand that IETF assigns ones for things like SNMP under 1.3.6.1.4.1...) I'm referring to the long strings of numbers separated by "."s, where each number is a subtree administered by someone. If either the project or

review of a change to sosend_generic()

2020-08-16 Thread Rick Macklem
Hi, I put D25923 up on phabricator a little while ago. I clicked on a couple of people that I thought might like to review it. However, if anyone else would like to review it, please do so. The review is as much about the concept as the actual implementation. Thanks, rick Here is the

Re: can buffer cache pages be used in ext_pgs mbufs?

2020-08-13 Thread Rick Macklem
Konstantin Belousov wrote: >On Tue, Aug 11, 2020 at 03:10:39AM +0000, Rick Macklem wrote: >> Konstantin Belousov wrote: >> >On Mon, Aug 10, 2020 at 12:46:00AM +, Rick Macklem wrote: >> >> Konstantin Belousov wrote: >> >> >On Fri, Aug 07,

Re: can buffer cache pages be used in ext_pgs mbufs?

2020-08-10 Thread Rick Macklem
Konstantin Belousov wrote: >On Mon, Aug 10, 2020 at 12:46:00AM +0000, Rick Macklem wrote: >> Konstantin Belousov wrote: >> >On Fri, Aug 07, 2020 at 09:43:14PM -0700, Kirk McKusick wrote: >> >> I do not have the answer to your question, but I am copying Kostik >&

can buffer cache pages be used in ext_pgs mbufs?

2020-08-06 Thread Rick Macklem
Hi, I've been at this game for a while and one of the axioms is... "Everything is harder than it at first looks." Currently, when the FreeBSD NFS client does a write, it does: - VOP_WRITE() copies the data into buffer cache block(s). --> An nfsiod thread (or sometimes the thread that called

Re: RFC: ktls and krpc using M_EXTPG mbufs

2020-07-27 Thread Rick Macklem
Andrew Gallatin wrote: >On 2020-07-19 19:34, Rick Macklem wrote: >> I spent a little time chasing a problem in the nfs-over-tls code, where it >> would sometimes end up with corrupted data in the file(s) of a mirrored >> pNFS configuration. >> >> I think the

RFC: ktls and krpc using M_EXTPG mbufs

2020-07-19 Thread Rick Macklem
I spent a little time chasing a problem in the nfs-over-tls code, where it would sometimes end up with corrupted data in the file(s) of a mirrored pNFS configuration. I think the problem was that the code filled the data to be written into anonymous page M_EXTPG mbufs, then did a m_copym() { copy

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-07-03 Thread Rick Macklem
Ryan Libby wrote: >On Sun, Jun 28, 2020 at 9:57 PM Rick Macklem wrote: >> >> Just in case you were waiting for another email, I have now run several >> cycles of the kernel build over NFS on a recent head kernel with the >> one line change and it has n

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-06-28 Thread Rick Macklem
anything in the next few days, I'll put it in a PR so it doesn't get forgotten. rick From: owner-freebsd-curr...@freebsd.org on behalf of Rick Macklem Sent: Thursday, June 18, 2020 11:42 PM To: Ryan Libby Cc: Konstantin Belousov; Jeff Roberson; freebsd

Re: openzfs-kmod build error

2020-06-23 Thread Rick Macklem
Kostya Berger wrote: >CURRENT r362292 >sysutils/openzfs-kmod build aborts with error:... >/usr/ports/sysutils/openzfs-kmod/work/zfs->c0eb5c35e/module/os/freebsd/zfs/zfs_vfsops.c:128:19: > error: > incompatible pointer types initializing 'vfs_checkexp_t *' (aka 'int > (*)(struct >

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-06-18 Thread Rick Macklem
Ryan Libby wrote: >On Mon, Jun 15, 2020 at 5:06 PM Rick Macklem wrote: >> >> Rick Macklem wrote: >> >r358098 will hang fairly easily, in 1-3 cycles of the kernel build over = NFS. >> >I thought this was the culprit, since I did 6 cycles of r358097 without = a han

does a ZFS change in head require additional work?

2020-06-16 Thread Rick Macklem
Hi, r362158 changed the arguments for zfs_checkexp() in head. There were no other changes, since the arguments are simply passed on to vfs_stdcheckexp(). Is there something else that needs to be done, such as sending this patch upstream? rick ___

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-06-15 Thread Rick Macklem
Rick Macklem wrote: >r358098 will hang fairly easily, in 1-3 cycles of the kernel build over NFS. >I thought this was the culprit, since I did 6 cycles of r358097 without a hang. >However, I just got a hang with r358097, but it looks rather different. >The r358097 hang did not have a

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-06-09 Thread Rick Macklem
ote: >On Fri, May 22, 2020 at 11:46:26PM +, Rick Macklem wrote: >> Konstantin Belousov wrote: >> >On Wed, May 20, 2020 at 11:58:50PM -0700, Ryan Libby wrote: >> >> On Wed, May 20, 2020 at 6:04 PM Rick Macklem wrote: >> >> > >> >> > Hi,

new mbuf functions to allocate and copy into ext_pgs mbufs with anonymous pages

2020-06-07 Thread Rick Macklem
Hi, I just put a patch that has a couple of new mbuf handling functions here: https://reviews.freebsd.org/D25182 I listed glebius@, gallatin@ and jhb@ as possible reviewers, but if anyone else wants to review or comment on these, please feel free to do so. rick

getgrouplist duplication of cr_groups[0] as cr_groups[1]

2020-06-03 Thread Rick Macklem
Hi, During testing of a mountd.c patch I have, I found an "old bug" where the mountd.c code assumed that getgrouplist() would always duplicate cr_groups[0] in cr_groups[1]. If I read the commit logs correctly, this was always the case until r174547 (only 12years ago), which switched

Re: vfs_mouse.c breakage?

2020-06-01 Thread Rick Macklem
now, rick From: Pete Wright Sent: Monday, June 1, 2020 8:05 PM To: Rick Macklem; FreeBSD Current Subject: Re: vfs_mouse.c breakage? CAUTION: This email originated from outside of the University of Guelph. Do not click links or open attachments unless you recognize the sende

Re: vfs_mouse.c breakage?

2020-06-01 Thread Rick Macklem
Pete Wright wrote: >Subject: vfs_mouse.c breakage? Not sure if the vfs mouse is broken (sorry, I couldn't resist), but... I think it needs a: #include but it will take a little while for me to test this. Thanks for reporting it, rick >hello - i am having issues building CURRENT after this was

review of an update to "struct export_args"

2020-05-31 Thread Rick Macklem
Hi, I have put a patch up on phabricator https://reviews.freebsd.org/D25088 I have listed kib@ and freqlabs@ as reviewers, but if anyone else wishes to review it, be my guest. It updates "struct export_args" to make the ex_flags field 64bits and the mapped user (is called ex_anon in the current

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-05-26 Thread Rick Macklem
Konstantin Belousov wrote: >On Fri, May 22, 2020 at 11:46:26PM +0000, Rick Macklem wrote: >> Konstantin Belousov wrote: >> >On Wed, May 20, 2020 at 11:58:50PM -0700, Ryan Libby wrote: >> >> On Wed, May 20, 2020 at 6:04 PM Rick Macklem wrote: >> >> &g

Re: r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-05-22 Thread Rick Macklem
Konstantin Belousov wrote: >On Wed, May 20, 2020 at 11:58:50PM -0700, Ryan Libby wrote: >> On Wed, May 20, 2020 at 6:04 PM Rick Macklem wrote: >> > >> > Hi, >> > >> > Since I hadn't upgraded a kernel through the winter, it took me a while >> &g

Re: RFC: merging nfs-over-tls changes into head/sys

2020-05-22 Thread Rick Macklem
John Baldwin wrote: >On 5/21/20 2:01 PM, Rick Macklem wrote: >> Hi, >> >> I have now completed changes to the code in projects/nfs-over-tls, which >> implements TLS encryption of NFS RPC messages. (This roughly conforms >> to the internet draft "Towards Remot

RFC: merging nfs-over-tls changes into head/sys

2020-05-21 Thread Rick Macklem
Hi, I have now completed changes to the code in projects/nfs-over-tls, which implements TLS encryption of NFS RPC messages. (This roughly conforms to the internet draft "Towards Remote Procedure Call Encryption By Default", which should soon become an RFC. For now, TLS1.2 is used instead of

r358252 causes intermittent hangs where processes are stuck sleeping on btalloc

2020-05-20 Thread Rick Macklem
Hi, Since I hadn't upgraded a kernel through the winter, it took me a while to bisect this, but r358252 seems to be the culprit. If I do a kernel build over NFS using my not so big Pentium 4 (single core, 1.25Gbytes RAM, i386), about every second attempt will hang. When I do a "ps" in the

Re: TLS certificates for NFS-over-TLS floating client

2020-03-28 Thread Rick Macklem
John-Mark Gurney wrote: >Rick Macklem wrote this message on Thu, Mar 26, 2020 at 14:33 +: >> John-Mark Gurney wrote: >> [lots of stuff snipped] >> >Rick Macklem wrote: >> >> I had originally planned on some "secret" in the certificate (like a CN

Re: TLS certificates for NFS-over-TLS floating client

2020-03-26 Thread Rick Macklem
of Rick Macklem Sent: Thursday, March 26, 2020 10:33 AM To: John-Mark Gurney Cc: Alexander Leidinger; freebsd-current@FreeBSD.org Subject: Re: TLS certificates for NFS-over-TLS floating client John-Mark Gurney wrote: [lots of stuff snipped] >Rick Macklem wrote: >> I had originally planne

Re: TLS certificates for NFS-over-TLS floating client

2020-03-26 Thread Rick Macklem
John-Mark Gurney wrote: [lots of stuff snipped] >Rick Macklem wrote: >> I had originally planned on some "secret" in the certificate (like a CN name >> that satisfies some regular expression or ???) but others convinced me that >> that wouldn't provide anything beyo

Re: TLS certificates for NFS-over-TLS floating client

2020-03-25 Thread Rick Macklem
John-Mark Gurney wrote: >Rick Macklem wrote this message on Mon, Mar 23, 2020 at 23:53 +: >> Alexander Leidinger wrote: >> John-Mark Gurney wrote: >> >>Rick Macklem wrote: >> >>> to be the best solution. The server can verify that the certificat

Re: TLS certificates for NFS-over-TLS floating client

2020-03-23 Thread Rick Macklem
Alexander Leidinger wrote: John-Mark Gurney wrote: >>Rick Macklem wrote: >>> to be the best solution. The server can verify that the certificate  >>> was issued by >>> the local CA. Unfortunately, if the client is compromised and the  >>> certificate is

Re: TLS certificates for NFS-over-TLS floating client

2020-03-20 Thread Rick Macklem
Miroslav Lachman wrote: >Rick Macklem wrote on 2020/03/19 03:09: >> Miroslav Lachman wrote: >>> >> [...] > >>> NFS (or any other server) should check list of revoked certificates too. >>> Otherwise you will not be able to deny access to user which you

Re: TLS certificates for NFS-over-TLS floating client

2020-03-20 Thread Rick Macklem
Jan Bramkamp wrote: >On 20.03.20 02:44, Russell L. Carter wrote: >> Here I commit heresy, by A) top posting, and B) by just saying, why >> not make it easy, first, to tunnel NFSv4 sessions through >> e.g. net/wireguard or sysutils/spiped? NFS is point to point. >> Security infrastructure that

Re: TLS certificates for NFS-over-TLS floating client

2020-03-19 Thread Rick Macklem
John-Mark Gurney wrote: >Rick Macklem wrote this message on Wed, Mar 04, 2020 at 03:15 +: >> I am slowly trying to understand TLS certificates and am trying to figure >> out how to do the following: >> -> For an /etc/exports file with... >> /home -tls -network 1

<    1   2   3   4   5   6   7   >