<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/tools, branch release/9.0.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F9.0.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F9.0.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2011-11-19T11:47:15Z</updated>
<entry>
<title>MFC r226549,r226550,r226551,r226552,r226553,r226554,r226568,r226569,r226611,</title>
<updated>2011-11-19T11:47:15Z</updated>
<author>
<name>Pawel Jakub Dawidek</name>
<email>pjd@FreeBSD.org</email>
</author>
<published>2011-11-19T11:47:15Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fe185ed3af9c00e55f094aad5aa28e0bc84cee08'/>
<id>urn:sha1:fe185ed3af9c00e55f094aad5aa28e0bc84cee08</id>
<content type='text'>
    r226612:

r226549:

Remove redundant size calculation.

r226550:

Initialize 'rc' properly before using it. This error could lead to infinite
loop when data reconstruction was needed.

r226551:

Don't mark vdev as healthy too soon, so we won't try to use invalid vdevs.

r226552:

Never pass NULL block pointer when reading. This is neither expected nor
handled by lower layers like vdev_raidz, which uses bp for checksum
verification. This bug could lead to NULL pointer reference and resets
during boot.

r226553:

Always pass data size for checksum verification function, as using
physical block size declared in bp may not always be what we want.
For example in case of gang block header physical block size declared
in bp is much larger than SPA_GANGBLOCKSIZE (512 bytes) and checksum
calculation failed. This bug could lead to accessing unallocated
memory and resets/failures during boot.

r226554:

Fix missing return when LOADER_GPT_SUPPORT is defined, but LOADER_MBR_SUPPORT
is not.

r226568:

- Correctly read gang header from raidz.
- Decompress assembled gang block data if compressed.
- Verify checksum of a gang header.
- Verify checksum of assembled gang block data.
- Verify checksum of uber block.

Submitted by:	avg

r226569:

With LOADER_MBR_SUPPORT defined and LOADER_GPT_SUPPORT undefined we would
never call disk_openmbr().

Submitted by:	avg

r226611:

- Allow to specify multiple files to check, eg.

	zfsboottest gpt/system0 gpt/system1 - /boot/kernel/kernel /boot/zfsloader

- Instead of printing file's content calculate MD5 hash of the file,
  so it can be easly compared to the hash calculated via file system.
- Some other minor improvements.

r226612:

Because ZFS boot code was very fragile in the past and real PITA to debug,
introduce zfsboottest.sh script that will verify if it will be possible to boot
from the given pool.

	# zfsboottest.sh system

Where "system" is pool name of the pool we want to boot from.

What is being verified by the script:
- Does the pool exist?
- Does it have bootfs property configured?
- Is mountpoint property of the boot dataset set to 'legacy'?

Dataset configured in bootfs property has to be mounted to perform more
checks:
- Does the /boot directory in boot dataset exist?
- Is this dataset configured as root file system in /etc/fstab or set
  in vfs.root.mountfrom variable in /boot/loader.conf?

By using zfsboottest tool the script will read all the files in /boot
directory using ZFS boot code and calculate their checksums.
Then, it will walk /boot directory using find(1) though regular file sytem
and also read all the files in /boot directory and calculate their checksums.
If any of the files cannot be looked up, read or checksum is invalid it will
be reported and booting off of this pool is probably not possible.

Some additional checks may be interesting as well. For example if the disks
contain proper pmbr and gptzfsboot code or if all expected files in /boot/
are present.

When upgrading FreeBSD, one should snapshot datasets that contain operating
system, upgrade (install new world and kernel) and use zfsboottest.sh to verify
if it will be possible to boot from new configuration. If all is good one
should upgrade boot blocks, by eg.:

	# gpart -b /boot/pmbr -p /boot/gptzfsboot -i 1 ada1

If something is wrong, one should rollback datasets and report the problems.

Approved by:	re (kib)
</content>
</entry>
<entry>
<title>- MFC r225778:</title>
<updated>2011-09-27T18:40:13Z</updated>
<author>
<name>Stanislav Sedov</name>
<email>stas@FreeBSD.org</email>
</author>
<published>2011-09-27T18:40:13Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=983eb23a5d4d838c03369ec112dd6f53e08daf94'/>
<id>urn:sha1:983eb23a5d4d838c03369ec112dd6f53e08daf94</id>
<content type='text'>
  - Add missing interdependencies to kerberos libraries.  Some of the
    kerberos libraries were not linked properly (missing dependencies),
    which causes 3rd party applications linking to fail when --as-needed
    ld flag is used.  I also added the --no-undefined ld(1) flag to make
    sure that there're no missing dependencies.

Approved by:	re (kib)
</content>
</entry>
<entry>
<title>zfsboottest: some additional enhancements</title>
<updated>2011-09-16T08:24:31Z</updated>
<author>
<name>Andriy Gapon</name>
<email>avg@FreeBSD.org</email>
</author>
<published>2011-09-16T08:24:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=ed8945cb715c08d56b810528983720382bba272e'/>
<id>urn:sha1:ed8945cb715c08d56b810528983720382bba272e</id>
<content type='text'>
- redirect diagnostics printfs in the boot code to stderr
- do not read trailing garbage from a trailing block of a file

Also add my copyright to the file after making so many changes.

Approved by:	re (kib)
MFC after:	1 week
</content>
</entry>
<entry>
<title>zfstest: rename to zfsboottest and move to tools</title>
<updated>2011-09-16T08:22:48Z</updated>
<author>
<name>Andriy Gapon</name>
<email>avg@FreeBSD.org</email>
</author>
<published>2011-09-16T08:22:48Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d560f3523c43be0e5bf4023fbc48bf007e266337'/>
<id>urn:sha1:d560f3523c43be0e5bf4023fbc48bf007e266337</id>
<content type='text'>
Approved by:	re (kib)
MFC after:	1 week
</content>
</entry>
<entry>
<title>Fix alignment assumptions.</title>
<updated>2011-09-02T16:40:18Z</updated>
<author>
<name>Marius Strobl</name>
<email>marius@FreeBSD.org</email>
</author>
<published>2011-09-02T16:40:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=74931812978048f9f50281aec063ffd51a6651d6'/>
<id>urn:sha1:74931812978048f9f50281aec063ffd51a6651d6</id>
<content type='text'>
PR:		160289
Approved by:	re (kib)
MFC after:	3 days
</content>
</entry>
<entry>
<title>Add support for IPv6 to ipfw fwd:</title>
<updated>2011-08-20T17:05:11Z</updated>
<author>
<name>Bjoern A. Zeeb</name>
<email>bz@FreeBSD.org</email>
</author>
<published>2011-08-20T17:05:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8a006adb24414b61097ec694cc28fb15de51ac2e'/>
<id>urn:sha1:8a006adb24414b61097ec694cc28fb15de51ac2e</id>
<content type='text'>
Distinguish IPv4 and IPv6 addresses and optional port numbers in
user space to set the option for the correct protocol family.
Add support in the kernel for carrying the new IPv6 destination
address and port.
Add support to TCP and UDP for IPv6 and fix UDP IPv4 to not change
the address in the IP header.
Add support for IPv6 forwarding to a non-local destination.
Add a regession test uitilizing VIMAGE to check all 20 possible
combinations I could think of.

Obtained from:	David Dolson at Sandvine Incorporated
		(original version for ipfw fwd IPv6 support)
Sponsored by:	Sandvine Incorporated
PR:		bin/117214
MFC after:	4 weeks
Approved by:	re (kib)
</content>
</entry>
<entry>
<title>Test process descriptors.</title>
<updated>2011-08-18T23:15:04Z</updated>
<author>
<name>Jonathan Anderson</name>
<email>jonathan@FreeBSD.org</email>
</author>
<published>2011-08-18T23:15:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b465884f4267f89ed4a02d76472d14b74ca367cc'/>
<id>urn:sha1:b465884f4267f89ed4a02d76472d14b74ca367cc</id>
<content type='text'>
Ensure that process descriptors work as expected. We should be able to:
 - pdfork(), like regular fork(), but producing a process descriptor
 - pdgetpid() to convert a PD into a PID
 - pdkill() to send signals to a process identified by a PD

Approved by:  re (kib), mentor (rwatson)
Sponsored by: Google Inc
</content>
</entry>
<entry>
<title>poll(2) implementation for capabilities.</title>
<updated>2011-08-16T14:14:56Z</updated>
<author>
<name>Jonathan Anderson</name>
<email>jonathan@FreeBSD.org</email>
</author>
<published>2011-08-16T14:14:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d6f724898368f8a55757aa5d7d443f90f558c17a'/>
<id>urn:sha1:d6f724898368f8a55757aa5d7d443f90f558c17a</id>
<content type='text'>
When calling poll(2) on a capability, unwrap first and then poll the
underlying object.

Approved by: re (kib), mentor (rwatson)
Sponsored by: Google Inc
</content>
</entry>
<entry>
<title>Rename CAP_*_KEVENT to CAP_*_EVENT.</title>
<updated>2011-08-12T14:26:47Z</updated>
<author>
<name>Jonathan Anderson</name>
<email>jonathan@FreeBSD.org</email>
</author>
<published>2011-08-12T14:26:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d1b6899e83a28eedca46b95bb090e3e476642166'/>
<id>urn:sha1:d1b6899e83a28eedca46b95bb090e3e476642166</id>
<content type='text'>
Change the names of a couple of capability rights to be less
FreeBSD-specific.

Approved by: re (kib), mentor (rwatson)
Sponsored by: Google Inc
</content>
</entry>
<entry>
<title>Test *at(2) calls with capability-mode lookup.</title>
<updated>2011-08-12T10:52:46Z</updated>
<author>
<name>Jonathan Anderson</name>
<email>jonathan@FreeBSD.org</email>
</author>
<published>2011-08-12T10:52:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a0108be612e95840896942276f0da60e6caf000b'/>
<id>urn:sha1:a0108be612e95840896942276f0da60e6caf000b</id>
<content type='text'>
This commit adds regression testing for openat(), fstatat(), etc. with
capability scoping ("strict relative" lookup), which applies:
 - in capability mode
 - when performing any *at() lookup relative to a capability

These tests will fail until the *at() code is committed; on my local
instance, with the *at() changes, they all pass.

Approved by: re (kib), mentor (rwatson)
Sponsored by: Google Inc
</content>
</entry>
</feed>
