- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Jul 26 2024
Jul 22 2024
In D37359#850297, @kib wrote:My preference, as you could see from the earlier response, is to have the patch in reverse direction, using &a_gen instead of cast. Cast means that you fight the type system, not utilizing it.
Anyway, I do not intend to block either change, go ahead with something.
Use an a_gen field instead of casting to vop_generic_args.
In D46016#1049086, @kp wrote:Looks good to me, just needs slight tweaking of the commit message.
I'd be tempted to leave out the second paragraph explaining how CHERI objects to this because it's still wrong on non-CHERI hardware (even if it does just work) but I'll leave that up to you.
Update the commit message to clarify why the broadcast address is not set.
Remove ifaddr_ad() and move its logic to callers.
Jul 19 2024
Thanks for reviews!
Jul 18 2024
Jul 9 2024
Jun 28 2024
May 1 2024
May 31 2023
Apr 26 2023
Nov 15 2022
In D37359#849134, @kib wrote:I believe all uses of &ap->a_gen are mine, and the casts are historic.
Isn't it more reliable to avoid cast and explicitly take the address of the generic member? Either case depends on the generic being the first member of the vop_arg struct for now.Anyway, I am curious about your choice of the cast, Is it due to the calculated number of each case in the source?
Nov 11 2022
Remove the style change.
Nov 10 2022
In D36402#836213, @jhb wrote:Hmm, does cscope fail because the directory name doesn't exist? (I confess to always using ALL_ARCH=yes myself)
Sep 9 2022
Aug 31 2022
Apr 10 2022
Aug 26 2018
This update fixes typos, style and changes die() to write messages to stderr.
Aug 25 2018
Jan 29 2018
Aug 6 2017
Aug 3 2017
I'm using a script to test kernel dumps in bhyve. It exercises combinations of minidumps vs. full dumps, compression, encryption, and dump device sector size.
Aug 2 2017
Jul 31 2017
Feb 8 2017
Feb 4 2017
Dec 10 2016
Nov 14 2016
Nov 12 2016
Aug 16 2016
This revision fixes alignment of the kdc_dumpkey member of the kerneldumpcrypto structure and uses roundup2 macro to round a kernel dump key size.
Aug 15 2016
The patch was updated to fix two problems:
- Use a packed structure instead of writing a kernel dump key structure byte per byte;
- Allocate require memory using malloc(9) when it's safe to do that which is during a dump device setup.
Jul 31 2016
I've merged the changes from HEAD. The current patch is against r303588 [1]. The main changes include:
- ambrisko submitted a patch to write crash dumps on dump devices with a block size other than 512B. EKCD should be compatible with these changes now;
- DIOCSKERNELDUMP_FREEBSD10 became DIOCSKERNELDUMP_FREEBSD11 as we already have FreeBSD 12.0-CURRENT;
- DIOCSKERNELDUMP ioctl has a new number as a new DIOCZONECMD ioctl was introduced in [3].
Apr 14 2016
Thanks for the review. I sent some replies to the inline comments.
Apr 2 2016
In D4712#124230, @cem wrote:In D4712#123472, @def wrote:In D4712#99936, @kib wrote:Still, I have a question. You choice was to modify the dump code, which resulted in spreading the patch over the MI dump and all MD minidump code. Semi-obvious alternate approach is to introduce a geom which would write the generated encrypted symmetric key into the first block and write data block N into encrypted block N+1 of the underlying provider. Then you do not have to touch the kernel dump code at all.
I agree with kib@. It would be nice not to have separate userspace tools here.
In fact we already have encrypted GEOM providers (g_eli, ...). All we lack is a way to dump core through them—maybe? I'm not even sure we lack that.
The kerneldumpkey structure has an arbitrary size.
I am sure this is not a problem in practice. An AES key is far smaller than 512 bytes.
Mar 30 2016
In D4712#99936, @kib wrote:I looked over the patch, it looks fine to me.
Still, I have a question. You choice was to modify the dump code, which resulted in spreading the patch over the MI dump and all MD minidump code. Semi-obvious alternate approach is to introduce a geom which would write the generated encrypted symmetric key into the first block and write data block N into encrypted block N+1 of the underlying provider. Then you do not have to touch the kernel dump code at all.
Is it possible technically ?
Dec 26 2015
Oct 16 2015
I have made some inline comments. I think a partial vmcore shouldn't be removed because another panic might happen before a user tries to run savecore manually again.