From owner-freebsd-bugs Sun Oct 4 03:57:52 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA19153 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 03:57:52 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA19087; Sun, 4 Oct 1998 03:57:21 -0700 (PDT) (envelope-from obrien@FreeBSD.org) From: "David E. O'Brien" Received: (from obrien@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA16683; Sun, 4 Oct 1998 03:57:12 -0700 (PDT) Date: Sun, 4 Oct 1998 03:57:12 -0700 (PDT) Message-Id: <199810041057.DAA16683@freefall.freebsd.org> To: sjr@home.net, obrien@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/7835 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: whereis doesn't find sources in /usr/src/contrib State-Changed-From-To: open-closed State-Changed-By: obrien State-Changed-When: Sun Oct 4 03:29:51 PDT 1998 State-Changed-Why: commited. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 05:03:48 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id FAA27412 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 05:03:48 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id FAA27243 for ; Sun, 4 Oct 1998 05:00:31 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id FAA19124; Sun, 4 Oct 1998 05:00:02 -0700 (PDT) Date: Sun, 4 Oct 1998 05:00:02 -0700 (PDT) Message-Id: <199810041200.FAA19124@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Andreas Klemm Subject: Re: kern/7822: Machine Reboots without reason Reply-To: Andreas Klemm Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/7822; it has been noted by GNATS. From: Andreas Klemm To: freebsd-gnats-submit@freebsd.org, bifrost@dis.org Cc: Subject: Re: kern/7822: Machine Reboots without reason Date: Sun, 04 Oct 1998 13:24:22 +0200 Could you please describe your envirenment more precisely ? I would expect at least a copy of your kernel configuration file or do you still run a GENERIC kernel ? Maybe you have to increase things like maxusers variable or NMBCLUSTERS. In the kernel sources I found: vm/vm_kern.c around line 288: * Locate sufficient space in the map. This will give us the final * virtual address for the new memory, and thus will tell us the * offset within the kernel map. */ vm_map_lock(map); if (vm_map_findspace(map, vm_map_min(map), size, &addr)) { vm_map_unlock(map); if (map == mb_map) { mb_map_full = TRUE; printf("Out of mbuf clusters - adjust NMBCLUSTERS or inc rease maxusers!\n"); return (0); } if (waitflag == M_WAITOK) panic("kmem_malloc(%d): kmem_map too small: %d total all ocated", size, map->size); return (0); } Since you have an enormous amount of main memory perhaps some kernel settings badly need finetuning. Am not sure but perhaps some kernel parameters are adjusted by memory size and some not, so that there is a demand of increasing some values to fit the others ? Just a vague guess .... -- Andreas Klemm http://www.FreeBSD.ORG/~andreas What gives you 90% more speed, for example, in kernel compilation ? http://www.FreeBSD.ORG/~fsmp/SMP/akgraph-a/graph1.html "NT = Not Today" (Maggie Biggs) ``powered by FreeBSD SMP'' To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 05:18:04 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id FAA29001 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 05:18:04 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from indigo.ie (ts04-031.dublin.indigo.ie [194.125.148.161]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id FAA28907 for ; Sun, 4 Oct 1998 05:16:59 -0700 (PDT) (envelope-from rotel@indigo.ie) Received: (from nsmart@localhost) by indigo.ie (8.8.8/8.8.7) id MAA00926; Sun, 4 Oct 1998 12:14:58 +0100 (IST) (envelope-from rotel@ginseng.indigo.ie) From: Niall Smart Message-Id: <199810041114.MAA00926@indigo.ie> Date: Sun, 4 Oct 1998 12:14:57 +0000 In-Reply-To: <199810011140.EAA22037@freefall.freebsd.org>; Poul-Henning Kamp Reply-To: rotel@indigo.ie X-Files: The truth is out there X-Mailer: Mail User's Shell (7.2.6 beta(3) 11/17/96) To: Poul-Henning Kamp , freebsd-bugs@FreeBSD.ORG Subject: Re: kern/8015: Some sysctl descriptions for the kernel Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Oct 1, 4:40am, Poul-Henning Kamp wrote: > > > Seeing a commit message asking for descriptions on new sysctl > >entries I thought I might add some, too. I choose the ones I could > >identify right away and knew what they were doing. > > > This is untested but I think it will work. Unfortunately we > >don't have a tool to list the comments, yet so one can't really test > >them anyway. :-( > > That was actually my dream at one point, the comment would be in > SGML and some tool would walk all over the kernel and construct > some doc from that. Oh, surely the comments should be in troff! Niall -- Niall Smart, rotel@indigo.ie. Amaze your friends and annoy your enemies: echo '#define if(x) if (!(x))' >> /usr/include/stdio.h To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 05:19:58 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id FAA29372 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 05:19:58 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.40.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id FAA29309 for ; Sun, 4 Oct 1998 05:19:34 -0700 (PDT) (envelope-from phk@critter.freebsd.dk) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.9.1/8.8.5) with ESMTP id OAA15482; Sun, 4 Oct 1998 14:14:25 +0200 (CEST) To: rotel@indigo.ie cc: freebsd-bugs@FreeBSD.ORG Subject: Re: kern/8015: Some sysctl descriptions for the kernel In-reply-to: Your message of "Sun, 04 Oct 1998 12:14:57 -0000." <199810041114.MAA00926@indigo.ie> Date: Sun, 04 Oct 1998 14:14:25 +0200 Message-ID: <15480.907503265@critter.freebsd.dk> From: Poul-Henning Kamp Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <199810041114.MAA00926@indigo.ie>, Niall Smart writes: >On Oct 1, 4:40am, Poul-Henning Kamp wrote: >> >> > Seeing a commit message asking for descriptions on new sysctl >> >entries I thought I might add some, too. I choose the ones I could >> >identify right away and knew what they were doing. >> >> > This is untested but I think it will work. Unfortunately we >> >don't have a tool to list the comments, yet so one can't really test >> >them anyway. :-( >> >> That was actually my dream at one point, the comment would be in >> SGML and some tool would walk all over the kernel and construct >> some doc from that. > >Oh, surely the comments should be in troff! You can convert SGML to troff, so SGML wins. -- Poul-Henning Kamp FreeBSD coreteam member phk@FreeBSD.ORG "Real hackers run -current on their laptop." "ttyv0" -- What UNIX calls a $20K state-of-the-art, 3D, hi-res color terminal To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 07:30:12 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA14679 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 07:30:12 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA14669 for ; Sun, 4 Oct 1998 07:30:08 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA25574; Sun, 4 Oct 1998 07:30:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA14220; Sun, 4 Oct 1998 07:25:22 -0700 (PDT) (envelope-from nobody) Message-Id: <199810041425.HAA14220@hub.freebsd.org> Date: Sun, 4 Oct 1998 07:25:22 -0700 (PDT) From: thomas@x-berg.in-berlin.de To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: bin/8142: freebsd 2.2.7 implementation of key(1) [stand-alone program for computing responses to S/Key challenges] differs from the latest of the author´s S/KEY One-Time Password System (Version 1.1 11-01- imar.gz at thumper.bellcore.com [128.96.41.1] D Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8142 >Category: bin >Synopsis: freebsd 2.2.7 implementation of key(1) [stand-alone program for computing responses to S/Key challenges] differs from the latest of the author´s S/KEY One-Time Password System (Version 1.1 11-01- imar.gz at thumper.bellcore.com [128.96.41.1] >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Oct 4 07:30:01 PDT 1998 >Last-Modified: >Originator: thomas osterried >Organization: in-berlin e.v. >Release: FreeBSD 2.2.7 >Environment: FreeBSD ratte.in-berlin.de 2.2.7-RELEASE FreeBSD 2.2.7-RELEASE #0: Thu Aug 13 21:17:55 CEST 1998 root@ratte.in-berlin.de:/usr/src/sys/compile/RATTE980808A i386 >Description: i was happy to find skey implemented on my FreeBSD 2.2.7-RELEASE system. everything works fine except you want to generate a key on an other system. in my case i wanted to run key (skey skey-1.1b.tar.gz from thumper.bellcore.com [128.96.41.1] Directory: /pub/nmh) compiled on my other maschine (a linux host) and could not login with the generated key: it always differs. i tried to compile skey-1.1b on my FreeBSD-2.2.7 maschine, and the generated key is the same as the one on my linux maschine and it differs from the key from /usr/bin/key on the (same) FreeBSD-2.2.7 maschine. in other words: the key implementation on FreeBSD-2.2.7 is not compatible anymore. it may be older (looking at the man page, FreeBSD´s key program may be 2 years older (1991 instead of 1993 in the skey-1.1b implementation) >How-To-Repeat: get skey1.1b, compile it and verify the output of ./src/key and /usr/bin/key using the same options and the same passoword. it differs, and ./src/key´s output grants no access. >Fix: well, hmm, let´s have a look at the source. there may have been a decision of the freebsd team in not upgrading. >Audit-Trail: >Unformatted: Directory: /pub/nmh To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 11:20:13 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA06350 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 11:20:13 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA06341 for ; Sun, 4 Oct 1998 11:20:08 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id LAA02189; Sun, 4 Oct 1998 11:20:01 -0700 (PDT) Received: from salmon.maths.tcd.ie (salmon.maths.tcd.ie [134.226.81.11]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id LAA05751 for ; Sun, 4 Oct 1998 11:16:14 -0700 (PDT) (envelope-from iedowse@maths.tcd.ie) Received: from hamilton.maths.tcd.ie by salmon.maths.tcd.ie with SMTP id ; 4 Oct 98 19:15:50 +0100 (BST) Message-Id: <9810041915.aa10150@hamilton.maths.tcd.ie> Date: Sun, 4 Oct 98 19:15:50 +0100 (BST) From: iedowse@maths.tcd.ie Reply-To: iedowse@maths.tcd.ie To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: i386/8146: Some kzipboot improvements Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8146 >Category: i386 >Synopsis: kzipboot serial console setup and malloc improvements >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Oct 4 11:20:01 PDT 1998 >Last-Modified: >Originator: Ian Dowse >Organization: School of Mathematics, Trinity College Dublin >Release: FreeBSD 3.0-BETA i386 >Environment: FreeBSD 3.0-BETA i386, also -stable >Description: The patches below address two problems with the kzipboot code: - When a serial console is used, kzipboot does not initialise the serial port so no kzipboot information or error messages are displayed. - Some large kernels can generate a 'warning: malloc wrapped' message due to the extremely simple malloc implementation. Also when netbooting kzipped kernels, malloc can overrun the stack which grows down from 0x9e000. >How-To-Repeat: >Fix: The patches below make kzipboot correctly initialise the serial port if RB_SERIAL is specified. The malloc implementation now uses a small cache of recent malloc'd blocks so it doesn't require so much memory. The total memory available to malloc is reduced from 320k to 256k so that kernels can be netbooted, but this is more than enough for the kernels I've tested. With the cache size set to its default of 100 entries, unzipping the 2.2.7 boot floppy kernel only reqires 10k instead of around 300k with the old code. diff -cr old/kzipboot/Makefile kzipboot/Makefile *** old/kzipboot/Makefile Wed May 27 09:06:33 1998 --- kzipboot/Makefile Sun Oct 4 17:50:29 1998 *************** *** 18,24 **** STRIP= # very important!! don't let kz*.o be stripped CFLAGS+= -DKADDR=$(KADDR) -DCSEG=$(CSEG) ! CFLAGS+= -DKZIP -DCOMCONSOLE=0x3F8 kztail.o: ${OBJS_KZTAIL} $(LD) -r -x -o kztail.o $(OBJS_KZTAIL) --- 18,24 ---- STRIP= # very important!! don't let kz*.o be stripped CFLAGS+= -DKADDR=$(KADDR) -DCSEG=$(CSEG) ! CFLAGS+= -DKZIP -DCOMCONSOLE=0x3F8 -DCOMSPEED=9600 kztail.o: ${OBJS_KZTAIL} $(LD) -r -x -o kztail.o $(OBJS_KZTAIL) diff -cr old/kzipboot/boot.c kzipboot/boot.c *** old/kzipboot/boot.c Tue Jul 1 01:29:33 1997 --- kzipboot/boot.c Sun Oct 4 17:54:26 1998 *************** *** 9,14 **** --- 9,17 ---- #include /* for inb/outb */ + #define COMSPEED_HIGH ((115200/(COMSPEED)) >> 8) + #define COMSPEED_LOW ((115200/(COMSPEED)) & 0xff) + short *videomem; int curs; int cols; *************** *** 131,136 **** --- 134,155 ---- curs = l*cols + c; if (curs > lines*cols) curs = (lines-1) * cols; + } else { + int l, h; + + /* Initialise console serial port */ + outb(COMCONSOLE+1, 0); + while ((inb(COMCONSOLE+5) & 0x60) != 0x60); + outb(COMCONSOLE+3, 0x83); + l = inb(COMCONSOLE); + h = inb(COMCONSOLE+1); + if (l != COMSPEED_LOW) + outb(COMCONSOLE, COMSPEED_LOW); + if (h != COMSPEED_HIGH) + outb(COMCONSOLE+1, COMSPEED_HIGH); + outb(COMCONSOLE+3, 0x03); + outb(COMCONSOLE+4, (inb(COMCONSOLE+4) & 8) | 3); + } putstr ("Uncompressing kernel..."); diff -cr old/kzipboot/malloc.c kzipboot/malloc.c *** old/kzipboot/malloc.c Thu Sep 7 22:11:34 1995 --- kzipboot/malloc.c Sun Oct 4 16:49:14 1998 *************** *** 35,52 **** extern unsigned char *storage; void * malloc(nbytes, junk1, junk2) /* junk? not used */ size_t nbytes; int junk1, junk2; { unsigned char *p = storage; storage += nbytes; ! if (storage >= (unsigned char *) 0xa0000) { ! putstr("warning: malloc wrapped\n"); ! p = (unsigned char *) 0x50000; ! storage = p + nbytes; ! } return p; } --- 35,76 ---- extern unsigned char *storage; + /* Simple cache so we can reuse most freed memory */ + #define MALLOC_CACHE_SIZE 100 + struct m_cache { + void *data; + int size; + int in_use; + } cache[MALLOC_CACHE_SIZE]; + static int c_used = 0; /* Number of entries in cache used */ + static int c_cur = 0; /* Current entry */ + void * malloc(nbytes, junk1, junk2) /* junk? not used */ size_t nbytes; int junk1, junk2; { unsigned char *p = storage; + int i; + + for (i=0; i= nbytes) { + cache[i].in_use = 1; + return cache[i].data; + } + storage += nbytes; ! if (storage >= (unsigned char *) 0x90000) ! error("Out of memory. Try increasing MALLOC_CACHE_SIZE"); ! ! cache[c_cur].data = p; ! cache[c_cur].size = nbytes; ! cache[c_cur].in_use = 1; ! if (++c_cur >= MALLOC_CACHE_SIZE) ! c_cur = 0; ! if (c_cur > c_used) ! c_used = c_cur; ! return p; } *************** *** 55,58 **** --- 79,86 ---- void *cp; int junk; { + int i; + for (i=0; iAudit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 15:30:50 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA09907 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 15:30:50 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA09864 for ; Sun, 4 Oct 1998 15:30:11 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id PAA07361; Sun, 4 Oct 1998 15:30:02 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA09458; Sun, 4 Oct 1998 15:27:54 -0700 (PDT) (envelope-from nobody) Message-Id: <199810042227.PAA09458@hub.freebsd.org> Date: Sun, 4 Oct 1998 15:27:54 -0700 (PDT) From: sysadmin@mfn.org To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: i386/8149: mailq -d is undocumented Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8149 >Category: i386 >Synopsis: mailq -d is undocumented >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Sun Oct 4 15:30:02 PDT 1998 >Last-Modified: >Originator: J.A. Terranson >Organization: Missouri FreeNet >Release: 2.2.5 >Environment: >Description: mailq -d works, but is undocumented in the man page. >How-To-Repeat: mailq -d or man mailq >Fix: Document mailq -d >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 19:30:13 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA10414 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 19:30:13 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA10381 for ; Sun, 4 Oct 1998 19:30:07 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id TAA12827; Sun, 4 Oct 1998 19:30:01 -0700 (PDT) Date: Sun, 4 Oct 1998 19:30:01 -0700 (PDT) Message-Id: <199810050230.TAA12827@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Garrett Wollman Subject: bin/8142: freebsd 2.2.7 implementation of key(1) Reply-To: Garrett Wollman Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8142; it has been noted by GNATS. From: Garrett Wollman To: thomas@x-berg.in-berlin.de Cc: freebsd-gnats-submit@FreeBSD.ORG Subject: bin/8142: freebsd 2.2.7 implementation of key(1) Date: Sun, 4 Oct 1998 22:20:59 -0400 (EDT) <> Synopsis: freebsd 2.2.7 implementation of key(1) [stand-alone [...] Please don't write jillion-character lines. FreeBSD uses the older, MD4-based S/Key mechanism. Switching to MD5 (or DES-MAC) would break every user's S/Key setup. If you need MD5 support (sounds like it), you will need to install it yourself. (There's a define you can change in the source to use MD5 instead of MD4.) -GAWollman -- Garrett A. Wollman | O Siem / We are all family / O Siem / We're all the same wollman@lcs.mit.edu | O Siem / The fires of freedom Opinions not those of| Dance in the burning flame MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sun Oct 4 23:50:37 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA19939 for freebsd-bugs-outgoing; Sun, 4 Oct 1998 23:50:37 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA19843 for ; Sun, 4 Oct 1998 23:50:09 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id XAA23948; Sun, 4 Oct 1998 23:50:01 -0700 (PDT) Received: from mie.mrit.co.jp (mie.mrit.co.jp [210.128.138.3]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA19547 for ; Sun, 4 Oct 1998 23:46:56 -0700 (PDT) (envelope-from yasu@mrit.mei.co.jp) Received: by mie.mrit.co.jp (8.8.4/mrit980615) from mrit [133.185.23.3] with ESMTP id PAA11996 for ; Mon, 5 Oct 1998 15:46:29 +0900 (JST) Received: by mrit.mei.co.jp (8.8.4/mrit980615) with ESMTP id PAA06823; Mon, 5 Oct 1998 15:46:28 +0900 from [133.185.25.71]; Received: by waltz.codec.mrit.mei.co.jp (8.9.1/codec-FreeBSD9703) id PAA18863; Mon, 5 Oct 1998 15:46:27 +0900 (JST) Message-Id: <199810050646.PAA18863@waltz.codec.mrit.mei.co.jp> Date: Mon, 5 Oct 1998 15:46:27 +0900 (JST) From: yasu@mrit.mei.co.jp (Yasuhiko WATANABE) Reply-To: yasu@mrit.mei.co.jp To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8154: Kernel panic happend in nfsd. Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8154 >Category: kern >Synopsis: Kernel panic happend in nfsd. >Confidential: yes >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sun Oct 4 23:50:00 PDT 1998 >Last-Modified: >Originator: Yasuhiko WATANABE >Organization: Matsushita Research Institue Tokyo, Inc. >Release: FreeBSD 3.0-BETA i386 >Environment: FreeBSD niccolo.codec.mrit.mei.co.jp 3.0-BETA FreeBSD 3.0-BETA #2: Mon Oct 5 14:28:37 JST 1998 yasu@waltz:/usr/src/sys/compile/NICCOLO i386 >Description: Here is the stack trace. Script started on Mon Oct 5 15:25:20 1998 You have mail. naoko# gdb -k kernel vmcore.0 GDB is free software and you are welcome to distribute copies of it under certain conditions; type "show copying" to see the conditions. There is absolutely no warranty for GDB; type "show warranty" for details. GDB 4.16 (i386-unknown-freebsd), Copyright 1996 Free Software Foundation, Inc... IdlePTD 267000 current pcb at 213be4 panic: from debugger #0 0xf011aad3 in boot () (kgdb) bt #0 0xf011aad3 in boot () #1 0xf011ae10 in panic () #2 0xf0102975 in db_panic () #3 0xf0102855 in db_command () #4 0xf01029e2 in db_command_loop () #5 0xf01050f3 in db_trap () #6 0xf01c8f11 in kdb_trap () #7 0xf01d36a8 in trap () #8 0xf01c9145 in Debugger () #9 0xf011ae07 in panic () #10 0xf0117893 in free (addr=0x0, type=0xf0201050) at ../../kern/kern_malloc.c:334 #11 0xf0184ab5 in nfsrv_dorec (slp=0xf0946100, nfsd=0xf0947a00, ndp=0xf5750e38) at ../../nfs/nfs_socket.c:2235 #12 0xf0188a40 in nfssvc_nfsd (nsd=0xf5750e94, argp=0x80751f4 "", p=0xf570ae80) at ../../nfs/nfs_syscalls.c:537 #13 0xf018865d in nfssvc (p=0xf570ae80, uap=0xf5750f94) at ../../nfs/nfs_syscalls.c:342 #14 0xf01d4183 in syscall () #15 0xf01c986c in Xint0x80_syscall () #16 0x80480cd in ?? () (kgdb) frame 10 #10 0xf0117893 in free (addr=0x0, type=0xf0201050) at ../../kern/kern_malloc.c:334 334 panic("free: multiple frees"); (kgdb) list 329 freep->type = type; 330 #endif /* DIAGNOSTIC */ 331 kup->ku_freecnt++; 332 if (kup->ku_freecnt >= kbp->kb_elmpercl) 333 if (kup->ku_freecnt > kbp->kb_elmpercl) 334 panic("free: multiple frees"); 335 else if (kbp->kb_totalfree > kbp->kb_highwat) 336 kbp->kb_couldfree++; 337 kbp->kb_totalfree++; 338 ksp->ks_memuse -= size; (kgdb) frame 11 #11 0xf0184ab5 in nfsrv_dorec (slp=0xf0946100, nfsd=0xf0947a00, ndp=0xf5750e38) at ../../nfs/nfs_socket.c:2235 2235 FREE(nam, M_SONAME); (kgdb) list 2230 nd->nd_md = nd->nd_mrep = m; 2231 nd->nd_nam2 = nam; 2232 nd->nd_dpos = mtod(m, caddr_t); 2233 error = nfs_getreq(nd, nfsd, TRUE); 2234 if (error) { 2235 FREE(nam, M_SONAME); 2236 free((caddr_t)nd, M_NFSRVDESC); 2237 return (error); 2238 } 2239 *ndp = nd; (kgdb) frame 12 #12 0xf0188a40 in nfssvc_nfsd (nsd=0xf5750e94, argp=0x80751f4 "", p=0xf570ae80) at ../../nfs/nfs_syscalls.c:537 537 error = nfsrv_dorec(slp, nfsd, &nd); (kgdb) list 532 nfsrv_rcv(slp->ns_so, (caddr_t)slp, 533 M_WAIT); 534 nfs_sndunlock(&slp->ns_solock, 535 &slp->ns_solock); 536 } 537 error = nfsrv_dorec(slp, nfsd, &nd); 538 cur_usec = nfs_curusec(); 539 if (error && slp->ns_tq.lh_first && 540 slp->ns_tq.lh_first->nd_time <= cur_usec) { 541 error = 0; (kgdb) frame 13 #13 0xf018865d in nfssvc (p=0xf570ae80, uap=0xf5750f94) at ../../nfs/nfs_syscalls.c:342 342 error = nfssvc_nfsd(nsd, uap->argp, p); (kgdb) list 337 } 338 } 339 } 340 if ((uap->flag & NFSSVC_AUTHINFAIL) && (nfsd = nsd->nsd_nfsd)) 341 nfsd->nfsd_flag |= NFSD_AUTHFAIL; 342 error = nfssvc_nfsd(nsd, uap->argp, p); 343 } 344 #endif /* NFS_NOSERVER */ 345 if (error == EINTR || error == ERESTART) 346 error = 0; (kgdb) frame 14 #14 0xf01d4183 in syscall () (kgdb) list 347 return (error); 348 } 349 350 #ifndef NFS_NOSERVER 351 /* 352 * Adds a socket to the list for servicing by nfsds. 353 */ 354 static int 355 nfssvc_addsock(fp, mynam, p) 356 struct file *fp; (kgdb) frame 15 #15 0xf01c986c in Xint0x80_syscall () (kgdb) list 357 struct sockaddr *mynam; 358 struct proc *p; 359 { 360 register struct mbuf *m; 361 register int siz; 362 register struct nfssvc_sock *slp; 363 register struct socket *so; 364 struct nfssvc_sock *tslp; 365 int error, s; 366 (kgdb) exit Undefined command: "exit". Try "help". (kgdb) q >How-To-Repeat: At the time the kernel paniced, I was using editor and reading mails from the nfs client machene. >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 01:40:42 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA03047 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 01:40:42 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA02915 for ; Mon, 5 Oct 1998 01:40:08 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id BAA27076; Mon, 5 Oct 1998 01:40:01 -0700 (PDT) Date: Mon, 5 Oct 1998 01:40:01 -0700 (PDT) Message-Id: <199810050840.BAA27076@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: tedm@toybox.placo.com Subject: Re:bin/8006:rshdoesnotacceptdataoninputstream Reply-To: tedm@toybox.placo.com Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8006; it has been noted by GNATS. From: tedm@toybox.placo.com To: freebsd-gnats-submit@freebsd.org, Philippe.Causse@mobilix.dk Cc: Subject: Re:bin/8006:rshdoesnotacceptdataoninputstream Date: Mon, 5 Oct 1998 01:35:31 -0700 (PDT) I also noticed this bug for the same reason. (wanted to make network backups) Can we put this in errata file? I enabled rexecd for now and changed the jobs around. It would be even better if the corrected binary could be placed up on ftp.cdrom.com, for those that don't have room to install the source tree. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 01:50:24 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA04207 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 01:50:24 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA04178 for ; Mon, 5 Oct 1998 01:50:10 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id BAA27335; Mon, 5 Oct 1998 01:50:01 -0700 (PDT) Received: from rch.ip.lt (rch.ip.lt [194.176.42.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA03786 for ; Mon, 5 Oct 1998 01:47:07 -0700 (PDT) (envelope-from rch@rch.ip.lt) Received: (from rch@localhost) by rch.ip.lt (8.9.1/8.9.1) id KAA29424; Mon, 5 Oct 1998 10:45:08 +0200 (CEST) (envelope-from rch) Message-Id: <199810050845.KAA29424@rch.ip.lt> Date: Mon, 5 Oct 1998 10:45:08 +0200 (CEST) From: rch@richard.eu.org To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8155: current make fails with "Error expanding embedded variable" Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8155 >Category: bin >Synopsis: current make fails with "Error expanding embedded variable" >Confidential: no >Severity: serious >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Oct 5 01:50:01 PDT 1998 >Last-Modified: >Originator: Ricardas Cepas >Organization: >Release: FreeBSD 3.0-19980923-BETA i386 >Environment: >Description: Current make fails with "Error expanding embedded variable" if founds $ in variable name, for example ARCHITECTURE=$(shell arch="`if test -x /usr/bin/dpkg; \ then dpkg --print-architecture; else uname -m; fi`" \ && if [ "$${arch%%i?86}"y = y ]; then arch=i386; fi \ && echo "$$arch") Earlier versions does not have this this problem, i.e. can ignore such statements. >How-To-Repeat: A=$(shell echo $b; ) >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 02:02:43 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAA06180 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 02:02:43 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from lecaire.grolier.fr (lecaire.grolier.fr [194.117.201.39]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA06175 for ; Mon, 5 Oct 1998 02:02:37 -0700 (PDT) (envelope-from akh@lecaire.grolier.fr) From: akh@lecaire.grolier.fr Received: from localhost (akh@localhost) by lecaire.grolier.fr (8.9.1/8.9.1) with SMTP id LAA25634 for ; Mon, 5 Oct 1998 11:02:03 +0200 (MET DST) Date: Mon, 5 Oct 1998 11:02:03 +0200 (MET DST) To: freebsd-bugs@FreeBSD.ORG Subject: 3.0-19981003-BETA DOS MEDIA INSTALL Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The installation from a dos partition dont work on 3.0-19981003 and 3.0-19980930. Error mounting /dev/wd0s3 /dist: Operation not supported by device (19). This appear on two kinds of computer which was installed by this way before (227-RELEASE). Thanks. AkH To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 03:30:20 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA17458 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 03:30:20 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA17379 for ; Mon, 5 Oct 1998 03:30:09 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA29625; Mon, 5 Oct 1998 03:30:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA16177; Mon, 5 Oct 1998 03:22:54 -0700 (PDT) (envelope-from nobody) Message-Id: <199810051022.DAA16177@hub.freebsd.org> Date: Mon, 5 Oct 1998 03:22:54 -0700 (PDT) From: estartu@augusta.de To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: misc/8156: mktime does not set tm_wday Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8156 >Category: misc >Synopsis: mktime does not set tm_wday >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Oct 5 03:30:00 PDT 1998 >Last-Modified: >Originator: Gerhard Schmidt >Organization: Augsburger Computer Forum e.V. >Release: 2.2.7-stable >Environment: FreeBSD inga.augusta.de 2.2.7-STABLE FreeBSD 2.2.7-STABLE #0: Thu Sep 17 15:22:59 MET DST 1998 root@inga.augusta.de:/usr/src/sys/compile/INGA i386 >Description: I have to finde out the weeekday of a spezific date and tryed to do this using mktime. As Said in the Manpage tm_wday is set to the weekday the programm fills the struct tm with the date and calles mktime but after return tm_wday hasn't change. >How-To-Repeat: struct tm Z Z->tm_mday = 1; Z->tm_mon = 1; Z->tm_year = 1999; Z->tm_isdst = -1; mktime(&Z); >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 04:50:13 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id EAA25024 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 04:50:13 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA25012 for ; Mon, 5 Oct 1998 04:50:07 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id EAA02790; Mon, 5 Oct 1998 04:50:01 -0700 (PDT) Date: Mon, 5 Oct 1998 04:50:01 -0700 (PDT) Message-Id: <199810051150.EAA02790@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Eivind Eklund Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Reply-To: Eivind Eklund Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8155; it has been noted by GNATS. From: Eivind Eklund To: rch@richard.eu.org, FreeBSD-gnats-submit@FreeBSD.ORG Cc: Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Date: Mon, 5 Oct 1998 13:48:38 +0200 The snippets submitted are, as far as I can tell, not for FreeBSD make. Could you be thinking of the GNU Make port? If so, you have to report the bug to GNU, not FreeBSD. If not, I'd appreciate a complete makefile that reproduce the problem. Thanks! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 06:30:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id GAA04995 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 06:30:10 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id GAA04982 for ; Mon, 5 Oct 1998 06:30:07 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id GAA05922; Mon, 5 Oct 1998 06:30:00 -0700 (PDT) Date: Mon, 5 Oct 1998 06:30:00 -0700 (PDT) Message-Id: <199810051330.GAA05922@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Ricardas Cepas Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Reply-To: Ricardas Cepas Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8155; it has been noted by GNATS. From: Ricardas Cepas To: Eivind Eklund , rch@richard.eu.org, FreeBSD-gnats-submit@FreeBSD.ORG Cc: Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Date: Mon, 5 Oct 1998 15:23:00 +0200 On Mon Oct 5 13:48:38 1998 +0200 (Pirmadienis, 1998 m. spalio 5 d. 13:48:38 CEST), Eivind Eklund wrote: > The snippets submitted are, as far as I can tell, not for FreeBSD > make. Could you be thinking of the GNU Make port? If so, you have to > report the bug to GNU, not FreeBSD. If not, I'd appreciate a complete > makefile that reproduce the problem. Thanks! Sure it is not for FreeBSD only. It is from Makefile intended to run with any `make'. This snippet isn't used on FreeBSD but is necessary somewhere else. Just till now FreeBSD `make' didn't give error for it. Regards, -- RiÄardas ÄŒepas ~~ ~ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 06:50:15 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id GAA08099 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 06:50:15 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id GAA08085 for ; Mon, 5 Oct 1998 06:50:07 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id GAA06355; Mon, 5 Oct 1998 06:50:01 -0700 (PDT) Date: Mon, 5 Oct 1998 06:50:01 -0700 (PDT) Message-Id: <199810051350.GAA06355@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Reply-To: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8155; it has been noted by GNATS. From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) To: rch@richard.eu.org Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: bin/8155: current make fails with "Error expanding embedded variable" Date: 05 Oct 1998 15:47:53 +0200 rch@richard.eu.org writes: > Current make fails with "Error expanding embedded variable" if founds $ in variable name, for example > ARCHITECTURE=$(shell arch="`if test -x /usr/bin/dpkg; \ > then dpkg --print-architecture; else uname -m; fi`" \ > && if [ "$${arch%%i?86}"y = y ]; then arch=i386; fi \ > && echo "$$arch") This looks very SysVish. The Right Way to do this in BSD make is: ARCHITECTURE != \ arch="`if test -x /usr/bin/dpkg; \ then dpkg --print-architecture; else uname -m; fi`" \ && if [ "$${arch%%i?86}"y = y ]; then arch=i386; fi \ && echo "$$arch" Anyway, that piece of code is a horrible kludge IMHO (and totally unnecessary in FreeBSD) DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 07:00:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA09313 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 07:00:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA09308 for ; Mon, 5 Oct 1998 07:00:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA06697; Mon, 5 Oct 1998 07:00:00 -0700 (PDT) Date: Mon, 5 Oct 1998 07:00:00 -0700 (PDT) Message-Id: <199810051400.HAA06697@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Q Subject: Re: misc/8156: mktime does not set tm_wday Reply-To: Q Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR misc/8156; it has been noted by GNATS. From: Q To: estartu@augusta.de Cc: freebsd-gnats-submit@FreeBSD.ORG Subject: Re: misc/8156: mktime does not set tm_wday Date: Mon, 5 Oct 1998 23:49:48 +1000 (EST) On Mon, 5 Oct 1998 estartu@augusta.de wrote: > >Originator: Gerhard Schmidt > >Organization: > Augsburger Computer Forum e.V. > >Release: 2.2.7-stable > >Environment: > FreeBSD inga.augusta.de 2.2.7-STABLE FreeBSD 2.2.7-STABLE #0: Thu Sep 17 15:22:59 MET DST 1998 root@inga.augusta.de:/usr/src/sys/compile/INGA i386 > > >Description: > I have to finde out the weeekday of a spezific date and tryed to do > this using mktime. As Said in the Manpage tm_wday is set to the weekday > the programm fills the struct tm with the date and calles mktime > but after return tm_wday hasn't change. > >How-To-Repeat: > struct tm Z > Z->tm_mday = 1; > Z->tm_mon = 1; > Z->tm_year = 1999; > Z->tm_isdst = -1; > mktime(&Z); > > >Fix: From mktime() man page: External declarations as well as the tm structure definition are in the include file. The tm structure includes at least the following fields: int tm_sec; /* seconds (0 - 60) */ int tm_min; /* minutes (0 - 59) */ int tm_hour; /* hours (0 - 23) */ int tm_mday; /* day of month (1 - 31) */ int tm_mon; /* month of year (0 - 11) */ int tm_year; /* year - 1900 */ ^^^^^^^^^^^ It's not a bug. Your using the struct incorrectly. Every call you make to mktime() will be returning -1. You are effectively asking it for the year 3899. Which can't be expresses using a time_t value. Change 'tm_year = 1999' to 'tm_year = 99'. You should put your Y2K hat on if you plan to use a 'struct tm' in your application. Seeya...Q -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- _____ / Quinton Dolan - q@fan.net.au __ __/ / / __/ / / Systems Administrator / __ / _/ / / Fast Access Network __/ __/ __/ ____/ / - / Gold Coast, QLD, Australia _______ / Ph: +61 7 5574 1050 \_\ SAGE-AU Member To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 12:11:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA07320 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 12:11:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from rm-rstar.sfu.ca (rm-rstar.sfu.ca [142.58.120.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA06985; Mon, 5 Oct 1998 12:10:01 -0700 (PDT) (envelope-from info@internationalmoneynews.com) From: info@internationalmoneynews.com Received: from falcon-west.bestnet.org ([205.211.8.60]) by rm-rstar.sfu.ca (8.8.7/8.8.7/SFU-4.0H) with SMTP id MAA05827; Mon, 5 Oct 1998 12:04:01 -0700 (PDT) Date: Mon, 5 Oct 1998 12:04:01 -0700 (PDT) Message-Id: Content-Type: TEXT/PLAIN charset=US-ASCII To: undisclosed-recipients:; Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Free all professionals' IMF and World Bank economic currency trends and industry stability reports. Educated assessments and reporting is provided in 5 languages. Our international Due Diligence is dedicated to supplementing your superior analytical skills in all linguistic backgrounds. Our reader suggestion provision for professional research needs and ideas provides a unique oppurtunity to get the information you need. Our subjects include foreign and domestic business awareness "GROWING TO THE NEXT LEVEL" of Global Dominance. For a preview of our service, please visit http://www.internationalmoneynews.com If you are not interested in viewing our free service, thank-you for your kind indulgence! Please send a blank reply to this email and we will immediately remove you from our database. Sincerely, International Money News To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Mon Oct 5 13:00:26 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA18237 for freebsd-bugs-outgoing; Mon, 5 Oct 1998 13:00:26 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA18110 for ; Mon, 5 Oct 1998 13:00:10 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA23074; Mon, 5 Oct 1998 13:00:01 -0700 (PDT) Received: from o-o.org (o-o.org [207.252.201.100]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA17392 for ; Mon, 5 Oct 1998 12:56:58 -0700 (PDT) (envelope-from licia@o-o.org) Received: (from licia@localhost) by o-o.org (8.8.8/8.8.7) id OAA02972; Mon, 5 Oct 1998 14:56:26 -0500 (CDT) Message-Id: <199810051956.OAA02972@o-o.org> Date: Mon, 5 Oct 1998 14:56:26 -0500 (CDT) From: Kaila Ladywolf Reply-To: licia@o-o.org To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8158: sio driver breaks in 2.2.7R in kernels without pcm/pnp drivers Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8158 >Category: kern >Synopsis: sio driver breaks in 2.2.7R in kernels without pcm/pnp drivers >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Oct 5 13:00:00 PDT 1998 >Last-Modified: >Originator: Christine Maxwell >Organization: Optimal Objectives >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: FreeBSD 2.2.7Release compiled without pcm or pnp drivers on various x86 machines. >Description: I discovered while compiling a kernel to use the Voxware drivers for a Soundblaster 32, and noticed the same symptoms as an earlier problem in a dialup machine without a soundcard. The sio driver fails in 2.2.7R kernels compiled without the pcm or pnp drivers. Detection of the device is incorrect and access to the serial ports becomes problematic. On one machine it has repeatedly caused the machine to lock up on starting either X or moused. On a machine with a boca board the same problem manifested but did not lock the machine. Access to the serial ports was simply incredibly slow and dialin became impossible. On the machine that locks up, this is reported in the dmesg in a kernel without the pnp or pcm drivers : sio0: configured irq 4 not in bitmap of probed irqs 0 sio0 at 0x3f8-0x3ff irq 4 on isa sio0: type 8250 This is reported on the same machine, with those drivers added : sio0 at 0x3e8-0x3ef irq 4 on isa sio0: type 16450 On the machine with the boca board, without the drivers, I get the same problem : sio1: configured irq 10 not in bitmap of probed irqs 0x10 Otherwise, I get sio10 at 0x148-0x14f flags 0x1005 on isa sio10: type 16550A (multiport) >How-To-Repeat: Compile a 2.2.7R kernel without the pcm or pnp drivers >Fix: Compile with pnp AND pcm driver. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 01:25:23 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA01514 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 01:25:23 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA01504; Tue, 6 Oct 1998 01:25:13 -0700 (PDT) (envelope-from yokota@FreeBSD.org) From: Kazutaka YOKOTA Received: (from yokota@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id BAA19460; Tue, 6 Oct 1998 01:25:11 -0700 (PDT) Date: Tue, 6 Oct 1998 01:25:11 -0700 (PDT) Message-Id: <199810060825.BAA19460@freefall.freebsd.org> To: pst@Shockwave.COM, yokota@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: kern/6277 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: mouse operation weird in -current State-Changed-From-To: open-closed State-Changed-By: yokota State-Changed-When: Tue Oct 6 01:24:22 PDT 1998 State-Changed-Why: The originator says that the problem is not reproducable anymore. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 02:50:20 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAB13226 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 02:50:20 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA13163 for ; Tue, 6 Oct 1998 02:50:04 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id CAA22620; Tue, 6 Oct 1998 02:50:01 -0700 (PDT) Received: from axl.training.iafrica.com (axl.training.iafrica.com [196.31.1.175]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA12886 for ; Tue, 6 Oct 1998 02:48:14 -0700 (PDT) (envelope-from sheldonh@axl.training.iafrica.com) Received: from sheldonh by axl.training.iafrica.com with local (Exim 2.02 #1) id 0zQTis-0001Uz-00 for FreeBSD-gnats-submit@freebsd.org; Tue, 6 Oct 1998 11:48:02 +0200 Message-Id: Date: Tue, 6 Oct 1998 11:48:02 +0200 From: axl@iafrica.com Reply-To: axl@iafrica.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: conf/8162: [PATCH] src/etc/syslog.conf won't use spaces as field separators Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8162 >Category: conf >Synopsis: [PATCH] src/etc/syslog.conf won't use spaces as field separators >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 02:50:01 PDT 1998 >Last-Modified: >Originator: Sheldon Hearn >Organization: UUNET Internet Africa >Release: FreeBSD 2.2.7-STABLE i386 >Environment: N/A >Description: When syslogd parses /etc/syslog.conf it does not accept spaces at field separators, because spaces are legal within the fields themselves. This makes the syslog.conf format unusual enough for a comment to be needed in the conf file. No such comment exists. >How-To-Repeat: N/A >Fix: The following patch, applicable to both current and stable, will provide a comment that should prevent an FAQ at the source. Hooray! Index: syslog.conf =================================================================== RCS file: /home/ncvs/src/etc/syslog.conf,v retrieving revision 1.8 diff -u -d -r1.8 syslog.conf --- syslog.conf 1998/09/02 01:34:56 1.8 +++ syslog.conf 1998/10/06 09:40:10 @@ -1,5 +1,7 @@ # $Id: syslog.conf,v 1.8 1998/09/02 01:34:56 brian Exp $ # +# Spaces are NOT valid field separators in this file. +# Consult the syslog.conf(5) manpage. *.err;kern.debug;auth.notice;mail.crit /dev/console *.notice;kern.debug;lpr.info;mail.crit;news.err /var/log/messages mail.info /var/log/maillog >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 04:10:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id EAA25799 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 04:10:11 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA25711 for ; Tue, 6 Oct 1998 04:10:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id EAA25832; Tue, 6 Oct 1998 04:10:04 -0700 (PDT) Received: from lion.plab.ku.dk (lion.plab.ku.dk [130.225.105.49]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA25530 for ; Tue, 6 Oct 1998 04:08:59 -0700 (PDT) (envelope-from tobez@lion.plab.ku.dk) Received: (from tobez@localhost) by lion.plab.ku.dk (8.8.8/8.8.8) id NAA20929; Tue, 6 Oct 1998 13:08:46 +0200 (CEST) (envelope-from tobez) Message-Id: <199810061108.NAA20929@lion.plab.ku.dk> Date: Tue, 6 Oct 1998 13:08:46 +0200 (CEST) From: tobez@plab.ku.dk Reply-To: tobez@plab.ku.dk To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8163: edquota bug with large quota sizes Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8163 >Category: bin >Synopsis: It is impossible to assign quotas larger than 4Gbytes using edquota >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 04:10:02 PDT 1998 >Last-Modified: >Originator: Anton Berezin >Organization: The Protein Laboratory, University of Copenhagen >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: "$Id: edquota.c,v 1.4.2.4 1998/03/09 13:50:51 jkh Exp $" >Description: While trying to assign quota limits to a value greater than 4Gbytes (4194304 kbytes) edquota does not report any problems and finishes successfully; however, actually assigned limits get wrapped modulo 4Gbytes. >How-To-Repeat: Try to assign, say, hard limit to 5242880, save & exit. Run edquota again for the same user. The assigned quota will be 1048576. >Fix: --- edquota.c.orig Mon Oct 5 20:08:24 1998 +++ edquota.c Mon Oct 5 20:52:02 1998 @@ -69,6 +69,25 @@ #include #include "pathnames.h" +/* Let's be paranoid about block size */ +#if 10 > DEV_BSHIFT +#define kbtodb(kbytes) \ + ((daddr_t)((unsigned long)(kbytes) << (10-DEV_BSHIFT))) + +#define dbtokb(db) \ + ((off_t)(db) >> (10-DEV_BSHIFT)) +#elif 10 < DEV_BSHIFT +#define kbtodb(kbytes) \ + ((daddr_t)((unsigned long)(kbytes) >> (DEV_BSHIFT-10))) + +#define dbtokb(db) \ + ((off_t)(db) << (DEV_BSHIFT-10)) +#else +#define kbtodb(kbytes) (kbytes) +#define dbtokb(db) (db) +#endif + + char *qfname = QUOTAFILENAME; char *qfextension[] = INITQFNAMES; char *quotagroup = QUOTAGROUP; @@ -416,9 +435,9 @@ for (qup = quplist; qup; qup = qup->next) { fprintf(fd, "%s: %s %lu, limits (soft = %lu, hard = %lu)\n", qup->fsname, "blocks in use:", - (unsigned long)(dbtob(qup->dqblk.dqb_curblocks) / 1024), - (unsigned long)(dbtob(qup->dqblk.dqb_bsoftlimit) / 1024), - (unsigned long)(dbtob(qup->dqblk.dqb_bhardlimit) / 1024)); + (unsigned long)(dbtokb(qup->dqblk.dqb_curblocks)), + (unsigned long)(dbtokb(qup->dqblk.dqb_bsoftlimit)), + (unsigned long)(dbtokb(qup->dqblk.dqb_bhardlimit))); fprintf(fd, "%s %lu, limits (soft = %lu, hard = %lu)\n", "\tinodes in use:", qup->dqblk.dqb_curinodes, qup->dqblk.dqb_isoftlimit, qup->dqblk.dqb_ihardlimit); @@ -469,9 +488,9 @@ warnx("%s:%s: bad format", fsp, cp); return (0); } - dqblk.dqb_curblocks = btodb(dqblk.dqb_curblocks * 1024); - dqblk.dqb_bsoftlimit = btodb(dqblk.dqb_bsoftlimit * 1024); - dqblk.dqb_bhardlimit = btodb(dqblk.dqb_bhardlimit * 1024); + dqblk.dqb_curblocks = kbtodb(dqblk.dqb_curblocks); + dqblk.dqb_bsoftlimit = kbtodb(dqblk.dqb_bsoftlimit); + dqblk.dqb_bhardlimit = kbtodb(dqblk.dqb_bhardlimit); if ((cp = strtok(line2, "\n")) == NULL) { warnx("%s: %s: bad format", fsp, line2); return (0); >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 04:20:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id EAA28344 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 04:20:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA28300 for ; Tue, 6 Oct 1998 04:20:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id EAA26290; Tue, 6 Oct 1998 04:20:01 -0700 (PDT) Received: from lion.plab.ku.dk (lion.plab.ku.dk [130.225.105.49]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA27725 for ; Tue, 6 Oct 1998 04:16:17 -0700 (PDT) (envelope-from tobez@lion.plab.ku.dk) Received: (from tobez@localhost) by lion.plab.ku.dk (8.8.8/8.8.8) id NAA21040; Tue, 6 Oct 1998 13:16:06 +0200 (CEST) (envelope-from tobez) Message-Id: <199810061116.NAA21040@lion.plab.ku.dk> Date: Tue, 6 Oct 1998 13:16:06 +0200 (CEST) From: tobez@plab.ku.dk Reply-To: tobez@plab.ku.dk To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8164: repquota incorrectly reports quotas larger than 4Gbytes Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8164 >Category: bin >Synopsis: repquota incorrectly reports quotas larger than 4Gbytes >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 04:20:01 PDT 1998 >Last-Modified: >Originator: Anton Berezin >Organization: The Protein Laboratory, University of Copenhagen >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: "$Id: repquota.c,v 1.3.6.3 1998/03/09 13:52:17 jkh Exp $" >Description: repquota reports softlimits, hardlimits and ``used'' field incorrectly, namely those numbers get wrapped modulo 4Gbytes. >How-To-Repeat: The easiest way is to create files owned by particular user/group with total sizes exceeding 4Gbytes, and look at the repquota-generated output. >Fix: --- repquota.c.orig Mon Oct 5 20:07:59 1998 +++ repquota.c Mon Oct 5 20:50:10 1998 @@ -64,6 +64,18 @@ #include #include +/* Let's be paranoid about block size */ +#if 10 > DEV_BSHIFT +#define dbtokb(db) \ + ((off_t)(db) >> (10-DEV_BSHIFT)) +#elif 10 < DEV_BSHIFT +#define dbtokb(db) \ + ((off_t)(db) << (DEV_BSHIFT-10)) +#else +#define dbtokb(db) (db) +#endif + + char *qfname = QUOTAFILENAME; char *qfextension[] = INITQFNAMES; @@ -233,9 +245,9 @@ fup->fu_dqblk.dqb_isoftlimit && fup->fu_dqblk.dqb_curinodes >= fup->fu_dqblk.dqb_isoftlimit ? '+' : '-', - (u_long)(dbtob(fup->fu_dqblk.dqb_curblocks) / 1024), - (u_long)(dbtob(fup->fu_dqblk.dqb_bsoftlimit) / 1024), - (u_long)(dbtob(fup->fu_dqblk.dqb_bhardlimit) / 1024), + (u_long)(dbtokb(fup->fu_dqblk.dqb_curblocks)), + (u_long)(dbtokb(fup->fu_dqblk.dqb_bsoftlimit)), + (u_long)(dbtokb(fup->fu_dqblk.dqb_bhardlimit)), fup->fu_dqblk.dqb_bsoftlimit && fup->fu_dqblk.dqb_curblocks >= fup->fu_dqblk.dqb_bsoftlimit ? >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 06:00:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id GAA12108 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 06:00:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id GAA12077 for ; Tue, 6 Oct 1998 06:00:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id GAA29484; Tue, 6 Oct 1998 06:00:01 -0700 (PDT) Received: from ns.wcom.co.uk (ns.wcom.co.uk [194.203.119.46]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id FAA11542 for ; Tue, 6 Oct 1998 05:56:22 -0700 (PDT) (envelope-from aledm@ns.wcom.co.uk) Received: (from aledm@localhost) by ns.wcom.co.uk (8.8.8/8.8.8) id NAA23400; Tue, 6 Oct 1998 13:56:09 +0100 (BST) (envelope-from aledm) Message-Id: <199810061256.NAA23400@ns.wcom.co.uk> Date: Tue, 6 Oct 1998 13:56:09 +0100 (BST) From: aledm@routers.co.uk Reply-To: aledm@routers.co.uk To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8165: minor inconsistency in dirent.h Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8165 >Category: kern >Synopsis: sys/dirent.h has duplicate constant from sys/syslimits.h >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 06:00:01 PDT 1998 >Last-Modified: >Originator: Aled Morris >Organization: Routers Ltd. >Release: FreeBSD 3.0-980309-SNAP i386 >Environment: kernel include files >Description: sys/dirent.h has a definition of MAXNAMLEN as follows: #define MAXNAMLEN 255 This should be the same as NAME_MAX from sys/syslimits.h: #define NAME_MAX 255 /* max bytes in a file name */ These should be synchronised in the same way that MAXPATHLEN in sys/param.h is fixed to PATH_MAX from sys/syslimits.h >How-To-Repeat: by inspection >Fix: to sys/dirent.h add #include and change "#define MAXNAMLEN 255" to "#define MAXNAMLEN NAME_MAX" >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 07:10:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA21358 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 07:10:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA21261 for ; Tue, 6 Oct 1998 07:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA06356; Tue, 6 Oct 1998 07:10:00 -0700 (PDT) Received: from tim.xenologics.com (tim.xenologics.com [194.77.5.24]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA20963 for ; Tue, 6 Oct 1998 07:08:56 -0700 (PDT) (envelope-from seggers@semyam.dinoco.de) Received: (from uucp@localhost) by tim.xenologics.com (8.8.5/8.8.8) with UUCP id QAA05793 for FreeBSD-gnats-submit@freebsd.org; Tue, 6 Oct 1998 16:05:06 +0200 (MET DST) Received: (from seggers@localhost) by semyam.dinoco.de (8.9.1/8.8.8) id IAA02858; Tue, 6 Oct 1998 08:57:52 +0200 (CEST) (envelope-from seggers) Message-Id: <199810060657.IAA02858@semyam.dinoco.de> Date: Tue, 6 Oct 1998 08:57:52 +0200 (CEST) From: Stefan Eggers Reply-To: seggers@semyam.dinoco.de To: FreeBSD-gnats-submit@FreeBSD.ORG Cc: seggers@semyam.dinoco.de X-Send-Pr-Version: 3.2 Subject: kern/8166: odboot is pointless with CAM Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8166 >Category: kern >Synopsis: odboot is pointless with CAM >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 07:10:00 PDT 1998 >Last-Modified: >Originator: Stefan Eggers >Organization: none >Release: FreeBSD 3.0-BETA i386 >Environment: -current cvsup'ed on Saturday. >Description: The Makefile in /sys/i386/boot/biosboot installs a link from bootod and odboot to the real boot blocks. Now that there is no od anymore we can remove that as was already done for bootsd and sdboot. >How-To-Repeat: >Fix: Just change the for statement in the Makefile's install target like this: Index: Makefile =================================================================== RCS file: /usr2/FreeBSD/CVSROOT/src/sys/i386/boot/biosboot/Makefile,v retrieving revision 1.66 diff -u -r1.66 Makefile --- Makefile 1998/09/23 06:50:45 1.66 +++ Makefile 1998/10/06 06:55:57 @@ -86,7 +86,7 @@ boot1 ${DESTDIR}${BINDIR}/boot1 ${INSTALL} ${COPY} -o ${BINOWN} -g ${BINGRP} -m ${BINMODE}\ boot2 ${DESTDIR}${BINDIR}/boot2 - for i in da fd wd od vn wfd ; do \ + for i in da fd wd vn wfd ; do \ ( cd ${DESTDIR}${BINDIR} ; \ rm -f boot$${i} $${i}boot ; \ ln -s boot1 $${i}boot ; \ >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 07:52:24 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA00548 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 07:52:24 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA00324; Tue, 6 Oct 1998 07:50:29 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA07670; Tue, 6 Oct 1998 07:50:29 -0700 (PDT) Date: Tue, 6 Oct 1998 07:50:29 -0700 (PDT) Message-Id: <199810061450.HAA07670@freefall.freebsd.org> To: estartu@augusta.de, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: misc/8156 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: mktime does not set tm_wday State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Tue Oct 6 07:47:15 PDT 1998 State-Changed-Why: Pilot error. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 07:53:13 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA00714 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 07:53:13 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from ifi.uio.no (ifi.uio.no [129.240.64.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA00542 for ; Tue, 6 Oct 1998 07:52:23 -0700 (PDT) (envelope-from dag-erli@ifi.uio.no) Received: from skejdbrimir.ifi.uio.no (2602@skejdbrimir.ifi.uio.no [129.240.65.2]) by ifi.uio.no (8.8.8/8.8.7/ifi0.2) with SMTP id QAA17622; Tue, 6 Oct 1998 16:51:14 +0200 (MET DST) Received: from localhost (dag-erli@localhost) by skejdbrimir.ifi.uio.no ; Tue, 6 Oct 1998 14:51:07 GMT Mime-Version: 1.0 To: Q Cc: freebsd-bugs@FreeBSD.ORG Subject: Re: misc/8156: mktime does not set tm_wday References: <199810051400.HAA06697@freefall.freebsd.org> Organization: University of Oslo, Department of Informatics X-url: http://www.stud.ifi.uio.no/~dag-erli/ X-other-addresses: 'finger dag-erli@ifi.uio.no' for a list X-disclaimer-1: The views expressed in this article are mine alone, and do X-disclaimer-2: not necessarily coincide with those of any organisation or X-disclaimer-3: company with which I am or have been affiliated. X-Stop-Spam: http://www.cauce.org/ From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Date: 06 Oct 1998 16:50:57 +0200 In-Reply-To: Q's message of "Mon, 5 Oct 1998 07:00:00 -0700 (PDT)" Message-ID: Lines: 13 X-Mailer: Gnus v5.5/Emacs 19.34 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id HAA00710 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Q writes: > It's not a bug. Your using the struct incorrectly. Every call you make to > mktime() will be returning -1. You are effectively asking it for the year > 3899. Which can't be expresses using a time_t value. Change 'tm_year = > 1999' to 'tm_year = 99'. You should put your Y2K hat on if you plan to use > a 'struct tm' in your application. If you think tm_year poses a Y2K problem, you've got another think coming. Apart from that, your analysis is correct. I'm closing the PR. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 08:10:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA02947 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 08:10:05 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA02894 for ; Tue, 6 Oct 1998 08:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA08150; Tue, 6 Oct 1998 08:10:01 -0700 (PDT) Received: from tim.xenologics.com (tim.xenologics.com [194.77.5.24]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA02795 for ; Tue, 6 Oct 1998 08:08:44 -0700 (PDT) (envelope-from seggers@semyam.dinoco.de) Received: (from uucp@localhost) by tim.xenologics.com (8.8.5/8.8.8) with UUCP id RAA10246 for FreeBSD-gnats-submit@freebsd.org; Tue, 6 Oct 1998 17:05:06 +0200 (MET DST) Received: (from seggers@localhost) by semyam.dinoco.de (8.9.1/8.8.8) id RAA00825; Tue, 6 Oct 1998 17:03:48 +0200 (CEST) (envelope-from seggers) Message-Id: <199810061503.RAA00825@semyam.dinoco.de> Date: Tue, 6 Oct 1998 17:03:48 +0200 (CEST) From: Stefan Eggers Reply-To: seggers@semyam.dinoco.de To: FreeBSD-gnats-submit@FreeBSD.ORG Cc: seggers@semyam.dinoco.de X-Send-Pr-Version: 3.2 Subject: kern/8168: ppbus plip boot message misses \n Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8168 >Category: kern >Synopsis: ppbus plip boot message misses \n >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 08:10:01 PDT 1998 >Last-Modified: >Originator: Stefan Eggers >Organization: none >Release: FreeBSD 3.0-BETA i386 >Environment: -current cvsup'ed last Saturday. >Description: A message used during verbose booting is missing a newline which makes the output look uglier than necessary. This affects the ppbus plip. >How-To-Repeat: Reboot with verbose messages a kernel with ppbus and plip. Look at the dmesg output. >Fix: Untested. I hope this complicated patch works. ;-) Index: if_plip.c =================================================================== RCS file: /usr2/FreeBSD/CVSROOT/src/sys/dev/ppbus/if_plip.c,v retrieving revision 1.3 diff -u -r1.3 if_plip.c --- if_plip.c 1998/08/17 01:05:23 1.3 +++ if_plip.c 1998/10/06 14:59:05 @@ -212,7 +212,7 @@ lp->lp_unit = nlp; if (bootverbose) - printf("plip: irq %d", ppb->ppb_link->id_irq); + printf("plip: irq %d\n", ppb->ppb_link->id_irq); /* * ppbus dependent initialisation. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 09:02:39 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA13810 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 09:02:39 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA13064; Tue, 6 Oct 1998 08:59:47 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA09910; Tue, 6 Oct 1998 08:59:47 -0700 (PDT) Date: Tue, 6 Oct 1998 08:59:47 -0700 (PDT) Message-Id: <199810061559.IAA09910@freefall.freebsd.org> To: sysadmin@mfn.org, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: i386/8149 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: mailq -d is undocumented State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Tue Oct 6 08:59:20 PDT 1998 State-Changed-Why: Yes it is: Mailq is identical to ``sendmail -bp''. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 10:10:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA28349 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 10:10:10 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA28340 for ; Tue, 6 Oct 1998 10:10:06 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id KAA11943; Tue, 6 Oct 1998 10:10:02 -0700 (PDT) Received: from mail.kt.rim.or.jp (mail.kt.rim.or.jp [202.247.130.53]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA27509 for ; Tue, 6 Oct 1998 10:03:33 -0700 (PDT) (envelope-from yoshiaki@kt.rim.or.jp) Received: from singer.kt.rim.or.jp (ppp391.kt.rim.or.jp [202.247.140.91]) by mail.kt.rim.or.jp (8.8.5/3.6W-RIMNET-98-06-09) with ESMTP id CAA01026 for ; Wed, 7 Oct 1998 02:03:21 +0900 (JST) Received: (from yoshiaki@localhost) by singer.kt.rim.or.jp (8.9.1/3.4Wbeta3-96070610) id BAA00647; Wed, 7 Oct 1998 01:39:33 +0900 (JST) Message-Id: <199810061639.BAA00647@singer.kt.rim.or.jp> Date: Wed, 7 Oct 1998 01:39:33 +0900 (JST) From: yoshiaki@kt.rim.or.jp Reply-To: yoshiaki@kt.rim.or.jp To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8169: sound driver (pcm : Luigi's driver) YMF-719 probrem Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8169 >Category: kern >Synopsis: probe fail PnP sound card (YMF-719 base board) >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 10:10:01 PDT 1998 >Last-Modified: >Originator: Yoshiaki Uchikawa >Organization: Rimnet >Release: FreeBSD 3.0-BETA i386 >Environment: Mainboad Tekram P6F40-B5 Bios revision 1.2 FreeBSD 3.0-BETA #0: Wed Oct 7 01:11:19 JST 1998 CPU: Pentium Pro (232.67-MHz 686-class CPU) real memory = 100663296 (98304K bytes) avail memory = 95350784 (93116K bytes) vga0: rev 0x10 int a irq 9 on pci0.9.0 ncr0: rev 0x03 int a irq 11 on pci0.11.0 bktr0: rev 0x12 int a irq 15 on pci0.13.0 Miro TV, Temic NTSC tuner. mss_attach 1 at 0x530 irq 5 dma 0:1 flags 0x11 da0: Fixed Direct Access SCSI2 device da1: Fixed Direct Access SCSI2 device >Description: I use YMF-719 base sound card. This card was failed mss_attach by PnP configure. In /var/log/messages Oct 6 07:15:36 singer /kernel: CSN 1 Vendor ID: YMH0800 [0x0008a865] Serial 0xffffffff Comp ID: PNPb02f [0x2fb0d041] Oct 6 07:15:36 singer /kernel: mss_attach 1 at 0x21c irq 5 dma 0:1 flags 0x11 ^^^^^ Oct 6 07:15:36 singer /kernel: pcm1 (CS423x/Yamaha sn 0xffffffff) at 0x21c-0x223 irq 5 drq 0 flags 0x11 on isa ^^^^^^^^^^^ >How-To-Repeat: In UserConfig Config> pnp 1 0 enable bios >Fix: This is simple mistake. "vend_id" is law ID. "id" was masked by 0xff00ffff . So... it is easy to confuse. --- ad1848.c.orig Wed Oct 7 01:04:07 1998 +++ ad1848.c Wed Oct 7 01:22:34 1998 @@ -1412,7 +1412,7 @@ s = "Yamaha SA2"; else if ( id == 0x3000a865) s = "Yamaha SA3"; - else if (vend_id == 0x0000a865) + else if (vend_id == 0x0008a865) s = "Yamaha YMF719 OPL-SA3"; else if (vend_id == 0x8140d315) s = "SoundscapeVIVO"; @@ -1467,7 +1467,7 @@ case 0x2000a865: /* Yamaha SA2 */ case 0x3000a865: /* Yamaha SA3 */ - case 0x0000a865: /* Yamaha TMF719 SA3 */ + case 0x0000a865: /* Yamaha YMF719 SA3 */ dev->id_iobase = d.port[1]; tmp_d.alt_base = d.port[0]; tmp_d.conf_base = d.port[4]; ----- yoshiaki@kt.rim.or.jp yoshiaki@jp.freebsd.org Yoshiaki UCHIKAWA >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 11:20:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA09580 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 11:20:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA09516 for ; Tue, 6 Oct 1998 11:20:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id LAA13878; Tue, 6 Oct 1998 11:20:01 -0700 (PDT) Received: from portal.west.saic.com (portal.west.saic.com [198.151.12.15]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id LAA09317 for ; Tue, 6 Oct 1998 11:19:01 -0700 (PDT) (envelope-from peter@phoenix.cistw.saic.com) Received: from [10.11.15.211] by portal.west.saic.com via smtpd (for hub.FreeBSD.ORG [204.216.27.18]) with SMTP; 6 Oct 1998 18:18:51 UT Received: (from peter@localhost) by phoenix.cistw.saic.com (8.9.1/8.9.1) id LAA11850; Tue, 6 Oct 1998 11:18:51 -0700 (PDT) Message-Id: <199810061818.LAA11850@phoenix.cistw.saic.com> Date: Tue, 6 Oct 1998 11:18:51 -0700 (PDT) From: peter.j.bartoli@cpmx.saic.com Reply-To: peter.j.bartoli@cpmx.saic.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8172: installer has difficulty handling ftp errors during upgrade Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8172 >Category: bin >Synopsis: installer has difficulty handling ftp errors during upgrade >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 11:20:00 PDT 1998 >Last-Modified: >Originator: peter bartoli >Organization: Science Applications International Corporation >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: plain old x86 box - nothing special; works fine most of the time >Description: while using the upgrade option, the first attempt to ftp connect bombed out with an error "0" (usually no error, right?) ... but it dumped me back out to the main menu immediately afterwards. however, it had already mounted the file systems, and when i went through the installer options again, it remounted everything *again*, only under /mnt/mnt (the root filesystem was mounted on top of itself!), and the installer installed everything under /mnt. >How-To-Repeat: try to install from a really, really busy ftp server (my guess as to the error generated). when it fails, try to do the installation again, but without rebooting. >Fix: rm -rf /mnt/* and install over again. or, during installation (if it happens), use the emergency shell to umount everything before proceeding a second time. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 13:10:15 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA04820 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 13:10:15 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA04696 for ; Tue, 6 Oct 1998 13:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA17817; Tue, 6 Oct 1998 13:10:00 -0700 (PDT) Received: from tim.xenologics.com (tim.xenologics.com [194.77.5.24]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA04357 for ; Tue, 6 Oct 1998 13:08:39 -0700 (PDT) (envelope-from seggers@semyam.dinoco.de) Received: (from uucp@localhost) by tim.xenologics.com (8.8.5/8.8.8) with UUCP id WAA03089 for FreeBSD-gnats-submit@freebsd.org; Tue, 6 Oct 1998 22:05:16 +0200 (MET DST) Received: (from seggers@localhost) by semyam.dinoco.de (8.9.1/8.8.8) id WAA01043; Tue, 6 Oct 1998 22:05:25 +0200 (CEST) (envelope-from seggers) Message-Id: <199810062005.WAA01043@semyam.dinoco.de> Date: Tue, 6 Oct 1998 22:05:25 +0200 (CEST) From: Stefan Eggers Reply-To: seggers@semyam.dinoco.de To: FreeBSD-gnats-submit@FreeBSD.ORG Cc: seggers@semyam.dinoco.de X-Send-Pr-Version: 3.2 Subject: kern/8174: fix for bootloader non-working autoboot Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8174 >Category: kern >Synopsis: fix for bootloader non-working autoboot >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 13:10:00 PDT 1998 >Last-Modified: >Originator: Stefan Eggers >Organization: none >Release: FreeBSD 3.0-BETA i386 >Environment: A current system cvsup'ed on Saturday, October 3rd with boot loader cvsup'ed today. >Description: When using autoboot from the keyboard/VGA it won't count down and only reacts to a keypress from the user. >How-To-Repeat: Boot from keyboard/VGA (won't work for a terminal on the serial line) and when you are in the new boot loader give it the command autoload with some small number of seconds. Wait forever or press some key. >Fix: Index: i386/libi386/vidconsole.c =================================================================== RCS file: /usr2/FreeBSD/CVSROOT/src/sys/boot/i386/libi386/vidconsole.c,v retrieving revision 1.3 diff -u -r1.3 vidconsole.c --- vidconsole.c 1998/10/02 16:32:45 1.3 +++ vidconsole.c 1998/10/06 19:52:05 @@ -110,7 +110,7 @@ v86.addr = 0x16; v86.eax = 0x100; v86int(); - return(v86.eax); + return(! v86.eax); } #if KEYBOARD_PROBE >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 14:42:57 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA02099 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 14:42:57 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA01903; Tue, 6 Oct 1998 14:42:06 -0700 (PDT) (envelope-from gibbs@FreeBSD.org) From: "Justin T. Gibbs" Received: (from gibbs@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA21113; Tue, 6 Oct 1998 14:42:02 -0700 (PDT) Date: Tue, 6 Oct 1998 14:42:02 -0700 (PDT) Message-Id: <199810062142.OAA21113@freefall.freebsd.org> To: gibbs@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, jkh@FreeBSD.ORG Subject: Re: kern/8166 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: odboot is pointless with CAM Responsible-Changed-From-To: freebsd-bugs->jkh Responsible-Changed-By: gibbs Responsible-Changed-When: Tue Oct 6 14:40:33 PDT 1998 Responsible-Changed-Why: I know that Jordan is concerned about compatibility issues with using the old device names. It may be that we actually want to resurrect the 'sdboot' link and keep the 'odboot' link for the 3.0 release. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 15:30:42 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA15725 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 15:30:42 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA15582 for ; Tue, 6 Oct 1998 15:30:06 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id PAA22636; Tue, 6 Oct 1998 15:30:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA14893; Tue, 6 Oct 1998 15:28:00 -0700 (PDT) (envelope-from nobody) Message-Id: <199810062228.PAA14893@hub.freebsd.org> Date: Tue, 6 Oct 1998 15:28:00 -0700 (PDT) From: synk@swcp.com To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: bin/8176: Buffer overflow in function called by getpwnam() Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8176 >Category: bin >Synopsis: Buffer overflow in function called by getpwnam() >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 15:30:01 PDT 1998 >Last-Modified: >Originator: Brendan Conoboy >Organization: >Release: 2.2.7-STABLE FreeBSD 2.2.7-STABLE #0: Wed Sep 23 12:10:33 >Environment: FreeBSD uspca.swcp.com 2.2.7-STABLE FreeBSD 2.2.7-STABLE #0: Wed Sep 23 12:10:33 MDT 1998 root@:/usr/src/sys/compile/uspca i386 >Description: When getpwnam() is passed a very large buffer, it will recieve a SIGBUS or SIGSEGV. As far as I've looked so far, it appears to manifest itself in __hashpw(), possibly during this macro: #define EXPAND(e) e = t; while ( (*t++ = *p++) ); Though I'm no coder, I think the problem might be that in getpwnam, "name" isn't necessarily null terminated. It is defined one byte larger than what is bcopied into it, but the last byte might not be zero. >How-To-Repeat: #include #include #include char zeename[]="AVeryLongStringGoesHere"; struct passwd * gunk; main() { gunk=getpwnam(zeename); } >Fix: If it's really just a null termination problem, add the null. I've not yet recompiled my libraries to test this theory. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 18:31:56 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA23896 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 18:31:56 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id SAA23845; Tue, 6 Oct 1998 18:31:46 -0700 (PDT) (envelope-from julian@FreeBSD.org) From: Julian Elischer Received: (from julian@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id SAA27869; Tue, 6 Oct 1998 18:31:45 -0700 (PDT) Date: Tue, 6 Oct 1998 18:31:45 -0700 (PDT) Message-Id: <199810070131.SAA27869@freefall.freebsd.org> To: archie@whistle.com, julian@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/7923 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: scandir(3) does not clean up after itself if it fails State-Changed-From-To: open-closed State-Changed-By: julian State-Changed-When: Tue Oct 6 17:54:39 PDT 1998 State-Changed-Why: Patch applied To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 19:00:22 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA00639 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 19:00:22 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA00587 for ; Tue, 6 Oct 1998 19:00:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id TAA28597; Tue, 6 Oct 1998 19:00:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA00337; Tue, 6 Oct 1998 18:58:46 -0700 (PDT) (envelope-from nobody) Message-Id: <199810070158.SAA00337@hub.freebsd.org> Date: Tue, 6 Oct 1998 18:58:46 -0700 (PDT) From: ysakazum@e.cc.titech.ac.jp To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: i386/8179: Install failure with motherbord using SIS5596 chip set Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8179 >Category: i386 >Synopsis: Install failure with motherbord using SIS5596 chip set >Confidential: no >Severity: critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 19:00:00 PDT 1998 >Last-Modified: >Originator: Yui Sakazume >Organization: Nihon Silicon Graphics K.K >Release: 2.2.7-RELEASE >Environment: >Description: The machne resets or hang up in the middle of installation. I think it is problem that SiS5513 is no supported because boot messages contain "no driver assigned" (for SiS5513). The conponents of the machine and boot messages are as follows. The conponents of the machine -------------------------------------------- motherbord: GIGABYTE GA-584MS CPU: Pentium-133(P54C) memory: 32MB SIMM x2 + 8MB SIMM x2 SISI bord: Tekram DC-390 NIC: DEC chip 21140 base First Ethernet card (PCI) HDD: HP C2490A (SCSI) FDD: 1.44MB 3.5inch 2mode FDD -------------------------------------------- boot messages -------------------------------------------- avail memory = 76009472 (74228K bytes) Probing for devices on PCI bus 0: chip0 rev 0 on pci0:0:0 chip1 rev 1 on pci0:1:0 pci0:1:1: Silicon Integrated Systems, device=0x5513, class=storage (ide) int a irq 14 [no driver assigned] amd0 rev 16 int a irq 15 on pci0:11:0 amd0 waiting for scsi devices to settle (amd0:0:0): Direct-Access 2033MB (4165272 512 byte sectors) de0: rev 34 int a irq 11 on pci0:15:0 de0: 21140A [10-100Mb/s] pass 2.2 de0: address 00:40:05:36:00:77 vga0 rev 17 int a irq 10 on pci0:20:0 Probing for devices on the ISA bus: sc0 at 0x060-0x06f irq 1 on motherbord sc0: VGA color <4 virtual consoles, flags=0x0> fdc0 at 0x3f0-0x3f7 irq 6 drq 2 on isa fdc0: FIFO enabled, 8 bytes threshold npx0 flags 0x1 on motherbord npx0: INT 16 interface Intel Pentium F00F detected, installing workaround changing root device to fd0s4c rootfs is 1440 Kbyte compiled in MFS /stand/sysinstall running as init on vty0 ----------------------------------------------------- >How-To-Repeat: Boot from floppy. The machne resets in the middle of installation. >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 19:20:04 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA04498 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 19:20:04 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA04440 for ; Tue, 6 Oct 1998 19:20:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id TAA29141; Tue, 6 Oct 1998 19:20:00 -0700 (PDT) Received: from mail-relay2.yahoo.com (mr1.yahoo.com [206.251.17.77]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA03397 for ; Tue, 6 Oct 1998 19:17:56 -0700 (PDT) (envelope-from serge@serge.yahoo.com) Received: from borogove.yahoo.com (borogove.yahoo.com [205.216.162.65]) by mail-relay2.yahoo.com (8.9.1a/8.8.8) with ESMTP id TAA03750; Tue, 6 Oct 1998 19:17:44 -0700 (PDT) Received: from serge.yahoo.com (serge.yahoo.com [205.216.162.201]) by borogove.yahoo.com (8.8.7/8.8.8) with ESMTP id TAA17062; Tue, 6 Oct 1998 19:17:37 -0700 (PDT) Received: (from serge@localhost) by serge.yahoo.com (8.8.8/8.8.7) id TAA12930; Tue, 6 Oct 1998 19:17:36 -0700 (PDT) (envelope-from serge) Message-Id: <199810070217.TAA12930@serge.yahoo.com> Date: Tue, 6 Oct 1998 19:17:36 -0700 (PDT) From: serge@yahoo-inc.com Reply-To: serge@yahoo-inc.com To: FreeBSD-gnats-submit@FreeBSD.ORG Cc: serge@yahoo-inc.com X-Send-Pr-Version: 3.2 Subject: kern/8180: open("..",O_RDONLY|O_NONBLOCK) fails Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8180 >Category: kern >Synopsis: open("..",O_RDONLY|O_NONBLOCK) fails >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue Oct 6 19:20:00 PDT 1998 >Last-Modified: >Originator: Sergiy Zhuk >Organization: >Release: FreeBSD 2.2.7-STABLE i386 >Environment: the bug is present in all bsd 2.1.x and 2.2.x (including the latest STABLE) >Description: looks like open() is checking permissions of the mount point rather then permissions of the mounted filesystem. >How-To-Repeat: as root: $ mkdir /sd1 $ chmod 700 /sd1 $ ls -lad /sd1 drwx------ 2 root wheel 512 Oct 2 19:39 /sd1 $ mount /dev/sd1a /sd1 OR $ mount some_host:/exported_fs /sd1 $ ls -ld /sd1 drwxr-xr-x 46 1064 1685 1024 Jan 12 1998 /sd1 as a normal user: $ cd /sd1 $ ls -la .. ls: ..: Permission denied $ cd .. $ ls -la total 2733 drwxr-xr-x 18 root wheel 512 2 ÏËÔ 19:39 . drwxr-xr-x 18 root wheel 512 2 ÏËÔ 19:39 .. -rw-r--r-- 2 root wheel 356 21 ÏËÔ 1997 .cshrc [...] as a result getwd() and getcwd() in /sd1 fails as they do opendir() (which calls open()). >Fix: rewrite kernel code workaround: as root: $ umount /sd1;chmod 755 /sd1 one can use open() + fchdir() instead of getcwd(), but this is not a fix anyway >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 20:30:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA19139 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 20:30:05 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA19073 for ; Tue, 6 Oct 1998 20:30:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id UAA01443; Tue, 6 Oct 1998 20:30:01 -0700 (PDT) Date: Tue, 6 Oct 1998 20:30:01 -0700 (PDT) Message-Id: <199810070330.UAA01443@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Bruce Evans Subject: Re: kern/8165: minor inconsistency in dirent.h Reply-To: Bruce Evans Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8165; it has been noted by GNATS. From: Bruce Evans To: aledm@routers.co.uk, FreeBSD-gnats-submit@FreeBSD.ORG Cc: Subject: Re: kern/8165: minor inconsistency in dirent.h Date: Wed, 7 Oct 1998 13:26:42 +1000 >These should be synchronised in the same way that MAXPATHLEN in sys/param.h >is fixed to PATH_MAX from sys/syslimits.h > >>How-To-Repeat: > >by inspection > >>Fix: > >to sys/dirent.h add #include >and change "#define MAXNAMLEN 255" to "#define MAXNAMLEN NAME_MAX" This would pollute some more and is not permitted in the _POSIX_SOURCE case. Bruce To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Tue Oct 6 20:53:59 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA25113 for freebsd-bugs-outgoing; Tue, 6 Oct 1998 20:53:59 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from fan.net.au (fan.net.au [203.20.92.1]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA25100 for ; Tue, 6 Oct 1998 20:53:52 -0700 (PDT) (envelope-from q@fan.net.au) Received: from gromit.fan.net.au (gromit.fan.net.au [203.23.133.34]) by fan.net.au (8.9.1/8.9.1) with SMTP id NAA11883; Wed, 7 Oct 1998 13:53:34 +1000 (EST) Date: Wed, 7 Oct 1998 13:53:34 +1000 (EST) From: Q To: =?ISO-8859-1?Q?Dag-Erling_C=2E_Sm=F8rgrav?= cc: freebsd-bugs@FreeBSD.ORG Subject: Re: misc/8156: mktime does not set tm_wday In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=ISO-8859-1 Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from QUOTED-PRINTABLE to 8bit by hub.freebsd.org id UAA25103 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On 6 Oct 1998, Dag-Erling C. Smørgrav wrote: > Q writes: > > It's not a bug. Your using the struct incorrectly. Every call you make to > > mktime() will be returning -1. You are effectively asking it for the year > > 3899. Which can't be expresses using a time_t value. Change 'tm_year = > > 1999' to 'tm_year = 99'. You should put your Y2K hat on if you plan to use > > a 'struct tm' in your application. > > If you think tm_year poses a Y2K problem, you've got another think > coming. Apart from that, your analysis is correct. I'm closing the PR. I wasn't implying a Y2K issue with using the struct, only that there can be issues if not used correctly. I was only suggesting that one should be careful and think when doing maths with dates. Sorry I probably should have been a little more direct. Seeya...Q -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- _____ / Quinton Dolan - q@fan.net.au __ __/ / / __/ / / Systems Administrator / __ / _/ / / Fast Access Network __/ __/ __/ ____/ / - / Gold Coast, QLD, Australia _______ / Ph: +61 7 5574 1050 \_\ SAGE-AU Member To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 03:00:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA24134 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 03:00:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA24044 for ; Wed, 7 Oct 1998 03:00:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA13976; Wed, 7 Oct 1998 03:00:01 -0700 (PDT) Received: from citadel.cdsec.com (citadel.cdsec.com [192.96.22.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA22335 for ; Wed, 7 Oct 1998 02:50:57 -0700 (PDT) (envelope-from gram@cdsec.com) Received: (from nobody@localhost) by citadel.cdsec.com (8.8.8/8.6.9) id LAA09504 for ; Wed, 7 Oct 1998 11:58:45 +0200 (SAST) Received: by citadel via recvmail id 9502; Wed Oct 7 11:58:22 1998 Message-Id: <199810070957.LAA04777@cdsec.com> Date: Wed, 7 Oct 1998 11:57:03 +0200 (SAT) From: gram@cdsec.com Reply-To: gram@cdsec.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8183: Signal handlers in inetd.c are unsafe Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8183 >Category: bin >Synopsis: Signal handlers in inetd.c are unsafe >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Oct 7 03:00:01 PDT 1998 >Last-Modified: >Originator: Graham Wheeler >Organization: Citadel Data Security >Release: FreeBSD 2.2.7 >Environment: Not important >Description: The signal handlers in inetd.c make use of unsafe functions > such as calls to allocate and free heap memory. This can > result in heap corruption, which is typically manifested > by inetd reporting the error message (from malloc or realloc): > > junk pointer: too low to make sense > >How-To-Repeat: The problem will usually occur if a signal is caught while > in heap allocation function. The signal handler can also > call these functions, which are not reentrant. As this is > timing related, replicating it reliably can be difficult, but > the problem is well known. > >Fix: The following inetd.c fixes the problem, by modifying the signal > handlers to write character flags to a pipe, and having the main > select() loop read these flags and call the original handlers. > The code also adds a new feature to inetd, allowing services > to be bound to specific addresses. This feature is enabled by > using the -X flag. A manual page is appended after the inetd.c > file. ----- inetd.c ---- cut here ------------------------------------ /* * Copyright (c) 1983, 1991, 1993, 1994 * The Regents of the University of California. All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef lint static const char copyright[] = "@(#) Copyright (c) 1983, 1991, 1993, 1994\n\ The Regents of the University of California. All rights reserved.\n"; #endif /* not lint */ #ifndef lint #if 0 static char sccsid[] = "@(#)from: inetd.c 8.4 (Berkeley) 4/13/94"; #endif static const char rcsid[] = "$Id: inetd.c,v 1.15.2.8 1998/07/18 11:10:26 jkh Exp $"; #endif /* not lint */ /* * Inetd - Internet super-server * * This program invokes all internet services as needed. Connection-oriented * services are invoked each time a connection is made, by creating a process. * This process is passed the connection as file descriptor 0 and is expected * to do a getpeername to find out the source host and port. * * Datagram oriented services are invoked when a datagram * arrives; a process is created and passed a pending message * on file descriptor 0. Datagram servers may either connect * to their peer, freeing up the original socket for inetd * to receive further messages on, or ``take over the socket'', * processing all arriving datagrams and, eventually, timing * out. The first type of server is said to be ``multi-threaded''; * the second type of server ``single-threaded''. * * Inetd uses a configuration file which is read at startup * and, possibly, at some later time in response to a hangup signal. * The configuration file is ``free format'' with fields given in the * order shown below. Continuation lines for an entry must being with * a space or tab. All fields must be present in each entry. * * service name must be in /etc/services or must * name a tcpmux service * socket type stream/dgram/raw/rdm/seqpacket * protocol must be in /etc/protocols * wait/nowait single-threaded/multi-threaded * user user to run daemon as * server program full path name * server program arguments maximum of MAXARGS (20) * * TCP services without official port numbers are handled with the * RFC1078-based tcpmux internal service. Tcpmux listens on port 1 for * requests. When a connection is made from a foreign host, the service * requested is passed to tcpmux, which looks it up in the servtab list * and returns the proper entry for the service. Tcpmux returns a * negative reply if the service doesn't exist, otherwise the invoked * server is expected to return the positive reply if the service type in * inetd.conf file has the prefix "tcpmux/". If the service type has the * prefix "tcpmux/+", tcpmux will return the positive reply for the * process; this is for compatibility with older server code, and also * allows you to invoke programs that use stdin/stdout without putting any * special server code in them. Services that use tcpmux are "nowait" * because they do not have a well-known port and hence cannot listen * for new requests. * * For RPC services * service name/version must be in /etc/rpc * socket type stream/dgram/raw/rdm/seqpacket * protocol must be in /etc/protocols * wait/nowait single-threaded/multi-threaded * user user to run daemon as * server program full path name * server program arguments maximum of MAXARGS * * Comment lines are indicated by a `#' in column 1. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef LOGIN_CAP #include /* see init.c */ #define RESOURCE_RC "daemon" #endif #include "pathnames.h" #ifndef MAXCHILD #define MAXCHILD -1 /* maximum number of this service < 0 = no limit */ #endif #ifndef MAXCPM #define MAXCPM -1 /* rate limit invocations from a single remote address, < 0 = no limit */ #endif #define TOOMANY 256 /* don't start more than TOOMANY */ #define CNT_INTVL 60 /* servers in CNT_INTVL sec. */ #define RETRYTIME (60*10) /* retry after bind or server fail */ #define MAX_MAXCHLD 32767 /* max allowable max children */ #define SIGBLOCK (sigmask(SIGCHLD)|sigmask(SIGHUP)|sigmask(SIGALRM)) int debug = 0; int log = 0; int extended_format = 0; int nsock, maxsock; fd_set allsock; int options; int timingout; int toomany = TOOMANY; int maxchild = MAXCPM; int maxcpm = MAXCHILD; struct servent *sp; struct rpcent *rpc; struct in_addr bind_address; int signalpipe[2]; struct servtab { char *se_service; /* name of service */ int se_socktype; /* type of socket to use */ char *se_proto; /* protocol used */ int se_maxchild; /* max number of children */ int se_maxcpm; /* max connects per IP per minute */ int se_numchild; /* current number of children */ pid_t *se_pids; /* array of child pids */ char *se_user; /* user name to run as */ char *se_group; /* group name to run as */ #ifdef LOGIN_CAP char *se_class; /* login class name to run with */ #endif struct biltin *se_bi; /* if built-in, description */ char *se_server; /* server program */ #define MAXARGV 20 char *se_argv[MAXARGV+1]; /* program arguments */ int se_fd; /* open descriptor */ struct sockaddr_in se_ctrladdr;/* bound address */ u_char se_type; /* type: normal, mux, or mux+ */ u_char se_checked; /* looked at during merge */ u_char se_accept; /* i.e., wait/nowait mode */ u_char se_rpc; /* ==1 if RPC service */ int se_rpc_prog; /* RPC program number */ u_int se_rpc_lowvers; /* RPC low version */ u_int se_rpc_highvers; /* RPC high version */ int se_count; /* number started since se_time */ struct timeval se_time; /* start of se_count */ struct servtab *se_next; } *servtab; #define NORM_TYPE 0 #define MUX_TYPE 1 #define MUXPLUS_TYPE 2 #define TTCP_TYPE 3 #define ISMUX(sep) (((sep)->se_type == MUX_TYPE) || \ ((sep)->se_type == MUXPLUS_TYPE)) #define ISMUXPLUS(sep) ((sep)->se_type == MUXPLUS_TYPE) #define ISTTCP(sep) ((sep)->se_type == TTCP_TYPE) void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); void flag_signal __P((char)); void flag_config __P((int)); void config __P((void)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); void discard_stream __P((int, struct servtab *)); void echo_dg __P((int, struct servtab *)); void echo_stream __P((int, struct servtab *)); void endconfig __P((void)); struct servtab *enter __P((struct servtab *)); void freeconfig __P((struct servtab *)); struct servtab *getconfigent __P((void)); void machtime_dg __P((int, struct servtab *)); void machtime_stream __P((int, struct servtab *)); char *newstr __P((char *)); char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); void flag_reapchild __P((int)); void reapchild __P((void)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); void flag_retry __P((int)); void retry __P((void)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); char *skip __P((char **)); struct servtab *tcpmux __P((int)); int cpmip __P((struct servtab *, int)); void unregisterrpc __P((register struct servtab *sep)); struct biltin { char *bi_service; /* internally provided service name */ int bi_socktype; /* type of socket supported */ short bi_fork; /* 1 if should fork before call */ int bi_maxchild; /* max number of children (default) */ void (*bi_fn)(); /* function which performs it */ } biltins[] = { /* Echo received data */ { "echo", SOCK_STREAM, 1, 0, echo_stream }, { "echo", SOCK_DGRAM, 0, 0, echo_dg }, /* Internet /dev/null */ { "discard", SOCK_STREAM, 1, 0, discard_stream }, { "discard", SOCK_DGRAM, 0, 0, discard_dg }, /* Return 32 bit time since 1970 */ { "time", SOCK_STREAM, 0, 0, machtime_stream }, { "time", SOCK_DGRAM, 0, 0, machtime_dg }, /* Return human-readable time */ { "daytime", SOCK_STREAM, 0, 0, daytime_stream }, { "daytime", SOCK_DGRAM, 0, 0, daytime_dg }, /* Familiar character generator */ { "chargen", SOCK_STREAM, 1, 0, chargen_stream }, { "chargen", SOCK_DGRAM, 0, 0, chargen_dg }, { "tcpmux", SOCK_STREAM, 1, 0, (void (*)())tcpmux }, { NULL } }; #define NUMINT (sizeof(intab) / sizeof(struct inent)) char *CONFIG = _PATH_INETDCONF; char *pid_file = _PATH_INETDPID; #ifdef OLD_SETPROCTITLE char **Argv; char *LastArg; #endif int getvalue(arg, value, whine) char *arg, *whine; int *value; { int tmp; char *p; tmp = strtol(arg, &p, 0); if (tmp < 1 || *p) { syslog(LOG_ERR, whine, arg); return 1; /* failure */ } *value = tmp; return 0; /* success */ } int main(argc, argv, envp) int argc; char *argv[], *envp[]; { struct servtab *sep; struct passwd *pwd; struct group *grp; struct sigaction sa, sapipe; int tmpint, ch, dofork; pid_t pid; char buf[50]; struct sockaddr_in peer; int i; #ifdef LOGIN_CAP login_cap_t *lc = NULL; #endif #ifdef OLD_SETPROCTITLE Argv = argv; if (envp == 0 || *envp == 0) envp = argv; while (*envp) envp++; LastArg = envp[-1] + strlen(envp[-1]); #endif openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON); bind_address.s_addr = htonl(INADDR_ANY); while ((ch = getopt(argc, argv, "dlXR:a:c:C:p:")) != -1) switch(ch) { case 'd': debug = 1; options |= SO_DEBUG; break; case 'l': log = 1; break; case 'X': extended_format = 1; break; case 'R': getvalue(optarg, &toomany, "-R %s: bad value for service invocation rate"); break; case 'c': getvalue(optarg, &maxchild, "-c %s: bad value for maximum children"); break; case 'C': getvalue(optarg, &maxcpm, "-C %s: bad value for maximum children/minute"); break; case 'a': if (!inet_aton(optarg, &bind_address)) { syslog(LOG_ERR, "-a %s: invalid IP address", optarg); exit(EX_USAGE); } break; case 'p': pid_file = optarg; break; case '?': default: syslog(LOG_ERR, "usage: inetd [-dl] [-a address] [-R rate]" " [-c maximum] [-C rate]" " [-p pidfile] [conf-file]"); exit(EX_USAGE); } argc -= optind; argv += optind; if (argc > 0) CONFIG = argv[0]; if (debug == 0) { FILE *fp; if (daemon(0, 0) < 0) { syslog(LOG_WARNING, "daemon(0,0) failed: %m"); } /* * In case somebody has started inetd manually, we need to * clear the logname, so that old servers run as root do not * get the user's logname.. */ if (setlogin("") < 0) { syslog(LOG_WARNING, "cannot clear logname: %m"); /* no big deal if it fails.. */ } pid = getpid(); fp = fopen(pid_file, "w"); if (fp) { fprintf(fp, "%ld\n", (long)pid); fclose(fp); } else { syslog(LOG_WARNING, "%s: %m", pid_file); } } sa.sa_flags = 0; sigemptyset(&sa.sa_mask); sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); sa.sa_handler = flag_retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); config(); sa.sa_handler = flag_config; sigaction(SIGHUP, &sa, (struct sigaction *)0); sa.sa_handler = flag_reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); { /* space for daemons to overwrite environment for ps */ #define DUMMYSIZE 100 char dummy[DUMMYSIZE]; (void)memset(dummy, 'x', DUMMYSIZE - 1); dummy[DUMMYSIZE - 1] = '\0'; (void)setenv("inetd_dummy", dummy, 1); } if (pipe(signalpipe) != 0) { syslog(LOG_ERR, "pipe: %%m"); exit(EX_OSERR); } FD_SET(signalpipe[0], &allsock); if (signalpipe[0]>maxsock) maxsock = signalpipe[0]; for (;;) { int n, ctrl; fd_set readable; if (nsock == 0) { (void) sigblock(SIGBLOCK); while (nsock == 0) sigpause(0L); (void) sigsetmask(0L); } readable = allsock; if ((n = select(maxsock + 1, &readable, (fd_set *)0, (fd_set *)0, (struct timeval *)0)) <= 0) { if (n < 0 && errno != EINTR) { syslog(LOG_WARNING, "select: %m"); sleep(1); } continue; } /* handle any queued signal flags */ if (FD_ISSET(signalpipe[0], &readable)) { int n; if (ioctl(signalpipe[0], FIONREAD, &n) == 0) { while (--n >= 0) { char c; if (read(signalpipe[0], &c, 1) == 1) { if (debug) warnx("Handling signal flag %c", c); switch(c) { case 'A': /* sigalrm */ retry(); break; case 'C': /* sigchld */ reapchild(); break; case 'H': /* sighup */ config(); break; } } else { syslog(LOG_ERR, "read: %m"); exit(EX_OSERR); } } } else { syslog(LOG_ERR, "ioctl: %m"); exit(EX_OSERR); } } for (sep = servtab; n && sep; sep = sep->se_next) if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) { n--; if (debug) warnx("someone wants %s", sep->se_service); if (sep->se_accept && sep->se_socktype == SOCK_STREAM) { ctrl = accept(sep->se_fd, (struct sockaddr *)0, (int *)0); if (debug) warnx("accept, ctrl %d", ctrl); if (ctrl < 0) { if (errno != EINTR) syslog(LOG_WARNING, "accept (for %s): %m", sep->se_service); continue; } if (cpmip(sep, ctrl) < 0) { close(ctrl); continue; } if (log) { i = sizeof peer; if (getpeername(ctrl, (struct sockaddr *) &peer, &i)) { syslog(LOG_WARNING, "getpeername(for %s): %m", sep->se_service); close(ctrl); continue; } syslog(LOG_INFO,"%s from %s", sep->se_service, inet_ntoa(peer.sin_addr)); } } else ctrl = sep->se_fd; (void) sigblock(SIGBLOCK); pid = 0; dofork = (sep->se_bi == 0 || sep->se_bi->bi_fork); if (dofork) { if (sep->se_count++ == 0) (void)gettimeofday(&sep->se_time, (struct timezone *)0); else if (sep->se_count >= toomany) { struct timeval now; (void)gettimeofday(&now, (struct timezone *)0); if (now.tv_sec - sep->se_time.tv_sec > CNT_INTVL) { sep->se_time = now; sep->se_count = 1; } else { syslog(LOG_ERR, "%s/%s server failing (looping), service terminated", sep->se_service, sep->se_proto); close_sep(sep); sigsetmask(0L); if (!timingout) { timingout = 1; alarm(RETRYTIME); } continue; } } pid = fork(); } if (pid < 0) { syslog(LOG_ERR, "fork: %m"); if (sep->se_accept && sep->se_socktype == SOCK_STREAM) close(ctrl); sigsetmask(0L); sleep(1); continue; } if (pid) addchild(sep, pid); sigsetmask(0L); if (pid == 0) { if (dofork) { if (debug) warnx("+ closing from %d", maxsock); for (tmpint = maxsock; tmpint > 2; tmpint--) if (tmpint != ctrl) (void) close(tmpint); } /* * Call tcpmux to find the real service to exec. */ if (sep->se_bi && sep->se_bi->bi_fn == (void (*)()) tcpmux) { sep = tcpmux(ctrl); if (sep == NULL) { close(ctrl); _exit(0); } } if (sep->se_bi) { (*sep->se_bi->bi_fn)(ctrl, sep); /* NOTREACHED */ } else { if (debug) warnx("%d execl %s", getpid(), sep->se_server); dup2(ctrl, 0); close(ctrl); dup2(0, 1); dup2(0, 2); if ((pwd = getpwnam(sep->se_user)) == NULL) { syslog(LOG_ERR, "%s/%s: %s: No such user", sep->se_service, sep->se_proto, sep->se_user); if (sep->se_socktype != SOCK_STREAM) recv(0, buf, sizeof (buf), 0); _exit(EX_NOUSER); } grp = NULL; if ( sep->se_group != NULL && (grp = getgrnam(sep->se_group)) == NULL ) { syslog(LOG_ERR, "%s/%s: %s: No such group", sep->se_service, sep->se_proto, sep->se_group); if (sep->se_socktype != SOCK_STREAM) recv(0, buf, sizeof (buf), 0); _exit(EX_NOUSER); } if (grp != NULL) pwd->pw_gid = grp->gr_gid; #ifdef LOGIN_CAP if ((lc = login_getclass(sep->se_class)) == NULL) { /* error syslogged by getclass */ syslog(LOG_ERR, "%s/%s: %s: login class error", sep->se_service, sep->se_proto); if (sep->se_socktype != SOCK_STREAM) recv(0, buf, sizeof (buf), 0); _exit(EX_NOUSER); } #endif if (setsid() < 0) { syslog(LOG_ERR, "%s: can't setsid(): %m", sep->se_service); /* _exit(EX_OSERR); not fatal yet */ } #ifdef LOGIN_CAP if (setusercontext(lc, pwd, pwd->pw_uid, LOGIN_SETALL) != 0) { syslog(LOG_ERR, "%s: can't setusercontext(..%s..): %m", sep->se_service, sep->se_user); _exit(EX_OSERR); } #else if (pwd->pw_uid) { if (setlogin(sep->se_user) < 0) { syslog(LOG_ERR, "%s: can't setlogin(%s): %m", sep->se_service, sep->se_user); /* _exit(EX_OSERR); not yet */ } if (setgid(pwd->pw_gid) < 0) { syslog(LOG_ERR, "%s: can't set gid %d: %m", sep->se_service, pwd->pw_gid); _exit(EX_OSERR); } (void) initgroups(pwd->pw_name, pwd->pw_gid); if (setuid(pwd->pw_uid) < 0) { syslog(LOG_ERR, "%s: can't set uid %d: %m", sep->se_service, pwd->pw_uid); _exit(EX_OSERR); } } #endif sigaction(SIGPIPE, &sapipe, (struct sigaction *)0); execv(sep->se_server, sep->se_argv); if (sep->se_socktype != SOCK_STREAM) recv(0, buf, sizeof (buf), 0); syslog(LOG_ERR, "cannot execute %s: %m", sep->se_server); _exit(EX_OSERR); } } if (sep->se_accept && sep->se_socktype == SOCK_STREAM) close(ctrl); } } } /* * Add a signal flag to the signal flag queue for later handling */ void flag_signal(c) char c; { if (write(signalpipe[1], &c, 1) != 1) { syslog(LOG_ERR, "write: %m"); exit(EX_OSERR); } } /* * Record a new child pid for this service. If we've reached the * limit on children, then stop accepting incoming requests. */ void addchild(struct servtab *sep, pid_t pid) { #ifdef SANITY_CHECK if (sep->se_numchild >= sep->se_maxchild) { syslog(LOG_ERR, "%s: %d >= %d", __FUNCTION__, sep->se_numchild, sep->se_maxchild); exit(EX_SOFTWARE); } #endif if (sep->se_maxchild == 0) return; sep->se_pids[sep->se_numchild++] = pid; if (sep->se_numchild == sep->se_maxchild) disable(sep); } /* * Some child process has exited. See if it's on somebody's list. */ void flag_reapchild(signo) int signo; { flag_signal('C'); } void reapchild() { int k, status; pid_t pid; struct servtab *sep; for (;;) { pid = wait3(&status, WNOHANG, (struct rusage *)0); if (pid <= 0) break; if (debug) warnx("%d reaped, status %#x", pid, status); for (sep = servtab; sep; sep = sep->se_next) { for (k = 0; k < sep->se_numchild; k++) if (sep->se_pids[k] == pid) break; if (k == sep->se_numchild) continue; if (sep->se_numchild == sep->se_maxchild) enable(sep); sep->se_pids[k] = sep->se_pids[--sep->se_numchild]; if (status) syslog(LOG_WARNING, "%s[%d]: exit status 0x%x", sep->se_server, pid, status); break; } } } void flag_config(signo) int signo; { flag_signal('H'); } void config() { struct servtab *sep, *new, **sepp; long omask; if (!setconfig()) { syslog(LOG_ERR, "%s: %m", CONFIG); return; } for (sep = servtab; sep; sep = sep->se_next) sep->se_checked = 0; while ((new = getconfigent())) { if (getpwnam(new->se_user) == NULL) { syslog(LOG_ERR, "%s/%s: No such user '%s', service ignored", new->se_service, new->se_proto, new->se_user); continue; } if (new->se_group && getgrnam(new->se_group) == NULL) { syslog(LOG_ERR, "%s/%s: No such group '%s', service ignored", new->se_service, new->se_proto, new->se_group); continue; } #ifdef LOGIN_CAP if (login_getclass(new->se_class) == NULL) { /* error syslogged by getclass */ syslog(LOG_ERR, "%s/%s: login class error, service ignored", new->se_service, new->se_proto); continue; } #endif for (sep = servtab; sep; sep = sep->se_next) if (strcmp(sep->se_service, new->se_service) == 0 && strcmp(sep->se_proto, new->se_proto) == 0 && (!extended_format || sep->se_ctrladdr.sin_addr.s_addr == new->se_ctrladdr.sin_addr.s_addr)) break; if (sep != 0) { int i; #define SWAP(a, b) { typeof(a) c = a; a = b; b = c; } omask = sigblock(SIGBLOCK); /* copy over outstanding child pids */ if (sep->se_maxchild && new->se_maxchild) { new->se_numchild = sep->se_numchild; if (new->se_numchild > new->se_maxchild) new->se_numchild = new->se_maxchild; memcpy(new->se_pids, sep->se_pids, new->se_numchild * sizeof(*new->se_pids)); } SWAP(sep->se_pids, new->se_pids); sep->se_maxchild = new->se_maxchild; sep->se_numchild = new->se_numchild; sep->se_maxcpm = new->se_maxcpm; /* might need to turn on or off service now */ if (sep->se_fd >= 0) { if (sep->se_maxchild && sep->se_numchild == sep->se_maxchild) { if (FD_ISSET(sep->se_fd, &allsock)) disable(sep); } else { if (!FD_ISSET(sep->se_fd, &allsock)) enable(sep); } } sep->se_accept = new->se_accept; SWAP(sep->se_user, new->se_user); SWAP(sep->se_group, new->se_group); #ifdef LOGIN_CAP SWAP(sep->se_class, new->se_class); #endif SWAP(sep->se_server, new->se_server); for (i = 0; i < MAXARGV; i++) SWAP(sep->se_argv[i], new->se_argv[i]); sigsetmask(omask); freeconfig(new); if (debug) print_service("REDO", sep); } else { sep = enter(new); if (debug) print_service("ADD ", sep); } sep->se_checked = 1; if (ISMUX(sep)) { sep->se_fd = -1; continue; } if (!sep->se_rpc) { sp = getservbyname(sep->se_service, sep->se_proto); if (sp == 0) { syslog(LOG_ERR, "%s/%s: unknown service", sep->se_service, sep->se_proto); sep->se_checked = 0; continue; } if (sp->s_port != sep->se_ctrladdr.sin_port) { sep->se_ctrladdr.sin_family = AF_INET; if (!extended_format) sep->se_ctrladdr.sin_addr = bind_address; sep->se_ctrladdr.sin_port = sp->s_port; if (sep->se_fd >= 0) close_sep(sep); } } else { rpc = getrpcbyname(sep->se_service); if (rpc == 0) { syslog(LOG_ERR, "%s/%s unknown RPC service.", sep->se_service, sep->se_proto); if (sep->se_fd != -1) (void) close(sep->se_fd); sep->se_fd = -1; continue; } if (rpc->r_number != sep->se_rpc_prog) { if (sep->se_rpc_prog) unregisterrpc(sep); sep->se_rpc_prog = rpc->r_number; if (sep->se_fd != -1) (void) close(sep->se_fd); sep->se_fd = -1; } } if (sep->se_fd == -1) setup(sep); } endconfig(); /* * Purge anything not looked at above. */ omask = sigblock(SIGBLOCK); sepp = &servtab; while ((sep = *sepp)) { if (sep->se_checked) { sepp = &sep->se_next; continue; } *sepp = sep->se_next; if (sep->se_fd >= 0) close_sep(sep); if (debug) print_service("FREE", sep); if (sep->se_rpc && sep->se_rpc_prog > 0) unregisterrpc(sep); freeconfig(sep); free((char *)sep); } (void) sigsetmask(omask); } void unregisterrpc(sep) struct servtab *sep; { int i; struct servtab *sepp; long omask; omask = sigblock(SIGBLOCK); for (sepp = servtab; sepp; sepp = sepp->se_next) { if (sepp == sep) continue; if (sep->se_checked == 0 || !sepp->se_rpc || sep->se_rpc_prog != sepp->se_rpc_prog) continue; return; } if (debug) print_service("UNREG", sep); for (i = sep->se_rpc_lowvers; i <= sep->se_rpc_highvers; i++) pmap_unset(sep->se_rpc_prog, i); if (sep->se_fd != -1) (void) close(sep->se_fd); sep->se_fd = -1; (void) sigsetmask(omask); } void flag_retry(signo) int signo; { flag_signal('A'); } void retry() { struct servtab *sep; timingout = 0; for (sep = servtab; sep; sep = sep->se_next) if (sep->se_fd == -1 && !ISMUX(sep)) setup(sep); } void setup(sep) struct servtab *sep; { int on = 1; if ((sep->se_fd = socket(AF_INET, sep->se_socktype, 0)) < 0) { if (debug) warn("socket failed on %s/%s", sep->se_service, sep->se_proto); syslog(LOG_ERR, "%s/%s: socket: %m", sep->se_service, sep->se_proto); return; } #define turnon(fd, opt) \ setsockopt(fd, SOL_SOCKET, opt, (char *)&on, sizeof (on)) if (strcmp(sep->se_proto, "tcp") == 0 && (options & SO_DEBUG) && turnon(sep->se_fd, SO_DEBUG) < 0) syslog(LOG_ERR, "setsockopt (SO_DEBUG): %m"); if (turnon(sep->se_fd, SO_REUSEADDR) < 0) syslog(LOG_ERR, "setsockopt (SO_REUSEADDR): %m"); #ifdef SO_PRIVSTATE if (turnon(sep->se_fd, SO_PRIVSTATE) < 0) syslog(LOG_ERR, "setsockopt (SO_PRIVSTATE): %m"); #endif #undef turnon if (sep->se_type == TTCP_TYPE) if (setsockopt(sep->se_fd, IPPROTO_TCP, TCP_NOPUSH, (char *)&on, sizeof (on)) < 0) syslog(LOG_ERR, "setsockopt (TCP_NOPUSH): %m"); if (bind(sep->se_fd, (struct sockaddr *)&sep->se_ctrladdr, sizeof (sep->se_ctrladdr)) < 0) { if (debug) warn("bind failed on %s/%s", sep->se_service, sep->se_proto); syslog(LOG_ERR, "%s/%s: bind: %m", sep->se_service, sep->se_proto); (void) close(sep->se_fd); sep->se_fd = -1; if (!timingout) { timingout = 1; alarm(RETRYTIME); } return; } if (sep->se_rpc) { int i, len = sizeof(struct sockaddr); if (getsockname(sep->se_fd, (struct sockaddr*)&sep->se_ctrladdr, &len) < 0){ syslog(LOG_ERR, "%s/%s: getsockname: %m", sep->se_service, sep->se_proto); (void) close(sep->se_fd); sep->se_fd = -1; return; } if (debug) print_service("REG ", sep); for (i = sep->se_rpc_lowvers; i <= sep->se_rpc_highvers; i++) { pmap_unset(sep->se_rpc_prog, i); pmap_set(sep->se_rpc_prog, i, (sep->se_socktype == SOCK_DGRAM) ? IPPROTO_UDP : IPPROTO_TCP, ntohs(sep->se_ctrladdr.sin_port)); } } if (sep->se_socktype == SOCK_STREAM) listen(sep->se_fd, 64); enable(sep); if (debug) { warnx("registered %s on %d", sep->se_server, sep->se_fd); } } /* * Finish with a service and its socket. */ void close_sep(sep) struct servtab *sep; { if (sep->se_fd >= 0) { if (FD_ISSET(sep->se_fd, &allsock)) disable(sep); (void) close(sep->se_fd); sep->se_fd = -1; } sep->se_count = 0; sep->se_numchild = 0; /* forget about any existing children */ } struct servtab * enter(cp) struct servtab *cp; { struct servtab *sep; long omask; sep = (struct servtab *)malloc(sizeof (*sep)); if (sep == (struct servtab *)0) { syslog(LOG_ERR, "Out of memory."); exit(EX_OSERR); } *sep = *cp; sep->se_fd = -1; omask = sigblock(SIGBLOCK); sep->se_next = servtab; servtab = sep; sigsetmask(omask); return (sep); } void enable(struct servtab *sep) { if (debug) warnx( "enabling %s, fd %d", sep->se_service, sep->se_fd); #ifdef SANITY_CHECK if (sep->se_fd < 0) { syslog(LOG_ERR, "%s: %s: bad fd", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } if (ISMUX(sep)) { syslog(LOG_ERR, "%s: %s: is mux", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } if (FD_ISSET(sep->se_fd, &allsock)) { syslog(LOG_ERR, "%s: %s: not off", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } #endif FD_SET(sep->se_fd, &allsock); nsock++; if (sep->se_fd > maxsock) maxsock = sep->se_fd; } void disable(struct servtab *sep) { if (debug) warnx( "disabling %s, fd %d", sep->se_service, sep->se_fd); #ifdef SANITY_CHECK if (sep->se_fd < 0) { syslog(LOG_ERR, "%s: %s: bad fd", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } if (ISMUX(sep)) { syslog(LOG_ERR, "%s: %s: is mux", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } if (!FD_ISSET(sep->se_fd, &allsock)) { syslog(LOG_ERR, "%s: %s: not on", __FUNCTION__, sep->se_service); exit(EX_SOFTWARE); } if (nsock == 0) { syslog(LOG_ERR, "%s: nsock=0", __FUNCTION__); exit(EX_SOFTWARE); } #endif FD_CLR(sep->se_fd, &allsock); nsock--; if (sep->se_fd == maxsock) maxsock--; } FILE *fconfig = NULL; struct servtab serv; char line[LINE_MAX]; int setconfig() { if (fconfig != NULL) { fseek(fconfig, 0L, SEEK_SET); return (1); } fconfig = fopen(CONFIG, "r"); return (fconfig != NULL); } void endconfig() { if (fconfig) { (void) fclose(fconfig); fconfig = NULL; } } struct servtab * getconfigent() { struct servtab *sep = &serv; int argc; char *cp, *arg, *s; char *versp; static char TCPMUX_TOKEN[] = "tcpmux/"; #define MUX_LEN (sizeof(TCPMUX_TOKEN)-1) more: while ((cp = nextline(fconfig)) && (*cp == '#' || *cp == '\0')) ; if (cp == NULL) return ((struct servtab *)0); /* * clear the static buffer, since some fields (se_ctrladdr, * for example) don't get initialized here. */ memset((caddr_t)sep, 0, sizeof *sep); arg = skip(&cp); if (cp == NULL) { /* got an empty line containing just blanks/tabs. */ goto more; } if (extended_format) { if (strcmp(arg, "any") == 0) sep->se_ctrladdr.sin_addr.s_addr = INADDR_ANY; else sep->se_ctrladdr.sin_addr.s_addr = inet_addr(arg); arg = sskip(&cp); } if (strncmp(arg, TCPMUX_TOKEN, MUX_LEN) == 0) { char *c = arg + MUX_LEN; if (*c == '+') { sep->se_type = MUXPLUS_TYPE; c++; } else sep->se_type = MUX_TYPE; sep->se_service = newstr(c); } else { sep->se_service = newstr(arg); sep->se_type = NORM_TYPE; } arg = sskip(&cp); if (strcmp(arg, "stream") == 0) sep->se_socktype = SOCK_STREAM; else if (strcmp(arg, "dgram") == 0) sep->se_socktype = SOCK_DGRAM; else if (strcmp(arg, "rdm") == 0) sep->se_socktype = SOCK_RDM; else if (strcmp(arg, "seqpacket") == 0) sep->se_socktype = SOCK_SEQPACKET; else if (strcmp(arg, "raw") == 0) sep->se_socktype = SOCK_RAW; else sep->se_socktype = -1; arg = sskip(&cp); if (strcmp(arg, "tcp/ttcp") == 0) { sep->se_type = TTCP_TYPE; sep->se_proto = newstr("tcp"); } else { sep->se_proto = newstr(arg); } if (strncmp(sep->se_proto, "rpc/", 4) == 0) { memmove(sep->se_proto, sep->se_proto + 4, strlen(sep->se_proto) + 1 - 4); sep->se_rpc = 1; sep->se_rpc_prog = sep->se_rpc_lowvers = sep->se_rpc_lowvers = 0; sep->se_ctrladdr.sin_family = AF_INET; sep->se_ctrladdr.sin_port = 0; if (!extended_format) sep->se_ctrladdr.sin_addr = bind_address; if ((versp = rindex(sep->se_service, '/'))) { *versp++ = '\0'; switch (sscanf(versp, "%d-%d", &sep->se_rpc_lowvers, &sep->se_rpc_highvers)) { case 2: break; case 1: sep->se_rpc_highvers = sep->se_rpc_lowvers; break; default: syslog(LOG_ERR, "bad RPC version specifier; %s\n", sep->se_service); freeconfig(sep); goto more; } } else { sep->se_rpc_lowvers = sep->se_rpc_highvers = 1; } } arg = sskip(&cp); if (!strncmp(arg, "wait", 4)) sep->se_accept = 0; else if (!strncmp(arg, "nowait", 6)) sep->se_accept = 1; else { syslog(LOG_ERR, "%s: bad wait/nowait for service %s", CONFIG, sep->se_service); goto more; } sep->se_maxchild = maxchild; sep->se_maxcpm = maxcpm; if ((s = strchr(arg, '/')) != NULL) { char *eptr; u_long val; val = strtoul(s + 1, &eptr, 10); if (eptr == s + 1 || val > MAX_MAXCHLD) { syslog(LOG_ERR, "%s: bad max-child for service %s", CONFIG, sep->se_service); goto more; } sep->se_maxchild = val; if (*eptr == '/') sep->se_maxcpm = strtol(eptr + 1, &eptr, 10); /* * explicitly do not check for \0 for future expansion / * backwards compatibility */ } if (ISMUX(sep)) { /* * Silently enforce "nowait" mode for TCPMUX services * since they don't have an assigned port to listen on. */ sep->se_accept = 1; if (strcmp(sep->se_proto, "tcp")) { syslog(LOG_ERR, "%s: bad protocol for tcpmux service %s", CONFIG, sep->se_service); goto more; } if (sep->se_socktype != SOCK_STREAM) { syslog(LOG_ERR, "%s: bad socket type for tcpmux service %s", CONFIG, sep->se_service); goto more; } } sep->se_user = newstr(sskip(&cp)); #ifdef LOGIN_CAP if ((s = strrchr(sep->se_user, '/')) != NULL) { *s = '\0'; sep->se_class = newstr(s + 1); } else sep->se_class = newstr(RESOURCE_RC); #endif if ((s = strrchr(sep->se_user, ':')) != NULL) { *s = '\0'; sep->se_group = newstr(s + 1); } else sep->se_group = NULL; sep->se_server = newstr(sskip(&cp)); if (strcmp(sep->se_server, "internal") == 0) { struct biltin *bi; for (bi = biltins; bi->bi_service; bi++) if (bi->bi_socktype == sep->se_socktype && strcmp(bi->bi_service, sep->se_service) == 0) break; if (bi->bi_service == 0) { syslog(LOG_ERR, "internal service %s unknown", sep->se_service); goto more; } sep->se_accept = 1; /* force accept mode for built-ins */ sep->se_bi = bi; } else sep->se_bi = NULL; if (sep->se_maxchild < 0) /* apply default max-children */ if (sep->se_bi) sep->se_maxchild = sep->se_bi->bi_maxchild; else sep->se_maxchild = sep->se_accept ? 0 : 1; if (sep->se_maxchild) { sep->se_pids = malloc(sep->se_maxchild * sizeof(*sep->se_pids)); if (sep->se_pids == NULL) { syslog(LOG_ERR, "Out of memory."); exit(EX_OSERR); } } argc = 0; for (arg = skip(&cp); cp; arg = skip(&cp)) if (argc < MAXARGV) { sep->se_argv[argc++] = newstr(arg); } else { syslog(LOG_ERR, "%s: too many arguments for service %s", CONFIG, sep->se_service); goto more; } while (argc <= MAXARGV) sep->se_argv[argc++] = NULL; return (sep); } void freeconfig(cp) struct servtab *cp; { int i; if (cp->se_service) free(cp->se_service); if (cp->se_proto) free(cp->se_proto); if (cp->se_user) free(cp->se_user); if (cp->se_group) free(cp->se_group); #ifdef LOGIN_CAP if (cp->se_class) free(cp->se_class); #endif if (cp->se_server) free(cp->se_server); if (cp->se_pids) free(cp->se_pids); for (i = 0; i < MAXARGV; i++) if (cp->se_argv[i]) free(cp->se_argv[i]); } /* * Safe skip - if skip returns null, log a syntax error in the * configuration file and exit. */ char * sskip(cpp) char **cpp; { char *cp; cp = skip(cpp); if (cp == NULL) { syslog(LOG_ERR, "%s: syntax error", CONFIG); exit(EX_DATAERR); } return (cp); } char * skip(cpp) char **cpp; { char *cp = *cpp; char *start; char quote = '\0'; again: while (*cp == ' ' || *cp == '\t') cp++; if (*cp == '\0') { int c; c = getc(fconfig); (void) ungetc(c, fconfig); if (c == ' ' || c == '\t') if ((cp = nextline(fconfig))) goto again; *cpp = (char *)0; return ((char *)0); } if (*cp == '"' || *cp == '\'') quote = *cp++; start = cp; if (quote) while (*cp && *cp != quote) cp++; else while (*cp && *cp != ' ' && *cp != '\t') cp++; if (*cp != '\0') *cp++ = '\0'; *cpp = cp; return (start); } char * nextline(fd) FILE *fd; { char *cp; if (fgets(line, sizeof (line), fd) == NULL) return ((char *)0); cp = strchr(line, '\n'); if (cp) *cp = '\0'; return (line); } char * newstr(cp) char *cp; { if ((cp = strdup(cp ? cp : ""))) return (cp); syslog(LOG_ERR, "strdup: %m"); exit(EX_OSERR); } #ifdef OLD_SETPROCTITLE void inetd_setproctitle(a, s) char *a; int s; { int size; char *cp; struct sockaddr_in sin; char buf[80]; cp = Argv[0]; size = sizeof(sin); if (getpeername(s, (struct sockaddr *)&sin, &size) == 0) (void) sprintf(buf, "-%s [%s]", a, inet_ntoa(sin.sin_addr)); else (void) sprintf(buf, "-%s", a); strncpy(cp, buf, LastArg - cp); cp += strlen(cp); while (cp < LastArg) *cp++ = ' '; } #else void inetd_setproctitle(a, s) char *a; int s; { int size; struct sockaddr_in sin; char buf[80]; size = sizeof(sin); if (getpeername(s, (struct sockaddr *)&sin, &size) == 0) (void) sprintf(buf, "%s [%s]", a, inet_ntoa(sin.sin_addr)); else (void) sprintf(buf, "%s", a); setproctitle("%s", buf); } #endif /* * Internet services provided internally by inetd: */ #define BUFSIZE 8192 /* ARGSUSED */ void echo_stream(s, sep) /* Echo service -- echo data back */ int s; struct servtab *sep; { char buffer[BUFSIZE]; int i; inetd_setproctitle(sep->se_service, s); while ((i = read(s, buffer, sizeof(buffer))) > 0 && write(s, buffer, i) > 0) ; exit(0); } int check_loop(sin, sep) struct sockaddr_in *sin; struct servtab *sep; { struct servtab *se2; for (se2 = servtab; se2; se2 = se2->se_next) { if (!se2->se_bi || se2->se_socktype != SOCK_DGRAM) continue; if (sin->sin_port == se2->se_ctrladdr.sin_port) { syslog(LOG_WARNING, "%s/%s:%s/%s loop request REFUSED from %s", sep->se_service, sep->se_proto, se2->se_service, se2->se_proto, inet_ntoa(sin->sin_addr)); return 1; } } return 0; } /* ARGSUSED */ void echo_dg(s, sep) /* Echo service -- echo data back */ int s; struct servtab *sep; { char buffer[BUFSIZE]; int i, size; struct sockaddr_in sin; size = sizeof(sin); if ((i = recvfrom(s, buffer, sizeof(buffer), 0, (struct sockaddr *)&sin, &size)) < 0) return; if (check_loop(&sin, sep)) return; (void) sendto(s, buffer, i, 0, (struct sockaddr *)&sin, sizeof(sin)); } /* ARGSUSED */ void discard_stream(s, sep) /* Discard service -- ignore data */ int s; struct servtab *sep; { int ret; char buffer[BUFSIZE]; inetd_setproctitle(sep->se_service, s); while (1) { while ((ret = read(s, buffer, sizeof(buffer))) > 0) ; if (ret == 0 || errno != EINTR) break; } exit(0); } /* ARGSUSED */ void discard_dg(s, sep) /* Discard service -- ignore data */ int s; struct servtab *sep; { char buffer[BUFSIZE]; (void) read(s, buffer, sizeof(buffer)); } #include #define LINESIZ 72 char ring[128]; char *endring; void initring() { int i; endring = ring; for (i = 0; i <= 128; ++i) if (isprint(i)) *endring++ = i; } /* ARGSUSED */ void chargen_stream(s, sep) /* Character generator */ int s; struct servtab *sep; { int len; char *rs, text[LINESIZ+2]; inetd_setproctitle(sep->se_service, s); if (!endring) { initring(); rs = ring; } text[LINESIZ] = '\r'; text[LINESIZ + 1] = '\n'; for (rs = ring;;) { if ((len = endring - rs) >= LINESIZ) memmove(text, rs, LINESIZ); else { memmove(text, rs, len); memmove(text + len, ring, LINESIZ - len); } if (++rs == endring) rs = ring; if (write(s, text, sizeof(text)) != sizeof(text)) break; } exit(0); } /* ARGSUSED */ void chargen_dg(s, sep) /* Character generator */ int s; struct servtab *sep; { struct sockaddr_in sin; static char *rs; int len, size; char text[LINESIZ+2]; if (endring == 0) { initring(); rs = ring; } size = sizeof(sin); if (recvfrom(s, text, sizeof(text), 0, (struct sockaddr *)&sin, &size) < 0) return; if (check_loop(&sin, sep)) return; if ((len = endring - rs) >= LINESIZ) memmove(text, rs, LINESIZ); else { memmove(text, rs, len); memmove(text + len, ring, LINESIZ - len); } if (++rs == endring) rs = ring; text[LINESIZ] = '\r'; text[LINESIZ + 1] = '\n'; (void) sendto(s, text, sizeof(text), 0, (struct sockaddr *)&sin, sizeof(sin)); } /* * Return a machine readable date and time, in the form of the * number of seconds since midnight, Jan 1, 1900. Since gettimeofday * returns the number of seconds since midnight, Jan 1, 1970, * we must add 2208988800 seconds to this figure to make up for * some seventy years Bell Labs was asleep. */ long machtime() { struct timeval tv; if (gettimeofday(&tv, (struct timezone *)0) < 0) { if (debug) warnx("unable to get time of day"); return (0L); } #define OFFSET ((u_long)25567 * 24*60*60) return (htonl((long)(tv.tv_sec + OFFSET))); #undef OFFSET } /* ARGSUSED */ void machtime_stream(s, sep) int s; struct servtab *sep; { long result; result = machtime(); (void) write(s, (char *) &result, sizeof(result)); } /* ARGSUSED */ void machtime_dg(s, sep) int s; struct servtab *sep; { long result; struct sockaddr_in sin; int size; size = sizeof(sin); if (recvfrom(s, (char *)&result, sizeof(result), 0, (struct sockaddr *)&sin, &size) < 0) return; if (check_loop(&sin, sep)) return; result = machtime(); (void) sendto(s, (char *) &result, sizeof(result), 0, (struct sockaddr *)&sin, sizeof(sin)); } /* ARGSUSED */ void daytime_stream(s, sep) /* Return human-readable time of day */ int s; struct servtab *sep; { char buffer[256]; time_t clock; clock = time((time_t *) 0); (void) sprintf(buffer, "%.24s\r\n", ctime(&clock)); (void) write(s, buffer, strlen(buffer)); } /* ARGSUSED */ void daytime_dg(s, sep) /* Return human-readable time of day */ int s; struct servtab *sep; { char buffer[256]; time_t clock; struct sockaddr_in sin; int size; clock = time((time_t *) 0); size = sizeof(sin); if (recvfrom(s, buffer, sizeof(buffer), 0, (struct sockaddr *)&sin, &size) < 0) return; if (check_loop(&sin, sep)) return; (void) sprintf(buffer, "%.24s\r\n", ctime(&clock)); (void) sendto(s, buffer, strlen(buffer), 0, (struct sockaddr *)&sin, sizeof(sin)); } /* * print_service: * Dump relevant information to stderr */ void print_service(action, sep) char *action; struct servtab *sep; { fprintf(stderr, #ifdef LOGIN_CAP "%s: %s proto=%s accept=%d max=%d user=%s group=%s class=%s builtin=%x server=%s\n", #else "%s: %s proto=%s accept=%d max=%d user=%s group=%s builtin=%x server=%s\n", #endif action, sep->se_service, sep->se_proto, sep->se_accept, sep->se_maxchild, sep->se_user, sep->se_group, #ifdef LOGIN_CAP sep->se_class, #endif (int)sep->se_bi, sep->se_server); } /* * Based on TCPMUX.C by Mark K. Lottor November 1988 * sri-nic::ps:tcpmux.c */ static int /* # of characters upto \r,\n or \0 */ getline(fd, buf, len) int fd; char *buf; int len; { int count = 0, n; struct sigaction sa; sa.sa_flags = 0; sigemptyset(&sa.sa_mask); sa.sa_handler = SIG_DFL; sigaction(SIGALRM, &sa, (struct sigaction *)0); do { alarm(10); n = read(fd, buf, len-count); alarm(0); if (n == 0) return (count); if (n < 0) return (-1); while (--n >= 0) { if (*buf == '\r' || *buf == '\n' || *buf == '\0') return (count); count++; buf++; } } while (count < len); return (count); } #define MAX_SERV_LEN (256+2) /* 2 bytes for \r\n */ #define strwrite(fd, buf) (void) write(fd, buf, sizeof(buf)-1) struct servtab * tcpmux(s) int s; { struct servtab *sep; char service[MAX_SERV_LEN+1]; int len; /* Get requested service name */ if ((len = getline(s, service, MAX_SERV_LEN)) < 0) { strwrite(s, "-Error reading service name\r\n"); return (NULL); } service[len] = '\0'; if (debug) warnx("tcpmux: someone wants %s", service); /* * Help is a required command, and lists available services, * one per line. */ if (!strcasecmp(service, "help")) { for (sep = servtab; sep; sep = sep->se_next) { if (!ISMUX(sep)) continue; (void)write(s,sep->se_service,strlen(sep->se_service)); strwrite(s, "\r\n"); } return (NULL); } /* Try matching a service in inetd.conf with the request */ for (sep = servtab; sep; sep = sep->se_next) { if (!ISMUX(sep)) continue; if (!strcasecmp(service, sep->se_service)) { if (ISMUXPLUS(sep)) { strwrite(s, "+Go\r\n"); } return (sep); } } strwrite(s, "-Service not available\r\n"); return (NULL); } #define CPMHSIZE 256 #define CPMHMASK (CPMHSIZE-1) #define CHTGRAN 10 #define CHTSIZE 6 typedef struct CTime { unsigned long ct_Ticks; int ct_Count; } CTime; typedef struct CHash { struct in_addr ch_Addr; time_t ch_LTime; char *ch_Service; CTime ch_Times[CHTSIZE]; } CHash; CHash CHashAry[CPMHSIZE]; int cpmip(sep, ctrl) struct servtab *sep; int ctrl; { struct sockaddr_in rsin; int rsinLen = sizeof(rsin); int r = 0; /* * If getpeername() fails, just let it through (if logging is * enabled the condition is caught elsewhere) */ if (sep->se_maxcpm > 0 && getpeername(ctrl, (struct sockaddr *)&rsin, &rsinLen) == 0 ) { time_t t = time(NULL); int hv = 0xABC3D20F; int i; int cnt = 0; CHash *chBest = NULL; unsigned int ticks = t / CHTGRAN; { char *p; int i; for (i = 0, p = (char *)&rsin.sin_addr; i < sizeof(rsin.sin_addr); ++i, ++p) { hv = (hv << 5) ^ (hv >> 23) ^ *p; } hv = (hv ^ (hv >> 16)); } for (i = 0; i < 5; ++i) { CHash *ch = &CHashAry[(hv + i) & CPMHMASK]; if (rsin.sin_addr.s_addr == ch->ch_Addr.s_addr && ch->ch_Service && strcmp(sep->se_service, ch->ch_Service) == 0) { chBest = ch; break; } if (chBest == NULL || ch->ch_LTime == 0 || ch->ch_LTime < chBest->ch_LTime) { chBest = ch; } } if (rsin.sin_addr.s_addr != chBest->ch_Addr.s_addr || chBest->ch_Service == NULL || strcmp(sep->se_service, chBest->ch_Service) != 0) { chBest->ch_Addr = rsin.sin_addr; if (chBest->ch_Service) free(chBest->ch_Service); chBest->ch_Service = strdup(sep->se_service); bzero(chBest->ch_Times, sizeof(chBest->ch_Times)); } chBest->ch_LTime = t; { CTime *ct = &chBest->ch_Times[ticks % CHTSIZE]; if (ct->ct_Ticks != ticks) { ct->ct_Ticks = ticks; ct->ct_Count = 0; } ++ct->ct_Count; } for (i = 0; i < CHTSIZE; ++i) { CTime *ct = &chBest->ch_Times[i]; if (ct->ct_Ticks <= ticks && ct->ct_Ticks >= ticks - CHTSIZE) { cnt += ct->ct_Count; } } if (cnt * (CHTSIZE * CHTGRAN) / 60 > sep->se_maxcpm) { r = -1; syslog(LOG_ERR, "%s from %s exceeded counts/min (limit %d/min)", sep->se_service, inet_ntoa(rsin.sin_addr), sep->se_maxcpm); } } return(r); } ----- inetd.8 ----- cut here ----------------------------------- .\" Copyright (c) 1985, 1991, 1993, 1994 .\" The Regents of the University of California. All rights reserved. .\" .\" Redistribution and use in source and binary forms, with or without .\" modification, are permitted provided that the following conditions .\" are met: .\" 1. Redistributions of source code must retain the above copyright .\" notice, this list of conditions and the following disclaimer. .\" 2. Redistributions in binary form must reproduce the above copyright .\" notice, this list of conditions and the following disclaimer in the .\" documentation and/or other materials provided with the distribution. .\" 3. All advertising materials mentioning features or use of this software .\" must display the following acknowledgement: .\" This product includes software developed by the University of .\" California, Berkeley and its contributors. .\" 4. Neither the name of the University nor the names of its contributors .\" may be used to endorse or promote products derived from this software .\" without specific prior written permission. .\" .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF .\" SUCH DAMAGE. .\" .\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 .\" $Id: inetd.8,v 1.9.2.6 1998/07/18 11:10:23 jkh Exp $ .\" .Dd October 7, 1998 .Dt INETD 8 .Os BSD 4.4 .Sh NAME .Nm inetd .Nd internet .Dq super-server .Sh SYNOPSIS .Nm inetd .Op Fl d .Op Fl l .Op Fl X .Op Fl c Ar maximum .Op Fl C Ar rate .Op Fl a Ar address .Op Fl p Ar filename .Op Fl R Ar rate .Op Ar configuration file .Sh DESCRIPTION The .Nm program should be run at boot time by .Pa /etc/rc (see .Xr rc 8 ) . It then listens for connections on certain internet sockets. When a connection is found on one of its sockets, it decides what service the socket corresponds to, and invokes a program to service the request. The server program is invoked with the service socket as its standard input, output and error descriptors. After the program is finished, .Nm continues to listen on the socket (except in some cases which will be described below). Essentially, .Nm allows running one daemon to invoke several others, reducing load on the system. .Pp The following options are available: .Bl -tag -width indent .It Fl d Turn on debugging. .It Fl l Turn on logging. .It Fl X Enable the extended config file format. .It Fl c Ar maximum Specify the default maximum number of services that can be invoked. May be overridden on a per-service basis with the "max-child" parameter. .It Fl C Ar rate Specify the default maximum number of times a service can be invoked from a single IP address in one minute; the default is unlimited. May be overridden on a per-service basis with the "max-connections-per-ip-per-minute" parameter. .It Fl R Ar rate Specify the maximum number of times a service can be invoked in one minute; the default is 256. .It Fl a Specify a specific IP address to bind to. .It Fl p Specify an alternate file in which to store the process ID. .El .Pp Upon execution, .Nm reads its configuration information from a configuration file which, by default, is .Pa /etc/inetd.conf . There must be an entry for each field of the configuration file, with entries for each field separated by a tab or a space. Comments are denoted by a ``#'' at the beginning of a line. There must be an entry for each field. The fields of the configuration file are as follows: .Pp .Bd -unfilled -offset indent -compact service name socket type protocol {wait|nowait}[/max-child[/max-connections-per-ip-per-minute]] user[:group][/login-class] server program server program arguments .Ed .Pp If the .Fl X option is given, then each entry has an additional initial field, which is the numeric IP address to which the listening socket should be bound. The special value `any' causes the socket to be bound to INADDR_ANY (the same as if the .Fl X option was not given). .Pp To specify an .No Tn "ONC RPC" Ns -based service, the entry would contain these fields: .Pp .Bd -unfilled -offset indent -compact service name/version socket type rpc/protocol user[:group][/login-class] server program server program arguments .Ed .Pp There are two types of services that .Nm can start: standard and TCPMUX. A standard service has a well-known port assigned to it; it may be a service that implements an official Internet standard or is a BSD-specific service. As described in .Tn RFC 1078 , TCPMUX services are nonstandard services that do not have a well-known port assigned to them. They are invoked from .Nm when a program connects to the .Dq tcpmux well-known port and specifies the service name. This feature is useful for adding locally-developed servers. TCPMUX requests are only accepted when the multiplexor service itself is enabled, above and beyond and specific TCPMUX-based servers; see the discussion of internal services below. .Pp The .Em service-name entry is the name of a valid service in the file .Pa /etc/services . For .Dq internal services (discussed below), the service name .Em must be the official name of the service (that is, the first entry in .Pa /etc/services ) . When used to specify an .No Tn "ONC RPC" Ns -based service, this field is a valid RPC service name in the file .Pa /etc/rpc . The part on the right of the .Dq / is the RPC version number. This can simply be a single numeric argument or a range of versions. A range is bounded by the low version to the high version - .Dq rusers/1-3 . For TCPMUX services, the value of the .Em service-name field consists of the string .Dq tcpmux followed by a slash and the locally-chosen service name. The service names listed in .Pa /etc/services and the name .Dq help are reserved. Try to choose unique names for your TCPMUX services by prefixing them with your organization's name and suffixing them with a version number. .Pp The .Em socket-type should be one of .Dq stream , .Dq dgram , .Dq raw , .Dq rdm , or .Dq seqpacket , depending on whether the socket is a stream, datagram, raw, reliably delivered message, or sequenced packet socket. TCPMUX services must use .Dq stream . .Pp The .Em protocol must be a valid protocol as given in .Pa /etc/protocols . Examples might be .Dq tcp or .Dq udp . If it is desired that the service is reachable via T/TCP, one should specify .Dq tcp/ttcp . Rpc based services are specified with the .Dq rpc/tcp or .Dq rpc/udp service type. TCPMUX services must use .Dq tcp . .Pp The .Em wait/nowait entry specifies whether the server that is invoked by .Nm will take over the socket associated with the service access point, and thus whether .Nm should wait for the server to exit before listening for new service requests. Datagram servers must use .Dq wait , as they are always invoked with the original datagram socket bound to the specified service address. These servers must read at least one datagram from the socket before exiting. If a datagram server connects to its peer, freeing the socket so .Nm can received further messages on the socket, it is said to be a .Dq multi-threaded server; it should read one datagram from the socket and create a new socket connected to the peer. It should fork, and the parent should then exit to allow .Nm to check for new service requests to spawn new servers. Datagram servers which process all incoming datagrams on a socket and eventually time out are said to be .Dq single-threaded . .Xr Comsat 8 , .Pq Xr biff 1 and .Xr talkd 8 are both examples of the latter type of datagram server. .Xr Tftpd 8 is an example of a multi-threaded datagram server. .Pp Servers using stream sockets generally are multi-threaded and use the .Dq nowait entry. Connection requests for these services are accepted by .Nm inetd , and the server is given only the newly-accepted socket connected to a client of the service. Most stream-based services operate in this manner. Stream-based servers that use .Dq wait are started with the listening service socket, and must accept at least one connection request before exiting. Such a server would normally accept and process incoming connection requests until a timeout. TCPMUX services must use .Dq nowait . .Pp The maximum number of outstanding child processes (or ``threads'') for a ``nowait'' service may be explicitly specified by appending a ``/'' followed by the number to the ``nowait'' keyword. Normally (or if a value of zero is specified) there is no maximum. Otherwise, once the maximum is reached, further connection attempts will be queued up until an existing child process exits. This also works in the case of ``wait'' mode, although a value other than one (the default) might not make sense in some cases. You can also specify the maximum number of connections per minute for a given IP address by appending a ``/'' followed by the number to the maximum number of outstanding child processes. Once the maximum is reached, further connections from this IP address will be dropped until the end of the minute. .Pp The .Em user entry should contain the user name of the user as whom the server should run. This allows for servers to be given less permission than root. Optional .Em group part separated by ``:'' allows to specify group name different than default group for this user. Optional .Em login-class part separated by ``/'' allows to specify login class different than default ``daemon'' login class. .Pp The .Em server-program entry should contain the pathname of the program which is to be executed by .Nm when a request is found on its socket. If .Nm provides this service internally, this entry should be .Dq internal . .Pp The .Em server program arguments should be just as arguments normally are, starting with argv[0], which is the name of the program. If the service is provided internally, the word .Dq internal should take the place of this entry. .Pp The .Nm program provides several .Dq trivial services internally by use of routines within itself. These services are .Dq echo , .Dq discard , .Dq chargen (character generator), .Dq daytime (human readable time), and .Dq time (machine readable time, in the form of the number of seconds since midnight, January 1, 1900). All of these services are available in both TCP and UDP versions; the UDP versions will refuse service if the request specifies a reply port corresponding to any internal service. (This is done as a defense against looping attacks; the remote IP address is logged.) For details of these services, consult the appropriate .Tn RFC document. .Pp The TCPMUX-demultiplexing service is also implemented as an internal service. For any TCPMUX-based service to function, the following line must be included in .Pa inetd.conf : .Bd -literal -offset indent tcpmux stream tcp nowait root internal .Ed .Pp When given the .Fl l option .Nm will log an entry to syslog each time an .Xr accept 2 is made, which notes the service selected and the IP-number of the remote requestor. .Pp The .Nm program rereads its configuration file when it receives a hangup signal, .Dv SIGHUP . Services may be added, deleted or modified when the configuration file is reread. Except when started in debugging mode, .Nm records its process ID in the file .Pa /var/run/inetd.pid to assist in reconfiguration. .Sh TCPMUX .Pp .Tn RFC 1078 describes the TCPMUX protocol: ``A TCP client connects to a foreign host on TCP port 1. It sends the service name followed by a carriage-return line-feed . The service name is never case sensitive. The server replies with a single character indicating positive (+) or negative (\-) acknowledgment, immediately followed by an optional message of explanation, terminated with a . If the reply was positive, the selected protocol begins; otherwise the connection is closed.'' The program is passed the TCP connection as file descriptors 0 and 1. .Pp If the TCPMUX service name begins with a ``+'', .Nm returns the positive reply for the program. This allows you to invoke programs that use stdin/stdout without putting any special server code in them. .Pp The special service name .Dq help causes .Nm to list TCPMUX services in .Pa inetd.conf . .Sh "FILES" .Bl -tag -width /var/run/inetd.pid -compact .It Pa /etc/inetd.conf configuration file. .It Pa /etc/rpc translation of service names to RPC program numbers. .It Pa /etc/services translation of service names to port numbers. .It Pa /var/run/inetd.pid the pid of the currently running .Nm inetd . .El .Sh "EXAMPLES" .Pp Here are several example service entries for the various types of services: .Bd -literal ftp stream tcp nowait root /usr/libexec/ftpd ftpd -l ntalk dgram udp wait root /usr/libexec/ntalkd ntalkd tcpmux/+date stream tcp nowait guest /bin/date date tcpmux/phonebook stream tcp nowait guest /usr/local/bin/phonebook phonebook rstatd/1-3 dgram rpc/udp wait root /usr/libexec/rpc.rstatd rpc.rstatd .Ed .Sh "ERROR MESSAGES" The .Nm server logs error messages using .Xr syslog 3 . Important error messages and their explanations are: .Pp .Bl -ohang -compact .It Xo .Ar service Ns / Ns Ar protocol .No " server failing (looping), service terminated." .Xc The number of requests for the specified service in the past minute exceeded the limit. The limit exists to prevent a broken program or a malicious user from swamping the system. This message may occur for several reasons: .Bl -enum -offset indent .It There are many hosts requesting the service within a short time period. .It A broken client program is requesting the service too frequently. .It A malicious user is running a program to invoke the service in a denial-of-service attack. .It The invoked service program has an error that causes clients to retry quickly. .El .Pp Use the .Fl R Ar rate option, as described above, to change the rate limit. Once the limit is reached, the service will be reenabled automatically in 10 minutes. .Pp .It Xo .Ar service Ns / Ns Ar protocol : .No \&No such user .Ar user , .No service ignored .Xc .It Xo .Ar service Ns / Ns Ar protocol : .No getpwnam : .Ar user : .No \&No such user .Xc No entry for .Ar user exists in the .Xr passwd 5 database. The first message occurs when .Nm (re)reads the configuration file. The second message occurs when the service is invoked. .Pp .It Xo .Ar service : .No can't set uid .Ar uid .Xc .It Xo .Ar service : .No can't set gid .Ar gid .Xc The user or group ID for the entry's .Ar user field is invalid. .Pp .It "setsockopt(SO_PRIVSTATE): Operation not supported" The .Nm program attempted to renounce the privileged state associated with a socket but was unable to. .El .Sh SEE ALSO .Xr login.conf 5 , .Xr passwd 5 , .Xr rpc 5 , .Xr services 5 , .Xr comsat 8 , .Xr fingerd 8 , .Xr ftpd 8 , .Xr portmap 8 , .Xr rexecd 8 , .Xr rlogind 8 , .Xr rshd 8 , .Xr telnetd 8 , .Xr tftpd 8 .Sh HISTORY The .Nm command appeared in .Bx 4.3 . TCPMUX is based on code and documentation by Mark Lottor. Support for .Tn "ONC RPC" based services is modeled after that provided by .Tn SunOS 4.1. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 07:21:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA28584 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 07:21:11 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from ifi.uio.no (ifi.uio.no [129.240.64.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA28575 for ; Wed, 7 Oct 1998 07:21:04 -0700 (PDT) (envelope-from dag-erli@ifi.uio.no) Received: from hindarfjell.ifi.uio.no (2602@hindarfjell.ifi.uio.no [129.240.64.130]) by ifi.uio.no (8.8.8/8.8.7/ifi0.2) with ESMTP id QAA26671; Wed, 7 Oct 1998 16:20:59 +0200 (MET DST) Received: (from dag-erli@localhost) by hindarfjell.ifi.uio.no ; Wed, 7 Oct 1998 16:20:58 +0200 (MET DST) Mime-Version: 1.0 To: Jin Guojun (FTG staff) Cc: bugs@FreeBSD.ORG Subject: Re: what is changed in 3.0 for "ld" making lkm module References: <199810011925.MAA17556@george.lbl.gov> Organization: University of Oslo, Department of Informatics X-url: http://www.stud.ifi.uio.no/~dag-erli/ X-other-addresses: 'finger dag-erli@ifi.uio.no' for a list X-disclaimer-1: The views expressed in this article are mine alone, and do X-disclaimer-2: not necessarily coincide with those of any organisation or X-disclaimer-3: company with which I am or have been affiliated. X-Stop-Spam: http://www.cauce.org/ From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Date: 07 Oct 1998 16:20:57 +0200 In-Reply-To: Jin Guojun's message of "Thu, 1 Oct 1998 12:25:22 -0700 (PDT)" Message-ID: Lines: 8 X-Mailer: Gnus v5.5/Emacs 19.34 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id HAA28578 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Jin Guojun (FTG staff) writes: > What is the solution to tell gdb to debug the kernel compiled with -aout? Compile an a.out version of gdb. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 07:43:42 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA01881 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 07:43:42 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA01716; Wed, 7 Oct 1998 07:43:16 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA29109; Wed, 7 Oct 1998 07:43:12 -0700 (PDT) Date: Wed, 7 Oct 1998 07:43:12 -0700 (PDT) Message-Id: <199810071443.HAA29109@freefall.freebsd.org> To: seggers@semyam.dinoco.de, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: kern/8168 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: ppbus plip boot message misses \n State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Wed Oct 7 07:43:00 PDT 1998 State-Changed-Why: Patch applied, thanks! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 07:50:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA03632 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 07:50:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA03599 for ; Wed, 7 Oct 1998 07:50:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA29422; Wed, 7 Oct 1998 07:50:01 -0700 (PDT) Date: Wed, 7 Oct 1998 07:50:01 -0700 (PDT) Message-Id: <199810071450.HAA29422@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe Reply-To: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8183; it has been noted by GNATS. From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) To: gram@cdsec.com Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe Date: 07 Oct 1998 16:45:56 +0200 gram@cdsec.com writes: > The following inetd.c fixes the problem, by modifying the signal > > handlers to write character flags to a pipe, and having the main > > select() loop read these flags and call the original handlers. > > The code also adds a new feature to inetd, allowing services > > to be bound to specific addresses. This feature is enabled by > > using the -X flag. A manual page is appended after the inetd.c > > file. Please send unidiffs, not entire source files. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 08:23:40 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA09777 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 08:23:40 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from citadel.cdsec.com (citadel.cdsec.com [192.96.22.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA09762; Wed, 7 Oct 1998 08:23:30 -0700 (PDT) (envelope-from gram@cdsec.com) Received: (from nobody@localhost) by citadel.cdsec.com (8.8.8/8.6.9) id RAA26326; Wed, 7 Oct 1998 17:30:51 +0200 (SAST) Received: by citadel via recvmail id 26322; Wed Oct 7 17:30:23 1998 From: Graham Wheeler Message-Id: <199810071529.RAA05457@cdsec.com> Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe To: FreeBSD-gnats-submit@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Date: Wed, 7 Oct 1998 17:29:03 +0200 (SAT) Cc: dag-erli@ifi.uio.no In-Reply-To: <199810071000.DAA13971@freefall.freebsd.org> from "FreeBSD-gnats-submit@FreeBSD.ORG" at Oct 7, 98 03:00:01 am X-Mailer: ELM [version 2.4 PL25-h4.1] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > Thank you very much for your problem report. > It has the internal identification `bin/8183'. > The individual assigned to look at your > report is: freebsd-bugs. > > >Category: bin > >Responsible: freebsd-bugs > >Synopsis: Signal handlers in inetd.c are unsafe > >Arrival-Date: Wed Oct 7 03:00:01 PDT 1998 > Here are context diff patches for the sources: diff -r -c /usr/src/usr.sbin/inetd.orig/inetd.8 /usr/src/usr.sbin/inetd/inetd.8 *** /usr/src/usr.sbin/inetd.orig/inetd.8 Wed Oct 7 11:22:45 1998 --- /usr/src/usr.sbin/inetd/inetd.8 Wed Oct 7 11:29:25 1998 *************** *** 32,38 **** .\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 .\" $Id: inetd.8,v 1.9.2.6 1998/07/18 11:10:23 jkh Exp $ .\" ! .Dd February 7, 1996 .Dt INETD 8 .Os BSD 4.4 .Sh NAME --- 32,38 ---- .\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 .\" $Id: inetd.8,v 1.9.2.6 1998/07/18 11:10:23 jkh Exp $ .\" ! .Dd October 7, 1998 .Dt INETD 8 .Os BSD 4.4 .Sh NAME *************** *** 43,48 **** --- 43,49 ---- .Nm inetd .Op Fl d .Op Fl l + .Op Fl X .Op Fl c Ar maximum .Op Fl C Ar rate .Op Fl a Ar address *************** *** 78,83 **** --- 79,86 ---- Turn on debugging. .It Fl l Turn on logging. + .It Fl X + Enable the extended config file format. .It Fl c Ar maximum Specify the default maximum number of services that can be invoked. May be overridden on a per-service basis with the "max-child" *************** *** 116,121 **** --- 119,133 ---- server program server program arguments .Ed + .Pp + If the + .Fl X + option is given, then each entry has an additional initial field, + which is the numeric IP address to which the listening socket should + be bound. The special value `any' causes the socket to be bound to + INADDR_ANY (the same as if the + .Fl X + option was not given). .Pp To specify an .No Tn "ONC RPC" Ns -based diff -r -c /usr/src/usr.sbin/inetd.orig/inetd.c /usr/src/usr.sbin/inetd/inetd.c *** /usr/src/usr.sbin/inetd.orig/inetd.c Tue Oct 6 16:04:43 1998 --- /usr/src/usr.sbin/inetd/inetd.c Wed Oct 7 17:17:00 1998 *************** *** 162,167 **** --- 162,168 ---- int debug = 0; int log = 0; + int extended_format = 0; int nsock, maxsock; fd_set allsock; int options; *************** *** 172,177 **** --- 173,179 ---- struct servent *sp; struct rpcent *rpc; struct in_addr bind_address; + int signalpipe[2]; struct servtab { char *se_service; /* name of service */ *************** *** 217,223 **** void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); ! void config __P((int)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); --- 219,227 ---- void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); ! void flag_signal __P((char)); ! void flag_config __P((int)); ! void config __P((void)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); *************** *** 234,243 **** char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); ! void reapchild __P((int)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); ! void retry __P((int)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); --- 238,249 ---- char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); ! void flag_reapchild __P((int)); ! void reapchild __P((void)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); ! void flag_retry __P((int)); ! void retry __P((void)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); *************** *** 336,342 **** openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON); bind_address.s_addr = htonl(INADDR_ANY); ! while ((ch = getopt(argc, argv, "dlR:a:c:C:p:")) != -1) switch(ch) { case 'd': debug = 1; --- 342,348 ---- openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON); bind_address.s_addr = htonl(INADDR_ANY); ! while ((ch = getopt(argc, argv, "dlXR:a:c:C:p:")) != -1) switch(ch) { case 'd': debug = 1; *************** *** 345,350 **** --- 351,359 ---- case 'l': log = 1; break; + case 'X': + extended_format = 1; + break; case 'R': getvalue(optarg, &toomany, "-R %s: bad value for service invocation rate"); *************** *** 408,419 **** sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); ! sa.sa_handler = retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); ! config(SIGHUP); ! sa.sa_handler = config; sigaction(SIGHUP, &sa, (struct sigaction *)0); ! sa.sa_handler = reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); --- 417,428 ---- sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); ! sa.sa_handler = flag_retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); ! config(); ! sa.sa_handler = flag_config; sigaction(SIGHUP, &sa, (struct sigaction *)0); ! sa.sa_handler = flag_reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); *************** *** 428,433 **** --- 437,450 ---- (void)setenv("inetd_dummy", dummy, 1); } + if (pipe(signalpipe) != 0) + { + syslog(LOG_ERR, "pipe: %%m"); + exit(EX_OSERR); + } + FD_SET(signalpipe[0], &allsock); + if (signalpipe[0]>maxsock) maxsock = signalpipe[0]; + for (;;) { int n, ctrl; fd_set readable; *************** *** 447,452 **** --- 464,504 ---- } continue; } + /* handle any queued signal flags */ + if (FD_ISSET(signalpipe[0], &readable)) + { + int n; + if (ioctl(signalpipe[0], FIONREAD, &n) == 0) + { + while (--n >= 0) + { + char c; + if (read(signalpipe[0], &c, 1) == 1) + { + if (debug) warnx("Handling signal flag %c", c); + switch(c) + { + case 'A': /* sigalrm */ + retry(); break; + case 'C': /* sigchld */ + reapchild(); break; + case 'H': /* sighup */ + config(); break; + } + } + else + { + syslog(LOG_ERR, "read: %m"); + exit(EX_OSERR); + } + } + } + else + { + syslog(LOG_ERR, "ioctl: %m"); + exit(EX_OSERR); + } + } for (sep = servtab; n && sep; sep = sep->se_next) if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) { n--; *************** *** 645,650 **** --- 697,716 ---- } /* + * Add a signal flag to the signal flag queue for later handling + */ + + void flag_signal(c) + char c; + { + if (write(signalpipe[1], &c, 1) != 1) + { + syslog(LOG_ERR, "write: %m"); + exit(EX_OSERR); + } + } + + /* * Record a new child pid for this service. If we've reached the * limit on children, then stop accepting incoming requests. */ *************** *** 671,679 **** */ void ! reapchild(signo) int signo; { int k, status; pid_t pid; struct servtab *sep; --- 737,751 ---- */ void ! flag_reapchild(signo) int signo; { + flag_signal('C'); + } + + void + reapchild() + { int k, status; pid_t pid; struct servtab *sep; *************** *** 703,711 **** } void ! config(signo) int signo; { struct servtab *sep, *new, **sepp; long omask; --- 775,788 ---- } void ! flag_config(signo) int signo; { + flag_signal('H'); + } + + void config() + { struct servtab *sep, *new, **sepp; long omask; *************** *** 739,745 **** #endif for (sep = servtab; sep; sep = sep->se_next) if (strcmp(sep->se_service, new->se_service) == 0 && ! strcmp(sep->se_proto, new->se_proto) == 0) break; if (sep != 0) { int i; --- 816,825 ---- #endif for (sep = servtab; sep; sep = sep->se_next) if (strcmp(sep->se_service, new->se_service) == 0 && ! strcmp(sep->se_proto, new->se_proto) == 0 && ! (!extended_format || ! sep->se_ctrladdr.sin_addr.s_addr == ! new->se_ctrladdr.sin_addr.s_addr)) break; if (sep != 0) { int i; *************** *** 802,808 **** } if (sp->s_port != sep->se_ctrladdr.sin_port) { sep->se_ctrladdr.sin_family = AF_INET; ! sep->se_ctrladdr.sin_addr = bind_address; sep->se_ctrladdr.sin_port = sp->s_port; if (sep->se_fd >= 0) close_sep(sep); --- 882,889 ---- } if (sp->s_port != sep->se_ctrladdr.sin_port) { sep->se_ctrladdr.sin_family = AF_INET; ! if (!extended_format) ! sep->se_ctrladdr.sin_addr = bind_address; sep->se_ctrladdr.sin_port = sp->s_port; if (sep->se_fd >= 0) close_sep(sep); *************** *** 882,890 **** } void ! retry(signo) int signo; { struct servtab *sep; timingout = 0; --- 963,977 ---- } void ! flag_retry(signo) int signo; { + flag_signal('A'); + } + + void + retry() + { struct servtab *sep; timingout = 0; *************** *** 1119,1124 **** --- 1206,1219 ---- /* got an empty line containing just blanks/tabs. */ goto more; } + if (extended_format) + { + if (strcmp(arg, "any") == 0) + sep->se_ctrladdr.sin_addr.s_addr = INADDR_ANY; + else + sep->se_ctrladdr.sin_addr.s_addr = inet_addr(arg); + arg = sskip(&cp); + } if (strncmp(arg, TCPMUX_TOKEN, MUX_LEN) == 0) { char *c = arg + MUX_LEN; if (*c == '+') { *************** *** 1160,1166 **** sep->se_rpc_lowvers = 0; sep->se_ctrladdr.sin_family = AF_INET; sep->se_ctrladdr.sin_port = 0; ! sep->se_ctrladdr.sin_addr = bind_address; if ((versp = rindex(sep->se_service, '/'))) { *versp++ = '\0'; switch (sscanf(versp, "%d-%d", --- 1255,1262 ---- sep->se_rpc_lowvers = 0; sep->se_ctrladdr.sin_family = AF_INET; sep->se_ctrladdr.sin_port = 0; ! if (!extended_format) ! sep->se_ctrladdr.sin_addr = bind_address; if ((versp = rindex(sep->se_service, '/'))) { *versp++ = '\0'; switch (sscanf(versp, "%d-%d", -- Dr Graham Wheeler E-mail: gram@cdsec.com Citadel Data Security Phone: +27(21)23-6065/6/7 Internet/Intranet Network Specialists Mobile: +27(83)253-9864 Firewalls/Virtual Private Networks Fax: +27(21)24-3656 Data Security Products WWW: http://www.cdsec.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 08:30:18 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA11493 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 08:30:18 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA11409 for ; Wed, 7 Oct 1998 08:30:04 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA01261; Wed, 7 Oct 1998 08:30:01 -0700 (PDT) Date: Wed, 7 Oct 1998 08:30:01 -0700 (PDT) Message-Id: <199810071530.IAA01261@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Graham Wheeler Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe Reply-To: Graham Wheeler Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR bin/8183; it has been noted by GNATS. From: Graham Wheeler To: FreeBSD-gnats-submit@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Cc: dag-erli@ifi.uio.no Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe Date: Wed, 7 Oct 1998 17:29:03 +0200 (SAT) > Thank you very much for your problem report. > It has the internal identification `bin/8183'. > The individual assigned to look at your > report is: freebsd-bugs. > > >Category: bin > >Responsible: freebsd-bugs > >Synopsis: Signal handlers in inetd.c are unsafe > >Arrival-Date: Wed Oct 7 03:00:01 PDT 1998 > Here are context diff patches for the sources: diff -r -c /usr/src/usr.sbin/inetd.orig/inetd.8 /usr/src/usr.sbin/inetd/inetd.8 *** /usr/src/usr.sbin/inetd.orig/inetd.8 Wed Oct 7 11:22:45 1998 --- /usr/src/usr.sbin/inetd/inetd.8 Wed Oct 7 11:29:25 1998 *************** *** 32,38 **** .\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 .\" $Id: inetd.8,v 1.9.2.6 1998/07/18 11:10:23 jkh Exp $ .\" ! .Dd February 7, 1996 .Dt INETD 8 .Os BSD 4.4 .Sh NAME --- 32,38 ---- .\" from: @(#)inetd.8 8.3 (Berkeley) 4/13/94 .\" $Id: inetd.8,v 1.9.2.6 1998/07/18 11:10:23 jkh Exp $ .\" ! .Dd October 7, 1998 .Dt INETD 8 .Os BSD 4.4 .Sh NAME *************** *** 43,48 **** --- 43,49 ---- .Nm inetd .Op Fl d .Op Fl l + .Op Fl X .Op Fl c Ar maximum .Op Fl C Ar rate .Op Fl a Ar address *************** *** 78,83 **** --- 79,86 ---- Turn on debugging. .It Fl l Turn on logging. + .It Fl X + Enable the extended config file format. .It Fl c Ar maximum Specify the default maximum number of services that can be invoked. May be overridden on a per-service basis with the "max-child" *************** *** 116,121 **** --- 119,133 ---- server program server program arguments .Ed + .Pp + If the + .Fl X + option is given, then each entry has an additional initial field, + which is the numeric IP address to which the listening socket should + be bound. The special value `any' causes the socket to be bound to + INADDR_ANY (the same as if the + .Fl X + option was not given). .Pp To specify an .No Tn "ONC RPC" Ns -based diff -r -c /usr/src/usr.sbin/inetd.orig/inetd.c /usr/src/usr.sbin/inetd/inetd.c *** /usr/src/usr.sbin/inetd.orig/inetd.c Tue Oct 6 16:04:43 1998 --- /usr/src/usr.sbin/inetd/inetd.c Wed Oct 7 17:17:00 1998 *************** *** 162,167 **** --- 162,168 ---- int debug = 0; int log = 0; + int extended_format = 0; int nsock, maxsock; fd_set allsock; int options; *************** *** 172,177 **** --- 173,179 ---- struct servent *sp; struct rpcent *rpc; struct in_addr bind_address; + int signalpipe[2]; struct servtab { char *se_service; /* name of service */ *************** *** 217,223 **** void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); ! void config __P((int)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); --- 219,227 ---- void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); ! void flag_signal __P((char)); ! void flag_config __P((int)); ! void config __P((void)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); *************** *** 234,243 **** char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); ! void reapchild __P((int)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); ! void retry __P((int)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); --- 238,249 ---- char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); ! void flag_reapchild __P((int)); ! void reapchild __P((void)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); ! void flag_retry __P((int)); ! void retry __P((void)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); *************** *** 336,342 **** openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON); bind_address.s_addr = htonl(INADDR_ANY); ! while ((ch = getopt(argc, argv, "dlR:a:c:C:p:")) != -1) switch(ch) { case 'd': debug = 1; --- 342,348 ---- openlog("inetd", LOG_PID | LOG_NOWAIT, LOG_DAEMON); bind_address.s_addr = htonl(INADDR_ANY); ! while ((ch = getopt(argc, argv, "dlXR:a:c:C:p:")) != -1) switch(ch) { case 'd': debug = 1; *************** *** 345,350 **** --- 351,359 ---- case 'l': log = 1; break; + case 'X': + extended_format = 1; + break; case 'R': getvalue(optarg, &toomany, "-R %s: bad value for service invocation rate"); *************** *** 408,419 **** sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); ! sa.sa_handler = retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); ! config(SIGHUP); ! sa.sa_handler = config; sigaction(SIGHUP, &sa, (struct sigaction *)0); ! sa.sa_handler = reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); --- 417,428 ---- sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); ! sa.sa_handler = flag_retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); ! config(); ! sa.sa_handler = flag_config; sigaction(SIGHUP, &sa, (struct sigaction *)0); ! sa.sa_handler = flag_reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); *************** *** 428,433 **** --- 437,450 ---- (void)setenv("inetd_dummy", dummy, 1); } + if (pipe(signalpipe) != 0) + { + syslog(LOG_ERR, "pipe: %%m"); + exit(EX_OSERR); + } + FD_SET(signalpipe[0], &allsock); + if (signalpipe[0]>maxsock) maxsock = signalpipe[0]; + for (;;) { int n, ctrl; fd_set readable; *************** *** 447,452 **** --- 464,504 ---- } continue; } + /* handle any queued signal flags */ + if (FD_ISSET(signalpipe[0], &readable)) + { + int n; + if (ioctl(signalpipe[0], FIONREAD, &n) == 0) + { + while (--n >= 0) + { + char c; + if (read(signalpipe[0], &c, 1) == 1) + { + if (debug) warnx("Handling signal flag %c", c); + switch(c) + { + case 'A': /* sigalrm */ + retry(); break; + case 'C': /* sigchld */ + reapchild(); break; + case 'H': /* sighup */ + config(); break; + } + } + else + { + syslog(LOG_ERR, "read: %m"); + exit(EX_OSERR); + } + } + } + else + { + syslog(LOG_ERR, "ioctl: %m"); + exit(EX_OSERR); + } + } for (sep = servtab; n && sep; sep = sep->se_next) if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) { n--; *************** *** 645,650 **** --- 697,716 ---- } /* + * Add a signal flag to the signal flag queue for later handling + */ + + void flag_signal(c) + char c; + { + if (write(signalpipe[1], &c, 1) != 1) + { + syslog(LOG_ERR, "write: %m"); + exit(EX_OSERR); + } + } + + /* * Record a new child pid for this service. If we've reached the * limit on children, then stop accepting incoming requests. */ *************** *** 671,679 **** */ void ! reapchild(signo) int signo; { int k, status; pid_t pid; struct servtab *sep; --- 737,751 ---- */ void ! flag_reapchild(signo) int signo; { + flag_signal('C'); + } + + void + reapchild() + { int k, status; pid_t pid; struct servtab *sep; *************** *** 703,711 **** } void ! config(signo) int signo; { struct servtab *sep, *new, **sepp; long omask; --- 775,788 ---- } void ! flag_config(signo) int signo; { + flag_signal('H'); + } + + void config() + { struct servtab *sep, *new, **sepp; long omask; *************** *** 739,745 **** #endif for (sep = servtab; sep; sep = sep->se_next) if (strcmp(sep->se_service, new->se_service) == 0 && ! strcmp(sep->se_proto, new->se_proto) == 0) break; if (sep != 0) { int i; --- 816,825 ---- #endif for (sep = servtab; sep; sep = sep->se_next) if (strcmp(sep->se_service, new->se_service) == 0 && ! strcmp(sep->se_proto, new->se_proto) == 0 && ! (!extended_format || ! sep->se_ctrladdr.sin_addr.s_addr == ! new->se_ctrladdr.sin_addr.s_addr)) break; if (sep != 0) { int i; *************** *** 802,808 **** } if (sp->s_port != sep->se_ctrladdr.sin_port) { sep->se_ctrladdr.sin_family = AF_INET; ! sep->se_ctrladdr.sin_addr = bind_address; sep->se_ctrladdr.sin_port = sp->s_port; if (sep->se_fd >= 0) close_sep(sep); --- 882,889 ---- } if (sp->s_port != sep->se_ctrladdr.sin_port) { sep->se_ctrladdr.sin_family = AF_INET; ! if (!extended_format) ! sep->se_ctrladdr.sin_addr = bind_address; sep->se_ctrladdr.sin_port = sp->s_port; if (sep->se_fd >= 0) close_sep(sep); *************** *** 882,890 **** } void ! retry(signo) int signo; { struct servtab *sep; timingout = 0; --- 963,977 ---- } void ! flag_retry(signo) int signo; { + flag_signal('A'); + } + + void + retry() + { struct servtab *sep; timingout = 0; *************** *** 1119,1124 **** --- 1206,1219 ---- /* got an empty line containing just blanks/tabs. */ goto more; } + if (extended_format) + { + if (strcmp(arg, "any") == 0) + sep->se_ctrladdr.sin_addr.s_addr = INADDR_ANY; + else + sep->se_ctrladdr.sin_addr.s_addr = inet_addr(arg); + arg = sskip(&cp); + } if (strncmp(arg, TCPMUX_TOKEN, MUX_LEN) == 0) { char *c = arg + MUX_LEN; if (*c == '+') { *************** *** 1160,1166 **** sep->se_rpc_lowvers = 0; sep->se_ctrladdr.sin_family = AF_INET; sep->se_ctrladdr.sin_port = 0; ! sep->se_ctrladdr.sin_addr = bind_address; if ((versp = rindex(sep->se_service, '/'))) { *versp++ = '\0'; switch (sscanf(versp, "%d-%d", --- 1255,1262 ---- sep->se_rpc_lowvers = 0; sep->se_ctrladdr.sin_family = AF_INET; sep->se_ctrladdr.sin_port = 0; ! if (!extended_format) ! sep->se_ctrladdr.sin_addr = bind_address; if ((versp = rindex(sep->se_service, '/'))) { *versp++ = '\0'; switch (sscanf(versp, "%d-%d", -- Dr Graham Wheeler E-mail: gram@cdsec.com Citadel Data Security Phone: +27(21)23-6065/6/7 Internet/Intranet Network Specialists Mobile: +27(83)253-9864 Firewalls/Virtual Private Networks Fax: +27(21)24-3656 Data Security Products WWW: http://www.cdsec.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 13:10:20 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA09481 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 13:10:20 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA09390 for ; Wed, 7 Oct 1998 13:10:04 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA10937; Wed, 7 Oct 1998 13:10:01 -0700 (PDT) Received: from ardbeg.komma.de (ardbeg.komma.de [194.77.233.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA08267 for ; Wed, 7 Oct 1998 13:04:39 -0700 (PDT) (envelope-from pmh@komma.de) Received: (from pmh@localhost) by ardbeg.komma.de (8.8.8/8.8.8) id WAA04462; Wed, 7 Oct 1998 22:04:26 +0200 (CEST) (envelope-from pmh) Message-Id: <199810072004.WAA04462@ardbeg.komma.de> Date: Wed, 7 Oct 1998 22:04:26 +0200 (CEST) From: "Patrick M. Hausen" Reply-To: pmh@komma.de To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8191: halt -p does't Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8191 >Category: kern >Synopsis: halt -p does't >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Oct 7 13:10:01 PDT 1998 >Last-Modified: >Originator: Patrick M. Hausen >Organization: WEB Internet Services Systemhaus GmbH >Release: FreeBSD 2.2.7-STABLE i386 >Environment: FreeBSD 2.2.7-STABLE i386 >Description: The function to power off APM-capable systems after shutdown is documented in the manpage reboot(8). Unfortunately the necessary code is in /sys/kern/kern_shutdown.c in 3.0-current but not in -stable, so it plain doesn't work. I looked for that function in 2.2.7-RELEASE not knowing it was in 3.0 and reinvented the wheel. So I think, instead of sending my patches, I'd rather ask kindly if the already existent code in 3.0 can be brought over to 2.2.x-stable. >How-To-Repeat: see above >Fix: import kern_shutdown.c from 3.0 >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 13:54:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA20661 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 13:54:11 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA20551; Wed, 7 Oct 1998 13:53:41 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA13018; Wed, 7 Oct 1998 13:53:40 -0700 (PDT) Date: Wed, 7 Oct 1998 13:53:40 -0700 (PDT) Message-Id: <199810072053.NAA13018@freefall.freebsd.org> To: gram@cdsec.com, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, des@FreeBSD.ORG Subject: Re: bin/8183 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Signal handlers in inetd.c are unsafe State-Changed-From-To: open-feedback State-Changed-By: des State-Changed-When: Wed Oct 7 13:52:12 PDT 1998 State-Changed-Why: I'm corresponding with the originator. Responsible-Changed-From-To: freebsd-bugs->des Responsible-Changed-By: des Responsible-Changed-When: Wed Oct 7 13:52:12 PDT 1998 Responsible-Changed-Why: I'll handle it. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 15:20:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA08382 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 15:20:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA08322 for ; Wed, 7 Oct 1998 15:20:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id PAA16207; Wed, 7 Oct 1998 15:20:02 -0700 (PDT) Date: Wed, 7 Oct 1998 15:20:02 -0700 (PDT) Message-Id: <199810072220.PAA16207@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Aled Morris Subject: Re: kern/8165: minor inconsistency in dirent.h Reply-To: Aled Morris Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8165; it has been noted by GNATS. From: Aled Morris To: Bruce Evans Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: kern/8165: minor inconsistency in dirent.h Date: Wed, 7 Oct 1998 23:17:53 +0100 (BST) On Wed, 7 Oct 1998, Bruce Evans wrote: >>>Fix: >> >>to sys/dirent.h add #include >>and change "#define MAXNAMLEN 255" to "#define MAXNAMLEN NAME_MAX" > >This would pollute some more and is not permitted in the >_POSIX_SOURCE case. I understand what you're saying, but do you agree that having the same constant (i.e. constants with the same meaning) being defined in two places is bad? Aled -- tel +44 973 207987 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 16:00:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id QAA16075 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 16:00:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id QAA16011 for ; Wed, 7 Oct 1998 16:00:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id QAA17441; Wed, 7 Oct 1998 16:00:00 -0700 (PDT) Received: from mail.cs.tu-berlin.de (mail.cs.tu-berlin.de [130.149.17.13]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id PAA14384 for ; Wed, 7 Oct 1998 15:54:59 -0700 (PDT) (envelope-from eserte@cs.tu-berlin.de) Received: (from eserte@localhost) by mail.cs.tu-berlin.de (8.9.1/8.9.1) id AAA22136; Thu, 8 Oct 1998 00:50:01 +0200 (MET DST) Received: (from eserte@localhost) by cabulja.herceg.de (8.8.8/8.6.12) id AAA04997; Thu, 8 Oct 1998 00:30:57 +0200 (CEST) Message-Id: <199810072230.AAA04997@cabulja.herceg.de> Date: Thu, 8 Oct 1998 00:30:57 +0200 (CEST) From: Slaven Rezic Reply-To: eserte@cs.tu-berlin.de To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8195: ee dumps core on window resize Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8195 >Category: bin >Synopsis: ee dumps core on window resize >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Oct 7 16:00:00 PDT 1998 >Last-Modified: >Originator: Slaven Rezic >Organization: Private FreeBSD site, Berlin, Germany >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: LANG=de_DE.ISO8859-1 XFree86 3.3.2 The same error also occurs with 2.2.6 >Description: ee segfaults if the window is resized. >How-To-Repeat: Run ee in a xterm window. Resize the window by one row. Hit cursor up --- ee quits with a segmentation fault. >Fix: From a quick look with gdb, it seems that ncurses only set `LINES' and `COLUMNS' on a resize, but not `lines' and `columns'. I tried to fix this problem, but then there was a segfault in another line. So I leave it to you curses experts. Maybe there is a newer ncurses version with this bug fixed? >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 17:20:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA01959 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 17:20:10 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA01878 for ; Wed, 7 Oct 1998 17:20:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id RAA19188; Wed, 7 Oct 1998 17:20:01 -0700 (PDT) Received: from whistle.com (s205m131.whistle.com [207.76.205.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA00682 for ; Wed, 7 Oct 1998 17:14:33 -0700 (PDT) (envelope-from archie@whistle.com) Received: (from smap@localhost) by whistle.com (8.7.5/8.6.12) id RAA06015 for ; Wed, 7 Oct 1998 17:14:25 -0700 (PDT) Received: from bubba.whistle.com(207.76.205.7) by whistle.com via smap (V1.3) id sma006011; Wed Oct 7 17:14:22 1998 Received: (from archie@localhost) by bubba.whistle.com (8.8.7/8.6.12) id RAA23434; Wed, 7 Oct 1998 17:14:22 -0700 (PDT) Message-Id: <199810080014.RAA23434@bubba.whistle.com> Date: Wed, 7 Oct 1998 17:14:22 -0700 (PDT) From: Archie Cobbs Reply-To: archie@whistle.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8196: patch to make syslog.conf tolerate space as field delimiter Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8196 >Category: bin >Synopsis: patch to make syslog.conf tolerate space as field delimiter >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Oct 7 17:20:00 PDT 1998 >Last-Modified: >Originator: Archie Cobbs >Organization: Whistle Communications, Inc. >Release: FreeBSD 2.2.6-RELEASE i386 >Environment: FreeBSD 2.2.7 and -current >Description: syslog.conf requires a TAB separating the LHS and RHS. There's no reason a SPACE should not also work, except in the unlikely scenario of existing syslog.conf's that have spaces within the LHS. >How-To-Repeat: >Fix: >From owner-freebsd-security@FreeBSD.ORG Tue Oct 6 20:04:38 1998 Received: from whistle.com (whistle.com [207.76.205.131]) by bubba.whistle.com (8.8.7/8.6.12) with ESMTP id UAA10160 for ; Tue, 6 Oct 1998 20:04:38 -0700 (PDT) Received: (from smap@localhost) by whistle.com (8.7.5/8.6.12) id UAA23359; Tue, 6 Oct 1998 20:04:38 -0700 (PDT) Received: from gatekeeper.whistle.com(207.76.204.2) by whistle.com via smap (V1.3) id sma023357; Tue Oct 6 20:04:29 1998 Received: (from smap@localhost) by gatekeeper.whistle.com (8.7.5/8.6.12) id UAA28570; Tue, 6 Oct 1998 20:04:29 -0700 (PDT) Received: from sarip.sol.net( 169.207.30.120) by gatekeeper via smap (V2.0) id xma028565; Tue, 6 Oct 98 20:04:14 -0700 Received: from hub.freebsd.org (hub.FreeBSD.ORG [204.216.27.18]) by sarip.sol.net (8.8.8/8.8.8/SNNS-1.02) with ESMTP id WAA16438; Tue, 6 Oct 1998 22:03:42 -0500 (CDT) Received: from localhost (daemon@localhost) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id RAA14896; Tue, 6 Oct 1998 17:53:04 -0700 (PDT) (envelope-from owner-freebsd-security) Received: by hub.freebsd.org (bulk_mailer v1.6); Tue, 6 Oct 1998 17:45:43 -0700 Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA13031 for freebsd-security-outgoing; Tue, 6 Oct 1998 17:45:21 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from whistle.com (s205m131.whistle.com [207.76.205.131]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA12961 for ; Tue, 6 Oct 1998 17:44:53 -0700 (PDT) (envelope-from archie@whistle.com) Received: (from smap@localhost) by whistle.com (8.7.5/8.6.12) id RAA21578; Tue, 6 Oct 1998 17:44:49 -0700 (PDT) Received: from bubba.whistle.com(207.76.205.7) by whistle.com via smap (V1.3) id sma021576; Tue Oct 6 17:44:26 1998 Received: (from archie@localhost) by bubba.whistle.com (8.8.7/8.6.12) id RAA07611; Tue, 6 Oct 1998 17:44:26 -0700 (PDT) From: Archie Cobbs Message-Id: <199810070044.RAA07611@bubba.whistle.com> Subject: Re: The necessary steps for logging (the problem is fixed) In-Reply-To: <361A5812.90244D76@dal.net> from Studded at "Oct 6, 98 10:49:06 am" To: Studded@dal.net (Studded) Date: Tue, 6 Oct 1998 17:44:26 -0700 (PDT) Cc: dan@dpcsys.com, freebsd-security@FreeBSD.ORG X-Mailer: ELM [version 2.4ME+ PL38 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-security@FreeBSD.ORG X-Loop: FreeBSD.org Status: RO Studded writes: > > Unless someone can demonstrate a valid use of spaces on the LHS > > crontab style checking would work though. (spaces are only legal > > in the last field of crontab as well) > > Works for me. :) Here's a patch that makes space a separator between LHS and RHS just like tab is.. -Archie ___________________________________________________________________________ Archie Cobbs * Whistle Communications, Inc. * http://www.whistle.com Index: syslogd.c =================================================================== RCS file: /cvs/freebsd/src/usr.sbin/syslogd/syslogd.c,v retrieving revision 1.41 diff -u -u -r1.41 syslogd.c --- syslogd.c 1998/08/25 21:16:47 1.41 +++ syslogd.c 1998/10/07 00:44:08 @@ -1365,12 +1365,12 @@ } /* scan through the list of selectors */ - for (p = line; *p && *p != '\t';) { + for (p = line; *p && *p != '\t' && *p != ' ';) { int pri_done; int pri_cmp; /* find the end of this facility name list */ - for (q = p; *q && *q != '\t' && *q++ != '.'; ) + for (q = p; *q && *q != '\t' && *q != ' ' && *q++ != '.'; ) continue; /* get the priority comparison */ @@ -1402,7 +1402,7 @@ ; /* collect priority name */ - for (bp = buf; *q && !strchr("\t,;", *q); ) + for (bp = buf; *q && !strchr(" \t,;", *q); ) *bp++ = *q++; *bp = '\0'; @@ -1424,8 +1424,8 @@ } /* scan facilities */ - while (*p && !strchr("\t.;", *p)) { - for (bp = buf; *p && !strchr("\t,;.", *p); ) + while (*p && !strchr(" \t.;", *p)) { + for (bp = buf; *p && !strchr(" \t,;.", *p); ) *bp++ = *p++; *bp = '\0'; @@ -1454,7 +1454,7 @@ } /* skip to action part */ - while (*p == '\t') + while (*p == '\t' || *p == ' ') p++; switch (*p) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 17:35:49 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA05859 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 17:35:49 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from allegro.lemis.com (allegro.lemis.com [192.109.197.134]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA05841 for ; Wed, 7 Oct 1998 17:35:43 -0700 (PDT) (envelope-from grog@freebie.lemis.com) Received: from freebie.lemis.com (freebie.lemis.com [192.109.197.137]) by allegro.lemis.com (8.9.1/8.9.0) with ESMTP id KAA29200; Thu, 8 Oct 1998 10:05:35 +0930 (CST) Received: (from grog@localhost) by freebie.lemis.com (8.9.1/8.9.0) id KAA06922; Thu, 8 Oct 1998 10:05:29 +0930 (CST) Message-ID: <19981008100529.V27781@freebie.lemis.com> Date: Thu, 8 Oct 1998 10:05:29 +0930 From: Greg Lehey To: =?iso-8859-1?Q?Dag-Erling_C=2E_Sm=F8rgrav_?= , Jin Guojun Cc: bugs@FreeBSD.ORG Subject: a.out version of gdb (was: what is changed in 3.0 for "ld" making lkm module) References: <199810011925.MAA17556@george.lbl.gov> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit X-Mailer: Mutt 0.91.1i In-Reply-To: =?iso-8859-1?Q?=3Cxzp1zokfo6u=2Efsf=40hindarfjell=2Eifi=2Euio=2Eno=3E=3B?= =?iso-8859-1?Q?_from_Dag-Erling_C=2E_Sm=F8rgrav__on_Wed=2C_Oct_07=2C_199?= =?iso-8859-1?Q?8_at_04:20:57PM_+0200?= WWW-Home-Page: http://www.lemis.com/~grog Organization: LEMIS, PO Box 460, Echunga SA 5153, Australia Phone: +61-8-8388-8286 Fax: +61-8-8388-8725 Mobile: +61-41-739-7062 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wednesday, 7 October 1998 at 16:20:57 +0200, Dag-Erling C. Smørgrav wrote: > Jin Guojun (FTG staff) writes: >> What is the solution to tell gdb to debug the kernel compiled with -aout? > > Compile an a.out version of gdb. You can pick one up at ftp://ftp.lemis.com/pub/vinum/gdb-aout. Greg -- See complete headers for address, home page and phone numbers finger grog@lemis.com for PGP public key To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 20:30:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA04530 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 20:30:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA04462 for ; Wed, 7 Oct 1998 20:30:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id UAA25074; Wed, 7 Oct 1998 20:30:01 -0700 (PDT) Date: Wed, 7 Oct 1998 20:30:01 -0700 (PDT) Message-Id: <199810080330.UAA25074@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Bruce Evans Subject: Re: kern/8165: minor inconsistency in dirent.h Reply-To: Bruce Evans Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8165; it has been noted by GNATS. From: Bruce Evans To: aledm@routers.co.uk, bde@zeta.org.au Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: kern/8165: minor inconsistency in dirent.h Date: Thu, 8 Oct 1998 13:23:04 +1000 >I understand what you're saying, but do you agree that having the same >constant (i.e. constants with the same meaning) being defined in two >places is bad? It's no worse than the same types being defined in several headers, as they must be to limit namespace pollution. size_t is a good example. The right technique for this is to define them in terms of a commin definition in an implementation-only header like . A closer look shows that MAXNAMLEN is not the same as NAME_MAX. They just happen to have the same value. NAME_MAX (if it is defined) is supposed to give the maximum length of a file name - file names of this length (but no longer) may exist on all (POSIX) file systems. MAXNAMLEN in is just the maximum length of a file name that may be returned by readdir(). It should be defined as the maximum of all the per-file-system maximum name lengths, but that is too hard to put in a single #define. Bruce To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Wed Oct 7 23:40:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA03817 for freebsd-bugs-outgoing; Wed, 7 Oct 1998 23:40:05 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA03741 for ; Wed, 7 Oct 1998 23:40:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id XAA00759; Wed, 7 Oct 1998 23:40:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA03264; Wed, 7 Oct 1998 23:34:56 -0700 (PDT) (envelope-from nobody) Message-Id: <199810080634.XAA03264@hub.freebsd.org> Date: Wed, 7 Oct 1998 23:34:56 -0700 (PDT) From: rrs@lmi.net To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: misc/8202: semop() is not wrapped for thread safety in libc_r Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8202 >Category: misc >Synopsis: semop() is not wrapped for thread safety in libc_r >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Oct 7 23:40:00 PDT 1998 >Last-Modified: >Originator: Rob Schulhof >Organization: LanMinds Internet >Release: FreeBSD 3.0-19980930 >Environment: FreeBSD schoolie.lmi.net 3.0-BETA FreeBSD 3.0-BETA #8: Wed Sep 30 20:33:07 PDT 1998 root@schoolie.lanminds.com:/usr/src/src/sys/compile/SCHOOL i386 >Description: Semaphore operations are not thread safe. If one thread sleeps waiting on a semop() then all of the threads are suspended. >How-To-Repeat: Create a set of threads that wait on a single semaphore value to reach zero, increment the value for a finite time, then decrement the value and exit. >Fix: Implement semop and semctl wrappers in libc_r. I don't know if any kernel mods are necessary. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 01:01:27 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA15587 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 01:01:27 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from citadel.cdsec.com (citadel.cdsec.com [192.96.22.18]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA15562; Thu, 8 Oct 1998 01:01:20 -0700 (PDT) (envelope-from gram@cdsec.com) Received: (from nobody@localhost) by citadel.cdsec.com (8.8.8/8.6.9) id KAA22044; Thu, 8 Oct 1998 10:09:02 +0200 (SAST) Received: by citadel via recvmail id 22042; Thu Oct 8 10:08:53 1998 From: Graham Wheeler Message-Id: <199810080807.KAA07108@cdsec.com> Subject: Re: bin/8183: Signal handlers in inetd.c are unsafe To: FreeBSD-gnats-submit@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Date: Thu, 8 Oct 1998 10:07:31 +0200 (SAT) Cc: dag-erli@ifi.uio.no In-Reply-To: <199810071000.DAA13971@freefall.freebsd.org> from "FreeBSD-gnats-submit@FreeBSD.ORG" at Oct 7, 98 03:00:01 am X-Mailer: ELM [version 2.4 PL25-h4.1] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org SEND-PR: -*- send-pr -*- SEND-PR: Lines starting with `SEND-PR' will be removed automatically, as SEND-PR: will all comments (text enclosed in `<' and `>'). SEND-PR: SEND-PR: Please consult the send-pr man page `send-pr(1)' or the Texinfo SEND-PR: manual if you are not sure how to fill out a problem report. SEND-PR: SEND-PR: Note that the Synopsis field is mandatory. The Subject (for SEND-PR: the mail) will be made the same as Synopsis unless explicitly SEND-PR: changed. SEND-PR: SEND-PR: Choose from the following categories: SEND-PR: SEND-PR: bin conf docs gnu i386 kern misc ports sparc SEND-PR: To: FreeBSD-gnats-submit@freebsd.org Subject: From: gram@cdsec.com Reply-To: gram@cdsec.com X-send-pr-version: 3.2 >Submitter-Id: current-users >Originator: Graham Wheeler >Organization: Citadel Data Security >Confidential: no >Synopsis: Signal handlers in inetd.c are unsafe >Severity: serious >Priority: medium >Category: bin >Release: FreeBSD 2.2.7 >Class: sw-bug >Environment: Not important >Description: The signal handlers in inetd.c make use of unsafe functions > such as calls to allocate and free heap memory. This can > result in heap corruption, which is typically manifested > by inetd reporting the error message (from malloc or realloc): > > junk pointer: too low to make sense > >How-To-Repeat: The problem will usually occur if a signal is caught while > in heap allocation function. The signal handler can also > call these functions, which are not reentrant. As this is > timing related, replicating it reliably can be difficult, but > the problem is well known. > >Fix: The following patch fixes the problem, by modifying the signal > handlers to write character flags to a pipe, and having the main > select() loop read these flags and call the original handlers. ------------------ cut here ------------------------------------ --- /usr/src/usr.sbin/inetd.orig/inetd.c Tue Oct 6 16:04:43 1998 +++ /usr/src/usr.sbin/inetd/inetd.c Thu Oct 8 09:50:15 1998 @@ -172,6 +172,7 @@ struct servent *sp; struct rpcent *rpc; struct in_addr bind_address; +int signalpipe[2]; struct servtab { char *se_service; /* name of service */ @@ -217,7 +218,9 @@ void chargen_dg __P((int, struct servtab *)); void chargen_stream __P((int, struct servtab *)); void close_sep __P((struct servtab *)); -void config __P((int)); +void flag_signal __P((char)); +void flag_config __P((int)); +void config __P((void)); void daytime_dg __P((int, struct servtab *)); void daytime_stream __P((int, struct servtab *)); void discard_dg __P((int, struct servtab *)); @@ -234,10 +237,12 @@ char *nextline __P((FILE *)); void print_service __P((char *, struct servtab *)); void addchild __P((struct servtab *, int)); -void reapchild __P((int)); +void flag_reapchild __P((int)); +void reapchild __P((void)); void enable __P((struct servtab *)); void disable __P((struct servtab *)); -void retry __P((int)); +void flag_retry __P((int)); +void retry __P((void)); int setconfig __P((void)); void setup __P((struct servtab *)); char *sskip __P((char **)); @@ -408,12 +413,12 @@ sigaddset(&sa.sa_mask, SIGALRM); sigaddset(&sa.sa_mask, SIGCHLD); sigaddset(&sa.sa_mask, SIGHUP); - sa.sa_handler = retry; + sa.sa_handler = flag_retry; sigaction(SIGALRM, &sa, (struct sigaction *)0); - config(SIGHUP); - sa.sa_handler = config; + config(); + sa.sa_handler = flag_config; sigaction(SIGHUP, &sa, (struct sigaction *)0); - sa.sa_handler = reapchild; + sa.sa_handler = flag_reapchild; sigaction(SIGCHLD, &sa, (struct sigaction *)0); sa.sa_handler = SIG_IGN; sigaction(SIGPIPE, &sa, &sapipe); @@ -428,6 +433,14 @@ (void)setenv("inetd_dummy", dummy, 1); } + if (pipe(signalpipe) != 0) + { + syslog(LOG_ERR, "pipe: %%m"); + exit(EX_OSERR); + } + FD_SET(signalpipe[0], &allsock); + if (signalpipe[0]>maxsock) maxsock = signalpipe[0]; + for (;;) { int n, ctrl; fd_set readable; @@ -447,6 +460,41 @@ } continue; } + /* handle any queued signal flags */ + if (FD_ISSET(signalpipe[0], &readable)) + { + int n; + if (ioctl(signalpipe[0], FIONREAD, &n) == 0) + { + while (--n >= 0) + { + char c; + if (read(signalpipe[0], &c, 1) == 1) + { + if (debug) warnx("Handling signal flag %c", c); + switch(c) + { + case 'A': /* sigalrm */ + retry(); break; + case 'C': /* sigchld */ + reapchild(); break; + case 'H': /* sighup */ + config(); break; + } + } + else + { + syslog(LOG_ERR, "read: %m"); + exit(EX_OSERR); + } + } + } + else + { + syslog(LOG_ERR, "ioctl: %m"); + exit(EX_OSERR); + } + } for (sep = servtab; n && sep; sep = sep->se_next) if (sep->se_fd != -1 && FD_ISSET(sep->se_fd, &readable)) { n--; @@ -645,6 +693,20 @@ } /* + * Add a signal flag to the signal flag queue for later handling + */ + +void flag_signal(c) + char c; +{ + if (write(signalpipe[1], &c, 1) != 1) + { + syslog(LOG_ERR, "write: %m"); + exit(EX_OSERR); + } +} + +/* * Record a new child pid for this service. If we've reached the * limit on children, then stop accepting incoming requests. */ @@ -671,9 +733,15 @@ */ void -reapchild(signo) +flag_reapchild(signo) int signo; { + flag_signal('C'); +} + +void +reapchild() +{ int k, status; pid_t pid; struct servtab *sep; @@ -703,9 +771,14 @@ } void -config(signo) +flag_config(signo) int signo; { + flag_signal('H'); +} + +void config() +{ struct servtab *sep, *new, **sepp; long omask; @@ -882,8 +955,14 @@ } void -retry(signo) +flag_retry(signo) int signo; +{ + flag_signal('A'); +} + +void +retry() { struct servtab *sep; ------------------ cut here ------------------------------------ -- Dr Graham Wheeler E-mail: gram@cdsec.com Citadel Data Security Phone: +27(21)23-6065/6/7 Internet/Intranet Network Specialists Mobile: +27(83)253-9864 Firewalls/Virtual Private Networks Fax: +27(21)24-3656 Data Security Products WWW: http://www.cdsec.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 08:00:12 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA11628 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 08:00:12 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA11576 for ; Thu, 8 Oct 1998 08:00:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA21362; Thu, 8 Oct 1998 08:00:00 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA11131; Thu, 8 Oct 1998 07:52:27 -0700 (PDT) (envelope-from nobody) Message-Id: <199810081452.HAA11131@hub.freebsd.org> Date: Thu, 8 Oct 1998 07:52:27 -0700 (PDT) From: leo@sai.msu.ru To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: kern/8206: Unconected UDP socket declined, if not room for prepending IP/UDP header Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8206 >Category: kern >Synopsis: Unconected UDP socket declined, if not room for prepending IP/UDP header >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 08:00:00 PDT 1998 >Last-Modified: >Originator: Serguei E. Leontiev >Organization: Sternberg Astronomical Institute >Release: 2.2.x >Environment: FreeBSD ns.sai.msu.ru 2.2.6-980321-BETA FreeBSD 2.2.6-980321-BETA #0: Mon Mar 23 02:22:40 MSK 1998 leo@ns.sai.msu.ru:/var/src/sys/compile/NSALTQ i386 >Description: Hi, Symptom: When TCP/IP overload (too enought free mbuf's) UDP service (syslog, DNS server, etc.) declined. Diagnose: Unconnected UDP socket declined, because it don't disconetcted (from temporarily conect) by M_PREPEND fail's. System: Code with bug use in all versions FreeBSD 2.2.x & 3.x (probably and other BSD 4.4Lite OS). Sorry for my best English. >How-To-Repeat: 1. Configure syslogd to forwarded messages on other host; 2. Connect this host over slow line (PPP); 3. Start `logger "test message"' in infinite loop; After error message about "No buffer space available". Any syslog's messages don't forwarded on other host. >Fix: *** udp_usrreq.c.orig 1997/04/10 19:14:45 --- udp_usrreq.c 1998/10/07 13:38:08 *************** *** 407,414 **** M_PREPEND(m, sizeof(struct udpiphdr), M_DONTWAIT); if (m == 0) { error = ENOBUFS; ! if (addr) splx(s); goto release; } --- 407,417 ---- M_PREPEND(m, sizeof(struct udpiphdr), M_DONTWAIT); if (m == 0) { error = ENOBUFS; ! if (addr) { ! in_pcbdisconnect(inp); ! inp->inp_laddr = laddr; splx(s); + } goto release; } >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 12:10:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA25777 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 12:10:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA25687 for ; Thu, 8 Oct 1998 12:10:01 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id MAA01520; Thu, 8 Oct 1998 12:10:00 -0700 (PDT) Received: from accom.accom.com (charon.accom.com [209.1.249.229]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA24733 for ; Thu, 8 Oct 1998 12:01:48 -0700 (PDT) (envelope-from cj@accom.com) Received: from flea.accom.com ([192.20.200.106]) by accom.accom.com (8.8.8/8.8.8) with ESMTP id MAA11131 for ; Thu, 8 Oct 1998 12:01:36 -0700 (PDT) Received: (from cj@localhost) by flea.accom.com (8.8.8/8.8.7) id MAA12539; Thu, 8 Oct 1998 12:01:36 -0700 (PDT) (envelope-from cj@accom.com) Message-Id: <199810081901.MAA12539@flea.accom.com> Date: Thu, 8 Oct 1998 12:01:36 -0700 (PDT) From: cj@accom.com Reply-To: cj@accom.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8211: Script to search kernel for an address Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8211 >Category: bin >Synopsis: Script to search kernel for an address >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 12:10:00 PDT 1998 >Last-Modified: >Originator: Colin Jensen >Organization: >Release: FreeBSD 2.2.6-STABLE i386 >Environment: Tested on FreeBSD 2.2 with both perl4 and perl5. >Description: When an experimental kernel crashes, it outputs a trap address to the console. To make a useful bug report, a user must translate this address into the name of the offending function. Current practice is to have the user type nm kernel | sort | more and search for the address by hand. This program automates the process of looking up the function by address. begin 644 symfind.tgz M'XL(`,@)'38``^U9;7/32!+F*_H5O=D4<0[;<2`)"P$6Q58273EVSI*332U[ M[%@:QP*]>/5"DEJXWWY/STBV$SBVKC#P]V<%<:_?Q]CUJ?5.M MRE%DN4B)[GEOOTSG"QDE\??0Z+N.'W_8*K)T:Q3$6U.9AL:/U$ZF-VEP.1_X>,DG(L<_$FS",+D*XDORDM@/>%$& M)KPLDODSO&XW[^B543*N%/(2'X2("EB2"RC*/,4H><]3)3+@@1$G>>#).@B" MC$*P8RYSF*()(IT*%'GZH!<0M@5&K`1K^`:M]$$](F:D9^XA61 MC'-1>6L+CD@PG5(DZP8_>.Z@0FU.N[U+5/;!=D;K_.TL#GTX74 M/Z03:]`^QD_SP.[:[H52Y]!V>RSMD-6C4W/@VNUAUQS0Z7!PVG>8&=O4L9UV MU[1/K$Z3H`+$DG5F]5QRCLUN=]%&_+EEXH$%_NG:_MPD^Q_US@`)-32SN*'C[/64P\.D/+I@M8Z'0K]/Y ML87O`X93(68R$`Z0:[M@MD`(F8#27;"4>M91USZR>FV+9_O,Y]QVK$TXRW:8 MP-:"S\T+-G"H3&5+L@_)[)S9K'I)C`!P[#)8^H=@Y`S;QR7P M38-](,>B")$'L8'5WH@CWC"7J8CJZK>\EEZ1BU&(_5KM2Q$E15QMVEQ>YYP> M3F4Z$=.,"9`Q,^3"$*F2]WX4\4*D9"1"`<82.S-K&NL0]8(V9ODUU_':/GU4)&--\P"/VJLWF_NP,,#9L;TY(Q"Y")F"*6MKF:XXGM%: MG12]IBHR<2GG5$/^^8Q*8GZ.DI!^U?K_MJ:60>LSY*3Q#9+[968\4"QJFQ2, MJ?;*'!R=T7.4&1\^T".\J`^;RE3K6D0,'D.?RC\*F?%)4HI@:"/Q#H@7.#%@ M"5+J1%X;Z^7\"[@B&.?[!DN9??P7;?VSUKK>_+GV:ZOQ5#3&9N/PMX>;ZUN; M]*?!F76^7+X786VM=;W^"%88'TF&<*\F>J"@JJTYFE:E?W@)Z?ZP$M&;Z67TSC@D()6V12TXT#Z"YY7.B\`\Y):&@L'U4].Q93CE$V7 M)38!0ABG[Q0'<#*5<:UW`J]SA)4\/ZQM,K*5QE::(MZYE,KY>(DC5O1J`I6H M]KQW\K*"@34`4K=`>ITIE.ZO"]]/%P':9B;W%>Q4F/4W'HAHEO;I]/J;ZOOZ M92KY%(2.E48SA4J2TN1J=S4:2M/[ZVJSOB"&`I3W0Y%I;_S@2VB&Z%,4S$7; MJ^E55'T6*ZW/`F"T@%B%C-(L8YV\B:I_$.N@S!.%D,9,^@V&K(1KMI:I!8JZ M(/;"@L_ZLA#2(:$BA4E0>"`?(7>!0LQ73SFFD,UXQ2RCZ"^P$E"HP++L;"WIASJ5C#%YJ M2F>V4M7;JU5U(V*]"BQ4+07X2@@RR;DW3U*E^CPRMEGY^U^(,&U9^;P3:K,@ MF*4%359MLV$,H1D?'CK]PRO8DEJC9XA4+>"C4OV]6?^_L]WB_G]OY_&J__\>H_EZ[2\:?@,DG^WO\9W_+J'%!YJT=> M^(UF^>+D$+ZE;:/9S^@PE?+`08@[$^J9)XB$7E3UMGCWR5'%N-IB9<\VOR>@ MT-\(GG;0PSR M;*`R05B)]E*1H0*N<_>K*RMD%LI3,9VU5;J',)!ZLB24V!%NHKMFP6M!"2U MBS2%NDA.J-:1#=&@&U@[$>]UYE2B\ININGHI+?J`O(^6Y(/N$CA+ZNZG:A%F M:@#J":;9($ZQY*JW'%.8).]8/S30S*92<\%E"(_3J>&R M-=,R2;,*69FCX:F#D!JYN*3&5>`CS1Z&1M/.Z8X_W86>%M:.I!*-U`S)Y?'U M:>"PYY4IY!/II3JAF#&$&=5AI*_1 MF"V5UUDXGE"?C&0E'Z%^,#QR6"I?X?!RNA(W+%K?C=QPY,\CCTK3YZ[ZY$). M-XK&DSS M\CY"!6(T1?W!0"E=1Y"C*'<8"(/?=K7N^F0U;I>EYA]TY[^B5NW=:JS&:JS& 5:JS&:JS&:JS&%\>_`=]:ZN,`*``` ` end >How-To-Repeat: >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 12:10:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA25791 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 12:10:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA25700 for ; Thu, 8 Oct 1998 12:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id MAA01529; Thu, 8 Oct 1998 12:10:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA24876; Thu, 8 Oct 1998 12:02:38 -0700 (PDT) (envelope-from nobody) Message-Id: <199810081902.MAA24876@hub.freebsd.org> Date: Thu, 8 Oct 1998 12:02:38 -0700 (PDT) From: rock@cs.uni-sb.de To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: bin/8212: memory leak in rpc.rstatd Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8212 >Category: bin >Synopsis: memory leak in rpc.rstatd >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 12:10:01 PDT 1998 >Last-Modified: >Originator: Daniel Rock >Organization: >Release: latest current (cvsup) >Environment: FreeBSD gate 3.0-BETA FreeBSD 3.0-BETA #45: Wed Oct 7 16:42:18 CEST 1998 root@gate:/usr/src/sys/compile/ROCK i386 >Description: rpc.rstatd has a memory leak. Every few invocations from network it requires an additional page of memory. >How-To-Repeat: Comment out rpc.rstatd in /etc/inetd.conf Start rpc.rstatd manually: /usr/libexec/rpc.rstatd Type several times "rup localhost" Watch memory usage with ps or top >Fix: diff -c -r1.12 rstat_proc.c libdevstat allocates memory during each update. This memory has to be freed. *** rstat_proc.c 1998/09/16 21:33:14 1.12 --- rstat_proc.c 1998/10/08 19:01:39 *************** *** 365,370 **** --- 365,372 ---- } } + if(stats.dinfo->mem_ptr) + free(stats.dinfo->mem_ptr); free(stats.dinfo); return(retval); } *************** *** 424,429 **** --- 426,433 ---- } } + if(stats.dinfo->mem_ptr) + free(stats.dinfo->mem_ptr); free(stats.dinfo); } >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 12:10:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA25795 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 12:10:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA25719 for ; Thu, 8 Oct 1998 12:10:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id MAA01538; Thu, 8 Oct 1998 12:10:02 -0700 (PDT) Received: from eubie.lbl.gov (eubie.lbl.gov [131.243.2.36]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA25588 for ; Thu, 8 Oct 1998 12:09:49 -0700 (PDT) (envelope-from jin@eubie.lbl.gov) Received: (from jin@localhost) by eubie.lbl.gov (8.9.1/8.9.1) id TAA05985; Thu, 8 Oct 1998 19:09:44 GMT (envelope-from jin) Message-Id: <199810081909.TAA05985@eubie.lbl.gov> Date: Thu, 8 Oct 1998 19:09:44 GMT From: Jin Guojun (FTG staff) Reply-To: jin@eubie.lbl.gov To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: conf/8213: config errors Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8213 >Category: conf >Synopsis: config errors >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 12:10:01 PDT 1998 >Last-Modified: >Originator: Jin Guojun (FTG staff) >Organization: >Release: FreeBSD 3.0-19981006-BETA i386 >Environment: FreeBSD 3.0-1998xxxx-BATE >Description: # /sys/i386/conf: config GENERIC config: line 31: syntax error config: line 32: syntax error Don't forget to do a ``make depend'' Kernel build directory is ../../compile/GENERIC Line 31-32 in GENERIC file: options CD9660 #ISO 9660 Filesystem options CD9660_ROOT #CD-ROM usable as root device, "CD9660" # /sys/i386/conf: config ATM # ATM is GENERIC + ATM + bpf config: line 31: syntax error # same as above config: line 32: syntax error ATM:178: unknown option "BPF_KERN_FILTER" # why ??? It is set in Makefile Unknown option used - it is VERY important that you do make clean && make depend before recompiling Kernel build directory is ../../compile/ATM >How-To-Repeat: just repeat config in /sys/i386/conf directory. >Fix: unknown >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 12:14:11 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA26509 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 12:14:11 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from george.lbl.gov (george.lbl.gov [131.243.2.12]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA26438 for ; Thu, 8 Oct 1998 12:13:59 -0700 (PDT) (envelope-from jin@george.lbl.gov) Received: (from jin@localhost) by george.lbl.gov (8.8.8/8.8.8) id MAA17306 for bugs@freebsd.org; Thu, 8 Oct 1998 12:13:53 -0700 (PDT) Date: Thu, 8 Oct 1998 12:13:53 -0700 (PDT) From: Jin Guojun (FTG staff) Message-Id: <199810081913.MAA17306@george.lbl.gov> To: bugs@FreeBSD.ORG Subject: 3.0-BETA bugs (multiple in installation and config) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org (1) installation failed at about 80%-90% completion: SIG 11 (2) configuration error + send-pr failed due to imcompleted installation: >Submitter-Id: current-users >Originator: Jin Guojun (FTG staff) >Organization: >Confidential: no >Synopsis: config errors >Severity: serious >Priority: medium >Category: conf >Release: FreeBSD 3.0-19981006-BETA i386 >Class: sw-bug >Environment: FreeBSD 3.0-1998xxxx-BATE >Description: # /sys/i386/conf: config GENERIC config: line 31: syntax error config: line 32: syntax error Don't forget to do a ``make depend'' Kernel build directory is ../../compile/GENERIC Line 31-32 in GENERIC file: options CD9660 #ISO 9660 Filesystem options CD9660_ROOT #CD-ROM usable as root device, "CD9660" # /sys/i386/conf: config ATM # ATM is GENERIC + ATM + bpf config: line 31: syntax error # same as above config: line 32: syntax error ATM:178: unknown option "BPF_KERN_FILTER" # why ??? It is set in Makefile Unknown option used - it is VERY important that you do make clean && make depend before recompiling Kernel build directory is ../../compile/ATM >How-To-Repeat: just repeat config in /sys/i386/conf directory. >Fix: unknown /tmp/p5485: 67 lines, 1918 characters. a)bort, e)dit or s)end? s hash map "Alias0": missing map file /etc/aliases.db: No such file or directory send-pr: mysterious mail failure. send-pr: the problem report remains in /tmp/pbad5485 and is not sent. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 12:58:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA05871 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 12:58:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from send103.yahoomail.com (send103.yahoomail.com [205.180.60.92]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id MAA05803 for ; Thu, 8 Oct 1998 12:58:03 -0700 (PDT) (envelope-from mphalpin@yahoo.com) Message-ID: <19981008195949.2157.rocketmail@send103.yahoomail.com> Received: from [32.100.214.226] by send103.yahoomail.com; Thu, 08 Oct 1998 12:59:49 PDT Date: Thu, 8 Oct 1998 12:59:49 -0700 (PDT) From: "M. Halpin" Subject: Installation errors prevents installation To: freebsd-bugs@FreeBSD.ORG MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Not sure if this a bug or what. PLEASE HELP! Upon trying to install the 3.0 distribution (I tried 4 different betas, including 10/4 and 10/6) from my FAT32 drive (using DOS as the media.. this is the way I've done it since 2.2.2), it tells me that it can't unpack bin, manpages, ports, .etc .etc from the distribution media. Then, of course, if I try to boot into the freebsd partition, it goes as far to say it can't find the kernel. System configuration is as follows, and then a FreeBSD directory list, and then some misc. notes: Intel Pentium II at 266Mhz, 32MB onboard SDRAM (168-pin) with an ATI AGP graphics card One 3 and 1/2 inch floppy drive One 3 gigabyte harddrive (primary master), one CD-ROM, and one CD-RW ISA-based K56Flex modem, PCI-based NE2000-compatible 10BaseT ethernet card and a PCI-based sound card Listing of C:\FREEBSD directory is as follows: Volume in drive C has no label Volume Serial Number is 2673-1706 Directory of C:\FREEBSD . 09-11-98 10:47p . .. 09-11-98 10:47p .. BIN 10-08-98 6:12a bin CATPAGES 10-08-98 8:59a catpages COMPAT1X 10-08-98 9:22a compat1x COMPAT20 10-08-98 9:25a compat20 COMPAT21 10-08-98 9:27a compat21 DES 10-08-98 9:29a des DICT 10-08-98 9:43a dict DOC 10-08-98 9:50a doc FLOPPIES 10-08-98 10:07a floppies GAMES 10-08-98 10:21a games INFO 10-08-98 10:35a info MANPAGES 10-08-98 10:45a manpages PORTS 10-08-98 11:13a ports ABOUT TXT 8,972 10-08-98 11:51a ABOUT.TXT CDROM INF 31 10-08-98 11:51a cdrom.inf ERRATA TXT 651 10-08-98 11:51a ERRATA.TXT HARDWARE TXT 20,653 10-08-98 11:51a HARDWARE.TXT INSTALL TXT 24,177 10-08-98 11:51a INSTALL.TXT LAYOUT TXT 4,613 10-08-98 11:51a LAYOUT.TXT README TXT 4,001 10-08-98 11:51a README.TXT RELNOTES TXT 29,770 10-08-98 11:51a RELNOTES.TXT TROUBLE TXT 12,429 10-08-98 11:51a TROUBLE.TXT UPGRADE TXT 7,964 10-08-98 11:51a UPGRADE.TXT SRC 10-08-98 12:11p src XF86332 10-06-98 1:39p XF86332 TOOLS 10-08-98 12:14p tools 10 file(s) 113,261 bytes 18 dir(s) 159,047,680 bytes free NOTE: In case I had missed something, I run the \freebsd\tools\setup.exe program, and it said 'bin.inf' was corrupt. However, I tried downloading this over and over, and comparing it to the ones online, and there was no difference. This is really confusing. _________________________________________________________ DO YOU YAHOO!? Get your free @yahoo.com address at http://mail.yahoo.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 13:01:56 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA06446 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 13:01:56 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA06384; Thu, 8 Oct 1998 13:01:17 -0700 (PDT) (envelope-from ken@FreeBSD.org) From: Kenneth Merry Received: (from ken@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA03281; Thu, 8 Oct 1998 13:01:14 -0700 (PDT) Date: Thu, 8 Oct 1998 13:01:14 -0700 (PDT) Message-Id: <199810082001.NAA03281@freefall.freebsd.org> To: rock@cs.uni-sb.de, ken@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, ken@FreeBSD.ORG Subject: Re: bin/8212 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: memory leak in rpc.rstatd State-Changed-From-To: open-closed State-Changed-By: ken State-Changed-When: Thu Oct 8 12:59:48 PDT 1998 State-Changed-Why: Suggested patch applied with minor modifications in revision 1.13 of rstat_proc.c. Responsible-Changed-From-To: freebsd-bugs->ken Responsible-Changed-By: ken Responsible-Changed-When: Thu Oct 8 12:59:48 PDT 1998 Responsible-Changed-Why: I wrote the devstat support for rpc.rstatd. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 13:20:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA10602 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 13:20:10 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA10526 for ; Thu, 8 Oct 1998 13:20:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA03719; Thu, 8 Oct 1998 13:20:00 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA09122; Thu, 8 Oct 1998 13:13:47 -0700 (PDT) (envelope-from nobody) Message-Id: <199810082013.NAA09122@hub.freebsd.org> Date: Thu, 8 Oct 1998 13:13:47 -0700 (PDT) From: rls@mail.id.net To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: i386/8214: Install 3.0-19981006-BETA fails Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8214 >Category: i386 >Synopsis: Install 3.0-19981006-BETA fails >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 13:20:00 PDT 1998 >Last-Modified: >Originator: Robert Shady >Organization: ID-Net, Inc. >Release: 3.0-19981006-BETA >Environment: Can't, won't get that far. Machine is Intel PII-300 Mhz on a Asus P2-L97-DS motherboard with two built-in IDE controllers, and two promise ultra/33 controller cards, 8 13.6 Gigabyte IDE hard drives, and 1 8.5 Gigabyte IDE hard drive. >Description: While booting the installation floppy, I get: fxp0: Ethernet address 00:a0:c9:2b:5c:a0 ide_pci1: rev 0x01 int a irq 12 on pci0.10.0 ide_pci2: rev 0x01 int a irq 10 on pci0.11.0 vga0: rev 0x01 int a irq 11 on pci0.12.0 Probing for devices on PCI bus 1: Problem for devices on ISA bus: sc0 at 0x60-0x6f irq 1 on motherboard Fatal trap 12: page fault while in kernel mode fault virtual address = 0x0 fault code = supervisor write, page not present intruction pointer = 0x8:0xf013e9d3 stack pointer = 0x10:0xf03e7ebc frame pointer = 0x10:0xf03e7ecc code segment = base 0x0, limit 0xffffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 0 () interrupt mask = net tty bio cam trap number = 12 panic: page fault >How-To-Repeat: 1. Insert 3.0-19981006-BETA install floppy 2. Boot machine. >Fix: Unknown. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:10:12 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA20884 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:10:12 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA20824 for ; Thu, 8 Oct 1998 14:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA05490; Thu, 8 Oct 1998 14:10:01 -0700 (PDT) Received: from home.dragondata.com (home.dragondata.com [204.137.237.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA20247 for ; Thu, 8 Oct 1998 14:07:35 -0700 (PDT) (envelope-from toasty@home.dragondata.com) Received: (from root@localhost) by home.dragondata.com (8.8.8/8.8.5) id QAA07651; Thu, 8 Oct 1998 16:07:26 -0500 (CDT) Message-Id: <199810082107.QAA07651@home.dragondata.com> Date: Thu, 8 Oct 1998 16:07:26 -0500 (CDT) From: toasty@dragondata.com Reply-To: toasty@dragondata.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8215: Creating 2 root partitions in sysinstall causes panic Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8215 >Category: kern >Synopsis: Creating 2 root partitions in sysinstall causes panic >Confidential: no >Severity: serious >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 14:10:00 PDT 1998 >Last-Modified: >Originator: Kevin Day >Organization: DragonData Internet Services >Release: FreeBSD 2.2.7-STABLE i386 >Environment: Running sysinstall on a 2.2.x system >Description: >How-To-Repeat: After freebsd is installed, restart sysinstall. Fdisk a second drive, go into the label editor, create a new FS slice, and set the mount point to / (this is after there's already a /) Hit W to write. It starts to newfs, then the kernel panic's with ufs_lock: recursive lock not expected >Fix: Don't do that. :) >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:28:41 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA24014 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:28:41 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from ifi.uio.no (ifi.uio.no [129.240.64.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA24009 for ; Thu, 8 Oct 1998 14:28:39 -0700 (PDT) (envelope-from dag-erli@ifi.uio.no) Received: from hrotti.ifi.uio.no (2602@hrotti.ifi.uio.no [129.240.64.15]) by ifi.uio.no (8.8.8/8.8.7/ifi0.2) with ESMTP id XAA02994; Thu, 8 Oct 1998 23:28:33 +0200 (MET DST) Received: (from dag-erli@localhost) by hrotti.ifi.uio.no ; Thu, 8 Oct 1998 23:28:32 +0200 (MET DST) Mime-Version: 1.0 To: Jin Guojun (FTG staff) Cc: bugs@FreeBSD.ORG Subject: Re: 3.0-BETA bugs (multiple in installation and config) References: <199810081913.MAA17306@george.lbl.gov> Organization: University of Oslo, Department of Informatics X-url: http://www.stud.ifi.uio.no/~dag-erli/ X-other-addresses: 'finger dag-erli@ifi.uio.no' for a list X-disclaimer-1: The views expressed in this article are mine alone, and do X-disclaimer-2: not necessarily coincide with those of any organisation or X-disclaimer-3: company with which I am or have been affiliated. X-Stop-Spam: http://www.cauce.org/ From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Date: 08 Oct 1998 23:28:31 +0200 In-Reply-To: Jin Guojun's message of "Thu, 8 Oct 1998 12:13:53 -0700 (PDT)" Message-ID: Lines: 8 X-Mailer: Gnus v5.5/Emacs 19.34 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id OAA24010 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Jin Guojun (FTG staff) writes: > hash map "Alias0": missing map file /etc/aliases.db: No such file or directory Run 'newaliases' as root to fix this. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:36:00 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA24905 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:36:00 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA24821; Thu, 8 Oct 1998 14:35:23 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA06178; Thu, 8 Oct 1998 14:35:22 -0700 (PDT) Date: Thu, 8 Oct 1998 14:35:22 -0700 (PDT) Message-Id: <199810082135.OAA06178@freefall.freebsd.org> To: jin@eubie.lbl.gov, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: conf/8213 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: config errors State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Thu Oct 8 14:34:25 PDT 1998 State-Changed-Why: Already fixed. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:39:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA25300 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:39:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from george.lbl.gov (george.lbl.gov [131.243.2.12]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA25293 for ; Thu, 8 Oct 1998 14:39:05 -0700 (PDT) (envelope-from jin@george.lbl.gov) Received: (from jin@localhost) by george.lbl.gov (8.8.8/8.8.8) id OAA19992; Thu, 8 Oct 1998 14:38:58 -0700 (PDT) Date: Thu, 8 Oct 1998 14:38:58 -0700 (PDT) From: Jin Guojun (FTG staff) Message-Id: <199810082138.OAA19992@george.lbl.gov> To: dag-erli@ifi.uio.no Subject: Re: 3.0-BETA bugs (multiple in installation and config) Cc: bugs@FreeBSD.ORG Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > > hash map "Alias0": missing map file /etc/aliases.db: No such file or directory > > Run 'newaliases' as root to fix this. Actually, the sned-pr was sent. I received both report. So, problem is that the installation does not install /etc/aliases.db in the first place. The second is that send-pr should not spit out such wrong message to confuse people. If send-pr can send without /etc/aliases.db, then eliminate such error report, just say: "/etc/aliases.db does not exit, but report is sent anyway." -Jin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:40:20 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA25587 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:40:20 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA25482 for ; Thu, 8 Oct 1998 14:40:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA06267; Thu, 8 Oct 1998 14:40:00 -0700 (PDT) Date: Thu, 8 Oct 1998 14:40:00 -0700 (PDT) Message-Id: <199810082140.OAA06267@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Subject: Re: conf/8213: config errors Reply-To: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR conf/8213; it has been noted by GNATS. From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) To: jin@eubie.lbl.gov Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: conf/8213: config errors Date: 08 Oct 1998 23:34:00 +0200 Jin Guojun (FTG staff) writes: > # /sys/i386/conf: config GENERIC > config: line 31: syntax error > config: line 32: syntax error > Don't forget to do a ``make depend'' > Kernel build directory is ../../compile/GENERIC > > Line 31-32 in GENERIC file: > options CD9660 #ISO 9660 Filesystem > options CD9660_ROOT #CD-ROM usable as root device, "CD9660" This is not a bug. You need quotes around options that contain digits. It *was* a bug in GENERIC and LINT for a short while, though (about four hours or something, before David fixed it) DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 14:48:17 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA27009 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 14:48:17 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from ifi.uio.no (ifi.uio.no [129.240.64.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA26919 for ; Thu, 8 Oct 1998 14:48:02 -0700 (PDT) (envelope-from dag-erli@ifi.uio.no) Received: from hrotti.ifi.uio.no (2602@hrotti.ifi.uio.no [129.240.64.15]) by ifi.uio.no (8.8.8/8.8.7/ifi0.2) with ESMTP id XAA04635; Thu, 8 Oct 1998 23:47:53 +0200 (MET DST) Received: (from dag-erli@localhost) by hrotti.ifi.uio.no ; Thu, 8 Oct 1998 23:47:52 +0200 (MET DST) Mime-Version: 1.0 To: Jin Guojun (FTG staff) Cc: bugs@FreeBSD.ORG Subject: Re: 3.0-BETA bugs (multiple in installation and config) References: <199810082138.OAA19992@george.lbl.gov> Organization: University of Oslo, Department of Informatics X-url: http://www.stud.ifi.uio.no/~dag-erli/ X-other-addresses: 'finger dag-erli@ifi.uio.no' for a list X-disclaimer-1: The views expressed in this article are mine alone, and do X-disclaimer-2: not necessarily coincide with those of any organisation or X-disclaimer-3: company with which I am or have been affiliated. X-Stop-Spam: http://www.cauce.org/ From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Date: 08 Oct 1998 23:47:51 +0200 In-Reply-To: Jin Guojun's message of "Thu, 8 Oct 1998 14:38:58 -0700 (PDT)" Message-ID: Lines: 26 X-Mailer: Gnus v5.5/Emacs 19.34 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id OAA26957 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Jin Guojun (FTG staff) writes: > So, problem is that the installation does not install /etc/aliases.db > in the first place. It normally does, but as you pointed out it segfaulted before completion. > The second is that send-pr should not spit out such > wrong message to confuse people. > > If send-pr can send without /etc/aliases.db, then eliminate such error > report, just say: "/etc/aliases.db does not exit, but report is sent anyway." send-pr(1) doesn't know what happened. The error message you got was from sendmail(8), which send-pr(1) invoked to mail the problem report. Arguably, sendmail(8) shouldn't have returned a non-zero exit status since it succeeded in sending the problem report. This is a whole other kettle of fish and I'd hesitate to do anything about it as a lot of software depends on assumptions about how sendmail(8) behaves when/if an error occurs, which fixing this apparent bug might actually break. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 15:44:48 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA08519 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 15:44:48 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from alpha.xerox.com (omega.Xerox.COM [13.1.64.95]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id PAA08413 for ; Thu, 8 Oct 1998 15:44:15 -0700 (PDT) (envelope-from fenner@parc.xerox.com) Received: from mango.parc.xerox.com ([13.1.102.232]) by alpha.xerox.com with SMTP id <435727(4)>; Thu, 8 Oct 1998 15:42:40 PDT Received: from mango.parc.xerox.com (localhost.parc.xerox.com [127.0.0.1]) by mango.parc.xerox.com (8.8.8/8.8.8) with ESMTP id PAA28612; Thu, 8 Oct 1998 15:42:37 -0700 (PDT) (envelope-from fenner@mango.parc.xerox.com) Message-Id: <199810082242.PAA28612@mango.parc.xerox.com> To: Jin Guojun (FTG staff) cc: bugs@FreeBSD.ORG Subject: Re: 3.0-BETA bugs (multiple in installation and config) In-reply-to: Your message of "Thu, 08 Oct 1998 12:13:53 PDT." <199810081913.MAA17306@george.lbl.gov> Date: Thu, 8 Oct 1998 15:42:37 PDT From: Bill Fenner Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <199810081913.MAA17306@george.lbl.gov>you write: ># /sys/i386/conf: config GENERIC >config: line 31: syntax error >config: line 32: syntax error >Don't forget to do a ``make depend'' >Kernel build directory is ../../compile/GENERIC > >Line 31-32 in GENERIC file: >options CD9660 #ISO 9660 Filesystem >options CD9660_ROOT #CD-ROM usable as root device, "CD9660 > " Add quotes around the "CD9660" and "CD9660_ROOT" entries. This was fixed yesterday. >ATM:178: unknown option "BPF_KERN_FILTER" # why ??? It is set in Makefil > e Because it's not in /sys/conf/options or /sys/i386/conf/options.i386. Read the head of /sys/conf/options to see why. Old options will still work, but will get this error message and dependencies on them will not work (i.e. if you config a new kernel without BPF_KERN_FILTER, it will not rebuild udp_usrreq.c because without using an opt_*.h nobody knows that udp_usrreq.c depends on BPF_KERN_FILTER). Bill To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 15:51:54 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id PAA09948 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 15:51:54 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from alpha.xerox.com (omega.Xerox.COM [13.1.64.95]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id PAA09807 for ; Thu, 8 Oct 1998 15:51:02 -0700 (PDT) (envelope-from fenner@parc.xerox.com) Received: from mango.parc.xerox.com ([13.1.102.232]) by alpha.xerox.com with SMTP id <435738(4)>; Thu, 8 Oct 1998 15:50:40 PDT Received: from mango.parc.xerox.com (localhost.parc.xerox.com [127.0.0.1]) by mango.parc.xerox.com (8.8.8/8.8.8) with ESMTP id PAA28762; Thu, 8 Oct 1998 15:50:37 -0700 (PDT) (envelope-from fenner@mango.parc.xerox.com) Message-Id: <199810082250.PAA28762@mango.parc.xerox.com> To: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) cc: freebsd-bugs@FreeBSD.ORG Subject: Re: conf/8213: config errors In-reply-to: Your message of "Thu, 08 Oct 1998 14:40:00 PDT." <199810082140.OAA06267@freefall.freebsd.org> Date: Thu, 8 Oct 1998 15:50:37 PDT From: Bill Fenner Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In message <199810082140.OAA06267@freefall.freebsd.org>you write: > It *was* a bug in GENERIC and LINT for a short while, though (about > four hours or something, before David fixed it) Only low by 50 hours. Bill To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 16:20:28 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id QAA16624 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 16:20:28 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id QAA16526 for ; Thu, 8 Oct 1998 16:20:06 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id QAA09189; Thu, 8 Oct 1998 16:20:03 -0700 (PDT) Date: Thu, 8 Oct 1998 16:20:03 -0700 (PDT) Message-Id: <199810082320.QAA09189@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Robert Shady Subject: Re: i386/8214: Install 3.0-19981006-BETA fails Reply-To: Robert Shady Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR i386/8214; it has been noted by GNATS. From: Robert Shady To: freebsd-gnats-submit@freebsd.org Cc: Subject: Re: i386/8214: Install 3.0-19981006-BETA fails Date: Thu, 8 Oct 1998 19:16:38 -0400 (EDT) Removing the Promise controller cards allows me to run the install script, but it dies at the end (Installation selected something or another). With the following messages on the debug screen (typed by hand): PORT command successful. Sending: RETR compat21/compat21.ab Opening BINARY mode data connection for 'compat21/compat21.ab' (176811 bytes). ... 96 blocks DEBUG: Executing command `cp -p /kernel.GENERIC /kernel' DEBUG: Command 'cp -p /kernel.GENERIC /kernel' returns status of 0 DEBUG: uc_open: kernel name is /kernel, incore = 1 DEBUG: uc_open: opened /stand/symbols file, reading 10 entries. DEBUG: uc_open: for entry 0, decoded: "_isa_devtab_bio", 7 1 0 -264509968 DEBUG: uc_open: for entry 1, decoded: "_isa_devtab_tty", 7 1 0 -264508880 DEBUG: uc_open: for entry 2, decoded: "_isa_devtab_net", 7 1 0 -264508336 DEBUG: uc_open: for entry 3, decoded: "_isa_devtab_null", 7 1 0 -264507248 DEBUG: uc_open: for entry 4, decoded: "_isa_biotab_wdc", 7 1 0 -264509424 DEBUG: uc_open: for entry 5, decoded: "_isa_biotab_fdc", 7 1 0 -264509084 DEBUG: uc_open: for entry 6, decoded: "_eisadriver_set", 29 0 0 -264504352 DEBUG: uc_open: for entry 7, decoded: "_eisa_dev_list", 8 0 0 -264441328 DEBUG: uc_open: for entry 8, decoded: "_pcidevice_set", 29 0 0 -264505036 DEBUG: uc_open: for entry 9, decoded: "_device_list", 0 0 0 0 DEBUG: uc_open: attempting to open /dev/kmem for incore. DEBUG: uc_open: got isa information DEBUG: uc_open: got pci information DEBUG: Signal 11 caught! That's bad! 3.0-19981004-BETA installs fine on the same machine. -- Rob === _/_/_/_/_/ _/_/_/_/ _/_/ _/ _/_/_/_/_/ _/_/_/_/_/ _/ _/ _/ _/_/_/ _/ _/ _/ _/_/_/_/ _/ _/_/_/_/_/ _/_/_/_/ _/ _/ _/_/_/_/_/ _/ Innovative Data Services, Inc. Serving South-Eastern Michigan Internet Service Provider / Hardware Sales / Consulting Services Voice: (248)855-2118 / Fax: (248)855-0696 / Web: http://www.id.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 20:10:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA00838 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 20:10:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA00774 for ; Thu, 8 Oct 1998 20:10:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id UAA16319; Thu, 8 Oct 1998 20:10:01 -0700 (PDT) Received: from smtp3.erols.com (smtp3.erols.com [207.172.3.236]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA29706 for ; Thu, 8 Oct 1998 20:04:01 -0700 (PDT) (envelope-from shmit@natasya.noc.erols.net) Received: from natasya.noc.erols.net (natasya.noc.erols.net [207.172.25.236]) by smtp3.erols.com (8.8.8/8.8.5) with ESMTP id XAA24515 for ; Thu, 8 Oct 1998 23:03:54 -0400 (EDT) Received: (from shmit@localhost) by natasya.noc.erols.net (8.9.1/8.9.1) id XAA15351; Thu, 8 Oct 1998 23:03:54 -0400 (EDT) Message-Id: <199810090303.XAA15351@natasya.noc.erols.net> Date: Thu, 8 Oct 1998 23:03:54 -0400 (EDT) From: Brian Cully Reply-To: shmit@rcn.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8221: Panic in tulip driver. Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8221 >Category: kern >Synopsis: Panic in tulip driver. >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Oct 8 20:10:00 PDT 1998 >Last-Modified: >Originator: Brian Cully >Organization: >Release: FreeBSD 3.0-BETA i386 >Environment: FreeBSD natasya.noc.erols.net 3.0-BETA FreeBSD 3.0-BETA #0: Tue Oct 6 17:28:47 EDT 1998 shmit@natasya.noc.erols.net:/usr/src/sys/compile/NATASYA i386 >Description: Under heavy network load the tulip driver panics like so: Fatal trap 12: page fault while in kernel mode fault virtual address = 0xefc00000 fault code = supervisor read, page not present instruction pointer = 0x8:0xf01b6e69 stack pointer = 0x10:0xf4aefd9c frame pointer = 0x10:0xf4aefdd0 code segment = base 0x0, limit 0xffff, type 0x1b = DPL0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resum, IOPL = 0 current process = 260 (cvsup) interrupt mask = net kernel: type 12 trap code = 0 Stopped at _tulip_txput+0x111: movl _PTmap(,%eax,4),%edx db> trace _tulip_txput [blah blah] _tulip_ifstart_one _ether_output _ip_output _tcp_output _tcp_input _ipintr swi_net_next() I don't know how useful this dump is, but it's been the cause of a lot of panics on my machine, and has been for the last couple of months. >How-To-Repeat: >Fix: I wish I could do that. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Thu Oct 8 20:34:42 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA04953 for freebsd-bugs-outgoing; Thu, 8 Oct 1998 20:34:42 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from george.lbl.gov (george.lbl.gov [131.243.2.12]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA04852 for ; Thu, 8 Oct 1998 20:34:24 -0700 (PDT) (envelope-from jin@george.lbl.gov) Received: (from jin@localhost) by george.lbl.gov (8.8.8/8.8.8) id UAA25952; Thu, 8 Oct 1998 20:34:04 -0700 (PDT) Date: Thu, 8 Oct 1998 20:34:04 -0700 (PDT) From: Jin Guojun (FTG staff) Message-Id: <199810090334.UAA25952@george.lbl.gov> To: dag-erli@ifi.uio.no, grog@lemis.com Subject: Re: a.out version of gdb (was: what is changed in 3.0 for "ld" making lkm module) Cc: bugs@FreeBSD.ORG Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org } >> What is the solution to tell gdb to debug the kernel compiled with -aout? } > } > Compile an a.out version of gdb. } } You can pick one up at ftp://ftp.lemis.com/pub/vinum/gdb-aout. } } Greg Thank you very much. It saves a lot of work of using printf to debug the Zeitnet ATM driver ported from FreeBSD 1.x/2.x to FreeBSD 3.0. -Jin To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 01:50:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA23460 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 01:50:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA23440 for ; Fri, 9 Oct 1998 01:50:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id BAA28178; Fri, 9 Oct 1998 01:50:01 -0700 (PDT) Received: from ns.kf.mnc.waseda.ac.jp (ns.kf.mnc.waseda.ac.jp [133.9.10.98]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA23346 for ; Fri, 9 Oct 1998 01:49:17 -0700 (PDT) (envelope-from fujimoto@ns.kf.mnc.waseda.ac.jp) Received: (from fujimoto@localhost) by ns.kf.mnc.waseda.ac.jp (8.8.8/3.6Wbeta5/970731) id RAA27839; Fri, 9 Oct 1998 17:49:10 +0900 (JST) Message-Id: <199810090849.RAA27839@ns.kf.mnc.waseda.ac.jp> Date: Fri, 9 Oct 1998 17:49:10 +0900 (JST) From: fujimoto@oscar.elec.waseda.ac.jp Reply-To: fujimoto@oscar.elec.waseda.ac.jp To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8225: /usr/bin/head -c never exit for short inputs Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8225 >Category: bin >Synopsis: /usr/bin/head -c never exit for short inputs >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Oct 9 01:50:00 PDT 1998 >Last-Modified: >Originator: FUJIMOTO Kensaku >Organization: Waseda University >Release: FreeBSD 2.2.7-RELEASE i386 >Environment: FreeBSD /usr/bin/head with "-c" option has this bug. FreeBSD 2.2.7-RELEASE and FreeBSD-current also contain it. >Description: "head -c " never exit and loops forever (until it is killed), if the input stream has fewer bytes than specified (n). >How-To-Repeat: echo abc | head -c 10 >Fix: Please apply the patch below: --- ../ORIG/head/head.c Mon Sep 15 17:17:20 1997 +++ head.c Fri Oct 9 17:10:04 1998 @@ -155,7 +155,7 @@ else readlen = sizeof(buf); readlen = fread(buf, sizeof(char), readlen, fp); - if (readlen == EOF) + if (readlen == 0) break; if (fwrite(buf, sizeof(char), readlen, stdout) != readlen) err(1, "stdout"); >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 02:32:47 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAA28099 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 02:32:47 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from ifi.uio.no (ifi.uio.no [129.240.64.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA28081 for ; Fri, 9 Oct 1998 02:32:38 -0700 (PDT) (envelope-from dag-erli@ifi.uio.no) Received: from hvergelmir.ifi.uio.no (2602@hvergelmir.ifi.uio.no [129.240.64.129]) by ifi.uio.no (8.8.8/8.8.7/ifi0.2) with ESMTP id LAA08736; Fri, 9 Oct 1998 11:32:29 +0200 (MET DST) Received: (from dag-erli@localhost) by hvergelmir.ifi.uio.no ; Fri, 9 Oct 1998 11:32:28 +0200 (MET DST) Mime-Version: 1.0 To: Bill Fenner Cc: freebsd-bugs@FreeBSD.ORG Subject: Re: conf/8213: config errors References: <199810082250.PAA28762@mango.parc.xerox.com> Organization: University of Oslo, Department of Informatics X-url: http://www.stud.ifi.uio.no/~dag-erli/ X-other-addresses: 'finger dag-erli@ifi.uio.no' for a list X-disclaimer-1: The views expressed in this article are mine alone, and do X-disclaimer-2: not necessarily coincide with those of any organisation or X-disclaimer-3: company with which I am or have been affiliated. X-Stop-Spam: http://www.cauce.org/ From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Date: 09 Oct 1998 11:32:27 +0200 In-Reply-To: Bill Fenner's message of "Thu, 8 Oct 1998 15:50:37 PDT" Message-ID: Lines: 12 X-Mailer: Gnus v5.5/Emacs 19.34 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by hub.freebsd.org id CAA28089 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Bill Fenner writes: > In message <199810082140.OAA06267@freefall.freebsd.org>you write: > > It *was* a bug in GENERIC and LINT for a short while, though (about > > four hours or something, before David fixed it) > Only low by 50 hours. Huh? I must have read that log with my eyes shut, ISTR there were two commits, one at roughly 4 am and one at roughly 7:30 am the same day. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 03:42:13 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA07332 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 03:42:13 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA07255; Fri, 9 Oct 1998 03:41:43 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA01433; Fri, 9 Oct 1998 03:41:42 -0700 (PDT) Date: Fri, 9 Oct 1998 03:41:42 -0700 (PDT) Message-Id: <199810091041.DAA01433@freefall.freebsd.org> To: fujimoto@oscar.elec.waseda.ac.jp, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/8225 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: /usr/bin/head -c never exit for short inputs State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Fri Oct 9 03:40:20 PDT 1998 State-Changed-Why: Fixed in revision 1.9 (current) and 1.3.2.4 (stable) of src/usr.bin/head/head.c, thanks! To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 08:20:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA17925 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 08:20:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA17910 for ; Fri, 9 Oct 1998 08:20:05 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA17041; Fri, 9 Oct 1998 08:20:01 -0700 (PDT) Received: from gw-nl1.philips.com (gw-nl1.philips.com [192.68.44.33]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA17834 for ; Fri, 9 Oct 1998 08:19:38 -0700 (PDT) (envelope-from Jos.Backus@nl.origin-it.com) Received: from smtprelay-nl1.philips.com (localhost.philips.com [127.0.0.1]) by gw-nl1.philips.com with ESMTP id RAA17828 for ; Fri, 9 Oct 1998 17:19:29 +0200 (MEST) (envelope-from Jos.Backus@nl.origin-it.com) Received: from hal.mpn.cp.philips.com (hal.mpn.cp.philips.com [130.139.64.195]) by smtprelay-nl1.philips.com (8.8.5/8.6.10-1.2.2m-970826) with SMTP id RAA14200 for ; Fri, 9 Oct 1998 17:19:28 +0200 (MET DST) Received: (qmail 9080 invoked by uid 666); 9 Oct 1998 15:19:49 -0000 Message-Id: <19981009151949.9079.qmail@hal.mpn.cp.philips.com> Date: 9 Oct 1998 15:19:49 -0000 From: Jos.Backus@nl.origin-it.com Reply-To: jos@hal.mpn.cp.philips.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8231: /etc/rc contains a dangerous typo. Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8231 >Category: bin >Synopsis: /etc/rc will not be executed properly >Confidential: no >Severity: serious >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Oct 9 08:20:01 PDT 1998 >Last-Modified: >Originator: Jos Backus >Organization: Origin B.V. >Release: FreeBSD 3.0-BETA i386 >Environment: -current as of 1998/10/08 >Description: /etc/rc starts with a single quote (') character, probably a result of a typing glitch (I know, I have a keyboard that makes me do that occasionally). >How-To-Repeat: cp -p /usr/src/etc /etc/rc reboot # watch the screen! >Fix: s%'#!/bin/sh%#!/bin/sh% >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 10:14:34 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA06635 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 10:14:34 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA06448; Fri, 9 Oct 1998 10:13:58 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id KAA20985; Fri, 9 Oct 1998 10:13:57 -0700 (PDT) Date: Fri, 9 Oct 1998 10:13:57 -0700 (PDT) Message-Id: <199810091713.KAA20985@freefall.freebsd.org> To: jos@hal.mpn.cp.philips.com, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/8231 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: /etc/rc will not be executed properly State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Fri Oct 9 10:13:36 PDT 1998 State-Changed-Why: Fixed, thanks. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 11:50:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA24359 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 11:50:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA24340 for ; Fri, 9 Oct 1998 11:50:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id LAA26990; Fri, 9 Oct 1998 11:50:02 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA23002; Fri, 9 Oct 1998 11:41:24 -0700 (PDT) (envelope-from nobody) Message-Id: <199810091841.LAA23002@hub.freebsd.org> Date: Fri, 9 Oct 1998 11:41:24 -0700 (PDT) From: ben@rosengart.com To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: kern/8235: kernel refuses to dump core Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8235 >Category: kern >Synopsis: kernel refuses to dump core >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Oct 9 11:50:01 PDT 1998 >Last-Modified: >Originator: Ben Rosengart >Organization: Icon CMT Corp. >Release: 3.0-beta >Environment: FreeBSD narcissus.net 3.0-BETA FreeBSD 3.0-BETA #0: Tue Oct 6 00:07:56 EDT 1998 root@narcissus.net:/usr/src/sys/compile/DSUEVEN i386 >Description: At DES' suggestion, I compiled up a DDB kernel, booted the system with it, dropped to the debugger, and called panic. The result: syncing disks... Fatal trap 12: page fault while in kernel mode fault virtual address = 0x30 fault code = supervisor read, page not present instruction pointer = 0x8:0xf017af00 stack pointer = 0x10:0xf01d1cdc frame pointer = 0x10:0xf01d1ce0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = Idle interrupt mask = tty bio kernel: type 12 trap, code=0 Stopped at _Debugger+0x35: movb $0,_in_Debugger.98 When I called panic again, the system printed a "dumping" message, but simply hung, and eventually printed an I/O error message and offered to reboot. Since the output of nm /kernel | sort is about 175K, rather than spam the list with it, I put it at http://www.interport.net/~float/nm.out. Here is my dmesg.boot: Copyright (c) 1992-1998 FreeBSD Inc. Copyright (c) 1982, 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved. FreeBSD 3.0-BETA #0: Tue Oct 6 00:07:56 EDT 1998 root@narcissus.net:/usr/src/sys/compile/DSUEVEN Timecounter "i8254" frequency 1193182 Hz cost 3499 ns Timecounter "TSC" frequency 199433076 Hz cost 252 ns CPU: Pentium Pro (199.43-MHz 686-class CPU) Origin = "GenuineIntel" Id = 0x617 Stepping=7 Features=0xf9ff real memory = 100663296 (98304K bytes) avail memory = 95535104 (93296K bytes) Probing for devices on PCI bus 0: chip0: rev 0x02 on pci0.0.0 chip1: rev 0x01 on pci0.7.0 vga0: rev 0x06 int a irq 11 on pci0.11.0 bt0: rev 0x08 int a irq 9 on pci0.15.0 bt0: BT-948 FW Rev. 5.05R Ultra Narrow SCSI Host Adapter, SCSI ID 7, 192 CCBs Probing for devices on the ISA bus: sc0 at 0x60-0x6f irq 1 on motherboard sc0: VGA color <16 virtual consoles, flags=0x0> ed0 at 0x300-0x31f irq 10 on isa ed0: address 00:40:05:1e:df:32, type NE2000 (16 bit) sio0 at 0x3f8-0x3ff irq 4 flags 0x10 on isa sio0: type 16550A sio1 at 0x2f8-0x2ff irq 3 on isa sio1: type 16550A lpt0 at 0x378-0x37f irq 7 on isa lpt0: Interrupt-driven port lp0: TCP/IP capable interface pcm0 at 0x220 irq 5 drq 1 on isa WARNING: sb: misconfigured secondary DMA channel fdc0 at 0x3f0-0x3f7 irq 6 drq 2 on isa fdc0: FIFO enabled, 8 bytes threshold fd0: 1.44MB 3.5in bt: unit number (1) too high bt1 not found npx0 on motherboard npx0: INT 16 interface changing root device to da0s1a da0 at bt0 bus 0 target 0 lun 0 da0: Fixed Direct Access SCSI2 device da0: 3.300MB/s transfers, Tagged Queueing Enabled da0: 2048MB (4194304 512 byte sectors: 255H 63S/T 261C) da1 at bt0 bus 0 target 6 lun 0 da1: Fixed Direct Access SCSI2 device da1: 3.300MB/s transfers, Tagged Queueing Enabled da1: 3067MB (6281856 512 byte sectors: 255H 63S/T 391C) WARNING: / was not properly dismounted cd0 at bt0 bus 0 target 2 lun 0 cd0: Removable CD-ROM SCSI2 device cd0: 3.300MB/s transfers cd0: cd present [193127 x 2048 byte records] ffs_mountfs: superblock updated ffs_mountfs: superblock updated >How-To-Repeat: Boot with DDB, drop to debugger, call panic. As far as I can tell, no one else is experiencing this problem. >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 12:05:41 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA26174 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 12:05:41 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA26158; Fri, 9 Oct 1998 12:05:31 -0700 (PDT) (envelope-from imp@FreeBSD.org) From: Warner Losh Received: (from imp@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id MAA27887; Fri, 9 Oct 1998 12:05:30 -0700 (PDT) Date: Fri, 9 Oct 1998 12:05:30 -0700 (PDT) Message-Id: <199810091905.MAA27887@freefall.freebsd.org> To: peter@baileynm.com, imp@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: i386/8079 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Adaptec 1542 on 3.0-BETA fails to initialize mailboxes State-Changed-From-To: open-closed State-Changed-By: imp State-Changed-When: Fri Oct 9 13:04:55 MDT 1998 State-Changed-Why: I fixed this bug by enabling the mailbox initialization for cards that had their bios enabled. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 12:46:32 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA03459 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 12:46:32 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from arc.hq.cti.ru (arc.hq.cti.ru [195.34.40.3]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA03442 for ; Fri, 9 Oct 1998 12:46:29 -0700 (PDT) (envelope-from tejblum@arc.hq.cti.ru) Received: from arc.hq.cti.ru (localhost [127.0.0.1]) by arc.hq.cti.ru (8.9.0/8.9.0) with ESMTP id XAA26980 for ; Fri, 9 Oct 1998 23:46:17 +0400 (MSD) Message-Id: <199810091946.XAA26980@arc.hq.cti.ru> X-Mailer: exmh version 2.0zeta 7/24/97 To: freebsd-bugs@FreeBSD.ORG Subject: Bug in pmap_ts_referenced? Date: Fri, 09 Oct 1998 23:46:17 +0400 From: Dmitrij Tejblum Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org It seems that the loop in pmap_ts_referenced checks only one pv_entry: it move the first pv_entry to the tail of the pv_table_t TAIL_QUEUE, and then loops to next pv_entry... I suspect this is not desired. (The moving pv_entry to the end of TAIL_QUEUE was introduced 1998/03/16 (rev 1.190) by John Dyson.) Dima To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 13:35:37 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA13616 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 13:35:37 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA13497; Fri, 9 Oct 1998 13:34:53 -0700 (PDT) (envelope-from dt@FreeBSD.org) From: Dmitrij Tejblum Received: (from dt@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA00924; Fri, 9 Oct 1998 13:34:51 -0700 (PDT) Date: Fri, 9 Oct 1998 13:34:51 -0700 (PDT) Message-Id: <199810092034.NAA00924@freefall.freebsd.org> To: dick@tar.com, dt@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/7744 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Pthread scheduler bug State-Changed-From-To: open-closed State-Changed-By: dt State-Changed-When: Fri Oct 9 13:34:17 PDT 1998 State-Changed-Why: Fixed in -current. Thanks. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 14:45:27 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id OAA27280 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 14:45:27 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id OAA27182; Fri, 9 Oct 1998 14:44:52 -0700 (PDT) (envelope-from gibbs@FreeBSD.org) From: "Justin T. Gibbs" Received: (from gibbs@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id OAA03482; Fri, 9 Oct 1998 14:44:47 -0700 (PDT) Date: Fri, 9 Oct 1998 14:44:47 -0700 (PDT) Message-Id: <199810092144.OAA03482@freefall.freebsd.org> To: ben@rosengart.com, gibbs@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, gibbs@FreeBSD.ORG Subject: Re: kern/8235 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: kernel refuses to dump core State-Changed-From-To: open-closed State-Changed-By: gibbs State-Changed-When: Fri Oct 9 14:43:38 PDT 1998 State-Changed-Why: Fixed in rev 1.5 of sys/dev/buslogic/bt.c Responsible-Changed-From-To: freebsd-bugs->gibbs Responsible-Changed-By: gibbs Responsible-Changed-When: Fri Oct 9 14:43:38 PDT 1998 Responsible-Changed-Why: I wrote this driver. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 20:40:24 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id UAA28809 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 20:40:24 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id UAA28712 for ; Fri, 9 Oct 1998 20:40:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id UAA14753; Fri, 9 Oct 1998 20:40:00 -0700 (PDT) Received: from nhj.nlc.net.au (nhj.nlc.net.au [203.24.133.1]) by hub.freebsd.org (8.8.8/8.8.8) with SMTP id UAA26634 for ; Fri, 9 Oct 1998 20:30:22 -0700 (PDT) (envelope-from john@pacer.nlc.net.au) Received: (qmail 2749 invoked from network); 10 Oct 1998 13:30:10 +1000 Received: from pacer.nlc.net.au (203.24.133.8) by nhj.nlc.net.au with SMTP; 10 Oct 1998 13:30:10 +1000 Received: (from john@localhost) by pacer.nlc.net.au (8.8.8/8.8.8) id NAA26299; Sat, 10 Oct 1998 13:37:44 +1000 (EST) (envelope-from john) Message-Id: <199810100337.NAA26299@pacer.nlc.net.au> Date: Sat, 10 Oct 1998 13:37:44 +1000 (EST) From: john@nlc.net.au Reply-To: john@nlc.net.au To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: i386/8245: SB16 MIDI probe message Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8245 >Category: i386 >Synopsis: Probe message for SoundBlaster 16 midi is bad >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Fri Oct 9 20:40:00 PDT 1998 >Last-Modified: >Originator: John Saunders >Organization: NORTHLINK COMMUNICATIONS >Release: FreeBSD 2.2.7-STABLE i386 >Environment: FreeBSD 2.2.7 with SB16/SB32/SB64 card. >Description: SB16 midi port probe message looks bad. >How-To-Repeat: Configure kernel to probe for SB16 midi port. >Fix: See attached patch. --- sys/i386/isa/sound/sb16_midi.c.ctm Sun Mar 15 01:39:18 1998 +++ sys/i386/isa/sound/sb16_midi.c Sun Mar 15 01:41:22 1998 @@ -233,7 +233,11 @@ return mem_start; } +#if defined(__FreeBSD__) + printk ("sbmidi0: "); +#else printk (" "); +#endif std_midi_synth.midi_dev = my_dev = num_midis; midi_devs[num_midis++] = &sb16midi_operations; >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 21:59:29 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id VAA13427 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 21:59:29 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id VAA13187; Fri, 9 Oct 1998 21:57:59 -0700 (PDT) (envelope-from steve@FreeBSD.org) From: Steve Price Received: (from steve@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id VAA20748; Fri, 9 Oct 1998 21:57:58 -0700 (PDT) Date: Fri, 9 Oct 1998 21:57:58 -0700 (PDT) Message-Id: <199810100457.VAA20748@freefall.freebsd.org> To: steve@FreeBSD.ORG, gnats-admin@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: pending/8177 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Any user can view other users "chmod 700" home dirs with locate. Responsible-Changed-From-To: gnats-admin->freebsd-bugs Responsible-Changed-By: steve Responsible-Changed-When: Fri Oct 9 21:57:11 PDT 1998 Responsible-Changed-Why: Misfiled PR. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 23:08:19 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA22149 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 23:08:19 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA22144; Fri, 9 Oct 1998 23:08:15 -0700 (PDT) (envelope-from ken@FreeBSD.org) From: Kenneth Merry Received: (from ken@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id XAA25382; Fri, 9 Oct 1998 23:08:14 -0700 (PDT) Date: Fri, 9 Oct 1998 23:08:14 -0700 (PDT) Message-Id: <199810100608.XAA25382@freefall.freebsd.org> To: ken@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG, se@FreeBSD.ORG Subject: Re: kern/8074 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: CAM rescan operation fatal Responsible-Changed-From-To: freebsd-bugs->se Responsible-Changed-By: ken Responsible-Changed-When: Fri Oct 9 23:06:55 PDT 1998 Responsible-Changed-Why: This appears to be a problem with the NCR driver. Stefan wrote the NCR driver, and is the person most likely to be able to decipher the NCR error messages in this PR. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Fri Oct 9 23:19:25 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA23256 for freebsd-bugs-outgoing; Fri, 9 Oct 1998 23:19:25 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA23251; Fri, 9 Oct 1998 23:19:20 -0700 (PDT) (envelope-from kato@FreeBSD.org) From: KATO Takenori Received: (from kato@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id XAA25764; Fri, 9 Oct 1998 23:19:19 -0700 (PDT) Date: Fri, 9 Oct 1998 23:19:19 -0700 (PDT) Message-Id: <199810100619.XAA25764@freefall.freebsd.org> To: kbyanc@freedomnet.com, kato@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: i386/7890 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: New (fixed) AMD processor detection patch (with write allocate feature) State-Changed-From-To: open-closed State-Changed-By: kato State-Changed-When: Fri Oct 9 23:18:26 PDT 1998 State-Changed-Why: AMD write allocate has been supported in current. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 01:20:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id BAA06872 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 01:20:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA06846 for ; Sat, 10 Oct 1998 01:20:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id BAA28450; Sat, 10 Oct 1998 01:20:01 -0700 (PDT) Received: from k6n1.znh.org (dialup4.gaffaneys.com [208.155.161.54]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id BAA05492 for ; Sat, 10 Oct 1998 01:10:32 -0700 (PDT) (envelope-from zach@gaffaneys.com) Received: (from zach@localhost) by k6n1.znh.org (8.9.1/8.9.1) id IAA13069; Sat, 10 Oct 1998 08:10:40 GMT (envelope-from zach) Message-Id: <199810100810.IAA13069@k6n1.znh.org> Date: Sat, 10 Oct 1998 08:10:40 GMT From: zach@gaffaneys.com Reply-To: zach@gaffaneys.com To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: bin/8250: buffer overflow in mail(1) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8250 >Category: bin >Synopsis: buffer overflow in mail(1) >Confidential: no >Severity: critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 01:20:01 PDT 1998 >Last-Modified: >Originator: Zach Heilig >Organization: none >Release: FreeBSD 3.0-BETA i386 >Environment: >Description: >How-To-Repeat: 1) set TMPDIR to any string longer than 14 characters. 2) run 'mail' Thanks to Studded (Doug) for stumbling across this one :-) >Fix: Index: temp.c =================================================================== RCS file: /home/ncvs/src/usr.bin/mail/temp.c,v retrieving revision 1.3 diff -u -r1.3 temp.c --- temp.c 1997/07/24 06:56:33 1.3 +++ temp.c 1998/10/10 07:16:34 @@ -49,11 +49,11 @@ * Give names to all the temporary files that we will need. */ -char tempMail[24]; -char tempQuit[24]; -char tempEdit[24]; -char tempResid[24]; -char tempMesg[24]; +char tempMail[FILENAME_MAX]; +char tempQuit[FILENAME_MAX]; +char tempEdit[FILENAME_MAX]; +char tempResid[FILENAME_MAX]; +char tempMesg[FILENAME_MAX]; char *tmpdir; void @@ -72,6 +72,11 @@ cp[len] = '/'; cp[len + 1] = '\0'; tmpdir = cp; + } + + if ((strlen(tmpdir) + sizeof("RsXXXXXX")) > sizeof tempMail) { + printf("ERROR: Temporary filename buffers are not big enough!\n"); + exit(1); } strcpy(tempMail, tmpdir); >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 03:00:27 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA16252 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 03:00:27 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA16186; Sat, 10 Oct 1998 03:00:08 -0700 (PDT) (envelope-from thepish@FreeBSD.org) From: Peter Hawkins Received: (from thepish@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA00819; Sat, 10 Oct 1998 03:00:07 -0700 (PDT) Date: Sat, 10 Oct 1998 03:00:07 -0700 (PDT) Message-Id: <199810101000.DAA00819@freefall.freebsd.org> To: zach@gaffaneys.com, thepish@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: bin/8250 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: buffer overflow in mail(1) State-Changed-From-To: open-closed State-Changed-By: thepish State-Changed-When: Sat Oct 10 02:58:31 PDT 1998 State-Changed-Why: Fixed (using malloc as opposed to supplied patch). Redefined tempMail[] as char *tempMail (etc) throughout. Thanks (thanks too to Studded). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 03:28:20 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA19389 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 03:28:20 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA19350; Sat, 10 Oct 1998 03:28:08 -0700 (PDT) (envelope-from des@FreeBSD.org) From: "Dag-Erling C. Sm\xf8rgrav" Received: (from des@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id DAA01323; Sat, 10 Oct 1998 03:28:06 -0700 (PDT) Date: Sat, 10 Oct 1998 03:28:06 -0700 (PDT) Message-Id: <199810101028.DAA01323@freefall.freebsd.org> To: john@nlc.net.au, des@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: i386/8245 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: Probe message for SoundBlaster 16 midi is bad State-Changed-From-To: open-closed State-Changed-By: des State-Changed-When: Sat Oct 10 03:27:31 PDT 1998 State-Changed-Why: Fixed in revision 1.10.2.3 of src/sys/i386/isa/sound/sb16_midi.c, thanks. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 07:20:06 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id HAA11019 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 07:20:06 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA11010 for ; Sat, 10 Oct 1998 07:20:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id HAA17328; Sat, 10 Oct 1998 07:20:01 -0700 (PDT) Received: from online.no (pilt-s.online.no [193.212.1.34]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id HAA10917 for ; Sat, 10 Oct 1998 07:18:13 -0700 (PDT) (envelope-from zerium@zerium.dyn.ml.org) Received: from zerium.dyn.ml.org (ti34a26-0012.dialup.online.no [130.67.65.140]) by online.no (8.9.1/8.9.1) with ESMTP id QAA10151 for ; Sat, 10 Oct 1998 16:18:01 +0200 (MET DST) Received: (from zerium@localhost) by zerium.dyn.ml.org (8.9.1/8.9.1) id TAA20293; Fri, 9 Oct 1998 19:40:04 +0200 (CEST) (envelope-from zerium) Message-Id: <199810091740.TAA20293@zerium.dyn.ml.org> Date: Fri, 9 Oct 1998 19:40:04 +0200 (CEST) From: zerium@webindex.no Reply-To: zerium@zerium.dyn.ml.org To: FreeBSD-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: 3.2 Subject: kern/8252: popen/pclose leaks Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8252 >Category: kern >Synopsis: popen/pclose leaks >Confidential: yes >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 07:20:01 PDT 1998 >Last-Modified: >Originator: Hans Petter Bieker >Organization: >Release: FreeBSD 3.0-BETA i386 >Environment: FreeBSD XXXXXXXXXX 3.0-BETA FreeBSD 3.0-BETA #2: Thu Oct 8 03:33:05 \ CEST 1998 root@XXXXXXXXXX:/usr/src/sys/compile/ZERIUM i386 >Description: A pclose() after a popen does not free all the uses memory. This is only a problem in v3.0, not in v2.2.x. The RCS diff between the popen.c in v2.2 and v3.0 is null, nil, no, nothing. I'm not sure if the libc function calls leaks or if it's a kernel problem. >How-To-Repeat: #include int main(argc, argv) int argc; char *argv[]; { for (;;) { FILE *pfile; pfile = popen("true", "r"); if (!pfile) break; if (pclose(pfile) == -1) break; } return 0; } run it and watch the process grow: zerium 14211 0.0 0.6 804 452 v0 S+ 5:56pm 0:00.06 myprocess zerium 14211 4.9 0.8 948 596 v0 S+ 5:56pm 0:00.23 myprocess zerium 14211 5.3 1.1 1208 856 v0 S+ 5:56pm 0:00.54 myprocess zerium 14211 5.3 1.4 1500 1148 v0 R+ 5:56pm 0:00.87 myprocess zerium 14211 5.7 1.9 1860 1508 v0 S+ 5:56pm 0:01.29 myprocess zerium 14211 5.5 2.4 2228 1876 v0 S+ 5:56pm 0:01.72 myprocess zerium 14211 5.5 3.1 2832 2480 v0 S+ 5:56pm 0:02.42 myprocess zerium 14211 5.9 3.4 3076 2724 v0 S+ 5:56pm 0:02.70 myprocess zerium 14211 6.3 3.8 3372 3020 v0 S+ 5:56pm 0:03.05 myprocess zerium 14211 5.9 4.2 3712 3360 v0 S+ 5:56pm 0:03.45 myprocess ^^^^ ^^^^ >Fix: N/A >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 08:00:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA14679 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 08:00:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA14623 for ; Sat, 10 Oct 1998 08:00:04 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA19320; Sat, 10 Oct 1998 08:00:02 -0700 (PDT) Date: Sat, 10 Oct 1998 08:00:02 -0700 (PDT) Message-Id: <199810101500.IAA19320@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Jonathan Lemon Subject: Re: kern/8252: popen/pclose leaks Reply-To: Jonathan Lemon Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8252; it has been noted by GNATS. From: Jonathan Lemon To: zerium@zerium.dyn.ml.org Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: kern/8252: popen/pclose leaks Date: Sat, 10 Oct 1998 09:54:16 -0500 This is a problem in the interaction between vfork() and execl(). The new vfork semantics are such that the child uses the parent's address space, not COW. execl calls malloc() to build the correct argv vector to pass to execve. This malloc'ed area used to be thrown away after execve creates a new address space, but now hangs around in the parent's address space, creating a leak. Quick-n-dirty fix is to turn off fast vfork: sysctl -w kern.kern_vfork=0 A better fix would be to somehow release the malloc'd area on a call to execve(). -- Jonathan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 08:30:22 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id IAA17829 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 08:30:22 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id IAA17744 for ; Sat, 10 Oct 1998 08:30:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id IAA20669; Sat, 10 Oct 1998 08:30:00 -0700 (PDT) Date: Sat, 10 Oct 1998 08:30:00 -0700 (PDT) Message-Id: <199810101530.IAA20669@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: Bruce Evans Subject: Re: kern/8252: popen/pclose leaks Reply-To: Bruce Evans Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8252; it has been noted by GNATS. From: Bruce Evans To: FreeBSD-gnats-submit@FreeBSD.ORG, zerium@webindex.no Cc: Subject: Re: kern/8252: popen/pclose leaks Date: Sun, 11 Oct 1998 01:22:31 +1000 >This is only a problem in v3.0, not in v2.2.x. > >The RCS diff between the popen.c in v2.2 and v3.0 is null, nil, no, >nothing. I'm not sure if the libc function calls leaks or if it's a kernel >problem. execl() leaks if vfork() is actually vfork(). Global data should not be changed between vfork() and execve(), but execl() calls malloc(). The simple fix (a tiny pessimization) is to replace vfork() by fork() in popen(). Bruce To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 09:10:09 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id JAA21644 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 09:10:09 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id JAA21578 for ; Sat, 10 Oct 1998 09:10:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id JAA22077; Sat, 10 Oct 1998 09:10:01 -0700 (PDT) Date: Sat, 10 Oct 1998 09:10:01 -0700 (PDT) Message-Id: <199810101610.JAA22077@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.ORG From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Subject: Re: kern/8252: popen/pclose leaks Reply-To: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org The following reply was made to PR kern/8252; it has been noted by GNATS. From: dag-erli@ifi.uio.no (Dag-Erling C. =?iso-8859-1?Q?Sm=F8rgrav?= ) To: zerium@zerium.dyn.ml.org Cc: FreeBSD-gnats-submit@FreeBSD.ORG Subject: Re: kern/8252: popen/pclose leaks Date: 10 Oct 1998 18:02:59 +0200 zerium@webindex.no writes: > >Severity: critical > >Priority: high Hmm, are you sure this is appropriate? > A pclose() after a popen does not free all the uses memory. > > This is only a problem in v3.0, not in v2.2.x. > > The RCS diff between the popen.c in v2.2 and v3.0 is null, nil, no, > nothing. I'm not sure if the libc function calls leaks or if it's a kernel > problem. The leak is related to the use of vfork(). If you replace vfork() with fork() in src/lib/libc/gen/popen.c the bug will disappear. I have a feeling that calling execl() in the child branch of a vfork() might be a pretty bad idea, since execl() calls buildargv() which uses realloc() extensively. DES -- Dag-Erling Smørgrav - dag-erli@ifi.uio.no To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 12:05:27 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id MAA16603 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 12:05:27 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from emmi.physik.TU-Berlin.DE (emmi.physik.TU-Berlin.DE [130.149.160.103]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id MAA16595 for ; Sat, 10 Oct 1998 12:05:19 -0700 (PDT) (envelope-from ibex@emmi.physik.TU-Berlin.DE) Received: (from ibex@localhost) by emmi.physik.TU-Berlin.DE (8.9.1/8.9.1) id VAA08398 for bugs@freebsd.org; Sat, 10 Oct 1998 21:05:07 +0200 (CEST) (envelope-from ibex) Message-ID: <19981010210506.B8072@physik.TU-Berlin.DE> Date: Sat, 10 Oct 1998 21:05:06 +0200 From: Dirk Froemberg To: bugs@FreeBSD.ORG Subject: PR ports/7347 can be closed Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.93i Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi! The version included in this PR was commited sometimes ago by Andreas Klemm. Hence it can be closed 8) Best regards Dirk -- e-mail: ibex@physik.tu-berlin.de To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 13:17:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id NAA26548 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 13:17:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id NAA26533; Sat, 10 Oct 1998 13:16:59 -0700 (PDT) (envelope-from rnordier@FreeBSD.org) From: Robert Nordier Received: (from rnordier@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id NAA29780; Sat, 10 Oct 1998 13:16:57 -0700 (PDT) Date: Sat, 10 Oct 1998 13:16:57 -0700 (PDT) Message-Id: <199810102016.NAA29780@freefall.freebsd.org> To: seggers@semyam.dinoco.de, rnordier@FreeBSD.ORG, freebsd-bugs@FreeBSD.ORG Subject: Re: kern/8174 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: fix for bootloader non-working autoboot State-Changed-From-To: open-closed State-Changed-By: rnordier State-Changed-When: Sat Oct 10 13:14:37 PDT 1998 State-Changed-Why: This has been resolved, and the suggested fix didn't. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 17:00:05 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA17542 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 17:00:05 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA17534 for ; Sat, 10 Oct 1998 17:00:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id RAA05845; Sat, 10 Oct 1998 17:00:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id QAA17426; Sat, 10 Oct 1998 16:57:04 -0700 (PDT) (envelope-from nobody) Message-Id: <199810102357.QAA17426@hub.freebsd.org> Date: Sat, 10 Oct 1998 16:57:04 -0700 (PDT) From: bs@eunet.ch To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: kern/8258: config doesn't like root on sd1 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8258 >Category: kern >Synopsis: config doesn't like root on sd1 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 17:00:00 PDT 1998 >Last-Modified: >Originator: Bernard Steiner >Organization: >Release: 3.0-19981010-BETA >Environment: FreeBSD grimma.anydomain.de 3.0-19980830-SNAP FreeBSD 3.0-19980830-SNAP #9: Tue Oct 6 19:11:34 CEST 1998 root@:/usr/src/sys/compile/GRIMMA i386 >Description: Old kernel config file with "root on sd1" directive fails to work with new 3.0-19981010-BETA system source and config utility. Strangely, root on wd0 is accepted even when there is no wdc/wd configured >How-To-Repeat: use "config kernel root on sd1" in kernel config file and call config >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 17:10:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA18914 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 17:10:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA18884 for ; Sat, 10 Oct 1998 17:10:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id RAA06088; Sat, 10 Oct 1998 17:10:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA17608; Sat, 10 Oct 1998 17:01:30 -0700 (PDT) (envelope-from nobody) Message-Id: <199810110001.RAA17608@hub.freebsd.org> Date: Sat, 10 Oct 1998 17:01:30 -0700 (PDT) From: bs@eunet.ch To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: misc/8259: better order in install Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8259 >Category: misc >Synopsis: better order in install >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 17:10:00 PDT 1998 >Last-Modified: >Originator: Bernard Steiner >Organization: >Release: 3.0-19981010-BETA >Environment: FreeBSD grimma.anydomain.de 3.0-19980830-SNAP FreeBSD 3.0-19980830-SNAP #9: Tue Oct 6 19:11:34 CEST 1998 root@:/usr/src/sys/compile/GRIMMA i386 >Description: The new ELF executables overwrite old a.out executables long before ELF shared libraries and ELF ld.so are put on disk. Should the system crash during the download, it may become uncomfortable to use. >How-To-Repeat: run upgrade from sysinstall >Fix: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 17:40:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA21705 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 17:40:07 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id RAA21650 for ; Sat, 10 Oct 1998 17:40:02 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id RAA06765; Sat, 10 Oct 1998 17:40:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id RAA21419; Sat, 10 Oct 1998 17:38:08 -0700 (PDT) (envelope-from nobody) Message-Id: <199810110038.RAA21419@hub.freebsd.org> Date: Sat, 10 Oct 1998 17:38:08 -0700 (PDT) From: bs@eunet.ch To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: misc/8260: upgrade security breach Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8260 >Category: misc >Synopsis: upgrade security breach >Confidential: no >Severity: critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 17:40:00 PDT 1998 >Last-Modified: >Originator: Bernard Steiner >Organization: >Release: 3.0-19981010-BETA >Environment: FreeBSD grimma.anydomain.de 3.0-19980830-SNAP FreeBSD 3.0-19980830-SNAP #9: Tue Oct 6 19:11:34 CEST 1998 root@:/usr/src/sys/compile/GRIMMA i386 >Description: During an upgrade, it appears that the old password file gets temporarily nuked by a password file that contains an empty root password. There is no flashing sign mentioning this. >How-To-Repeat: Call upgrade from sysinstall >Fix: Put a *** SECURITY WARNING *** with appropriate kind words that it may be a good idea to disable inetd and friends between the upgrade-commit button and the actual upgrade. This is a non-issue for installs running single user mode. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 18:04:02 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA24313 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 18:04:02 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: (from gpalmer@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA24254; Sat, 10 Oct 1998 18:03:56 -0700 (PDT) (envelope-from gpalmer) Date: Sat, 10 Oct 1998 18:03:56 -0700 (PDT) From: Gary Palmer Message-Id: <199810110103.SAA24254@hub.freebsd.org> To: bs@eunet.ch, gpalmer, freebsd-bugs Subject: Re: kern/8258 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Synopsis: config doesn't like root on sd1 State-Changed-From-To: open-closed State-Changed-By: gpalmer State-Changed-When: Sat Oct 10 18:03:21 PDT 1998 State-Changed-Why: Under CAM (now the default scsi layer in 3.0) sd is now called da. If you do root on da1 it should work To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 18:28:42 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA26171 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 18:28:42 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from mail.eunet.ch (mail.eunet.ch [146.228.10.7]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id SAA26081; Sat, 10 Oct 1998 18:27:59 -0700 (PDT) (envelope-from bs@qwerty.eunet.ch) Received: from eunet.ch (qwerty.eunet.ch [146.228.11.110]) by mail.eunet.ch (8.8.6/1.34) via ESMTP id BAA02275; Sun, 11 Oct 1998 01:27:20 GMT env-from (bs@qwerty.eunet.ch) Received: from qwerty.eunet.ch by eunet.ch (8.6.10/EUnet/CH-LEAF-0.3-SPECIAL) id DAA03742; Sun, 11 Oct 1998 03:27:20 +0200 Message-Id: <199810110127.DAA03742@eunet.ch> To: Gary Palmer cc: bs@eunet.ch, gpalmer@hub.freebsd.org, freebsd-bugs@hub.freebsd.org Subject: Re: kern/8258 In-reply-to: Your message of "Sat, 10 Oct 1998 18:03:56 PDT." <199810110103.SAA24254@hub.freebsd.org> From: "Bernard Steiner" Date: Sun, 11 Oct 1998 03:27:11 +0200 Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > Synopsis: config doesn't like root on sd1 > > State-Changed-From-To: open-closed > State-Changed-By: gpalmer > State-Changed-When: Sat Oct 10 18:03:21 PDT 1998 > State-Changed-Why: > Under CAM (now the default scsi layer in 3.0) sd is now called da. If you > do > > root on da1 > > it should work It does indeed. I just didn't expect sd to disappear suddenly. Sorry for not reading the new GENERIC or LINT. (What is CAM ? Time to read the source, I guess ;-) Thanks for the hint Bernard To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message From owner-freebsd-bugs Sat Oct 10 19:10:08 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA28927 for freebsd-bugs-outgoing; Sat, 10 Oct 1998 19:10:08 -0700 (PDT) (envelope-from owner-freebsd-bugs@FreeBSD.ORG) Received: from freefall.freebsd.org (freefall.FreeBSD.ORG [204.216.27.21]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id TAA28912 for ; Sat, 10 Oct 1998 19:10:03 -0700 (PDT) (envelope-from gnats@FreeBSD.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.8/8.8.5) id TAA08205; Sat, 10 Oct 1998 19:10:01 -0700 (PDT) Received: (from nobody@localhost) by hub.freebsd.org (8.8.8/8.8.8) id TAA28715; Sat, 10 Oct 1998 19:06:14 -0700 (PDT) (envelope-from nobody) Message-Id: <199810110206.TAA28715@hub.freebsd.org> Date: Sat, 10 Oct 1998 19:06:14 -0700 (PDT) From: thomma@slip.net To: freebsd-gnats-submit@FreeBSD.ORG X-Send-Pr-Version: www-1.0 Subject: conf/8261: aout-to-elf failed at ldconfig ${AOUTLIBDIRS} Sender: owner-freebsd-bugs@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org >Number: 8261 >Category: conf >Synopsis: aout-to-elf failed at ldconfig ${AOUTLIBDIRS} >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Oct 10 19:10:01 PDT 1998 >Last-Modified: >Originator: Tamiji Homma >Organization: >Release: 3.0-current >Environment: May 24, 1998 SNAP CD >Description: make aout-to-elf failed on the system installed with Express installation (May 24, 1998 SNAP CD). aout/elf build went fine but after moving aout libraries, ldconfig ${AOUTLIBDIRS} failed since there is no /usr/local/lib/aout directory on a freshly installed system. >How-To-Repeat: Install May 24 1998 SNAP CD, choose Express Install. Cvsup -current and do make aout-to-elf. >Fix: ${AOUTLIBDIRS} should not contain non-existing directories. To continue aout-to-elf, I just created /usr/local/lib/aout and redo make aout-to-elf. It went fine. >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-bugs" in the body of the message