From owner-freebsd-stable Mon Nov 18 0:20:46 2002 Delivered-To: freebsd-stable@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 511D237B401; Mon, 18 Nov 2002 00:20:44 -0800 (PST) Received: from whale.sunbay.crimea.ua (whale.sunbay.crimea.ua [212.110.138.65]) by mx1.FreeBSD.org (Postfix) with ESMTP id A0B4343E3B; Mon, 18 Nov 2002 00:20:40 -0800 (PST) (envelope-from ru@whale.sunbay.crimea.ua) Received: from whale.sunbay.crimea.ua (ru@localhost [127.0.0.1]) by whale.sunbay.crimea.ua (8.12.6/8.12.6/Sunbay) with ESMTP id gAI8KO5V087642 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Mon, 18 Nov 2002 10:20:24 +0200 (EET) (envelope-from ru@whale.sunbay.crimea.ua) Received: (from ru@localhost) by whale.sunbay.crimea.ua (8.12.6/8.12.6/Submit) id gAI8KM1g087631; Mon, 18 Nov 2002 10:20:22 +0200 (EET) Date: Mon, 18 Nov 2002 10:20:22 +0200 From: Ruslan Ermilov To: Brian Behlendorf Cc: Peter Wemm , stable@FreeBSD.org Subject: Re: /usr/bin/cvs consumes 60MB of memory, freezes Message-ID: <20021118082022.GA87133@sunbay.com> References: <20021115024248.A352-100000@yez.hyperreal.org> <20021116121050.X9499-100000@yez.hyperreal.org> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="OgqxwSJOaUobr8KG" Content-Disposition: inline In-Reply-To: <20021116121050.X9499-100000@yez.hyperreal.org> User-Agent: Mutt/1.5.1i Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG --OgqxwSJOaUobr8KG Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Nov 16, 2002 at 12:12:32PM -0800, Brian Behlendorf wrote: > On Fri, 15 Nov 2002, Brian Behlendorf wrote: > > On Thu, 14 Nov 2002, Ruslan Ermilov wrote: > > > Does PR gnu/44564 look similar? > > > > Yep, that's the one. I've implemented the small patches at the top of = the > > PR plus the rest of the vendor merge of server.c, rev 1.280. I haven't > > seen any runaways yet, I'll email if I do. >=20 > Update: 32 hours or so of operation without any more runaways. Please > make sure the complete vendor patch in gnu/44564 is applied. >=20 > For what it's worth, I noticed another not-so-nice behavior in the updated > cvs binary: failed passwords are logged to syslog. >=20 Yes, I was about to file a PR on that too. The messages are logged with the LOG_AUTHPRIV facility, which is documented to be secure: : LOG_AUTHPRIV The same as LOG_AUTH, but logged to a file readable only by : selected individuals. This is all OK, because authpriv.* messages are logged to /var/log/auth.log except LOG_AUTHPRIV | LOG_NOTICE are also logged to /var/log/messages. Cheers, --=20 Ruslan Ermilov Sysadmin and DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age --OgqxwSJOaUobr8KG Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQE92KLFUkv4P6juNwoRAshCAJ9DcMnWGlw4Q1lN33BfuqDrqjma3gCfactm rVKu7ic/yprPYUyx227WClw= =sMKl -----END PGP SIGNATURE----- --OgqxwSJOaUobr8KG-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message