Re: ps on 4.0-current

1999-11-24 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], Warner Losh writes:

Not all will agree with this, and it is a change from the past so
there needs to be a sysctl to control this.  And given that it is a
radical change from the past, it needs to default to open.

Now, I can't tell if you wore the security-master hard-hat in this
email or not, and I see some quite divergent australian positions,
so I will sit tight until I see a little bit more of a consensus.

Poul-Henning

--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED]   "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Peter Wemm

Warner Losh wrote:
 In message [EMAIL PROTECTED] Poul-Henning Kamp writes:
 : Warner ?

[.. reasons for and against ..]

 Not all will agree with this, and it is a change from the past so
 there needs to be a sysctl to control this.  And given that it is a
 radical change from the past, it needs to default to open.
 
 Warner

Without wanting to get "please send patches" (I fear sysinstall as much as
anyone), I think it would be really nice to create a place where we can set
a default 'security profile' or something which arranges for these sorts
of things to be set according to the role of the machine.

For example, in "workstation" mode, the reasonable default is "open",
because typically there is one user on the box (other than root) and that
person has root access.  Excessive hiding info from that user just means
that they'll have to use root more, or will give up the idea of using a mortal
user entirely and run everything as root (a Really Bad idea, think of Windoze
and viruses etc etc).

In a dedicated server role, again it might be appropriate to default it to
"open"  (dedicated server being something like a squid box), again there will be
a couple of sysadmin type users or people who have to monitor things.  Hiding
information gains nothing there either.

In other roles, including something like a shell server box with presumably
hostile users (you reasonably have to assume this), you want everything you
possibly can to be locked down.

Oh for ACL's, privilige attributes, etc.  It would solve this sort of thing
nicely so that you could allow admin users to see what's going on
(including a ps -ax and see what the users are running) without having to
constantly (ab)use root and the dangers of overusing that.

Cheers,
-Peter



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread scanner

On Wed, 24 Nov 1999, Doug Rabson wrote:

 We need to put audit tags into the source tree when a file is audited.
 That allows the diffs to be audited later which should be a smaller job
 and then the audit tag slides forward.

Not to interrupt in the middle of this discussion but you might
want to check with robert watson before you guys get too deep here since
he is working on a FUNDED Posix.1e implementation for FreeBSD. And has
already posted some EARLY MAC code. It might be usefull to work with him
as well. Just a thought.

Chris

--

"I've always been mad, I know I've been mad, like most of us have. And you
have to explain why you were mad, even if you're not mad." -PF DsoTM

===| Open Systems FreeBSD Consulting.
   FreeBSD 3.3 is available now!   | Yahoo Messenger ID: opsys_98
---| 1402 N. Washington, Wellington, KS 67152
   FreeBSD: The power to serve!| E-Mail: [EMAIL PROTECTED]
  http://www.freebsd.org   | Consulting, Network Engineering, Security
===| http://open-systems.net



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread Alexey Zelkin

hi,

 MM I have been charged with the duty of ensuring that FreeBSD gets a
 MM security audit that has the credibility of OpenBSD's.

What's going on with FreeBSD Auditing Project
(http://www.FreeBSD.org/auditors.html) ?  Is it still alive ?
I think this task is task of this project members. Or will be ;-)

 MM I'll get a mailing list going if this is deemed necessary.

audit-*@FreeBSD.org ? Or create general list [EMAIL PROTECTED] ?

-- 
/* Alexey Zelkin[EMAIL PROTECTED]*/
/* Tavric National University   [EMAIL PROTECTED]  */
/* http://www.ccssu.crimea.ua/~phantom  [EMAIL PROTECTED] */


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread Brad Knowles

At 1:41 AM -0500 1999/11/24, Brian Fundakowski Feldman wrote:

 Our code doesn't run an a system _anything_ like that.

That may well be true today, however as FreeBSD gets more widely 
ported to other platforms, and as the "native" platforms it runs on 
progress, this might change in the future.  I'd suggest erring on the 
side of paranoia in this case.

-- 
   These are my opinions -- not to be taken as official Skynet policy
  
|o| Brad Knowles, [EMAIL PROTECTED]Belgacom Skynet NV/SA |o|
|o| Systems Architect, News  FTP Admin  Rue Col. Bourg, 124   |o|
|o| Phone/Fax: +32-2-706.11.11/12.49 B-1140 Brussels   |o|
|o| http://www.skynet.be Belgium   |o|
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
  Unix is like a wigwam -- no Gates, no Windows, and an Apache inside.
   Unix is very user-friendly.  It's just picky who its friends are.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



ST-506, ESDI and BAD144 ?

1999-11-24 Thread Poul-Henning Kamp


Sørens new ATA driver can handle all IDE disks as far as has been
tested now, but it doesn't provide bad sector remapping which is
needed for ESDI and ST-506 disks.

Having two drivers fight for the same class of drivers is a rather
messy process, and it complicates the code a fair bit, not to
mention the clutter in end-user documentation.

Considering that most of the machines with ST-506 and ESDI disks
are limited to 16MB ram anyway, I think it would be reasonable to
simply tell the users of these old irons to stick with the 3.X
branch until end of life (there is probably at least 1.5 years more
life in the 3.X branch judging from the history of the 2.2.X branch).

So I would like to propose that we discontinue support for ST-506,
ESDI disks and BAD144 bad-sector remapping starting with the 4.0
release.

So, is anyone running -current on ESDI or ST-506 disks in 
actual applications (as opposed for the gadget/novelty thrill or
testing purposes) ?

--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED]   "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: buildworld across signal changes not quite right

1999-11-24 Thread Marcel Moolenaar

Mark Murray wrote:
 
  I'm not sure how to fix this problem.  Unlike our other build tools,
  perl is not designed to be able to be cross-built:  It builds bits
  of itself and assumes they can be safely executed to build other bits.
 
 Perl is hugely fragile; cross-building it is a big PITA. If you
 have any smart ideas, I'm all ears.

I haven't paid any special attention to it yet.

 (I may have mentioned before that I hate the perl build).

No, but it is so noted now :-)

-- 
Marcel Moolenaarmailto:[EMAIL PROTECTED]
SCC Internetworking  Databases   http://www.scc.nl/
The FreeBSD projectmailto:[EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: buildworld across signal changes not quite right

1999-11-24 Thread Marcel Moolenaar

David Scheidt wrote:
 
 On Tue, 23 Nov 1999, David O'Brien wrote:
 
   Thanks to Marcel's latest Makefile.inc1 changes (1.92), a -current
   buildworld running on an older -current system now progresses much
   further - in fact it now completes :-).
 
  Actually, I've been seeing just the opposite.
  Before you could build a -CURRENT kernel and then the world.  Now those
  with worlds from this past summer can't build today's world regardless
  of which of userland or kernel is built first.
 
 The upgrade from -STABLE is also broken because of this.  The %expect stuff
 is blowing up.  I haven't yet tried to see if building yacc and bison
 manually fixes things or not.

It will.

 I will tomorrow, when I have access to the
 box, assuming my workload doesn't try to kill me first.  (I hadn't reported
 it, because I haven't had time to investigate properly. )

Be prepared to fix gcc and dd too.

-- 
Marcel Moolenaarmailto:[EMAIL PROTECTED]
SCC Internetworking  Databases   http://www.scc.nl/
The FreeBSD projectmailto:[EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Threads and my new job.

1999-11-24 Thread Julian Elischer

Firstly there is some threads discussion going on in -arch so 
I'm going to really reply to this over there..

This is just redirector mail


julian

On Mon, 22 Nov 1999, Jason Evans wrote:

 Walnut Creek has hired me as a full time employee to work primarily on
 improving and expanding FreeBSD's threads support.  This is very exciting
 to me, and I hope my work will be of benefit the FreeBSD community.  
 
[chop]





To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread Rodney W. Grimes

 
 "Rodney W. Grimes" [EMAIL PROTECTED] writes:
 
  It's not so much that they where ``allowed'' to do it, it is more the
  matter that they where never directly served with legal papers from USL/Novell
  to cease all use of Net/2.  Nor did they ever enter into any agreement,
  that I am aware of, with respect to Net/2 code with any party other
  than UCB.
 
 That's half true.  No letter ever received asked us to `cease all use
 of Net/2'.  However, as has been publically stated *numerous* times,
 there does exist an agreement between NetBSD and USL stating that,
 after certain Net/2 files were removed and certain others were updated
 to their 4.4-Lite versions, USL would not bother us again.

That agreement is different than the agreement I have before me.

 
  These agreements basically say that the parties would stop all use of
  Net/2 based code and replace it with BSD4.4 Lite, [...]
 
 That's false.  If the FreeBSD agreement is *anything* like the NetBSD
 one, it covers only specific files, not the entire source tree.

You can't make the claim that this is false, you have not seen the document,
and you can't.  I will assert my statement is true.  I can't say anymore
about it than that as the agreement itself says that it's contents are not
to be disclosed.

The agreement evedently does not look like the one that NetBSD signed.

 
  One could make claim that Novell/USL seriously failed to do ``due dilegence'',
  but they where not protecting a trademark, but instead a copyright and they
  could, if they still owned the code. come along and slap NetBSD/OpenBSD
  with a pretty healthy law suite.
 
 That's also false.  Worse, it's FUD.

Agreed, given the other statements.

  Technically if I where to bring a NetBSD repository over to my box and
  then let anyone other than myself even look at it I would be in violation
  of the USL/Novell agreement due to the fact that the repository contains
  Net/2 code.  :-(.
 
 And that's false, too.

You can't know that, you don't know what my agreement says.  Unless I missed
it some place the ,v files of the NetBSD repository where not purged of
the Net/2 code, unless this was done offline in a non-public manner.  That
I might not know about.  Though the legal agreement between NetBSD and
USL/Novell may have only required NetBSD to purge certain files, my
agreement is very explicit about ALL of Net/2.

 Please check your facts before spewing about legal matters.

My facts on the legal points of this issue are probably at least an order
of magnitude more correct than yours.  NetBSD wouldn't have even seen something
as simple as what it did get from USL had I not spent a month of my time
working with Novel legal to have something palatible we (WC and myself)
could agree to.

-- 
Rod Grimes - KD7CAX @ CN85sl - (RWG25)   [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Compiling XFree86 under Current

1999-11-24 Thread Fritz Heinrichmeyer


Here is how i compiled XFree86 today (an additonal file for
/usr/ports/x11/XFree86/patches):

http://es-i2.fernuni-hagen.de/~jfh/FreeBSD_Documentation/node7.html

-- 
Fritz Heinrichmeyer mailto:[EMAIL PROTECTED]
FernUniversitaet Hagen, LG ES, 58084 Hagen (Germany)
tel:+49 2331/987-1166 fax:987-355 http://ES-i2.fernuni-hagen.de/~jfh


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Buildworld broken in 'usr.bin/kdump' due to ipfilter

1999-11-24 Thread nnd

Buildworld of today current is broken due to
importing of ip_filter's header files with ioctls which
in turn broke building 'usr.bin/kdump'.

It seems to me that 'mkioctls' script in
'kdump' is "over-automated" - it build the list of the
'ioctl_includes' 'grepping' through the 'include' directory.
But often (as in today's sources) new files with ioctls
require manually inserting "prerequisite" includes in the
same 'mkioctl' script. May be it'll be better if we manually
insert BOTH the includes with ioctls and prerequisite files ?

N.Dudorov
 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Overflow in banner(1)

1999-11-24 Thread David O'Brien

On Wed, Nov 24, 1999 at 09:58:51AM +0200, John Hay wrote:
 Well the original line is plain wrong if Brian's patch is being used,
 because there message is a pointer and the size of a pointer is 4.

Yes, yes, yes.  Warner and I are *not* that stupid WRT C.  We were both
commenting on the *original* proposed patch.  Geez.

Now rather than try to call us stupid, Kris (and only Kris) could say,
"well, I've decided to go with a dynamically allocated buffer, so of
course I can't use sizeof() any more".
 
-- 
-- David([EMAIL PROTECTED])


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread Garrett Wollman

On Tue, 23 Nov 1999 23:33:14 -0500 (EST), Brian Fundakowski Feldman 
[EMAIL PROTECTED] said:

 #define SNPARGS(buf, len) buf + len, sizeof(buf)  len ? sizeof(buf) - len : 0
 char action2[32], proto[47], name[18], fragment[17];
 /* Print command name */
 snprintf(SNPARGS(name, 0), "ipfw: %d", f ? f-fw_number : -1);

 Despite the fact that the buffer name[] was made to be exactly the
 largest size

Exactly the largest size of what?  All I see here is a magic number.

Perhaps if name[] had been declared thus:

#define INTTYPE_NCHARS(t) ((sizeof(t) * 3 * CHAR_BIT + 7) / 8)

char name[(sizeof "ipfw: ") + INTTYPE_NCHARS(int)];

...but even then, if KNF is followed, this declaration might be so far
away from the printf format that when the format is modified, the
programmer might forget to modify the declaration as well.

snprintf is a good thing.

-GAWollman

--
Garrett A. Wollman   | O Siem / We are all family / O Siem / We're all the same
[EMAIL PROTECTED]  | O Siem / The fires of freedom 
Opinions not those of| Dance in the burning flame
MIT, LCS, CRS, or NSA| - Susan Aglukark and Chad Irschick


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Warner Losh

In message [EMAIL PROTECTED] Poul-Henning Kamp writes:
: In message [EMAIL PROTECTED], Warner Losh writes:
: 
: Not all will agree with this, and it is a change from the past so
: there needs to be a sysctl to control this.  And given that it is a
: radical change from the past, it needs to default to open.
: 
: Now, I can't tell if you wore the security-master hard-hat in this
: email or not, and I see some quite divergent australian positions,
: so I will sit tight until I see a little bit more of a consensus.

It was with my hat on, but lemme explain a little how I got here.

Before the recent changes to ps, procfs used to not disclose the
command line.  When it was modified to be used with a ps that didn't
need to be set[gu]id it lost this.  I wanted to see it restored for
those people that had depended on this, but realized that it would be
unpopular (and unnecessary) for many people.  As part of the change to
restore the behavior, I wanted the sysctl.  Now that it is half there,
I'd like the other half to complete the picture.

The reason that it was a big deal to me was that on the old system if
you turned off the setuidness of ps, w, et al you would block
disclosure of args/env vars, etc, but still have access to process
lists.  With the change, there was no way to do this which represented
a weakening of the overall system on the whole, despite the strenth
added by taking the setgid bit off ps.

sef has sent me patches that I've not had a chance to review that
appear to implement this.

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Warner Losh

In message [EMAIL PROTECTED] Peter Wemm writes:
: For example, in "workstation" mode, the reasonable default is "open",
: because typically there is one user on the box (other than root) and that
: person has root access.  Excessive hiding info from that user just means
: that they'll have to use root more, or will give up the idea of using a mortal
: user entirely and run everything as root (a Really Bad idea, think of Windoze
: and viruses etc etc).

True.

: In a dedicated server role, again it might be appropriate to default
: it to "open" (dedicated server being something like a squid box),
: again there will be a couple of sysadmin type users or people who
: have to monitor things.  Hiding information gains nothing there
: either.

I disagree with this, but that is because I've rarely seen a totally
dedicated server.  A simple fileserver that does nothing else would
want to be open in this respect since few people have accounts.

: In other roles, including something like a shell server box with presumably
: hostile users (you reasonably have to assume this), you want everything you
: possibly can to be locked down.

Firewall, dialup boxes, dns servers, etc are good candidates to be
locked down.

: Oh for ACL's, privilige attributes, etc.  It would solve this sort of thing
: nicely so that you could allow admin users to see what's going on
: (including a ps -ax and see what the users are running) without having to
: constantly (ab)use root and the dangers of overusing that.

sef suggested this be a procfs mount option.  I think I like this more
than the sysctl option, but don't strong opinion either way (sysctl is
more like most of the rest of the system, while a mount option would
be harder to change on the fly).  Having it be a mount option would
make it possible to have a GID that the files are "owned" by that
could be 'operator' so that operators can see the args, and possibly
other things.

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: FreeBSD security auditing project.

1999-11-24 Thread Warner Losh

In message [EMAIL PROTECTED] Alexey Zelkin writes:
: What's going on with FreeBSD Auditing Project
: (http://www.FreeBSD.org/auditors.html) ?  Is it still alive ?
: I think this task is task of this project members. Or will be ;-)

Went gangbusters for a short while.  Everybody was jazzed.  Parts of
the tree had bugs fixed.  Some bug fixes wound up on the floor.  Poor
central coordination and management of this project was likely a
factor.  It accomplished some things, but left others undone.  It
found nothing major that was snuck in while freefall's root had been
compromised (which was the impetus behind the project in the first
place).

Warner



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Threads and my new job.

1999-11-24 Thread Kip Macy

I will admit that I have had odd behaviours with threads in developing 
Lyris on FreeBSD that I have not seen on Solaris, NT, or Linux. I will 
see things like what appears to be the thread scheduler stop scheduling 
threads and just do a busy wait. I have not tracked it down any further 
for lack of time.
-Kip

On Wed, 24 Nov 1999, Nick Hilliard wrote:

  Why do we need to smite the Linux database servers? With threads in their 
  current state they already outperform Linux's native threads by ~50x for 
  things like sending mail. I would assume that the differences in database 
  performance is similar.
 
 The threads ( the old nfs issues which have now thankfully been fixed) in
 their current state led bCandid to write about the Cyclone news router:
 
 : Issues the w/FreeBSD kernel and buggy threads have required our development
 : team to wait until improvements to the OS can be made.  We did have a beta
 : posted on our website for a while but have since removed it.
 
 disclaimer: I am not a thread hacker.
 
 Nick
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with "unsubscribe freebsd-current" in the body of the message
 
 



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Overflow in banner(1)

1999-11-24 Thread David O'Brien

 I've never done this myself, but I've always been under the impression that
 sizeof(*buf) would work for dynamically allocated buffers.

sizeof() is an operator whose value is determined at compile time.
sizeof(*buf) gives the size of what buf points to.  This would be `1' if
buf were a char*, or `4' if buf were an int* [on the i386].

-- 
-- David([EMAIL PROTECTED])


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Overflow in banner(1)

1999-11-24 Thread Dan Moschuk


| sizeof() is an operator whose value is determined at compile time.
| sizeof(*buf) gives the size of what buf points to.  This would be `1' if
| buf were a char*, or `4' if buf were an int* [on the i386].

Ahh, so I've probably seen this concept used only on structures then.

-- 
Dan Moschuk ([EMAIL PROTECTED])
"Cure for global warming: One giant heatsink and dual fans!"


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Poul-Henning Kamp

In message [EMAIL PROTECTED], Warner Losh writes:
In message [EMAIL PROTECTED] Warner Losh writes:
: sef has sent me patches that I've not had a chance to review that
: appear to implement this.

Actually, these patches do something else.  My mistake for reading
them before caffeine.

So please explain the logic you want implemented once people have
stopped haggeling about it, it is rather trivial.

I pressume we want the same policy for /proc/*/cmdline as for the
sysctl ps(1) uses ?

--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED]   "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Make buildworld blowing up

1999-11-24 Thread Christopher Shumway

On Tue, 23 Nov 1999, David O'Brien wrote:

  Anyone have any ideas whats going on here?
 
 Yep.  ;-)
  
  yacc: e - line 30 of "c-parse.y", syntax error
  %expect 51
  ^
  *** Error code 1
 
 The problem is rev 1.92 of src/Makefile.inc1.  With that change, the
 tools needed to build GCC aren't made first.  I added a few Bison-like
 features to Byacc that GCC depended on.  The non-tradional "%expect" is
 one of them.
 
 If you manually build and install src/usr.bin/yacc/, a `make world'
 should then work.  Acutally, you should also do the same for
 src/gnu/usr.bin/bison/ as I think you'll hit another problem later in the
 build.

Excelent, that got me past the first hurdle :)

But now its blowing up when compiling
/usr/src/gnu/usr.bin/binutils/gdb/

/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:39: readline
/readline.h: No such file or directory
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:40: readline
/history.h: No such file or directory
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c: In function
 `line_completion_function':
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:1690: `rl_co
mpleter_word_break_characters' undeclared (first use in this function)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:1690: (Each
undeclared identifier is reported only once
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:1690: for ea
ch function it appears in.)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c: In function
 `readline_line_completion_function':
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:1885: `rl_li
ne_buffer' undeclared (first use in this function)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:1885: `rl_po
int' undeclared (first use in this function)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c: In function
 `command_line_input':
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:2087: warnin
g: assignment makes pointer from integer without a cast
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c: In function
 `show_commands':
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:3254: syntax
 error before `*'
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:3261: `histo
ry_base' undeclared (first use in this function)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:3298: invali
d type argument of `-'
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c: In function
 `init_main':
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:3467: `rl_co
mpletion_entry_function' undeclared (first use in this function)
/usr/src/gnu/usr.bin/binutils/gdb/../../../../contrib/gdb/gdb/top.c:3470: `rl_re
adline_name' undeclared (first use in this function)
*** Error code 1
Stop.




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Warner Losh

In message [EMAIL PROTECTED] Poul-Henning Kamp writes:
: So please explain the logic you want implemented once people have
: stopped haggeling about it, it is rather trivial.

OK.  I'll likely state what I'd like to see as a patch.

: I pressume we want the same policy for /proc/*/cmdline as for the
: sysctl ps(1) uses ?

Yes.  I'll firm this up later today and send an exact proposal out so
we can kill this.

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Threads and my new job.

1999-11-24 Thread Geoff Buckingham

On Wed, Nov 24, 1999 at 01:31:44PM +, Nick Hilliard wrote:
  Why do we need to smite the Linux database servers? With threads in their 
  current state they already outperform Linux's native threads by ~50x for 
  things like sending mail. I would assume that the differences in database 
  performance is similar.
 
 The threads ( the old nfs issues which have now thankfully been fixed) in
 their current state led bCandid to write about the Cyclone news router:
 
 : Issues the w/FreeBSD kernel and buggy threads have required our development
 : team to wait until improvements to the OS can be made.  We did have a beta
 : posted on our website for a while but have since removed it.
 
 disclaimer: I am not a thread hacker.


To this I would add that a number of commercial products currently available
for FreeBSD depend on the Linux threads implimentation, notably Inktomis'
depending on the future of the linux threads stuff, some diplomacy and 
vendor support may be necesary.

What is the current status of the linux threads (Particularly with regard to
SMP, which I recall was a problem)?

How far from the userland bound original has libc_r moved ?

Is the BSDi thread stuff completely seperate from all of this?

-- 
GeoffB 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



calcru() warnings...

1999-11-24 Thread Poul-Henning Kamp


I still hear reports of sporadic calcru() warnings.

If any of you see these, could you try to see if they correlate
to the uptime of the machine in question ?

--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED]   "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



- current diskless is it possible ?

1999-11-24 Thread Holm Tiffe

Hi,

I have an unconventional setup at home, my PC and an little 386/40 w/o
NPU and disk that is routing my net over an ISDN line with i4b
to the world.
(the router is because there are no free slots anymore in the PC to put
the ISDN card in, it is an oldish dual P100 EISA/PCI machine running -current
from 3 days ago)
So far so good.
The problem is, the os on this little diskless router is dated. It is a
pre ELF 3.0-current with an I4b from this time too.

I have had some problems to get my setup with an new provider (new job)
working on an ascent max 1800 and I have decided to update this old router.

The router has an wd8013 with an nb8390 boot rom, this seems to make an a.out
kernel the way to go (currently)

(the linker claims on an symbol _swapdev that he cloudn't find, please someone
from the committers can comment this symbol out in sys/i386/i386/symbols.raw
nobody needs it anymore)

Now I get the Root mount failed: 22 - problem and the machine is asking nicley
for a root device. NFS is NOT listed in the list of possible bootdevices, only MFS ?!
and something like nfs:139.20.129.5:/usr1/testroot seems to be totally wrong here
  ^^
I get :
no search device: testroot
setrootdevname failed.
(from my memory, may be a little incorrect)

the panic following later is surely related on to this, but it is a page fault.

What should I do ?

Is an NFS root supported in -current ?
How is the syntax to set the rootdevice ?
How about /boot/loader and friends - and etherboot ?
(the port is outdated, it references etherboot-2.4.5.tar.gz
and no one has this old file anymore, current is 2.4.10)

Any hints ?

Thanks in advance,

Holm
PS: sorry for my poor english
-- 
FreibergNet Systemhaus GbR  Holm Tiffe  * Administration, Development
Systemhaus für Daten- und Netzwerktechnik   phone +49 3731 781279
Unternehmensgruppe Liebscher  Partnerfax +49 3731 781377
D-09599 Freiberg * Am St. Niclas Schacht 13http://www.freibergnet.de/



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: calcru() warnings...

1999-11-24 Thread Bob Bishop

Hi,

At 8:00 pm +0100 24/11/99, Poul-Henning Kamp wrote:
I still hear reports of sporadic calcru() warnings.

If any of you see these, could you try to see if they correlate
to the uptime of the machine in question ?

Nov 23 00:03:35 bludnok /kernel: [boot]

Nov 24 09:02:06 bludnok /kernel: calcru: negative time of -4660895 usec for
pid 76002 (cc)

Ie up just under 9 hours. Building world at the time. This box is running
SMP, full details on request.


--
Bob Bishop  (0118) 977 4017  international code +44 118
[EMAIL PROTECTED]fax (0118) 989 4254  between 0800 and 1800 UK




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: - current diskless is it possible ?

1999-11-24 Thread Doug Ambrisko

Holm Tiffe writes:
| Is an NFS root supported in -current ?
| How is the syntax to set the rootdevice ?
| How about /boot/loader and friends - and etherboot ?
| (the port is outdated, it references etherboot-2.4.5.tar.gz
| and no one has this old file anymore, current is 2.4.10)

Yes it is possible, but you need to patch sys/i386/i386/autoconf.c. included
in this message.  I've only tested in the case of netbooting so I could
broken normal booting.

Then use Etherboot.  I also included it an uuencoded update to the 
etherboot port for etherboot-2.4.10 which can boot a FreeBSD ELF kenel.  
This all works as of -current (yesterday).  Sorry it takes so long
for the port to get updated and the Linux guys keep working on Etherboot
(which BTW they has code to boot FreeBSD now and they test it).  Then I 
have to wait for someone to read the pr's that I send in.  They when someone 
finally looks at it.  It is already obsolete.  Same thing with my sdcc 
port that needs updating.

I expect Mike will kill me for this, but it works and I don't have a PXE 
rom in this machine.  I prefer a netboot panic rather then panic'ing my 
laptop when testing things.

Doug A.

Index: sys/i386/i386/autoconf.c
===
RCS file: /cvs/freebsd/src/sys/i386/i386/autoconf.c,v
retrieving revision 1.143
diff -c -r1.143 autoconf.c
*** autoconf.c  1999/11/02 19:38:27 1.143
--- autoconf.c  1999/11/24 18:39:47
***
*** 48,53 
--- 48,54 
  #include "opt_bootp.h"
  #include "opt_ffs.h"
  #include "opt_cd9660.h"
+ #include "opt_nfs.h"
  #include "opt_nfsroot.h"
  #include "opt_bus.h"
  #include "opt_rootdevname.h"
***
*** 213,224 
--- 214,231 
cold = 0;
  }
  
+ #ifdef BOOTP
+ extern void bootpc_init();
+ #endif
  /*
   * Do legacy root filesystem discovery.
   */
  void
  cpu_rootconf()
  {
+ #ifdef BOOTP
+ bootpc_init();
+ #endif
  #if defined(NFS)  defined(NFS_ROOT)
  #if !defined(BOOTP_NFSROOT)
if (nfs_diskless_valid)
***
*** 226,232 
rootdevnames[0] = "nfs:";
  #endif
  #if defined(FFS)  defined(FFS_ROOT)
!   setroot();
  #endif
  }
  SYSINIT(cpu_rootconf, SI_SUB_ROOT_CONF, SI_ORDER_FIRST, cpu_rootconf, NULL)
--- 233,240 
rootdevnames[0] = "nfs:";
  #endif
  #if defined(FFS)  defined(FFS_ROOT)
! if (!rootdevnames[0])
! setroot();
  #endif
  }
  SYSINIT(cpu_rootconf, SI_SUB_ROOT_CONF, SI_ORDER_FIRST, cpu_rootconf, NULL)


begin 664 etherboot.tgz
M'XL(`!G].C@"`^U:7/:3!+V5_0KAW7QCG0?0`;4B$@UD;`%.]D.J(48
M@0HA:768%/Y[]LS`HP=9_VFUH%L/$]L(XE6S]'SS'2/6B'9C"3C*,JD@Y\
MT7+,N``0)55DWXBY-7GZ@0L63$-R]0T%4!1%=DX`.-@!\C3S$D`#IS%./'3
M?0]N6,D.#@MP/9V+_Y82#MU_ZR9FJF;%+[YK,[;][^_?QX/'+439-/7_
M8G]-H_:7=471=(O:7].I_65N_Y^.6IR2Y(HDM77[W[E7:4W"/\(!Q^^/._PG
M93Z691[Y3_NG*'_[II:IS_NP!ENN0EA(S3B11'299*(FDS;#@L\!3XK\=
M9HE/TAVO_XIBW/'_=$4S.?]WPO^.,R'Q!)$4VI$X4P(#H%LAJ3=5JN@5*
MM5J5)*$E4:E4DMAQ[3N[.9L/F5'G$[_Q_POS+OG^%\W#.;_JPJ/__=B_Y^Q
M"_`G[2];NJKIAD+M;VH:M_^^[/_8NP`_'O_KAJ;R]9_'_QQ[X?\C[P(\'/];
M=_AO6!:/_W^)^+\8%GPN$K\?^Q=@(?Y;][EOZKJG/\[X?]B8F#HKWX;^AO:
M)O3G]'\R_,?A\.AE/,1_53:VXG^+QG\XW#^[P*=E@''FT%0UD55501NT2
M_OL%U(%,7-'MCLZ*ZQ-,UIVIZRMBJ(8SUCQ%8`K?IAG?I"65;$J*J(L
MJL:6#E4S9$MJ%[%FQC:6)KGJ%JQ+(\UQU799U/+[\"_];P0[YK\JFS?[
M?[HF%_L_!N?_+O`,NF0)S/$'-PH"XF8^@*+U6``+TIJ:*.;YX'/X`-)4BJ3
MD'_E?D(F-;"B0I^U7(R`FY"\*.XS![OF-"($S]@[@0*?9Q%BQK02O*I]!8
MV0#;'8CEC,_S0(BNM'BK?`,[SXZP6#E_:!5@_NBE?4@?GT%BF@4#HQD7!0
M*7I-56NZ##')2`+VYQB.4*'0:@^W4;'KI?NSH+"Q=GI/=\(S;0/NWUV_:@
M7L+2A4YC,+3[HT%[2*_,LBRN2=)RN133()^*43(5G7RKBO!)*U+Y:DX)TE(
M`BHJQ?E8"G`V_2Q-R!4)I*GK?G/'NG-HIT@3[#B)M*D?4XK/1EW:2OJSD8
MCKZ\;WOA^WSPB#W5]?%K#F[X0?^U^O71?CPO"^\OV6O4LB_L;HLVUTD7
MM:,O%[W^-!J][^N*DDO"T*W-[IH-,\:I]AC083C*?)P2(6/\T3AXVJD+@D
M39WD6K@V*/33N/,KBO"Q_[9H-^LE[#F,C48A%%WW^5TL0M:ZJPW8`ZCI=[
M5AR`9U@"F"?)5KX:C5,L193)Z4#29.YJ`N(4Y(5TS4A-*[@2VR[[56?`W
MVOU8HBAM;H'R+$JSNJ]5S'(SL-H997,30)O$+_./#R9_23;DF").H[(X
M%P4!WO3NZ(O=_'OO*_2)ATUAW$4M.Q!LP].%OIIK,FDL:.HN6D$5;EAM
MV'VK0@#'(R0X?KP@BN-K\!?.E(AX!_GL9Z`(@NB';I!/"+S!5HF4:^)B_I8O
MU;_M^K]^I/OX9?Q`_J=N*NSYGZ:_/G/?NS//LN.L[OXS]3UU?Z/;"F6RO9_
M9+[_NQ.\?/D2UDX3.B#^M'22^-!S,U!5D*LUQ:II10Z(4"Z7-Z)WI2HU=27U
M\C;H.5CZ:ZL*[)0JP=.*#'A4%@":)^-T\KJGPB5QT.YUZY\.CXY7QR\^
M'=Z6Z=OGO6;]Z)A]-EJM_@O\_ED#?9.2E*?)O5O8RRB92_X#!+Z!9*3EM%?
M$%X!ZKB9D/X@[BP"493P!^]\N27Z!Q:(/^V6W1UBJ_M33E'Q^_;P\$+N*D]
M')]G..%=\]I+60.X%CCD8$SP)\!EVM3E^1C2")8$9LX5+LK$"6!!%E%R
M31?IA`A[X?]X9_S'=_8\%]C^S]\_W7_\RO_8^]JMR3=YB?R'XK0Q5=_E
M?D5]7:D4W+]%Y$YOV()RJ]W!'4L;N7!:V@1TZXR+PA%6H!W1\%AXJI'E,
M*2[\!26WM#5ZE\,1TX4Z[?.3XGBM\@1UQCLQID?3ID7/"DP98'R0^0L2
MY1D3W-8X.!N][_6=14U-KH##().I?GPSH][MK#C[W^N4HH'?SF;_P/W
MWSSN'C]!_W\U_[N[\_]T;?/\3];48O[G^_^[F_\UMRI_%MU[%P!T_[2;!6`E
M5(O3_M^RN`9K[6U1OOCY[JZ_F23DOKC8;#S5@49XWO@A]EUYZA9\$.V
M(U6,^=HM"WXIM@YBUU?G+VEXB2^-ZJ+S/#TEIV.[8(YQ.2Z:,V/KBG\T/
M_1%.J^UFZ5C^;#1D^87PI/@_G^[W_]5_B=[_]T^?N?[#_SWD'^,?MKVD*

Re: calcru() warnings...

1999-11-24 Thread Louis A. Mamakos

I got a few calcru() warnings on a dual Pentium-III Xeon system.  It had been
up for around 9 or 10 days or so; I've since rebooted it.  Specific 
configuration
available if you need it.

louie




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Brian Somers

  In the last episode (Nov 23), Lyndon Nerenberg said:
   After you verify that this change isn't going to break things that
   assume they can see the *argv list via ps(1). I.e. lightning bolts
   that do 'kill -MUMBLE `ps -ax|grep foo`'. Which may not be elegant
   style, but sometimes is the only workable solution.

Indeed.  There's always a better way, but I've seen countless 
production systems that do this all the time.  In fact, we've only 
recently done away with all the (sysv) ``ps -ef''s where I work.

  That won't be affected, because anyone that has kill rights to the
  process will also see the full processname.  Now that I think about it,
  I can't come up with a case where this is really bad.  If you're doing
  ps'es with intent to kill arbitrary processes (in the name of debugging
  or whatever), you're probably already root.

Or maybe you're a sysadm that's smart enough to use sudo and not run 
around with root liability in normal life.

 This was discussed close to death before the changes were committed, 
 and the current behaviour (restricted access) has been agreed by 
 general consensus to be the most appropriate.

My reading of the thread was ``I'm going to cache ps args to stop all 
the delving into user space to do a ps'', ``but what about the -e 
option'', ``ok, I'll make that inaccessible unless you have 
permission''.

I stopped reading the -e thread because I believe it's a good thing to 
restrict this.  I completely missed that the conversation had moved 
on to ``hey, who needs ps args anyway'', and I'm sure that given the 
number of messages posted about the -e restriction, others did too.

 Making this behaviour tunable would be bad; it adds another option 
 increasing complexity, and with the proposed default in most cases an 
 admin tightening up a system would never know about it in the first 
 place, rendering it useless.
 
 I'd strongly recommend leaving things they way they are.

This change in behaviour will break production systems, and I'm 
pretty sure that the breakage will be worked around with a quick 
``chmod 4555 /bin/ps''.  Is this what we want ?  Where I work, we've 
just done away with all the sysv ``ps -ef'' calls in the system.  It 
took several weeks and a lot of testing.  I'd be pretty miffed if the 
OS shoved this down my throat prematurely as a requirement just be
cause I upgraded without knowing of the change.

Further, I assert that this change is just wrong !

Why does setproctitle() now require root privileges if nobody can 
see the results ?  This is dumb, as the only uid that we're 
protecting against is the user that's running setproctitle() !

sendmail/nfs/ppp etc can no longer give normal users information on 
what's going on via the command args (ok, you can figure out the nfs 
args).

System monitoring scripts will now have to run as root.

In fact, why do the processes owned by other users show up at all ?  
The ``you don't need to see their args'' argument can equally apply 
to needing to see the entire process you can always kill -0 a 
process if you need to know if it's running or maybe on second 
thoughts, we should restrict kill -0 - why should people have this 
functionality anyway ?

I believe the knob is required and should default to the way things 
were.

Well, that's my opinion.  I'll calm down now.

 -- 
 \\ Give a man a fish, and you feed him for a day. \\  Mike Smith
 \\ Tell him he should learn how to fish himself,  \\  [EMAIL PROTECTED]
 \\ and he'll hate you for a lifetime. \\  [EMAIL PROTECTED]

-- 
Brian [EMAIL PROTECTED][EMAIL PROTECTED]
  http://www.Awfulhak.org   [EMAIL PROTECTED]
Don't _EVER_ lose your sense of humour !  [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Wes Peters

Warner Losh wrote:
 
 In message [EMAIL PROTECTED] Peter Wemm writes:
 : 
 : In a dedicated server role, again it might be appropriate to default
 : it to "open" (dedicated server being something like a squid box),
 : again there will be a couple of sysadmin type users or people who
 : have to monitor things.  Hiding information gains nothing there
 : either.
 
 I disagree with this, but that is because I've rarely seen a totally
 dedicated server.  A simple fileserver that does nothing else would
 want to be open in this respect since few people have accounts.
 
 : In other roles, including something like a shell server box with presumably
 : hostile users (you reasonably have to assume this), you want everything you
 : possibly can to be locked down.
 
 Firewall, dialup boxes, dns servers, etc are good candidates to be
 locked down.

Firewall, web, dns, news, etc. servers are good candidates to be open because 
there should not be any "normal" user accounts on them, only administration 
accounts.  And darned few of those.  I think this is what Peter was getting
at.

-- 
"Where am I, and what am I doing in this handbasket?"

Wes Peters Softweyr LLC
[EMAIL PROTECTED]   http://softweyr.com/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: calcru() warnings...

1999-11-24 Thread N

Poul-Henning Kamp wrote:

 I still hear reports of sporadic calcru() warnings.
 
 If any of you see these, could you try to see if they correlate
 to the uptime of the machine in question ?

Should they start or stop when a machine has been running a while?  I see
neither (negative calcru notices in dmesg start at boot time and didn't
stop until the box had a kernel panic last Saturday evening, after about 
two weeks uptime).

FWIW, the messages started occurring when I switched from a pre-signal to
post-signal change kernel and world.


-- Niels.



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Threads and my new job.

1999-11-24 Thread Nik Clayton

Jason,

On Mon, Nov 22, 1999 at 06:52:20PM -0800, Jason Evans wrote:
 Walnut Creek has hired me as a full time employee to work primarily on
 improving and expanding FreeBSD's threads support.  This is very exciting
 to me, and I hope my work will be of benefit the FreeBSD community.  

That's great. 

Is it part of your remit to maintain http://www.FreeBSD.org/threads/?

That URL doesn't exist at the moment, but if we're going to have an active
threads project, it probably should.  Are you (or anyone else reading this,
you don't have to be a committer at the moment) interested in keeping this
section up to date?

N
-- 
If you want to imagine the future, imagine a tennis shoe stamping
on a penguin's face forever.
--- with apologies to George Orwell


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



RE: calcru() warnings...

1999-11-24 Thread Daniel O'Connor


On 24-Nov-99 Poul-Henning Kamp wrote:
  I still hear reports of sporadic calcru() warnings.
  
  If any of you see these, could you try to see if they correlate
  to the uptime of the machine in question ?

I have had them for Seti@Home occasionally. The system hadn't been up for more
than 24 hours.

Its a dual PII-350.

---
Daniel O'Connor software and network engineer
for Genesis Software - http://www.gsoft.com.au
"The nice thing about standards is that there
are so many of them to choose from."
  -- Andrew Tanenbaum


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: ps on 4.0-current

1999-11-24 Thread Garance A Drosihn

At 8:03 AM + 11/24/99, Brian Somers wrote:
  This was discussed close to death before the changes were committed,
  and the current behaviour (restricted access) has been agreed by
  general consensus to be the most appropriate.

My reading of the thread was ``I'm going to cache ps args to stop all
the delving into user space to do a ps'', ``but what about the -e
option'', ``ok, I'll make that inaccessible unless you have
permission''.

I stopped reading the -e thread because I believe it's a good thing to
restrict this.  I completely missed that the conversation had moved
on to ``hey, who needs ps args anyway'', and I'm sure that given the
number of messages posted about the -e restriction, others did too.

For what it's worth, this is also what happened to me.  I tuned out
the '-e' thread once I had said my two-bits on the topic (and I was
pretty sure the end result would come out OK with me).  I did not
notice the topic of also removing argv from 'ps'.

Removing 'ps -e' ability is fine by me (though I'd prefer that I
could see the environment of "my own" processes).  I can see how
that would improve security, even if it occasionally means a very
slight loss in user convenience.

I am not at all happy with the idea of removing argv from 'ps'
listings.  I have scripts which use that information, and it
sounds like the only way to fix those scripts would make things
WORSE for security.  This does not benefit "user convenience"
and it does not benefit "security".

At the same time, I remember many years ago when another OS that
I worked on was trying for security classification.  I can see
that this behavior *could* be a good idea for situations which
want to be really paranoid about security.  I would not mind
this behavior as a system-wide option, but I'd certainly want
the default setting to match current behavior.


---
Garance Alistair Drosehn   =   [EMAIL PROTECTED]
Senior Systems Programmer  or  [EMAIL PROTECTED]
Rensselaer Polytechnic Institute


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: Threads and my new job.

1999-11-24 Thread MIHIRA Yoshiro

[EMAIL PROTECTED] wrote:

 *) Lacking interfaces, such as pthread_cancel() (mentioned specifically in
PR bin/7587) need to be implemented.

  It's good news for me.

  I hope to port xmovie -- QuickTime movie Player for Linux to FreeBSD.
  But I can not compile it under FreeBSD, because it's need pthread_cancel. 

xmovie
http://heroine.linuxbox.com/xmovie.html

MIHIRA Yoshiro


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: calcru() warnings...

1999-11-24 Thread Vallo Kallaste

On Thu, Nov 25, 1999 at 10:38:56AM +1030, Daniel O'Connor [EMAIL PROTECTED] 
wrote:

 
 On 24-Nov-99 Poul-Henning Kamp wrote:
   I still hear reports of sporadic calcru() warnings.
   
   If any of you see these, could you try to see if they correlate
   to the uptime of the machine in question ?
 
 I have had them for Seti@Home occasionally. The system hadn't been up for more
 than 24 hours.
 
 Its a dual PII-350.

Same here, running setiathome means that I can find such processes
after a day or so:

4  ??  DL   -2341043:-35.26  (bufdaemon)

The ``calcru'' messages aren't strictly necessary, such things happen
without them also. Dual PIII-500, two seti processes.
-- 

Vallo Kallaste
[EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: calcru() warnings...

1999-11-24 Thread Poul-Henning Kamp


Is this SMP ?

In message [EMAIL PROTECTED], N writes:
Poul-Henning Kamp wrote:

 I still hear reports of sporadic calcru() warnings.
 
 If any of you see these, could you try to see if they correlate
 to the uptime of the machine in question ?

Should they start or stop when a machine has been running a while?  I see
neither (negative calcru notices in dmesg start at boot time and didn't
stop until the box had a kernel panic last Saturday evening, after about 
two weeks uptime).

FWIW, the messages started occurring when I switched from a pre-signal to
post-signal change kernel and world.


   -- Niels.



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message


--
Poul-Henning Kamp FreeBSD coreteam member
[EMAIL PROTECTED]   "Real hackers run -current on their laptop."
FreeBSD -- It will take a long time before progress goes too far!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message