Re: syslogd: using IPv6 as hostnames results in "IP mismatch"

2019-02-24 Thread Hajimu UMEMOTO
Hi,

>>>>> On Thu, 31 Jan 2019 08:24:38 +0100
>>>>> "O. Hartmann"  said:

ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \
ohartmann>   fdff:dead:beef::; 
ohartmann> rejected in rule 1 due to IP mismatch. 

The -a option was broken.  It should be fixed now.
Please, try it.

Sincerely,

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume/
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: syslogd: using IPv6 as hostnames results in "IP mismatch"

2019-02-24 Thread Hajimu UMEMOTO
Hi,

>>>>> On Thu, 31 Jan 2019 08:24:38 +0100
>>>>> "O. Hartmann"  said:

ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \
ohartmann>   fdff:dead:beef::; 
ohartmann> rejected in rule 1 due to IP mismatch.

The -a option was broken.  It should be fixed now.
Please try it.

Sincerely,

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: syslogd: using IPv6 as hostnames results in "IP mismatch"

2019-02-24 Thread Hajimu UMEMOTO
Hi,

>>>>> On Thu, 31 Jan 2019 08:24:38 +0100
>>>>> "O. Hartmann"  said:

ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \
ohartmann>   fdff:dead:beef::; 
ohartmann> rejected in rule 1 due to IP mismatch.

The -a option was broken.  It should be fixed now.
Please try it.

Sincerely,

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Some locale data are broken

2016-11-18 Thread Hajimu UMEMOTO
Hi,

>>>>> On Fri, 18 Nov 2016 09:35:01 +0100
>>>>> Jean-S9bastien P9dron <dumbb...@freebsd.org> said:

dumbbell> What looks incorrect to me is the output of `locale -k` when no 
keyword
dumbbell> is specified:

dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k
dumbbell> ...
dumbbell> d_fmt="%m/%d/%y"
dumbbell> ...
dumbbell> altmon_1="January"
dumbbell> ...

dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k d_fmt
dumbbell> d_fmt="%d.%m.%Y"

dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k altmon_1
dumbbell> altmon_1="janvier"

How about this patch?

Sincerely,

Index: usr.bin/locale/locale.c
===
--- usr.bin/locale/locale.c (revision 308220)
+++ usr.bin/locale/locale.c (working copy)
@@ -283,8 +283,9 @@
 
/* process '-c', '-k', or command line arguments. */
if (prt_categories || prt_keywords || argc > 0) {
+   if (prt_keywords)
+   setlocale(LC_ALL, "");
if (argc > 0) {
-   setlocale(LC_ALL, "");
        while (argc > 0) {
showdetails(*argv);
argv++;

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume/
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

Re: Date formatting with en_US locale

2016-06-18 Thread Hajimu UMEMOTO
Hi,

>>>>> On Sat, 18 Jun 2016 18:25:51 -0500
>>>>> Eric van Gyzen <vangy...@freebsd.org> said:

vangyzen> On 06/18/16 04:10 AM, Hajimu UMEMOTO wrote:
> Does the attached patch fix your issue?
> Though there are many locales it should be fixed, I've included only
> en_US one, in this time.

vangyzen> Yes, it fixes my issue with en_US.  Thank you, Umemoto-san.

You are welcome.
I've just committed into HEAD.

Sincerely,

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume/
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"


Re: Date formatting with en_US locale

2016-06-18 Thread Hajimu UMEMOTO
Hi,

vangyzen> Above, I mentioned two issues.  The other one is, the date format for
vangyzen> en_US pads the month with a zero, but the day with a space.  So, June 
7 is:

vangyzen> 06/ 7/16

vangyzen> That looks weird.  It should pad both with zeros.  I'd be happy to fix
vangyzen> it, but I don't see how:  There isn't an "xformat" callback in the
vangyzen> cldr2def.pl script, and it's not clear how to add one.  If you can
vangyzen> explain, I'll do it.  If you can fix it, I'll be grateful.  ;)

Does the attached patch fix your issue?
Though there are many locales it should be fixed, I've included only
en_US one, in this time.

Sincerely,

Index: share/timedef/en_US.UTF-8.src
===
--- share/timedef/en_US.UTF-8.src	(revision 302002)
+++ share/timedef/en_US.UTF-8.src	(working copy)
@@ -53,7 +53,7 @@
 %I:%M:%S %p
 #
 # x_fmt
-%m/%e/%y
+%m/%d/%y
 #
 # c_fmt
 %A, %B %e, %Y at %I:%M:%S %p
@@ -80,7 +80,7 @@
 December
 #
 # md_order
-m
+md
 #
 # ampm_fmt
 %I:%M:%S %p
Index: tools/tools/locale/tools/cldr2def.pl
===
--- tools/tools/locale/tools/cldr2def.pl	(revision 302002)
+++ tools/tools/locale/tools/cldr2def.pl	(working copy)
@@ -68,6 +68,7 @@
 	mdorder => \_mdorder,
 	altmon => \_altmon,
 	cformat => \_cformat,
+	dformat => \_dformat,
 	dtformat => \_dtformat,
 	cbabmon => \_abmon,
 	cbampm => \_ampm,
@@ -183,10 +184,9 @@
 	"abday"		=> "as",
 	"day"		=> "as",
 	"t_fmt"		=> "s",
-	"d_fmt"		=> "s",
+	"d_fmt"		=> "<dformat<d_fmt<s",
 	"c_fmt"		=> "<cformat<d_t_fmt<s",
 	"am_pm"		=> "<cbampm<am_pm<as",
-	"d_fmt"		=> "s",
 	"d_t_fmt"		=> "<dtformat<d_t_fmt<s",
 	"altmon"		=> "<altmon<mon<as",
 	"md_order"		=> "<mdorder<d_fmt<s",
@@ -225,6 +225,14 @@
 	return $s;
 };
 
+sub callback_dformat {
+	my $s = shift;
+
+	$s =~ s/(%m(|[-.]))%e/$1%d/;
+	$s =~ s/%e((|[-.])%m)/%d$1/;
+	return $s;
+};
+
 sub callback_dtformat {
 	my $s = shift;
 	my $nl = $callback{data}{l} . "_" . $callback{data}{c};
@@ -241,7 +249,8 @@
 sub callback_mdorder {
 	my $s = shift;
 	return undef if (!defined $s);
-	$s =~ s/[^dm]//g;
+	$s =~ s/[^dem]//g;
+	$s =~ s/e/d/g;
 	return $s;
 };
 

--
Hajimu UMEMOTO
u...@mahoroba.org  u...@freebsd.org
http://www.mahoroba.org/~ume/
___
freebsd-current@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

Re: r225932 libsasl undefined references - buildworld failure

2011-10-17 Thread Hajimu UMEMOTO
 reference to `gss_accept_sec_context'
mexas gssapi.c:(.text+0x3d12): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x3dc2): undefined reference to `gss_display_name'
mexas gssapi.c:(.text+0x3f02): undefined reference to `GSS_C_NT_USER_NAME'
mexas gssapi.c:(.text+0x3f10): undefined reference to `GSS_C_NT_USER_NAME'
mexas gssapi.c:(.text+0x3f22): undefined reference to `gss_import_name'
mexas gssapi.c:(.text+0x3f72): undefined reference to `gss_compare_name'
mexas gssapi.c:(.text+0x3fa2): undefined reference to `gss_release_name'
mexas gssapi.c:(.text+0x4022): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x42e2): undefined reference to `gss_wrap'
mexas gssapi.c:(.text+0x43e2): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x4582): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x46d2): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x48a2): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x4d42): undefined reference to `gss_wrap_size_limit'
mexas gssapi.c:(.text+0x4d92): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x4f82): undefined reference to 
`GSS_C_NT_HOSTBASED_SERVICE'
mexas gssapi.c:(.text+0x4f90): undefined reference to 
`GSS_C_NT_HOSTBASED_SERVICE'
mexas gssapi.c:(.text+0x4fa2): undefined reference to `gss_import_name'
mexas gssapi.c:(.text+0x5042): undefined reference to `gss_release_cred'
mexas gssapi.c:(.text+0x5092): undefined reference to `gss_acquire_cred'
mexas gssapi.c:(.text+0x5142): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x52e2): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x5322): undefined reference to `gss_release_name'
mexas gssapi.c:(.text+0x5422): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x54b2): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x5572): undefined reference to `gss_release_buffer'
mexas gssapi.c:(.text+0x5692): undefined reference to `gss_release_buffer'
mexas *** Error code 1

I suspect that you don't have /usr/local/lib/libsasl2.so.2 installed,
due to the brokenness of devel/libtool on 10-CURRENT.  Please refer
the 20110928 entry of ports/UPDATING.  Further, you may want to read
the thread from
http://lists.freebsd.org/pipermail/cvs-ports/2011-October/227399.html

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: 9.0-beta3 preferring ipv4 over ipv6 with ipv6_activate_all_interfaces=YES

2011-10-14 Thread Hajimu UMEMOTO
Hi,

 On Fri, 14 Oct 2011 17:09:11 +0900 (JST)
 Hiroki Sato h...@freebsd.org said:

hrs Thomas Steen Rasmussen tho...@gibfest.dk wrote
hrs   in 4e97d9f3.4020...@gibfest.dk:

th On 14.10.2011 08:14, Hiroki Sato wrote:
hrs th  telnet www.freebsd.org 80  /dev/null
th [tykling@tykburk ~]$ telnet www.freebsd.org 80  /dev/null
th Trying 69.147.83.34...
th Connected to red.freebsd.org.
th Escape character is '^]'.
th Connection closed by foreign host.

hrs  Thanks.  There is no problem with the source address selection.  The
hrs  last questions are:

hrs  % route get -inet www.freebsd.org
hrs  % route get -inet6 www.freebsd.org
hrs  % netstat -nrf inet6
hrs  % ndp -r

hrs  I guess the second one returns route: writing to routing socket: No
hrs  such process on your box.  Is it correct?

AFAIK, recent Firefox implements Happy Eyeballs.  So, I suspect it
doesn't obey RFC 3484, anymore.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: cvs commit: ports/security/cyrus-sasl2 Makefile ports/security/cyrus-sasl2/files patch-plugins::gssapi.c

2011-10-09 Thread Hajimu UMEMOTO
Hi,

 On Fri, 07 Oct 2011 16:48:52 -0700
 Doug Barton do...@freebsd.org said:

dougb In case anyone wants to take this on, this port fails to install on 10.0
dougb because it uses its own version of libtool. I took a quick look but
dougb there wasn't a solution obvious enough for me. :)

I didn't have 10-current box, yet.  So, I've just upgraded my
9-current box to today's current, and tried to rebuild cyrus-sasl2
port on it.  However, I couldn't reproduce the problem.  It built just
fine, here.  Any thought?

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: System sendmail build fails with updated cyrus-sasl2 port

2011-09-26 Thread Hajimu UMEMOTO
Hi,

 On Mon, 26 Sep 2011 15:58:03 +0400
 Andrey Chernov a...@freebsd.org said:

ache This is for 9 BETA2 or 10-CURRENT.
ache Please fix it on either side. Apparently minor types mismatch within 
ache sasl_callback_t type.

ache cc -O2 -pipe -march=pentium4 
ache -I/usr/src/usr.sbin/sendmail/../../contrib/sendmail/src 
ache -I/usr/src/usr.sbin/sendmail/../../contrib/sendmail/include -I. -DNEWDB  
ache -DTCPWRAPPERS -DMAP_REGEX -DDNSMAP -DNETINET6 -DSTARTTLS -D_FFR_TLS_1 
ache -I/usr/local/include -DSASL=2 -std=gnu99 -fstack-protector 
ache -Wsystem-headers -Werror -Wno-pointer-sign -c 
ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c
ache cc1: warnings being treated as errors
ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c:112: 
warning: 
ache initialization from incompatible pointer type
ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c:113: 
warning: 
ache initialization from incompatible pointer type
ache *** Error code 1

It seems 2.1.25 requires to cast to sasl_callback_ft.  How about the
attached patch?

Index: contrib/sendmail/src/main.c
diff -u -p contrib/sendmail/src/main.c.orig contrib/sendmail/src/main.c
--- contrib/sendmail/src/main.c.orig	2011-06-22 13:00:26.0 +0900
+++ contrib/sendmail/src/main.c	2011-09-27 00:32:34.0 +0900
@@ -109,8 +109,8 @@ GIDSET_T	InitialGidSet[NGROUPS_MAX];
 #if SASL
 static sasl_callback_t srvcallbacks[] =
 {
-	{	SASL_CB_VERIFYFILE,	safesaslfile,	NULL	},
-	{	SASL_CB_PROXY_POLICY,	proxy_policy,	NULL	},
+	{	SASL_CB_VERIFYFILE,	(sasl_callback_ft)safesaslfile,	NULL	},
+	{	SASL_CB_PROXY_POLICY,	(sasl_callback_ft)proxy_policy,	NULL	},
 	{	SASL_CB_LIST_END,	NULL,		NULL	}
 };
 #endif /* SASL */
Index: contrib/sendmail/src/sendmail.h
diff -u contrib/sendmail/src/sendmail.h.orig contrib/sendmail/src/sendmail.h
--- contrib/sendmail/src/sendmail.h.orig	2011-06-22 13:00:27.0 +0900
+++ contrib/sendmail/src/sendmail.h	2011-09-27 00:57:43.0 +0900
@@ -133,10 +133,15 @@
 
 # if SASL == 2 || SASL = 2
 #  include sasl/sasl.h
+#  include sasl/saslplug.h
 #  include sasl/saslutil.h
+#  if SASL_VERSION_FULL  0x020119
+typedef int (*sasl_callback_ft)(void);
+#  endif
 # else /* SASL == 2 || SASL = 2 */
 #  include sasl.h
 #  include saslutil.h
+typedef int (*sasl_callback_ft)(void);
 # endif /* SASL == 2 || SASL = 2 */
 # if defined(SASL_VERSION_MAJOR)  defined(SASL_VERSION_MINOR)  defined(SASL_VERSION_STEP)
 #  define SASL_VERSION (SASL_VERSION_MAJOR * 1)  + (SASL_VERSION_MINOR * 100) + SASL_VERSION_STEP
Index: contrib/sendmail/src/usersmtp.c
diff -u -p contrib/sendmail/src/usersmtp.c.orig contrib/sendmail/src/usersmtp.c
--- contrib/sendmail/src/usersmtp.c.orig	2011-09-27 00:51:44.0 +0900
+++ contrib/sendmail/src/usersmtp.c	2011-09-27 00:51:52.0 +0900
@@ -524,15 +524,15 @@ static int attemptauth	__P((MAILER *, MC
 
 static sasl_callback_t callbacks[] =
 {
-	{	SASL_CB_GETREALM,	saslgetrealm,	NULL	},
+	{	SASL_CB_GETREALM,	(sasl_callback_ft)saslgetrealm,	NULL	},
 #define CB_GETREALM_IDX	0
-	{	SASL_CB_PASS,		getsecret,	NULL	},
+	{	SASL_CB_PASS,		(sasl_callback_ft)getsecret,	NULL	},
 #define CB_PASS_IDX	1
-	{	SASL_CB_USER,		getsimple,	NULL	},
+	{	SASL_CB_USER,		(sasl_callback_ft)getsimple,	NULL	},
 #define CB_USER_IDX	2
-	{	SASL_CB_AUTHNAME,	getsimple,	NULL	},
+	{	SASL_CB_AUTHNAME,	(sasl_callback_ft)getsimple,	NULL	},
 #define CB_AUTHNAME_IDX	3
-	{	SASL_CB_VERIFYFILE,	safesaslfile,	NULL	},
+	{	SASL_CB_VERIFYFILE,	(sasl_callback_ft)safesaslfile,	NULL	},
 #define CB_SAFESASL_IDX	4
 	{	SASL_CB_LIST_END,	NULL,		NULL	}
 };

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org

Re: resolvconf script overwrites entries in resolv.conf - RDNSS/DNSSL related

2011-08-11 Thread Hajimu UMEMOTO
Hi,

 On Mon, 8 Aug 2011 07:55:11 -0400
 J.R. Oldroyd f...@opal.com said:

 Is there any chance that you could create a patch for 8.2 based on the 
 commits in HEAD?
 That would be great!
 
fbsd Better would be to ask hrs@ to MFC his commits to 8-stable.

hrs@ posted MFC candidate patch for review.  Please refer the thread
started from:

http://lists.freebsd.org/pipermail/freebsd-net/2011-June/029070.html

The patches you will find in the thread are:

http://people.freebsd.org/~hrs/rfc6106_stable8_20110612-1.diff
http://people.freebsd.org/~ume/resolvconf-releng_8.diff

You may be interested in the thread from the following as well:

http://lists.freebsd.org/pipermail/freebsd-net/2011-June/029091.html

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: resolvconf script overwrites entries in resolv.conf - RDNSS/DNSSL related

2011-08-10 Thread Hajimu UMEMOTO
Hi,

 On Mon, 08 Aug 2011 16:42:06 +1000
 Mattia Rossi mro...@swin.edu.au said:

mrossi Anyhow, the manpage is really not clear about name_servers_append, and
mrossi it's not working as expected either:

mrossi 1) If I put in a comma separated list of nameservers, I'll find that
mrossi comma separated list in /etc/resolv.conf under a single nameserver
mrossi tag. That doesn't work, as it's not a valid entry. Each nameserver
mrossi needs to have a nameserver host entry.

name_servers and name_servers_append is a space separated list of
nameserver.

mrossi 2) If I use multiple name_servers_append entries in
mrossi /etc/resolvconf.conf, then only the last entry is used. I don't want
mrossi only one DNS server there though, I want all three of them, as I
mrossi already had the problem that one or the other didn't work properly.

You can specify multiple nameservers in name_servers and/or
name_servers_append.

mrossi 3) If I read the description for name_servers in resolvconf.conf(5), I
mrossi understand that this tag prepends the nameserver to my list. This is
mrossi not what happens. Still not sure what actually happens there...

It is strange to me.  If you specify name_servers, it should be
prepended to the nameserver list.  I've just tried name_servers, and
it did the job as expected, here.

mrossi How do I get my 3 manual DNS entries properly into my resolv.conf ?

Please specify your 3 servers as space separated list in name_servers
or name_servers_append.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: CFR: importing openresolv

2011-02-21 Thread Hajimu UMEMOTO
Hi,

 On Sun, 20 Feb 2011 18:21:18 + (UTC)
 Bjoern A. Zeeb b...@freebsd.org said:

bz Do you have an updated patch for 3.4.1 or 3.3.6?  I'd like to help to
bz you get it in for 9.0-R.  I wouldn't even mind if some ports would
bz conflict with it for a while not making the situation any worse than
bz it is these days.

I didn't notice that openresolv was updated.  I'll soon make a new
diff for 3.4.1.
hrs@ noticed that ppp(8) and uhsoctl(8) in our base tree touch
/etc/resolv.conf.  We need to change them to use resovlconf(8).

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: CFR: importing openresolv

2011-02-21 Thread Hajimu UMEMOTO
Hi,

 On Tue, 22 Feb 2011 01:50:17 +0900
 Hajimu UMEMOTO u...@freebsd.org said:

bz Do you have an updated patch for 3.4.1 or 3.3.6?  I'd like to help to
bz you get it in for 9.0-R.  I wouldn't even mind if some ports would
bz conflict with it for a while not making the situation any worse than
bz it is these days.

ume I didn't notice that openresolv was updated.  I'll soon make a new
ume diff for 3.4.1.
ume hrs@ noticed that ppp(8) and uhsoctl(8) in our base tree touch
ume /etc/resolv.conf.  We need to change them to use resovlconf(8).

I've updated a patch for 3.4.1:

  http://www.imasy.or.jp/~ume/FreeBSD/openresolv-20110222.diff.gz

If you have the previous patch applied, make sure to remove
src/contrib/openresolv and src/sbin/resolvconf before applying new
one.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Files under src/ not used for building world

2010-11-05 Thread Hajimu UMEMOTO
Hi,

 On Fri, 5 Nov 2010 17:16:47 -0400
 John Baldwin j...@freebsd.org said:

 etc/periodic/security/610.ipf6denied

jhb I wonder if this is stale due to ip6fw being removed?

No, it seems to me that it is not related to ip6fw, and it calls
ipfstat.  Perhaps, some work for IPv6 support of IP Filter?

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  u...@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


CFR: importing openresolv

2010-08-18 Thread Hajimu UMEMOTO
Hi,

I wish to import openresolv 3.3.5 into our base tree.  It makes
merging the DNS server addresses informed from DHCP, DHCPv6, PPP, ...
into /etc/resolv.conf easier.

http://roy.marples.name/projects/openresolv

My patch against 9-CURRENT can be obtained from:

http://www.imasy.or.jp/~ume/FreeBSD/openresolv-20100818.diff.gz

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  u...@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: HEADS UP: COMPAT_IA32 renamed COMPAT_FREEBSD32

2010-03-11 Thread Hajimu UMEMOTO
Hi,

 On Thu, 11 Mar 2010 08:50:05 -0600
 Nathan Whitehorn nwhiteh...@freebsd.org said:

nwhitehorn As a result of importing 32-bit compatibility support for non-x86 
64-bit 
nwhitehorn platforms, the kernel options COMPAT_IA32 has been renamed 
nwhitehorn COMPAT_FREEBSD32 in revision 205014, so all kernel configurations 
nwhitehorn including this option must be modified accordingly.

Doesn't this mean we cannot have FreeBSD version 32? :)

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
u...@mahoroba.org  u...@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
freebsd-current@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org


Re: Can we get rid of kerb5 redefining macros?

2003-12-01 Thread Hajimu UMEMOTO
Hi,

 On Mon, 1 Dec 2003 04:11:34 -0800
 David O'Brien [EMAIL PROTECTED] said:

obrien Ever since kerberos5 got hooked up to the build by default I'm getting
obrien *TONS* (758) of CPP macros.  An example is:

obrien In file included from /usr/obj/usr/src/kerberos5/lib/libasn1/roken.h:77,
obrien  from /usr/src/crypto/heimdal/lib/vers/print_version.c:38:
obrien /usr/src/crypto/heimdal/lib/roken/roken-common.h:183:1: warning: EAI_NODATA 
re
obrien defined
obrien In file included from /usr/obj/usr/src/kerberos5/lib/libasn1/roken.h:59,
obrien  from /usr/src/crypto/heimdal/lib/vers/print_version.c:38:
obrien /usr/include/netdb.h:166:1: warning: this is the location of the previous 
defini
obrien tion

obrien Can a kerberos5 guy take a look at these?

I made a patch for this.  However, I forgot to sent it to Kerberos5
guy.

Sincerely,

Index: crypto/heimdal/lib/krb5/eai_to_heim_errno.c
diff -u crypto/heimdal/lib/krb5/eai_to_heim_errno.c.orig 
crypto/heimdal/lib/krb5/eai_to_heim_errno.c
--- crypto/heimdal/lib/krb5/eai_to_heim_errno.c.origThu Jun 21 11:11:31 2001
+++ crypto/heimdal/lib/krb5/eai_to_heim_errno.c Fri Nov  7 02:47:15 2003
@@ -47,8 +47,10 @@
 switch(eai_errno) {
 case EAI_NOERROR:
return 0;
+#ifdef EAI_ADDRFAMILY
 case EAI_ADDRFAMILY:
return HEIM_EAI_ADDRFAMILY;
+#endif
 case EAI_AGAIN:
return HEIM_EAI_AGAIN;
 case EAI_BADFLAGS:
@@ -59,8 +61,10 @@
return HEIM_EAI_FAMILY;
 case EAI_MEMORY:
return HEIM_EAI_MEMORY;
+#if defined(EAI_NODATA)  EAI_NODATA != EAI_NONAME
 case EAI_NODATA:
return HEIM_EAI_NODATA;
+#endif
 case EAI_NONAME:
return HEIM_EAI_NONAME;
 case EAI_SERVICE:
Index: crypto/heimdal/lib/krb5/verify_krb5_conf.c
diff -u crypto/heimdal/lib/krb5/verify_krb5_conf.c.orig 
crypto/heimdal/lib/krb5/verify_krb5_conf.c
--- crypto/heimdal/lib/krb5/verify_krb5_conf.c.orig Sat Oct 25 06:55:43 2003
+++ crypto/heimdal/lib/krb5/verify_krb5_conf.c  Fri Nov  7 02:42:26 2003
@@ -156,7 +156,11 @@
 hostname[strcspn(hostname, /)] = '\0';
 ret = getaddrinfo(hostname, telnet /* XXX */, NULL, ai);
 if(ret != 0) {
+#ifdef EAI_NODATA
if(ret == EAI_NODATA)
+#else
+   if(ret == EAI_NONAME)
+#endif
krb5_warnx(context, %s: host not found (%s), path, hostname);
else
krb5_warnx(context, %s: %s (%s), path, gai_strerror(ret), hostname);
Index: crypto/heimdal/lib/roken/roken-common.h
diff -u crypto/heimdal/lib/roken/roken-common.h.orig 
crypto/heimdal/lib/roken/roken-common.h
--- crypto/heimdal/lib/roken/roken-common.h.origWed Sep 18 02:36:32 2002
+++ crypto/heimdal/lib/roken/roken-common.h Fri Nov  7 01:58:38 2003
@@ -171,22 +171,26 @@
 #ifndef EAI_NOERROR
 #define EAI_NOERROR0   /* no error */
 #endif
-
 #ifndef EAI_ADDRFAMILY
-
 #define EAI_ADDRFAMILY 1   /* address family for nodename not supported */
+#endif
+
+#ifndef EAI_NONAME
+
 #define EAI_AGAIN  2   /* temporary failure in name resolution */
 #define EAI_BADFLAGS   3   /* invalid value for ai_flags */
 #define EAI_FAIL   4   /* non-recoverable failure in name resolution */
 #define EAI_FAMILY 5   /* ai_family not supported */
 #define EAI_MEMORY 6   /* memory allocation failure */
+#ifndef EAI_NODATA
 #define EAI_NODATA 7   /* no address associated with nodename */
+#endif
 #define EAI_NONAME 8   /* nodename nor servname provided, or not known */
 #define EAI_SERVICE9   /* servname not supported for ai_socktype */
 #define EAI_SOCKTYPE   10  /* ai_socktype not supported */
 #define EAI_SYSTEM 11  /* system error returned in errno */
 
-#endif /* EAI_ADDRFAMILY */
+#endif /* EAI_NONAME */
 
 /* flags for getaddrinfo() */
 
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: another trap 12 while in kernel mode (now with trace)

2003-11-20 Thread Hajimu UMEMOTO
Hi,

 On Wed, 19 Nov 2003 22:30:44 + (UTC)
 [EMAIL PROTECTED] (Bjoern A. Zeeb) said:

db trace
bzeeb-lists key_cmpspidx_withmask(deadc0de,c9b5c914) at key_cmpspidx_withmask+0x2c
bzeeb-lists key_allocsp(0,c9b5c914,2,16000210,c1426f0a) at key_allocsp+0x8b

Thank you for your report.  I'm working on this.  Please wait.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: /etc/rc.d/ipsec starts not in time

2003-11-16 Thread Hajimu UMEMOTO
Hi,

 On Sat, 15 Nov 2003 15:21:34 -0800
 Terry Lambert [EMAIL PROTECTED] said:

 It is not sufficient.  There is setkey(8) in /usr/sbin.  It means that
 we cannot protect NFS exported /usr by IPsec.  If there is no
 objection, I wish to move setkey(8) into /sbin like NetBSD did.

tlambert2 This type of order inversion is common.

tlambert2 Can we simply delay exportation until later in the boot process?
tlambert2 Wouldn't this have the same effect?

Oops, I should explain the situation clearly.  The client which mounts
/usr by NFS cannot use IPsec due to lack of setkey(8).

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: /etc/rc.d/ipsec starts not in time

2003-11-16 Thread Hajimu UMEMOTO
Hi,

 On Sun, 16 Nov 2003 12:10:12 +0200
 Kostyuk Oleg [EMAIL PROTECTED] said:

It is not sufficient.  There is setkey(8) in /usr/sbin.  It means that
we cannot protect NFS exported /usr by IPsec.  If there is no
objection, I wish to move setkey(8) into /sbin like NetBSD did.
 
 tlambert2 This type of order inversion is common.
 tlambert2 Can we simply delay exportation until later in the boot process?
 tlambert2 Wouldn't this have the same effect?
 
 Oops, I should explain the situation clearly.  The client which mounts
 /usr by NFS cannot use IPsec due to lack of setkey(8).

cub I think, you not exactly understand my problem.

I don't think so.

cub I not export anything, not protect NFS exported /usr and
cub have ordinary workstation with 40G HD and /usr on it.
cub Using IPSec - hostorical behavior :), and i live without
cub problems on 4.x .

cub But I use NFS exports from others.
cub And, in case if IPSec used between my mashine and NFS server,
cub I can't boot smoothly - booting hold up on mounting NFS
cub until I press Ctrl+C .

cub Patch, which I send, resolve my problem.
cub But I not sure - applicable this patch for diskless ?

setkey(8) is in /usr/sbin.  Currently, ipsec is done after
mountcritremote.  So, the user who use NFS mounted /usr can use
setkey(8).
It seems your patch changes to invoke ipsec before networking.  It
means that the user who use NFS mounted /usr cannot use setkey(8),
anymore.
So, I believe that moving setkey(8) into /sbin is required to
establish your needs.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: /etc/rc.d/ipsec starts not in time

2003-11-15 Thread Hajimu UMEMOTO
Hi,

 On Sun, 02 Nov 2003 15:49:35 +0200
 Kostyuk Oleg [EMAIL PROTECTED] said:

cubProblem is in order of starting /etc/rc.d/ipsec.
cubIt must start BEFORE any network interaction,
cubmay be even before configuring interfaces.
cubBut I not sure in case with diskless mashines.

cub-# BEFORE:  DAEMON
cub+# BEFORE:  NETWORK

It is not sufficient.  There is setkey(8) in /usr/sbin.  It means that
we cannot protect NFS exported /usr by IPsec.  If there is no
objection, I wish to move setkey(8) into /sbin like NetBSD did.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-12 Thread Hajimu UMEMOTO
Hi,

 On Wed, 12 Nov 2003 16:22:38 +0100
 Andre Oppermann [EMAIL PROTECTED] said:

oppermann Ok, I found the bug. It was in the ipv6 hash function where I made
oppermann a mistake with the hashmask.
oppermann The updated patch is here:
oppermann  http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031112.patch
oppermann Could you try again please?

It does repeatable panic.  Unfortunately, my laptop hanguped during
dumping core, and I couldn't get core.  So, I copied the output from
ddb by hand.

Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0x1c
fault code  = supervisor read, page not present
instruction pointer = 0x8:0xc05b68c5
stack pointer   = 0x10:0xd208ea28
frame pointer   = 0x10:0xd208ea64
code segment= base 0x0, limit 0x, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 27 (swi1: net)
kernel: type 12 trap, code=0
Stopped at  in6_selecthlim+0x35:cmpl$0,0x1c(%esi)
db trace
in6_selecthlim(0,0,28,0,fadd8ac9) at in6_selecthlim+0x35
syncache_respond(c3f6f000,c19a0600,1,c19a0600,0) at syncache_respond+0x31c
syncache_add(d208eb80,d208ebf4,c1fc4836,d208eb4c,c19a0600) at syncache_add+0x4f4
tcp_input(c19a0600,28,0,d208ec40,6) at tcp_input+0xdae
tcp6_input(d208ec84,d208ec60,6,d208ec84,28) at tcp6_input+0xf5
ip6_input(c19a0600,d018930f,39d40a1e,c0724474,0) at ip6_input+0xc18
netisr_processqueue(c06f0484,aa,7b1c1ccb,351110b4,c050250d) at netisr_processqueue+0xd9
swi_net(0,0,0,0,c199254c) at swi_net+0xd9
ithread_loop(c1988580,d208ed48,4d,55ff44fd,0) at ithread_loop+0x1d8
fork_exit(c04e4d90,c1988580,d208ed48) at fork_exit+0x80
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xd208ed7c, ebp = 0 ---
db

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-11 Thread Hajimu UMEMOTO
Hi,

 On Sun, 09 Nov 2003 17:19:07 +0100
 Andre Oppermann [EMAIL PROTECTED] said:

oppermann The patch is here (relative to -CURRENT as of 2003-11-09):
oppermann  http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031109.patch

The patch cannot be compiled:

cc -c -O -pipe -march=pentium3 -Wall -Wredundant-decls -Wnested-externs 
-Wstrict-prototypes  -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual  
-fformat-extensions -std=c99 -g -nostdinc -I-  -I. 
-I/usr/home/ume/cvs/freefall/current/src/sys 
-I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/acpica 
-I/usr/home/ume/cvs/freefall/current/src/sys/contrib/ipfilter 
-I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/ath 
-I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/ath/freebsd 
-I/usr/home/ume/cvs/freefall/current/src/sys/contrib/ngatm -D_KERNEL -include 
opt_global.h -fno-common -finline-limit=15000 -fno-strict-aliasing  
-mno-align-long-strings -mpreferred-stack-boundary=2 -ffreestanding -Werror  
/usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c
/usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c: In function 
`ip_forward':
/usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c:1960: warning: implicit 
declaration of function `ipsec_getpolicybyaddr'
/usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c:1963: warning: 
assignment makes pointer from integer without a cast
*** Error code 1

There is no ipsec_getpolicybyaddr() for IPSEC.  And, #ifdef is
slightly complex.
I don't tested it actually, yet.

--- sys/netinet/ip_input.c.orig Wed Nov 12 00:08:42 2003
+++ sys/netinet/ip_input.c  Wed Nov 12 00:18:50 2003
@@ -1957,10 +1957,17 @@
int ipsechdr;
struct route *ro;
 
+#ifdef IPSEC
+   sp = ipsec4_getpolicybyaddr(mcopy,
+   IPSEC_DIR_OUTBOUND,
+   IP_FORWARDING,
+   ipsecerror);
+#else
sp = ipsec_getpolicybyaddr(mcopy,
   IPSEC_DIR_OUTBOUND,
   IP_FORWARDING,
   ipsecerror);
+#endif
 
if (sp != NULL) {
/* count IPsec header size */
@@ -1995,13 +2002,11 @@
 #else
KEY_FREESP(sp);
 #endif
-   ipstat.ips_cantfrag++;
-   break;
-   } else 
-#endif /*IPSEC || FAST_IPSEC*/
-   destifp = ia-ia_ifp;
-#if defined(IPSEC) || defined(FAST_IPSEC)
+   } else
+   destifp = ia-ia_ifp;
}
+#else
+   destifp = ia-ia_ifp;
 #endif /*IPSEC || FAST_IPSEC*/
ipstat.ips_cantfrag++;
break;

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-11 Thread Hajimu UMEMOTO
Hi,

 On Sun, 09 Nov 2003 17:19:07 +0100
 Andre Oppermann [EMAIL PROTECTED] said:

oppermann The patch is here (relative to -CURRENT as of 2003-11-09):

oppermann  http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031109.patch

It panics at boot around invoking rtsol(8):

Fatal trap 12: page fault while in kernel mode
fault virtual address   = 0x80
fault code  = supervisor write, page not present
instruction pointer = 0x8:0xc05b5278
stack pointer   = 0x10:0xd7be0944
frame pointer   = 0x10:0xd7be0998
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 4912 (rtsol)
trap number = 12
panic: page fault


#0  doadump ()
at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:240
240 dumping++;
(kgdb) bt
#0  doadump ()
at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:240
#1  0xc04fad80 in boot (howto=256)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:372
#2  0xc04fb168 in panic ()
at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:550
#3  0xc0662316 in trap_fatal (frame=0xd7be0904, eva=0)
at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:821
#4  0xc0661fb2 in trap_pfault (frame=0xd7be0904, usermode=0, eva=128)
at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:735
#5  0xc0661b05 in trap (frame=
  {tf_fs = -1068629992, tf_es = -675414000, tf_ds = -675414000, tf_edi = 
-1010894932, tf_esi = -675411476, tf_ebp = -675411560, tf_isp = -675411664, tf_ebx = 
0, tf_edx = -1010048384, tf_ecx = 0, tf_eax = 4, tf_trapno = 12, tf_err = 2, tf_eip = 
-1067756936, tf_cs = 8, tf_eflags = 66118, tf_esp = -675411440, tf_ss = -675411320}) 
at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:420
#6  0xc0652df8 in calltrap () at {standard input}:94
#7  0xc05b4b5b in in6_selectsrc (dstsock=0xd7be09ec, opts=0xd7be0a88,
mopts=0x0, ro=0x0, laddr=0xc3bef7ac, errorp=0xd7be0a84)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/in6_src.c:242
#8  0xc05cda65 in rip6_output (m=0xc19a1000)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/raw_ip6.c:426
#9  0xc05ce4ec in rip6_send (so=0xc3bdf660, flags=0, m=0xc19a1000, nam=0x0,
control=0x0, td=0xc3cbe280)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/raw_ip6.c:742
#10 0xc053a62d in sosend (so=0xc3bdf660, addr=0xc39bbb20, uio=0xd7be0bf4,
top=0xc19a1000, control=0xc19a1100, flags=0, td=0xc3cbe280)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_socket.c:715
#11 0xc053ef7c in kern_sendit (td=0xc3cbe280, s=3, mp=0xd7be0ca4, flags=0,
control=0x0)
---Type return to continue, or q return to quit---
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:722
#12 0xc053ed9e in sendit (td=0x0, s=0, mp=0xd7be0ca4, flags=0)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:662
#13 0xc053f393 in sendmsg (td=0x0, uap=0xd7be0d10)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:900
#14 0xc06626a0 in syscall (frame=
  {tf_fs = 47, tf_es = 47, tf_ds = 47, tf_edi = 5, tf_esi = 1, tf_ebp = 
-1077940776, tf_isp = -675410572, tf_ebx = 134549504, tf_edx = 134545504, tf_ecx = 
134545504, tf_eax = 28, tf_trapno = 12, tf_err = 2, tf_eip = 671923007, tf_cs = 31, 
tf_eflags = 514, tf_esp = -1077940852, tf_ss = 47})
at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:1010
#15 0xc0652e4d in Xint0x80_syscall () at {standard input}:136
---Can't read userspace from dump, or kernel process---
 
(kgdb) frame 7
#7  0xc05b4b5b in in6_selectsrc (dstsock=0xd7be09ec, opts=0xd7be0a88,
mopts=0x0, ro=0x0, laddr=0xc3bef7ac, errorp=0xd7be0a84)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/in6_src.c:242
242 if ((*errorp = in6_selectif(dstsock, opts, mopts, ro, ifp)) != 0)
(kgdb)

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-11 Thread Hajimu UMEMOTO
Hi,

 On Tue, 11 Nov 2003 18:06:05 +0100
 Andre Oppermann [EMAIL PROTECTED] said:

oppermann However there is a problem in netkey/key.c with the static variable
oppermann ipsec_esp_auth which is unused if IPSEC_ESP is not defined.

Thanks.  I've just committed to define ipsec_esp_auth only when
IPSEC_ESP is defined.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-11 Thread Hajimu UMEMOTO
 to quit---
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/ip6_output.c:830
#27 0xc05cf5b9 in udp6_output (in6p=0xc3b2d900, m=0xc19a0b00,
addr6=0xc19a0bf8, control=0xc199db00, td=0xc3840a00)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/udp6_output.c:297
#28 0xc05d03ce in udp6_send (so=0xc3c1b110, flags=0, m=0xc19a0a00,
addr=0xc39bb5e0, control=0xc199db00, td=0xc3840a00)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/udp6_usrreq.c:758
#29 0xc053a62d in sosend (so=0xc3c1b110, addr=0xc39bb5e0, uio=0xd2e5ebf4,
top=0xc19a0a00, control=0xc199db00, flags=0, td=0xc3840a00)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_socket.c:715
#30 0xc053ef7c in kern_sendit (td=0xc3840a00, s=6, mp=0xd2e5eca4, flags=0,
control=0x0)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:722
#31 0xc053ed9e in sendit (td=0x0, s=0, mp=0xd2e5eca4, flags=0)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:662
#32 0xc053f393 in sendmsg (td=0x0, uap=0xd2e5ed10)
at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:900
#33 0xc06626b0 in syscall (frame=
  {tf_fs = 47, tf_es = 47, tf_ds = 47, tf_edi = -1077941600, tf_esi = 2, tf_ebp = 
-1077941400, tf_isp = -756683404, tf_ebx = 0, tf_edx = 27, tf_ecx = -1077942160, 
tf_eax = 28, tf_trapno = 0, tf_err = 2, tf_eip = 673524543, tf_cs = 31, tf_eflags = 
658, tf_esp = -1077941956, tf_ss = 47})
at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:1010
#34 0xc0652e5d in Xint0x80_syscall () at {standard input}:136
---Can't read userspace from dump, or kernel process---
 
(kgdb) frame 24
#24 0xc058e637 in tcp_hc_getmtu (inc=0x0)
at /usr/home/ume/cvs/freefall/current/src/sys/netinet/tcp_hostcache.c:420
420 hc_entry = tcp_hc_lookup(inc);
(kgdb)

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: tcp hostcache and ip fastforward for review

2003-11-10 Thread Hajimu UMEMOTO
Hi,

 On Sun, 09 Nov 2003 17:19:07 +0100
 Andre Oppermann [EMAIL PROTECTED] said:

oppermann Hajimu-san, I'm looking especially for comments on whether my changes
oppermann to IPv6 are correct wrt IPv6 concepts. (I hope they are).

I don't see the patch in detail, yet, it seems your change will affect
KAME's development.  You should ask [EMAIL PROTECTED] for review your
patch in detail before committing into FreeBSD.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Forward: HEADS UP! Default value of ip6_v6only changed

2003-10-28 Thread Hajimu UMEMOTO
Hi,

Our default of net.inet6.ip6.v6only was off in 4.X, and was changed to
on on 5.X to follow NetBSD's practice.  This behavior on 5.X breaks
RFC2553/3493, and the change was intentional from security
consideration.  But, NetBSD changed it off by default.
How do you think our default of on?

---BeginMessage---
The default value of ip6_v6only (sysctl net.inet6.ip6.v6only) has
been changed.  The new value brings us closer in line with current
RFC-defined behavior and practices.

Itojun still has significant concerns about the new default behavior.
His concerns have been well-documented in
ftp://ftp.itojun.org/pub/paper/draft-cmetz-v6ops-v4mapped-api-harmful-00.txt

Best Regards,
NetBSD OS PMC (core)

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
---End Message---
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


HEADS-UP: switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542

2003-10-24 Thread Hajimu UMEMOTO
Hi,

I've just committed to switch Advanced Sockets API for IPv6 from
RFC2292 to RFC3542 (aka RFC2292bis).  Though I believe this commit
doesn't break backward compatibility againt existing binaries, it
breaks backward compatibility of API.
Now, the applications which use Advanced Sockets API such as telnet,
ping6, mld6query and traceroute6 use RFC3542 API.

Sincerely,

---BeginMessage---
ume 2003/10/24 11:26:30 PDT

  FreeBSD src repository

  Modified files:
contrib/telnet/telnet commands.c 
lib/libc/net Makefile.inc getaddrinfo.c ip6opt.c 
 rthdr.c 
lib/libsdp   search.c 
sbin/ping6   Makefile ping6.8 ping6.c 
sys/netinet  icmp6.h in.h in_pcb.h ip6.h 
sys/netinet6 icmp6.c in6.h in6_pcb.c in6_var.h 
 ip6_input.c ip6_output.c ip6_var.h mld6.c 
 nd6.c nd6.h nd6_rtr.c raw_ip6.c route6.c 
 udp6_output.c 
usr.sbin/mld6query   Makefile mld6.c 
usr.sbin/traceroute6 Makefile 
  Added files:
lib/libc/net inet6_opt_init.3 inet6_rth_space.3 
  Log:
  Switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542
  (aka RFC2292bis).  Though I believe this commit doesn't break
  backward compatibility againt existing binaries, it breaks
  backward compatibility of API.
  Now, the applications which use Advanced Sockets API such as
  telnet, ping6, mld6query and traceroute6 use RFC3542 API.
  
  Obtained from:  KAME
  
  Revision  ChangesPath
  1.33  +9 -16 src/contrib/telnet/telnet/commands.c
  1.49  +14 -2 src/lib/libc/net/Makefile.inc
  1.46  +276 -156  src/lib/libc/net/getaddrinfo.c
  1.1   +291 -0src/lib/libc/net/inet6_opt_init.3 (new)
  1.1   +254 -0src/lib/libc/net/inet6_rth_space.3 (new)
  1.5   +227 -0src/lib/libc/net/ip6opt.c
  1.6   +340 -210  src/lib/libc/net/rthdr.c
  1.2   +1 -0  src/lib/libsdp/search.c
  1.10  +2 -4  src/sbin/ping6/Makefile
  1.19  +61 -71src/sbin/ping6/ping6.8
  1.25  +200 -181  src/sbin/ping6/ping6.c
  1.13  +25 -26src/sys/netinet/icmp6.h
  1.81  +1 -0  src/sys/netinet/in.h
  1.63  +6 -4  src/sys/netinet/in_pcb.h
  1.8   +10 -11src/sys/netinet/ip6.h
  1.43  +36 -5 src/sys/netinet6/icmp6.c
  1.28  +90 -33src/sys/netinet6/in6.h
  1.43  +1 -2  src/sys/netinet6/in6_pcb.c
  1.17  +4 -1  src/sys/netinet6/in6_var.h
  1.59  +33 -56src/sys/netinet6/ip6_input.c
  1.62  +985 -246  src/sys/netinet6/ip6_output.c
  1.20  +37 -4 src/sys/netinet6/ip6_var.h
  1.14  +1 -1  src/sys/netinet6/mld6.c
  1.35  +27 -38src/sys/netinet6/nd6.c
  1.15  +28 -9 src/sys/netinet6/nd6.h
  1.23  +0 -3  src/sys/netinet6/nd6_rtr.c
  1.29  +25 -23src/sys/netinet6/raw_ip6.c
  1.8   +1 -2  src/sys/netinet6/route6.c
  1.13  +3 -2  src/sys/netinet6/udp6_output.c
  1.5   +2 -2  src/usr.sbin/mld6query/Makefile
  1.3   +97 -16src/usr.sbin/mld6query/mld6.c
  1.8   +2 -2  src/usr.sbin/traceroute6/Makefile
---End Message---
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: buildworld fails on Alpha?

2003-10-24 Thread Hajimu UMEMOTO
Hi,

 On Fri, 24 Oct 2003 23:03:31 +0200
 Wilko Bulte [EMAIL PROTECTED] said:

wkb ll -Wno-format-y2k -Wno-uninitialized  -c /usr/src/lib/libfetch/common.c
wkb /usr/src/lib/libfetch/common.c:58: error: `EAINONAME' undeclared here (not

It was fixed already.  Please re-cvsup.
Sorry for the mess.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


HEADS-UP: EAI_NODATA was deprecated

2003-10-23 Thread Hajimu UMEMOTO
Hi,

I've just committed to nuke EAI_NODATA.  It was depricated in RFC3493
(aka RFC2553bis).  Now, getaddrinfo(3) returns EAI_NONAME instead of
EAI_NODATA.  So, an application that looks EAI_NODATA, error handling
will not work.  At least, you need to recompile telnet(1).

Sincerely,

---BeginMessage---
ume 2003/10/23 06:55:36 PDT

  FreeBSD src repository

  Modified files:
contrib/telnet/telnet commands.c 
lib/libc/net getaddrinfo.3 getaddrinfo.c 
  Log:
  EAI_ADDRFAMILY and EAI_NODATA was deprecated in RFC3493
  (aka RFC2553bis).  Now, getaddrinfo(3) returns EAI_NONAME
  instead of EAI_NODATA.  Our getaddrinfo(3) nor getnameinfo(3)
  didn't use EAI_ADDRFAMILY.
  
  Obtained from:  KAME
  
  Revision  ChangesPath
  1.32  +2 -2  src/contrib/telnet/telnet/commands.c
  1.23  +0 -7  src/lib/libc/net/getaddrinfo.3
  1.44  +4 -10 src/lib/libc/net/getaddrinfo.c
---End Message---
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: HEADS-UP: EAI_NODATA was deprecated

2003-10-23 Thread Hajimu UMEMOTO
Hi,

 On Thu, 23 Oct 2003 10:40:05 -0700
 Terry Lambert [EMAIL PROTECTED] said:

tlambert2 Please apply this patch:
tlambert2 +#define EAI_NODATA  EAINONAME   /* To be removed on 23 APR 2004 */

Okay, applied.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: panic: mutex rtentry not owned at /usr/src/sys/net/route.c:225

2003-10-18 Thread Hajimu UMEMOTO
Hi,

 On Sat, 18 Oct 2003 11:47:21 +0200
 John Hay [EMAIL PROTECTED] said:

jhay #2  0xc0482a18 in panic () at /usr/src/sys/kern/kern_shutdown.c:550
jhay #3  0xc047ad51 in _mtx_assert (m=0xc2a0da90, what=0, 
jhay file=0xc05b9e4f /usr/src/sys/net/route.c, line=225)
jhay at /usr/src/sys/kern/kern_mutex.c:855
jhay #4  0xc04e0598 in rtfree (rt=0xc2a0da00) at /usr/src/sys/net/route.c:225
jhay #5  0xc0518291 in nd6_output (ifp=0xc2988800, origifp=0xc2988800, 
jhay m0=0xc12ae700, dst=0xc2a240dc, rt0=0xc361ca00)
jhay at /usr/src/sys/netinet6/nd6.c:1917

I've just committed, and it should fix.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


HEADS-UP: SADB_X_AALG_RIPEMD160HMAC was changed

2003-10-12 Thread Hajimu UMEMOTO
Hi,

I've just corrected the value of SADB_X_AALG_RIPEMD160HMAC from 9 to
8.  If you are using IPsec stuff, it breaks binary compatibility.
When updating your kernel, you need to update libipsec, setkey, racoon
and isakmpd appropriately.

Sincerely,

---BeginMessage---
ume 2003/10/12 21:54:51 PDT

  FreeBSD src repository

  Modified files:
lib/libipsec pfkey_dump.c 
sys/conf files 
sys/net  pfkeyv2.h 
sys/netinet6 ah_core.c 
usr.sbin/setkey  setkey.8 token.l 
  Log:
  - support AES XCBC MAC for AH
  - correct SADB_X_AALG_RIPEMD160HMAC to 8
  
  Obtained from:  KAME
  
  Revision  ChangesPath
  1.10  +3 -0  src/lib/libipsec/pfkey_dump.c
  1.831 +3 -2  src/sys/conf/files
  1.10  +2 -1  src/sys/net/pfkeyv2.h
  1.18  +7 -0  src/sys/netinet6/ah_core.c
  1.26  +2 -0  src/usr.sbin/setkey/setkey.8
  1.7   +1 -0  src/usr.sbin/setkey/token.l
---End Message---
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: problem with IPv6 gif tunnel activation in rc.conf (latestcurrent)

2003-08-14 Thread Hajimu UMEMOTO
Hi,

 On Sun, 10 Aug 2003 17:41:40 +0100
 Matt [EMAIL PROTECTED] said:

matt ipv6_network_interfaces=xl1 lo0

This line should be `ipv6_network_interfaces=xl1 gif0'.

matt ipv6_ifconfig_xl1=fec0:0:0:1::1 prefixlen 64
matt ipv6_ifconfig_gif0=2001:470:1F00:::32F 2001:470:1F00:::32E prefixlen
matt 128
matt ipv6_ifconfig_xl1_alias0=2001:470:1F00:507::1 prefixlen 64

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: RELENG_5_1 doesnt build gifconfig

2003-07-12 Thread Hajimu UMEMOTO
Hi,

 On Sat, 12 Jul 2003 18:16:48 +0200
 Karl M. Joch [EMAIL PROTECTED] said:

k.joch wanted to setup some ipsec tunnels and miss gifconfig. it is still in 
k.joch the source tree, but doesnt build with buildworld. cleaned out src and 
k.joch obj and cvs a new src tree but still the same.

The feature of gifconfig(8) was merged into ifconfig(8), and
gifconfig(8) was obsoleted for a long time.  The source of
gifconfig(8) was removed on recent 5-CURRENT.  Please use tunnel
option of ifconfig(8), instead.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: [acpi-jp 2408] Problems with 0619 and battery support

2003-07-12 Thread Hajimu UMEMOTO
Hi,

 On Fri, 11 Jul 2003 20:21:07 -0700
 Nate Lawson [EMAIL PROTECTED] said:

nate I am attempting to import acpica-0619 into FreeBSD.  The basic changes I
nate made to get things working was to change calls to AcpiGetObjectInfo to use
nate an ACPI_BUFFER and AcpiEnableGpe instead of AcpiEnableEvent for enabling
nate our GPE handlers for the EC.  With my changes, it compiles and boots fine.
nate But it seems battery support is broken.  Here is the dmesg output.

I met similar problem and I cannot get battery status at all on
today's -CURRENT.

ACPI-0432: *** Error: Handler for [EmbeddedControl] returned 
AE_NO_HARDWARE_RESPONSE
ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.RBAT] (Node 
0xc3138f20), AE_AML_NO_RETURN_VALUE
ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.RVSN] (Node 
0xc3138ea0), AE_AML_NO_RETURN_VALUE
ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.BAT0._BST] 
(Node 0xc3138dc0), AE_AML_NO_RETURN_VALUE

[EMAIL PROTECTED]:1012% apm
APM version: 1.2
APM Management: Disabled
AC Line status: on-line
Battery status: charging
Remaining battery life: invalid value (0x)
Remaining battery time: unknown
Number of batteries: 2
Battery 0:
Battery status: not present
Battery 1:
Battery status: not present
Resume timer: Thu Jan  1 08:59:59 1970
Resume on ring indicator: disabled
APM Capabilities:
unknown
[EMAIL PROTECTED]:1013% sysctl hw.acpi.battery
hw.acpi.battery.life: -1
hw.acpi.battery.time: -1
hw.acpi.battery.state: 7
hw.acpi.battery.units: 2
hw.acpi.battery.info_expire: 10

nate I've attached the diff.  Please let me know if there's something I should
nate be aware of that changed calling _BIF.

Unfortunately, the patch couldn't be compiled.

cc -O -pipe -march=pentium3 -I/usr/src/sys/modules/acpi/../../contrib/dev/acpica  
-D_KERNEL -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes  
-Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual  -fformat-extensions 
-std=c99 -DKLD_MODULE -nostdinc -I-  
-I/usr/src/sys/modules/acpi/../../contrib/dev/acpica -I. -I@ -I@/dev -I@/../include 
-fno-common -g -mno-align-long-strings -mpreferred-stack-boundary=2 -ffreestanding 
-Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes  -Wmissing-prototypes 
-Wpointer-arith -Winline -Wcast-qual  -fformat-extensions -std=c99 -c 
/usr/src/sys/dev/acpica/acpi.c
/usr/src/sys/dev/acpica/acpi.c: In function `acpi_identify':
bus_if.h:79: warning: inlining failed in call to `BUS_ADD_CHILD'
/usr/src/sys/dev/acpica/acpi.c:264: warning: called from here
/usr/src/sys/dev/acpica/acpi.c: In function `acpi_isa_get_logicalid':
/usr/src/sys/dev/acpica/acpi.c:716: warning: passing arg 2 of `AcpiGetObjectInfo' from 
incompatible pointer type
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
/usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not 
a structure or union
. . .

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED],jp.}FreeBSD.org
http://www.imasy.org/~ume/
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-current
To unsubscribe, send any mail to [EMAIL PROTECTED]


Re: rsync --daemon problems

2003-02-07 Thread Hajimu UMEMOTO
Hi,

 On Thu, 6 Feb 2003 19:33:10 -0500
 David Rhodus [EMAIL PROTECTED] said:

david On one machine that rsync start's on, I get this from netstat.
david tcp6   0  0  *.873  *.*
david LISTEN

It seems the daemon mode of rsync depends on an IPv4-mapped IPv6
address.  Since an IPv4-mapped IPv6 address is off by default on
5-CURRENT, rsync doesn't listen on IPv4.
Further, rsync has a bug that it always listen on 1st entry's address
of the result of getaddrinfo() call.
Please try attached patch.  With this patch, rsync listen on both an
IPv4 and an IPv6.

Sincerely,


Index: socket.c
diff -u socket.c.orig socket.c
--- socket.c.orig	Mon Jan 27 12:35:09 2003
+++ socket.c	Sat Feb  8 00:06:59 2003
@@ -292,11 +292,11 @@
  * @param bind_address Local address to bind, or NULL to allow it to
  * default.
  **/
-static int open_socket_in(int type, int port, const char *bind_address,
-			  int af_hint)
+static int *open_socket_in(int type, int port, const char *bind_address,
+			   int af_hint)
 {
 	int one=1;
-	int s;
+	int *s, *socks, maxs;
 	struct addrinfo hints, *all_ai, *resp;
 	char portbuf[10];
 	int error;
@@ -310,41 +310,65 @@
 	if (error) {
 		rprintf(FERROR, RSYNC_NAME : getaddrinfo: bind address %s: %s\n,
 			bind_address, gai_strerror(error));
-		return -1;
+		return NULL;
+	}
+
+	/* Count max number of sockets we may open */
+	for (maxs = 0, resp = all_ai; resp; resp = resp-ai_next, maxs++)
+		;
+	socks = malloc((maxs + 1) * sizeof(int));
+	if (!socks) {
+		rprintf(FERROR,
+			RSYNC_NAME couldn't allocate memory for sockets);
+		return NULL;
 	}
 
 	/* We may not be able to create the socket, if for example the
 	 * machine knows about IPv6 in the C library, but not in the
 	 * kernel. */
+	*socks = 0;   /* num of sockets counter at start of array */
+	s = socks + 1;
 	for (resp = all_ai; resp; resp = resp-ai_next) {
-		s = socket(resp-ai_family, resp-ai_socktype,
+		*s = socket(resp-ai_family, resp-ai_socktype,
 			   resp-ai_protocol);
 
-		if (s == -1) 
+		if (*s == -1) 
 			/* See if there's another address that will work... */
 			continue;
 		
-		setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
+		setsockopt(*s, SOL_SOCKET, SO_REUSEADDR,
 			   (char *)one, sizeof one);
 		
+#ifdef IPV6_V6ONLY
+		if (resp-ai_family == AF_INET6)
+			setsockopt(*s, IPPROTO_IPV6, IPV6_V6ONLY,
+   (char *)one, sizeof one);
+#endif
+
 		/* now we've got a socket - we need to bind it */
-		if (bind(s, all_ai-ai_addr, all_ai-ai_addrlen)  0) {
+		if (bind(*s, resp-ai_addr, resp-ai_addrlen)  0) {
 			/* Nope, try another */
-			close(s);
+			close(*s);
 			continue;
 		}
 
-		freeaddrinfo(all_ai);
-		return s;
+		(*socks)++;
+		s++;
 	}
 
-	rprintf(FERROR, RSYNC_NAME : open inbound socket on port %d failed: 
-		%s\n,
-		port, 
-		strerror(errno));
+	if (all_ai)
+		freeaddrinfo(all_ai);
 
-	freeaddrinfo(all_ai);
-	return -1; 
+	if (*socks == 0) {
+		rprintf(FERROR,
+			RSYNC_NAME : open inbound socket on port %d failed: 
+			%s\n,
+			port, 
+			strerror(errno));
+		free(socks);
+		return NULL;
+	}
+	return socks;
 }
 
 
@@ -376,19 +400,29 @@
 
 void start_accept_loop(int port, int (*fn)(int, int))
 {
-	int s;
+	fd_set deffds;
+	int *s, maxfd, i, j;
 	extern char *bind_address;
 	extern int default_af_hint;
 
 	/* open an incoming socket */
 	s = open_socket_in(SOCK_STREAM, port, bind_address, default_af_hint);
-	if (s == -1)
+	if (s == NULL)
 		exit_cleanup(RERR_SOCKETIO);
 
 	/* ready to listen */
-	if (listen(s, 5) == -1) {
-		close(s);
-		exit_cleanup(RERR_SOCKETIO);
+	FD_ZERO(deffds);
+	maxfd = -1;
+	for (i = 1; i = *s; i++) {
+		if (listen(s[i], 5) == -1) {
+			for (j = 1; j = i; j++)
+close(s[j]);
+			free(s);
+			exit_cleanup(RERR_SOCKETIO);
+		}
+		FD_SET(s[i], deffds);
+		if (maxfd  s[i])
+			maxfd = s[i];
 	}
 
 
@@ -406,16 +440,20 @@
 		   forever */
 		log_close();
 
-		FD_ZERO(fds);
-		FD_SET(s, fds);
+		FD_COPY(deffds, fds);
 
-		if (select(s+1, fds, NULL, NULL, NULL) != 1) {
+		if (select(maxfd + 1, fds, NULL, NULL, NULL) != 1) {
 			continue;
 		}
 
-		if(!FD_ISSET(s, fds)) continue;
-
-		fd = accept(s,(struct sockaddr *)addr,addrlen);
+		fd = -1;
+		for (i = 1; i = *s; i++) {
+			if (FD_ISSET(s[i], fds)) {
+fd = accept(s[i], (struct sockaddr *)addr,
+	addrlen);
+break;
+			}
+		}
 
 		if (fd == -1) continue;
 
@@ -430,7 +468,7 @@
 
 		if ((pid = fork()) == 0) {
 			int ret;
-			close(s);
+			close(s[i]);
 			/* open log file in child before possibly giving
 			   up privileges  */
 			log_open();
@@ -452,6 +490,7 @@
 			close(fd);
 		}
 	}
+	free(s);
 }
 
 

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/



Re: Linux networking emulation broken?

2003-02-06 Thread Hajimu UMEMOTO
Hi,

 On Thu, 6 Feb 2003 22:28:26 +
 David Malone [EMAIL PROTECTED] said:

dwmalone On Thu, Feb 06, 2003 at 11:00:21AM -0800, Kris Kennaway wrote:
 I'm also seeing this with Linux Phoenix, though I haven't tcpdumped
 the output.

dwmalone I'm guessing the short patch at:

dwmalone   http://www.maths.tcd.ie/~dwmalone/linux_sendmsg.patch

dwmalone should help. Can you try it and let me know?

Oops, thanks!  Though I cannot test it for now, it seems correct to
me.  However, I think that where

bsd_args.msg = (caddr_t)((nmsg == NULL) ? linux_args.msg : nmsg);

it is sufficient to just substitute nmsg for bsd_args.msg:

bsd_args.msg = (caddr_t) nmsg;

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: if_sis.c failed to attach my SiS630 ethernet controller with the latest commit

2003-01-26 Thread Hajimu UMEMOTO
Hi,

 Sun, 26 Jan 2003 14:31:28 +0900 (JST),
 Toshiomi Moriki [EMAIL PROTECTED] said:

toshiomi I found the same problem in my FreeBSD box.
toshiomi Isn't anyone have further informations about this problem?

I have same problem here with my laptop which has SiS630 chipset.  I
backed out if_sis.c to 1.59, then it works fine.

sis0@pci0:1:1:  class=0x02 card=0x14551043 chip=0x09001039 rev=0x82 hdr=0x00
vendor   = 'Silicon Integrated Systems (SiS)'
device   = 'SiS900 Fast Ethernet/Home Networking Ctrlr'
class= network
subclass = ethernet

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [CFR] IPv6 support for Linux sym

2003-01-21 Thread Hajimu UMEMOTO
Hi,

 On Mon, 20 Jan 2003 20:48:56 -0500 (EST)
 Andrew Gallatin [EMAIL PROTECTED] said:

gallatin The ifdefs are there because the linux hack^W OS uses a different
gallatin syscall table on each platform, with a different ABI (eg, the same
gallatin syscall may take 3 args on x86 and 2 on alpha).   They basically never
gallatin cleaned up after bootstrapping themselves from OSF/1.

gallatin The #ifndef alpha code is not compiled because it will never be
gallatin referred to on the alpha..  The osf1 compat code is a much better
gallatin match for the linux networking syscalls, so that's what's used.  On
gallatin alpha, the linux compat module depends on the osf1 compat module..

Umm, I see.  Thank you for clarification.

gallatin Naively, I'm uncertain why you're having compilation problems on
gallatin alpha, since the code is just ifdef'ed out there anyway ;)

My previous patch had two problems on alpha:

- sys/alpha/linux/linux.h did not define LINUX_AF_INET6.

- linux_connect() called linux_sa_get().  linux_sa_get() calls
  linux_to_bsd_domain().  But, linux_to_bsd_domain() was not
  compiled in on alpha.

I believe that these problems were gone in my current patch.
Maybe, you saw new one. :)

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [CFR] IPv6 support for Linux sym

2003-01-20 Thread Hajimu UMEMOTO
Hi,

 On Sun, 19 Jan 2003 19:59:57 +
 David Malone [EMAIL PROTECTED] said:

dwmalone I have a patch which is quite similar to this, but also reduces the
dwmalone use of the stackgap in the Linux networking code and breaks out
dwmalone things like socket, bind and listen into an implimentation and a
dwmalone syscall wrapper (extending Ian's work in this area). I took these
dwmalone patches far enough to get the linux version of telnet to speak IPv6.

Your approach of having syscall wrapper reduces the overhead of
copyout(), and seems good.  I thought that doing copyout() is slightly
lengthy.
However, only connect() and bind() have an wrapper.  We need more
wrappers for converting `to' field of sendto() and `msg_name' field of
sendmsg().  These are not simple than the wrapper for connect() and
bind().  I have no idea how these should be wrapped at the moment.

dwmalone   1) I hadn't figured out the best way to deal with syscalls
dwmalone   which copyout a sockaddr - I suspect we need a per-sysvec
dwmalone   sockaddr copyout function to do this cleanly, but I'm open
dwmalone   to suggestion.

Maybe yes.

dwmalone   2) The patches wouldn't compile on the alpha 'cos of some
dwmalone   ifdefs in the linux emulation code. I just hadn't got around
dwmalone   to resolving this.

Oops, thank you for pointing this out.  It seems that other than
linux_connect() are ifdef'ed by __alpha__.  Is it right?  Is there any
problem removing #ifdef __alpha__ and compiling the codes in on
FreeBSD/Alpha?

dwmalone Maybe we could see if we could combine these patches? My patch is
dwmalone available at:

dwmalone   http://www.maths.tcd.ie/~dwmalone/linux-socket

I think so, too.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [CFR] IPv6 support for Linux sym

2003-01-20 Thread Hajimu UMEMOTO
Hi,

 Mon, 20 Jan 2003 18:18:41 +0900,
 Hajimu UMEMOTO [EMAIL PROTECTED] said:

dwmalone Maybe we could see if we could combine these patches? My patch is
dwmalone available at:
dwmalone   http://www.maths.tcd.ie/~dwmalone/linux-socket
ume I think so, too.

I've tried to merge your patch into my patch, then replaced the
previous one.  How about this?

http://www.imasy.or.jp/~ume/FreeBSD/linux-ipv6.diff

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



[CFR] IPv6 support for Linux sym

2003-01-19 Thread Hajimu UMEMOTO
Hi,

I wrote an IPv6 support for Linux sym.  I've tested it with RHL8's
ftp(1) and ports/www/linux-phoenix, and it seems nicely running with
both an IPv4 and an IPv6.
You can obtain my patch from:

http://www.imasy.or.jp/~ume/FreeBSD/linux-ipv6.diff

Please review it.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [resolution] Re: sendmail (Re: 5.0-RC2 informal PR: 90 sec sendmail delay)

2003-01-04 Thread Hajimu UMEMOTO
Hi,

 On Sat, 04 Jan 2003 12:47:29 -0800
 Terry Lambert [EMAIL PROTECTED] said:

tlambert2 The FreeBSD library bug is that the /etc/hosts file entry:

tlambert2  ::1

tlambert2 is not canonized before being compared, for the reverse lookup.

No, it does.  I've tested it with following program:

#include sys/types.h
#include sys/socket.h
#include netinet/in.h
#include stdio.h
#include netdb.h

main()
{
struct sockaddr_in6 sin6;
struct hostent *ht;
int error;
char hbuf[NI_MAXHOST];

ht = gethostbyaddr((char *)in6addr_loopback, sizeof(struct in6_addr),
   AF_INET6);
if (!ht)
errx(1, gethostbyaddr: lookup faild);
printf(gethostbyaddr: %s\n, ht-h_name);

ht = getipnodebyaddr((char *)in6addr_loopback, sizeof(struct in6_addr),
 AF_INET6, error);
if (!ht)
errx(1, getipnodebyaddr: lookup faild %d, error);
printf(getipnodebyaddr: %s\n, ht-h_name);

memset(sin6, 0, sizeof(sin6));
memcpy(sin6.sin6_addr, in6addr_loopback, sizeof(struct in6_addr));
sin6.sin6_family = AF_INET6;
sin6.sin6_len = sizeof(sin6);
if (getnameinfo((struct sockaddr *)sin6, sizeof(sin6),
hbuf, sizeof(hbuf), NULL, 0, 0) != 0)
errx(1, getnameinfo: lookup faild);
printf(getnameinfo: %s\n, hbuf);
}

Then, it returned as expected:

ume@mille:1082% ./revtest
gethostbyaddr: localhost
getipnodebyaddr: localhost
getnameinfo: localhost

where my /etc/host.conf is:

hosts
#bind

and my /etc/hosts contains:

::1 localhost localhost.mahoroba.org
127.0.0.1   localhost localhost.mahoroba.org

When I commented the ::1 line out in /etc/hosts, the test program
returned:

me@mille:1087% ./revtest
revtest: gethostbyaddr: lookup faild

So, I cannot understand what you say.

tlambert2 It can probably be worked around by spcifying:

tlambert2  0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1

tlambert2 as the left hand side for the IPv6 loopback address, instead of ::1,
tlambert2 in the /etc/hosts file.  I don't recommend this, since it would not
tlambert2 encourage the author of the IPv6 resovler code to fix the bug they
tlambert2 introduced.

You don't need to do it at all.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: problem with phoenix

2002-11-18 Thread Hajimu UMEMOTO
Hi,

 On Mon, 18 Nov 2002 10:51:16 -0600
 John Newman [EMAIL PROTECTED] said:

jnn I'm running a recently (as in today) cvsup'd current box.  Today I compiled
jnn phoenix 0.4.  Oddly enough it would say Connection refused to any URL.
jnn Looking at truss/tcpdump I realized it was ALWAYS trying to connect to
jnn an ipv6 address, for any site.  I searched around google and found this
jnn link:

Please copy

  ports/www/mozilla-devel/files/patch-nsprpub::pr::src::pthreads::ptio.c

into ports/www/phoenix/files, then recompile phoenix.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [CFR] ipfilter IPv6 support in rc

2002-11-02 Thread Hajimu UMEMOTO
Hi,

 On Wed, 30 Oct 2002 16:50:20 +0100
 Ronald van der Pol [EMAIL PROTECTED] said:

Ronald.vanderPol On Tue, Oct 29, 2002 at 00:38:39 +0900, Hajimu UMEMOTO wrote:

 Please review it.  If there is no objection, I'll commit it at next
 weekend.

Ronald.vanderPol Reviewed -stable, looks OK. Would be nice to have this fix. Thanks.

Thanks!  I've just committed it.  I'll do MFC it after 1 week.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



[CFR] ipfilter IPv6 support in rc

2002-10-28 Thread Hajimu UMEMOTO
Hi,

Current rc doesn't support IPv6 setup for ipfilter.  So I made the
patches.  The former is for both 4-STABLE and 5-CURRENT.  In addition
to the former one, 5-CURRENT requires the latter one for
/etc/rc.d/ipfilter.
This patch is not for /etc/rc.network6 as usual IPv6 related setups
but for /etc/rc.network.  I tried to add IPv6 part of ipfilter setups
within /etc/rc.network6.  However, it was difficult to do so.  For
example, flushing rules by `ipf -Fa' affects both IPv4 and IPv6.  So,
I gave up it, and expanded /etc/rc.network.
Please review it.  If there is no objection, I'll commit it at next
weekend.

Sincerely,


Index: etc/defaults/rc.conf
===
RCS file: /home/ncvs/src/etc/defaults/rc.conf,v
retrieving revision 1.159
diff -u -r1.159 rc.conf
--- etc/defaults/rc.conf	5 Sep 2002 20:14:40 -	1.159
+++ etc/defaults/rc.conf	28 Oct 2002 10:30:53 -
@@ -311,6 +311,10 @@
 ipv6_firewall_quiet=NO	# Set to YES to suppress rule display
 ipv6_firewall_logging=NO	# Set to YES to enable events logging
 ipv6_firewall_flags=		# Flags passed to ip6fw when type is a file
+ipv6_ipfilter_rules=/etc/ipf6.rules	# rules definition file for ipfilter,
+	# see /usr/src/contrib/ipfilter/rules
+	# for examples
+ipv6_ipfilter_flags=		# additional flags for ipfilter
 
 ##
 ###  System console options  #
Index: etc/rc.network
===
RCS file: /home/ncvs/src/etc/rc.network,v
retrieving revision 1.137
diff -u -r1.137 rc.network
--- etc/rc.network	20 Sep 2002 18:31:55 -	1.137
+++ etc/rc.network	28 Oct 2002 10:30:54 -
@@ -101,10 +101,20 @@
 		esac
 		case ${ipfilter_enable} in
 		[Yy][Ee][Ss])
-			if [ -r ${ipfilter_rules} ]; then
+			if [ -r ${ipfilter_rules} -o \
+			 -r ${ipv6_ipfilter_rules} ]; then
 echo -n ' ipfilter'
-${ipfilter_program:-/sbin/ipf} -Fa -f \
-${ipfilter_rules} ${ipfilter_flags}
+${ipfilter_program:-/sbin/ipf} -Fa
+if [ -r ${ipfilter_rules} ]; then
+	${ipfilter_program:-/sbin/ipf} \
+	-f ${ipfilter_rules} \
+	${ipfilter_flags}
+fi
+if [ -r ${ipv6_ipfilter_rules} ]; then
+	${ipfilter_program:-/sbin/ipf} -6 \
+	-f ${ipv6_ipfilter_rules} \
+	${ipv6_ipfilter_flags}
+fi
 			else
 ipfilter_enable=NO
 echo -n ' NO IPF RULES'

Index: etc/rc.d/ipfilter
===
RCS file: /home/ncvs/src/etc/rc.d/ipfilter,v
retrieving revision 1.4
diff -u -r1.4 ipfilter
--- etc/rc.d/ipfilter	12 Oct 2002 10:31:31 -	1.4
+++ etc/rc.d/ipfilter	28 Oct 2002 10:59:20 -
@@ -16,7 +16,7 @@
 
 case ${OSTYPE} in
 FreeBSD)
-	stop_precmd=test -f ${ipfilter_rules}
+	stop_precmd=test -f ${ipfilter_rules} -o -f ${ipv6_ipfilter_rules}
 	;;
 NetBSD)
 	stop_precmd=test -f /etc/ipf.conf -o -f /etc/ipf6.conf
@@ -49,7 +49,8 @@
 	fi
 
 	# check for ipfilter rules
-	if [ ! -r ${ipfilter_rules} ]; then
+	if [ ! -r ${ipfilter_rules} ]  [ ! -r ${ipv6_ipfilter_rules} ]
+	then
 		warn 'IP-filter: NO IPF RULES'
 		return 1
 	fi
@@ -78,8 +79,15 @@
 	echo Enabling ipfilter.
 	case ${OSTYPE} in
 	FreeBSD)
-		${ipfilter_program:-/sbin/ipf} -Fa -f \
-		${ipfilter_rules} ${ipfilter_flags}
+		${ipfilter_program:-/sbin/ipf} -Fa
+		if [ -r ${ipfilter_rules} ]; then
+			${ipfilter_program:-/sbin/ipf} \
+			-f ${ipfilter_rules} ${ipfilter_flags}
+		fi
+		if [ -r ${ipv6_ipfilter_rules} ]; then
+			${ipfilter_program:-/sbin/ipf} -6 \
+			-f ${ipv6_ipfilter_rules} ${ipv6_ipfilter_flags}
+		fi
 		;;
 	NetBSD)
 		/sbin/ipf -E -Fa
@@ -114,8 +122,15 @@
 
 	case ${OSTYPE} in
 	FreeBSD)
-		${ipfilter_program:-/sbin/ipf} -I -Fa -f \
-		${ipfilter_rules} ${ipfilter_flags}
+		${ipfilter_program:-/sbin/ipf} -I -Fa
+		if [ -r ${ipfilter_rules} ]; then
+			${ipfilter_program:-/sbin/ipf} -I \
+			-f ${ipfilter_rules} ${ipfilter_flags}
+		fi
+		if [ -r ${ipv6_ipfilter_rules} ]; then
+			${ipfilter_program:-/sbin/ipf} -I -6 \
+			-f ${ipv6_ipfilter_rules} ${ipv6_ipfilter_flags}
+		fi
 		;;
 	NetBSD)
 		/sbin/ipf -I -Fa

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/



HEADS UP: Re: cvs commit: src/sys/net pfkeyv2.h

2002-10-15 Thread Hajimu UMEMOTO

Hi,

I've just committed the following changes.  This broke binary
compatibility of IPsec related applications.  When upgrading your
kernel, you need to recompile libipsec, netstat(1) and setkey(8).  If
you are using racoon(8) or isakmpd(8), you need to reinstall it from
ports, too.

Sincerely,

 On Tue, 15 Oct 2002 13:59:56 -0700 (PDT)
 Hajimu UMEMOTO [EMAIL PROTECTED] said:

ume ume 2002/10/15 13:59:56 PDT

ume   Modified files:
ume sys/net  pfkeyv2.h 
ume   Log:
ume   Correct the definitions of SADB_* to be compatible with
ume   RFC2407/IANA assignment.  This change breaks binary
ume   compatibility.  So, you need to recompile IPsec related
ume   applications.
  
ume   Revision  ChangesPath
ume   1.8   +16 -16src/sys/net/pfkeyv2.h

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Missing groff_mwww.7.gz while installing world in new directory

2002-10-12 Thread Hajimu UMEMOTO
Hi,

 On Sat, 12 Oct 2002 12:36:26 -0700 (PDT)
 Shizuka Kudo [EMAIL PROTECTED] said:

shizukakudo_99 I just built a new world with latest source. If I make installworld 
with DESTDIR=/newdir, it fails
shizukakudo_99 with groff_mwww.7.gz missing. I believe this was related to the recent 
upgrade of groff and
shizukakudo_99 groff_mwww was changed to groff_www. Looking at 
src/gnu/usr.bin/groff/tmac/Makefile still finds a
shizukakudo_99 MLINK reference to groff_mwww.7.

shizukakudo_99 Did anybody have the same problem?

Yes, I just met same problem here.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [PATCH] 'ata_dmasetup: transfer active on this device!' problem on resume

2002-09-05 Thread Hajimu UMEMOTO

Hi,

 Thu, 05 Sep 2002 11:40:39 +0900 (JST),
 Mitsuru IWASAKI [EMAIL PROTECTED] said:

iwasaki My patches will do those things during suspend time;
iwasaki  - wait for DMA transfer completion if it is on the way.
iwasaki  - cancel new requests (yes, it's possible even during suspend
iwasakitime) for ATA disks and remain them in ATA queue.

Oh, it's great.  My problem was gone.  Thanks!

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: sshd doesn't log hostname into utmp correctly

2002-09-01 Thread Hajimu UMEMOTO
Hi,

 Thu, 01 Aug 2002 16:39:45 +0900 $B$N9o$K!V(Bume$B!W!"$9$J$o$A(B
 Hajimu UMEMOTO [EMAIL PROTECTED] $B;a[)$/(B

ume Current sshd doesn't handle actual size of struct sockaddr correctly,
ume and does copy it as long as just size of struct sockaddr.  So, sshd
ume deesn't log hostname into utmp correctly.
ume Here is a proposed patch to fix this problem.  Please review it.

I discussed about this on [EMAIL PROTECTED] as use
requested.  Then, this problem is occur only under FreeBSD because of
our hack.
However, this is potential problem of OpenSSH-portable, and they
agreed to fix this.  But, there is no fixed version of
OpenSSH-portable available, yet.
This problem is serious and I received the claim from many people
especially from Japan.  This problem is occur only when connecting via
IPv6, and there are many people who are using IPv6 in Japan.
So, I wish to fix this problem in time for 4.7-RELEASE.  I wish to commit
this fix.  Any objection or any idea?

Sincerely,

ume [2 sshd-loghost.diff text/x-patch; US-ASCII (7bit)]
ume Index: crypto/openssh/monitor.c
ume diff -u crypto/openssh/monitor.c.orig crypto/openssh/monitor.c
ume --- crypto/openssh/monitor.c.orig  Thu Jul 11 08:04:07 2002
ume +++ crypto/openssh/monitor.c   Thu Aug  1 15:21:58 2002
ume @@ -1113,8 +1113,8 @@
ume * the address be 0.0.0.0.
ume */
umememset(from, 0, sizeof(from));
ume +  fromlen = sizeof(from);
umeif (packet_connection_is_on_socket()) {
ume -  fromlen = sizeof(from);
umeif (getpeername(packet_get_connection_in(),
ume(struct sockaddr *)  from, fromlen)  0) {
umedebug("getpeername: %.100s", strerror(errno));
ume @@ -1124,7 +1124,7 @@
ume/* Record that there was a login on that tty from the remote host. */
record_login(s-pid, s-tty, pw-pw_name, pw-pw_uid,
umeget_remote_name_or_ip(utmp_len, options.verify_reverse_mapping),
ume -  (struct sockaddr *)from);
ume +  (struct sockaddr *)from, fromlen);
ume  }
 
ume  static void
ume Index: crypto/openssh/session.c
ume diff -u crypto/openssh/session.c.orig crypto/openssh/session.c
ume --- crypto/openssh/session.c.orig  Sun Jul 28 00:43:29 2002
ume +++ crypto/openssh/session.c   Thu Aug  1 15:22:21 2002
ume @@ -721,8 +721,8 @@
ume * the address be 0.0.0.0.
ume */
umememset(from, 0, sizeof(from));
ume +  fromlen = sizeof(from);
umeif (packet_connection_is_on_socket()) {
ume -  fromlen = sizeof(from);
umeif (getpeername(packet_get_connection_in(),
ume(struct sockaddr *)  from, fromlen)  0) {
umedebug("getpeername: %.100s", strerror(errno));
ume @@ -735,7 +735,7 @@
umerecord_login(pid, s-tty, pw-pw_name, pw-pw_uid,
umeget_remote_name_or_ip(utmp_len,
umeoptions.verify_reverse_mapping),
ume -  (struct sockaddr *)from);
ume +  (struct sockaddr *)from, fromlen);
 
ume  #ifdef USE_PAM
ume/*
ume Index: crypto/openssh/sshlogin.c
ume diff -u crypto/openssh/sshlogin.c.orig crypto/openssh/sshlogin.c
ume --- crypto/openssh/sshlogin.c.orig Sat Jul 13 12:53:57 2002
ume +++ crypto/openssh/sshlogin.c  Thu Aug  1 15:24:36 2002
ume @@ -66,12 +66,12 @@
ume   */
ume  void
ume  record_login(pid_t pid, const char *ttyname, const char *user, uid_t uid,
ume -const char *host, struct sockaddr * addr)
ume +const char *host, struct sockaddr * addr, socklen_t addrlen)
ume  {
umestruct logininfo *li;
 
umeli = login_alloc_entry(pid, user, host, ttyname);
ume -  login_set_addr(li, addr, sizeof(struct sockaddr));
ume +  login_set_addr(li, addr, addrlen);
umelogin_login(li);
umelogin_free_entry(li);
ume  }
ume Index: crypto/openssh/sshlogin.h
ume diff -u crypto/openssh/sshlogin.h.orig crypto/openssh/sshlogin.h
ume --- crypto/openssh/sshlogin.h.orig Sat Jul 13 12:53:57 2002
ume +++ crypto/openssh/sshlogin.h  Thu Aug  1 15:26:40 2002
ume @@ -16,7 +16,7 @@
 
ume  void
ume  record_login(pid_t, const char *, const char *, uid_t,
ume -const char *, struct sockaddr *);
ume +const char *, struct sockaddr *, socklen_t);
ume  void   record_logout(pid_t, const char *, const char *);
ume  u_long get_last_login_time(uid_t, const char *, char *, u_int);
 
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message


Re: Call for testers: acpica-unix-20020815

2002-08-25 Thread Hajimu UMEMOTO

Hi,

 Mon, 26 Aug 2002 02:37:36 +0900 (JST),
 Mitsuru IWASAKI [EMAIL PROTECTED] said:

iwasaki If you have this problem w/ X running, and don't have w/o X,
iwasaki please try attached patches.

iwasaki Index: isa/syscons_isa.c
iwasaki ===
iwasaki RCS file: /home/ncvs/src/sys/isa/syscons_isa.c,v
iwasaki retrieving revision 1.17
iwasaki diff -u -r1.17 syscons_isa.c
iwasaki --- isa/syscons_isa.c  30 Jun 2001 10:15:06 -  1.17
iwasaki +++ isa/syscons_isa.c  16 Feb 2002 13:11:50 -

I need this patch to do suspend/resume my laptop (Victor InterLink
XP).  This patch is also required for FIVA.
It may better to have kernel option or sysctl to enable/disable this
function.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: location of setkey in /etc/rc.d/ipsec

2002-08-01 Thread Hajimu UMEMOTO

Hi,

 On Thu, 1 Aug 2002 10:45:08 -0700
 David O'Brien [EMAIL PROTECTED] said:

obrien On Thu, Aug 01, 2002 at 01:40:55AM +0900, Hajimu UMEMOTO wrote:
 makonnen Thanks for spotting this. I think the following patch might be better.
 Thanks!  I've just committed your version.

obrien We probably should have decided if setkey should have been moved to
obrien /sbin first.  Is it reasonable to run setkey before /usr is mounted?

Yes, I think it is reasonable.  ipsec setup is done before mounting
NFS.  So, setkey cannot be executed on NFS mounted /usr.
If there is no objection, I'll move setkey into /sbin.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: sshd doesn't log hostname into utmp correctly

2002-08-01 Thread Hajimu UMEMOTO

Hi,

 On 01 Aug 2002 11:05:46 +0200
 Dag-Erling Smorgrav [EMAIL PROTECTED] said:

des Hajimu UMEMOTO [EMAIL PROTECTED] writes:
 Current sshd doesn't handle actual size of struct sockaddr correctly,
 and does copy it as long as just size of struct sockaddr.  So, sshd
 deesn't log hostname into utmp correctly.
 Here is a proposed patch to fix this problem.  Please review it.

des Could you please submit it to [EMAIL PROTECTED]?

Yes, I'll sent it.
Can I commit it to FreeBSD repo.?

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: sshd doesn't log hostname into utmp correctly

2002-08-01 Thread Hajimu UMEMOTO

Hi,

 On 01 Aug 2002 17:18:23 +0200
 Dag-Erling Smorgrav [EMAIL PROTECTED] said:

des Hajimu UMEMOTO [EMAIL PROTECTED] writes:
 des Could you please submit it to [EMAIL PROTECTED]?
 Yes, I'll sent it.
 Can I commit it to FreeBSD repo.?

des No, please wait and see what the OpenSSH developers say.

Okay, I just sent my previous patch (+ fix for utmpx part) to
[EMAIL PROTECTED]

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: location of setkey in /etc/rc.d/ipsec

2002-07-31 Thread Hajimu UMEMOTO

Hi,

 On Mon, 29 Jul 2002 00:33:02 -0700
 Mike Makonnen [EMAIL PROTECTED] said:

makonnen Thanks for spotting this. I think the following patch might be better.

Thanks!  I've just committed your version.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Removing INET6 does stop the crashes.

2002-07-30 Thread Hajimu UMEMOTO

Hi,

 Tue, 30 Jul 2002 02:12:41 +0900,
 Hajimu UMEMOTO [EMAIL PROTECTED] said:

wa1ter Yes, it stops the crashes.  If I set v6only = 0 then the machine
wa1ter works normally; if set to 1 then I get connection refused from
wa1ter any server I try to connect to.  Is that normal v6only behavior?

ume It is expected behaivior.  However, I realized that Mozilla still has
ume the problem that IPv4-mapped IPv6 address is used to connect to IPv4
ume site.  It should be fixed by Mozilla side.  I heared that NetBSD
ume pkgsrc has a workaround to this problem:

ume 
http://cvsweb.no.netbsd.org/bsdweb.cgi/pkgsrc/www/mozilla/patches/patch-be?rev=1.8content-type=text/x-cvsweb-markup

ume Our port should have it, too.

This patch is for ports/www/mozilla, and enables IPv4-mapped IPv6
address per socket basis.  Please try it.

Sincerely,



Index: nsprpub/pr/src/pthreads/ptio.c
diff -u nsprpub/pr/src/pthreads/ptio.c.orig nsprpub/pr/src/pthreads/ptio.c
--- nsprpub/pr/src/pthreads/ptio.c.orig	Fri Apr 12 03:14:39 2002
+++ nsprpub/pr/src/pthreads/ptio.c	Tue Jul 30 18:52:11 2002
@@ -3414,6 +3414,17 @@
 if (osfd == -1) pt_MapError(_PR_MD_MAP_SOCKET_ERROR, errno);
 else
 {
+#if (defined(_PR_INET6_PROBE) || defined(_PR_INET6))  \
+	defined(__FreeBSD__)  defined(IPV6_V6ONLY)
+		if (domain == PR_AF_INET6) {
+			int opt = 0;
+			if (setsockopt(osfd, IPPROTO_IPV6, IPV6_V6ONLY,
+   opt, sizeof(opt))) {
+close(osfd);
+return NULL;
+			}
+		}
+#endif
 fd = pt_SetMethods(osfd, ftype, PR_FALSE, PR_FALSE);
 if (fd == NULL) close(osfd);
 }


--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/



Re: Removing INET6 does stop the crashes.

2002-07-29 Thread Hajimu UMEMOTO

Hi,

 On Mon, 29 Jul 2002 08:11:50 -0700
 walt [EMAIL PROTECTED] said:

After reading Scott Long's recent post I tried removing INET6
from my kernel config and the crashes due to mozilla are now
definitely gone.

Thank you for fixing it.  I tried to fix as the same way as you did,
then during committing my fix, I found that it was already fixed by
you. :-)

wa1ter Yes, it stops the crashes.  If I set v6only = 0 then the machine
wa1ter works normally; if set to 1 then I get connection refused from
wa1ter any server I try to connect to.  Is that normal v6only behavior?

It is expected behaivior.  However, I realized that Mozilla still has
the problem that IPv4-mapped IPv6 address is used to connect to IPv4
site.  It should be fixed by Mozilla side.  I heared that NetBSD
pkgsrc has a workaround to this problem:

http://cvsweb.no.netbsd.org/bsdweb.cgi/pkgsrc/www/mozilla/patches/patch-be?rev=1.8content-type=text/x-cvsweb-markup

Our port should have it, too.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



location of setkey in /etc/rc.d/ipsec

2002-07-28 Thread Hajimu UMEMOTO

Hi,

I found that setup of IPsec doesn't work correctly if you are using
/etc/rc.d/.  While NetBSD has setkey in /sbin, FreeBSD has it in
/usr/sbin.  However, the location is hardcoded in /etc/rc.d/ipsec.
Here is a patch.
It may be a time to consider to move setkey into /sbin as NetBSD did.

Sincerely,

--- etc/rc.d/ipsec.orig Fri Jun 14 17:30:58 2002
+++ etc/rc.d/ipsec  Mon Jul 29 00:03:28 2002
@@ -45,7 +45,7 @@
 ipsec_start()
 {
echo Installing ipsec manual keys/policies.
-   /sbin/setkey -f $ipsec_file
+   setkey -f $ipsec_file
 }
 
 ipsec_stop()
@@ -56,16 +56,16 @@
# it is very questionable to do this during shutdown session, since
# it can hang any of remaining IPv4/v6 session.
#
-   /sbin/setkey -F
-   /sbin/setkey -FP
+   setkey -F
+   setkey -FP
 }
 
 ipsec_reload()
 {
echo Reloading ipsec manual keys/policies.
-   /sbin/setkey -F
-   /sbin/setkey -FP
-   /sbin/setkey -f $ipsec_file
+   setkey -F
+   setkey -FP
+   setkey -f $ipsec_file
 }
 
 load_rc_config $name


--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



HEADS UP: an IPv4-mapped IPv6 address off by default

2002-07-25 Thread Hajimu UMEMOTO

Hi,

I've just committed to change an IPv4-mapped IPv6 address off by
default.
The existing applications may be affected this change.  The
applications which depend on an IPv4-mapped IPv6 address will become
listen only an IPv6 socket.
Apache2 is known having this problem.  You may need to specify the
Listen directive explicitly in your httpd.conf like as follows:

Listen 0.0.0.0:80
Listen [::]:80

If you still want to use an IPv4-mapped IPv6 address, please specify

ipv6_ipv4mapping=YES

in your /etc/rc.conf.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: HEADS UP: an IPv4-mapped IPv6 address off by default

2002-07-25 Thread Hajimu UMEMOTO

Hi,

 On Thu, 25 Jul 2002 12:50:49 -0400
 Jeroen C.van Gelderen [EMAIL PROTECTED] said:

jeroen May I ask what motivated this change?

Yes.  There is discussion that an IPv4-mapped IPv6 address has
potential security weakness in developping application and/or
operating servers.  NetBSD's default is off, and OpenBSD doesn't
support an IPv4-mapped IPv6 address.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: HEADS UP: prefix(8) and gifconfig(8) are obsoleted.

2002-06-16 Thread Hajimu UMEMOTO

Hi,

 On Sat, 15 Jun 2002 16:30:01 -0700
 Brooks Davis [EMAIL PROTECTED] said:

brooks [1  text/plain; us-ascii (quoted-printable)]
brooks On Sun, Jun 16, 2002 at 03:14:17AM +0900, Hajimu UMEMOTO wrote:
 I committed to don't install prefix(8) and gifconfig(8).  ifconfig(8)
 has the facilities provided by these commands.  Please use
 ifconfig(8).
 
   gifconfig - ifconfig tunnel/deletetunnel
   prefix- ifconfig eui64
 
 I'll do cvs remove after a mean time.
 I have no plan to MFC this due to backward compatibility issue.

brooks After RELENG_4 is unfrozen, it would probably be a good idea to modify
brooks these utilities to warn of their obsolesence when run to try and get
brooks people to switch now.

Okay, I'll do it for gifconfig(8).
Current prefix(8) does that by replacing it with a wrapper script
since 11 months ago.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



HEADS UP: prefix(8) and gifconfig(8) are obsoleted.

2002-06-15 Thread Hajimu UMEMOTO

Hi,

I committed to don't install prefix(8) and gifconfig(8).  ifconfig(8)
has the facilities provided by these commands.  Please use
ifconfig(8).

gifconfig - ifconfig tunnel/deletetunnel
prefix- ifconfig eui64

I'll do cvs remove after a mean time.
I have no plan to MFC this due to backward compatibility issue.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Perl scripts that need rewriting - Progress!

2002-05-10 Thread Hajimu UMEMOTO

Hi,

 On Thu, 09 May 2002 20:33:22 +0100
 Mark Murray [EMAIL PROTECTED] said:

mark /usr/sbin/scriptdump

This script is from KAME.  It seems that NetBSD doesn't install it.
Is someone actually using it?  If okay, I'll change to don't install
it.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Patch to fix the build of the smbfs.ko kernel module

2002-03-17 Thread Hajimu UMEMOTO

Hi,

 On Sun, 17 Mar 2002 15:38:48 -0800
 Maxime Henrion [EMAIL PROTECTED] said:

mux Actually, this patch is wrong because it won't ever compile des_enc.S.
mux Whatever I do, des_enc.c gets compiled and I can't figure out how to
mux compile a .S file with bsd.kmod.mk.  If someone with more make(1) clue
mux than me could help out, that would be appreciated.

Did you make sure to do make depend after changing your Makefile?
I tried it and I could reproduce your problem with `make buildkernel
NOCLEAN=YES NO_KERNELDEPEND=YES'.  Then, I tried with `make
buildkernel NOCLEAN=YES', and the problem was gone.

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Patch to fix the build of the smbfs.ko kernel module

2002-03-16 Thread Hajimu UMEMOTO

Hi,

 On Sat, 16 Mar 2002 01:32:04 -0800
 Maxime Henrion [EMAIL PROTECTED] said:

mux Since the addition of optimized 3DES encryption for x86, the build of the
mux smbfs kernel module has been broken (on all platforms).  This is because
mux new files are now needed (des_enc.S for x86, des_enc.c for other
mux archs).  The attached patch fixes this problem.

Oops, I've forgot about smbfs.ko.  It seems fine to me.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: cvs commit: src/usr.bin/ftp Makefile cmds.c cmdtab.c complet

2001-12-22 Thread Hajimu UMEMOTO

Hi,

 On Fri, 14 Dec 2001 08:43:49 +0200 (SAT)
 John Hay [EMAIL PROTECTED] said:

 On 13-Dec-2001 Mike Heffner wrote:
 | mikeh   2001/12/13 15:46:45 PST
jhay ...
 |   Log:
 |   Connect lukemftp to the build as the default ftp client. Lukemftp
 |   supports most of the previous features of FreeBSD ftp, but has been
 |   better maintained and includes new features.
 
 Short summary of differences:
 
jhay ...
 Differences/Losses:
 
  *) FTP_PASSIVE_MODE vs. FTP_MODE
  *) -4/-6 for forcing IPV4/IPV6

jhay Any chance of getting -4/-6 or something like it, back? It is very useful
jhay here in our environment that have a lot of dual-stack machines.

I think it is still useful in the environment where IPv6 link is
relatively slow than IPv4 link.
How about this patch?

Index: contrib/lukemftp/src/fetch.c
===
RCS file: /home/ncvs/src/contrib/lukemftp/src/fetch.c,v
retrieving revision 1.1.1.1
diff -u -u -r1.1.1.1 fetch.c
--- contrib/lukemftp/src/fetch.c19 Jul 2001 16:26:13 -  1.1.1.1
+++ contrib/lukemftp/src/fetch.c22 Dec 2001 14:47:28 -
@@ -617,7 +617,7 @@
 
memset(hints, 0, sizeof(hints));
hints.ai_flags = 0;
-   hints.ai_family = AF_UNSPEC;
+   hints.ai_family = family;
hints.ai_socktype = SOCK_STREAM;
hints.ai_protocol = 0;
error = getaddrinfo(host, NULL, hints, res0);
Index: contrib/lukemftp/src/ftp.1
===
RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp.1,v
retrieving revision 1.1.1.1
diff -u -u -r1.1.1.1 ftp.1
--- contrib/lukemftp/src/ftp.1  19 Jul 2001 16:26:13 -  1.1.1.1
+++ contrib/lukemftp/src/ftp.1  22 Dec 2001 14:47:29 -
@@ -77,7 +77,7 @@
 Internet file transfer program
 .Sh SYNOPSIS
 .Nm 
-.Op Fl AadefginpRtvV
+.Op Fl 46AadefginpRtvV
 .Bk -words
 .Op Fl o Ar output
 .Ek
@@ -146,6 +146,14 @@
 Options may be specified at the command line, or to the
 command interpreter.
 .Bl -tag -width port   
+.It Fl 4
+Forces
+.Nm
+to use IPv4 addresses only.
+.It Fl 6
+Forces
+.Nm
+to use IPv6 addresses only.
 .It Fl A
 Force active mode ftp.
 By default,
Index: contrib/lukemftp/src/ftp.c
===
RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp.c,v
retrieving revision 1.1.1.1
diff -u -u -r1.1.1.1 ftp.c
--- contrib/lukemftp/src/ftp.c  19 Jul 2001 16:26:14 -  1.1.1.1
+++ contrib/lukemftp/src/ftp.c  22 Dec 2001 14:47:31 -
@@ -149,7 +149,7 @@
memset(hints, 0, sizeof(hints));
portnum = parseport(port, FTP_PORT);
hints.ai_flags = AI_CANONNAME;
-   hints.ai_family = AF_UNSPEC;
+   hints.ai_family = family;
hints.ai_socktype = SOCK_STREAM;
hints.ai_protocol = 0;
error = getaddrinfo(host, NULL, hints, res0);
Index: contrib/lukemftp/src/ftp_var.h
===
RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp_var.h,v
retrieving revision 1.1.1.1
diff -u -u -r1.1.1.1 ftp_var.h
--- contrib/lukemftp/src/ftp_var.h  19 Jul 2001 16:26:14 -  1.1.1.1
+++ contrib/lukemftp/src/ftp_var.h  22 Dec 2001 14:47:31 -
@@ -279,6 +279,8 @@
 GLOBAL charremotepwd[MAXPATHLEN];  /* remote dir */
 GLOBAL char   *username;   /* name of user logged in as. (dynamic) */
 
+GLOBAL sa_family_t family; /* address family to use for connections */
+
 GLOBAL char*ftpport;   /* port number to use for FTP connections */
 GLOBAL char*httpport;  /* port number to use for HTTP connections */
 GLOBAL char*gateport;  /* port number to use for gateftp connections */
Index: contrib/lukemftp/src/main.c
===
RCS file: /home/ncvs/src/contrib/lukemftp/src/main.c,v
retrieving revision 1.1.1.1
diff -u -u -r1.1.1.1 main.c
--- contrib/lukemftp/src/main.c 19 Jul 2001 16:26:14 -  1.1.1.1
+++ contrib/lukemftp/src/main.c 22 Dec 2001 14:47:32 -
@@ -171,6 +171,7 @@
upload_path = NULL;
isupload = 0;
reply_callback = NULL;
+   family = AF_UNSPEC;
 
/*
 * Get the default socket buffer sizes if we don't already have them.
@@ -255,8 +256,16 @@
}
}
 
-   while ((ch = getopt(argc, argv, Aadefgino:pP:r:RtT:u:vV)) != -1) {
+   while ((ch = getopt(argc, argv, 46Aadefgino:pP:r:RtT:u:vV)) != -1) {
switch (ch) {
+   case '4':
+   family = AF_INET;
+   break;
+
+   case '6':
+   family = AF_INET6;
+   break;
+
case 'A':
activefallback = 0;
passivemode = 0;

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume

Re: About stscasestr() prototyped with string.h of current lib

2001-11-02 Thread Hajimu UMEMOTO

Hi,

 On Fri, 2 Nov 2001 12:01:19 +0300
 Andrey A. Chernov [EMAIL PROTECTED] said:

ache On Fri, Nov 02, 2001 at 17:36:04 +0900, NINOMIYA Hideyuki wrote:

 In implementation with current, even if you implemented it for the
 reason that Linux included, there is the problem that behavior is
 different from Linux in about prototyping reference.

ache 1) Our strcasestr() implementation is not related to Linux that way.
ache 2) Program must not prototype by itself system-wide functions and should 
ache relay on system headers instead.
ache 3) Programs which not follows rule #2 must be fixed by removing 
ache prototypes in question from their headers.

I think nin said that having strcasestr() in our standard header
breaks existing program.  That is, our header seems not confirm
standard.  Mew2 could be compiled even on Linux which has
strcasestr().

Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: lpd: Host name for your address (fe80:....%xl0) unknown

2001-10-02 Thread Hajimu UMEMOTO

 On Tue, 2 Oct 2001 12:30:33 -0400
 Garance A Drosihn [EMAIL PROTECTED] said:

drosih On the print *client* machine, you start lpd with '-4', meaning that
drosih it (the client) should only accept jobs from IPv4-style connections.
drosih Note that this flag only effects what lpd will accept, this flag has
drosih no effect on what lpr/lpq/lprm will do when they need to connect to
drosih a remote queue.

Yes, it's right.

drosih The print queue for 'lp' on oink refers to a remote machine that
drosih is named neutron.  That hostname maps to an IPv6 address.  Thus,
drosih lpq/lpr/lprm have no choice on how to connect to that remote host.
drosih They use the IPv6 address.  (note, for instance, that your 'ping6'
drosih knows about neutron via IPv6, not IPv4).  So, the print client
drosih connects to the print server via IPv6.  When the print client
drosih connects to the print server, the print server looks up the IPv6
drosih address of the *client*, because the client made an IPv6 connection
drosih to the server.  Again, this has nothing to do with 'lpd -4' on the
drosih client.  The print server apparently can not find a hostname to
drosih match the IPv6 address of the client, so it returns the first error
drosih message, listing the IPv6 address of the client.

No, a client does query  RR for IPv6 and A RR for IPv4.  If 
RR is found, a client tries to connect using IPv6, 1st.  However, lpd
accepts only IPv4 connection, in this case.  Then, if A RR is found, a
client falls down and tries to connect using IPv4.  So, a client never
connects using IPv6 to an IPv4 only listening server.

drosih Assuming that all of the above is correct, then I *think* everything
drosih is working the way it is supposed to.  However, I do not know the
drosih finer points of how IPv6 is supposed to work.  Can a single hostname
drosih have both an IPv4 address and an IPv6 address?  (as far as DNS is
drosih concerned, I mean).  This I do not know.  In any case, the parameters
drosih to 'lpd' are not going to effect how 'lpq' handles the printcap file.

It is usual way that a dual stack host has both  RR and A RR.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: lpd: Host name for your address (fe80:....%xl0) unknown

2001-10-01 Thread Hajimu UMEMOTO

 On Mon, 1 Oct 2001 15:29:43 +0200
 Alexander Langer [EMAIL PROTECTED] said:

alex Thus spake Dag-Erling Smorgrav ([EMAIL PROTECTED]):

  alex@oink ~ $ lpq
  lpd: Host name for your address (fe80::250:baff:fed4:a512%xl0) unknown
 The server is reporting that it can't figure out who you are, and
 therefore won't let you access the printer.  See hosts.lpd(5).  The
 client is merely repeating the error message it got from the server.

alex It's still using IPv6 though I told it to do IPv4.

Still, I cannot understand why it occures, and I cannot reproduce it,
here.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: lpd: Host name for your address (fe80:....%xl0) unknown

2001-10-01 Thread Hajimu UMEMOTO

 On Mon, 1 Oct 2001 14:21:28 +0200
 Alexander Langer [EMAIL PROTECTED] said:

alex BTW, the lpd server (neutron) is a
alex FreeBSD neutron.cichlids.com 4.3-STABLE FreeBSD 4.3-STABLE #0: Tue Jun  5 
01:38:27 CEST 2001 [EMAIL PROTECTED]:/storage/obj/storage/src/sys/NEUTRON  
i386

alex I think the problem is on the server-side. (since the error messages
alex contains a xl0 string, which is the server's NIC).

Yes, lpd has this message, while lpq hasn't.
I'm trying to reproduce it on my 4.4-RELEASE box.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: lpd: Host name for your address (fe80:....%xl0) unknown

2001-09-30 Thread Hajimu UMEMOTO

Hi,

 On Sun, 30 Sep 2001 14:54:31 +0200
 Alexander Langer [EMAIL PROTECTED] said:

alex I don't think that I like this behaviour:

alex alex@oink ~ $ ps ax | grep lpd
alex 15328  ??  Ss 0:00.01 lpd -4
alex 15329  ??  S  0:00.02 lpd -4
alex alex@oink ~ $ lpq
alex lpd: Host name for your address (fe80::250:baff:fed4:a512%xl0) unknown

Sorry, but I cannot see this message, here.
Could you please tell me how did you do?

alex Odd.  Is a link-local address supposed to have a host name anyways?

No.  The resolver doesn't do reverse lookup at all.  So, I believe you
cannot play with lpr by specifying link-local address.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: IPSEC/IPSEC_ESP module(s)

2001-08-03 Thread Hajimu UMEMOTO

 On Thu, 2 Aug 2001 02:57:55 -0700
 Kris Kennaway [EMAIL PROTECTED] said:

kris On Tue, Jul 31, 2001 at 04:55:53PM -0600, [EMAIL PROTECTED] wrote:
 
 Has anyone attempted to make a loadable module out of IPSEC yet?

kris I doubt it would be possible: it has hooks all through the network
kris code.

Is there any chance to enable IPSEC in GENERIC?

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Use of M_WAITOK in if_addmulti().

2001-07-15 Thread Hajimu UMEMOTO

Hi,

Current if_addmulti() calls MALLOC() with M_WAITOK.  However,
if_addmulti() can be called from in[6]_addmulti() with splnet().  It
may lead kernel panic.  So, I wish to change to use M_NOWAIT.
Any comment?

Index: sys/net/if.c
diff -u sys/net/if.c.orig sys/net/if.c
--- sys/net/if.c.orig   Wed Jul  4 20:28:47 2001
+++ sys/net/if.cSun Jul 15 23:47:15 2001
@@ -1412,8 +1412,8 @@
llsa = 0;
}
 
-   MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK);
-   MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_WAITOK);
+   MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_NOWAIT);
+   MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_NOWAIT);
bcopy(sa, dupsa, sa-sa_len);
 
ifma-ifma_addr = dupsa;
@@ -1441,9 +1441,9 @@
ifma-ifma_refcount++;
} else {
MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma,
-  M_IFMADDR, M_WAITOK);
+  M_IFMADDR, M_NOWAIT);
MALLOC(dupsa, struct sockaddr *, llsa-sa_len,
-  M_IFMADDR, M_WAITOK);
+  M_IFMADDR, M_NOWAIT);
bcopy(llsa, dupsa, llsa-sa_len);
ifma-ifma_addr = dupsa;
ifma-ifma_ifp = ifp;

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: Use of M_WAITOK in if_addmulti().

2001-07-15 Thread Hajimu UMEMOTO


ume Index: sys/net/if.c
ume diff -u sys/net/if.c.orig sys/net/if.c
ume --- sys/net/if.c.orig  Mon Jul 16 01:39:34 2001
ume +++ sys/net/if.c   Mon Jul 16 01:51:49 2001

Oops, it was wrong version.

Index: sys/net/if.c
diff -u sys/net/if.c.orig sys/net/if.c
--- sys/net/if.c.orig   Mon Jul 16 01:39:34 2001
+++ sys/net/if.cMon Jul 16 01:51:49 2001
@@ -1412,8 +1412,14 @@
llsa = 0;
}
 
-   MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK);
-   MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_WAITOK);
+   MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_NOWAIT);
+   if (ifma == NULL)
+   return (ENOBUFS);
+   MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_NOWAIT);
+   if (dupsa == NULL) {
+   FREE(ifma, M_IFMADDR);
+   return (ENOBUFS);
+   }
bcopy(sa, dupsa, sa-sa_len);
 
ifma-ifma_addr = dupsa;
@@ -1441,9 +1447,15 @@
ifma-ifma_refcount++;
} else {
MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma,
-  M_IFMADDR, M_WAITOK);
+  M_IFMADDR, M_NOWAIT);
+   if (ifma == NULL)
+   return (ENOBUFS);
MALLOC(dupsa, struct sockaddr *, llsa-sa_len,
-  M_IFMADDR, M_WAITOK);
+  M_IFMADDR, M_NOWAIT);
+   if (dupsa == NULL) {
+   FREE(ifma, M_IFMADDR);
+   return (ENOBUFS);
+   }
bcopy(llsa, dupsa, llsa-sa_len);
ifma-ifma_addr = dupsa;
ifma-ifma_ifp = ifp;

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: syslogd and -a

2001-07-02 Thread Hajimu UMEMOTO

 On Mon, 2 Jul 2001 08:25:38 -0700
 Crist J. Clark [EMAIL PROTECTED] said:

cristjc That's exactly what happens in the syslogd(8) code. However, I think
cristjc that should be,

cristjc   n = m
cristjc   .
cristjc   .
cristjc   .
cristjc   ((h  m) == n)

I think it should be:

  ((h  m) == (n  m))

cristjc That is, why allow the user to enter a network number that is not
cristjc /really/ the network number? Either flag an error or do the
cristjc calculation for the user. I think doing the calculation is the more
cristjc sensible choice. Commiting it to CURRENT now.

When I committed IPv6 support to syslogd, I didn't mask address to
keep compatibility with IPv4.  So, I'll commit to IPv6 side, later.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: syslogd and -a

2001-07-02 Thread Hajimu UMEMOTO

 On Mon, 2 Jul 2001 12:25:42 -0700
 Kris Kennaway [EMAIL PROTECTED] said:

kris This doesn't seem to work with IPv6.  Isn't there a libc function
kris which can be used to do this?

Yup, there is no api for masking address ether libc nor standard.
I'll commit the following patch for IPv6:

Index: usr.sbin/syslogd/syslogd.c
===
RCS file: /home/ncvs/src/usr.sbin/syslogd/syslogd.c,v
retrieving revision 1.79
diff -u -r1.79 syslogd.c
--- usr.sbin/syslogd/syslogd.c  2001/07/02 15:26:47 1.79
+++ usr.sbin/syslogd/syslogd.c  2001/07/02 19:39:32
@@ -2033,7 +2033,7 @@
reject = 0;
for (j = 0; j  16; j += 4) {
if ((*(u_int32_t *)sin6-sin6_addr.s6_addr[i] 
 *(u_int32_t *)m6p-sin6_addr.s6_addr[i])
-   != *(u_int32_t 
*)a6p-sin6_addr.s6_addr[i]) {
+   != (*(u_int32_t 
+*)a6p-sin6_addr.s6_addr[i]  *(u_int32_t *)m6p-sin6_addr.s6_addr[i])) {
++reject;
break;
}

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [patch] netinet6/ip6_fw.c: use syslog for logging

2001-06-24 Thread Hajimu UMEMOTO

 Fri, 22 Jun 2001 20:06:34 +0900,
 Jun Kuriyama [EMAIL PROTECTED] said:

kuriyama I found logs from ipfw(8) and ip6fw(8) are stored to different place.
kuriyama Former one is into security.info via syslog(3) but latter one is
kuriyama into kern.crit via kernel printf().

kuriyama The reason of this difference is came from missing merge from
kuriyama ip_fw.c.  And I hope this patch will be first step to synchronize
kuriyama ip_fw.c and ip6_fw.c.

kuriyama So, I made a patch to merge the difference revision 1.117 and 1.118 of
kuriyama ip_fw.c into ip6_fw.c to use syslog(3) interface for ip6fw(8) logging.

It seems fine to me.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [patch] netinet6/ip6_fw.c: use syslog for logging

2001-06-22 Thread Hajimu UMEMOTO

 Fri, 22 Jun 2001 20:06:34 +0900,
 Jun Kuriyama [EMAIL PROTECTED] said:

kuriyama I found logs from ipfw(8) and ip6fw(8) are stored to different place.
kuriyama Former one is into security.info via syslog(3) but latter one is
kuriyama into kern.crit via kernel printf().

kuriyama The reason of this difference is came from missing merge from
kuriyama ip_fw.c.  And I hope this patch will be first step to synchronize
kuriyama ip_fw.c and ip6_fw.c.

kuriyama So, I made a patch to merge the difference revision 1.117 and 1.118 of
kuriyama ip_fw.c into ip6_fw.c to use syslog(3) interface for ip6fw(8) logging.

kuriyama Please review this patch carefully because I'm not kernel hacker.

  Okay, I'll take a look this.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



HEAD UP: rtadvd_enable's default is changed to NO

2001-06-20 Thread Hajimu UMEMOTO

Hi,

Currently, rtadvd_enable's default is YES.  It means that IPv6 router
runs rtadvd(8) by default.
This breaks the following description in RFC2461:

AdvSendAdvertisements
A flag indicating whether or not the router sends
periodic Router Advertisements and responds to
Router Solicitations.

Default: FALSE

Note that AdvSendAdvertisements MUST be FALSE by
default so that a node will not accidentally start
acting as a router unless it is explicitly
configured by system management to send Router
Advertisements.

So, I'll change default value of rtadvd_enable to NO, soon.  If you
are running rtadvd(8) in your IPv6 router, please make sure to set
rtadvd_enable to YES in your /etc/rc.conf.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: [CFR] latest KAME merge into FreeBSD

2001-06-18 Thread Hajimu UMEMOTO

Hi,

 Mon, 18 Jun 2001 12:10:22 +0900,
 JINMEI Tatuya / [EMAIL PROTECTED] said:

jinmei Thanks for the effort.  Could you apply the following patch?  The fix
jinmei is not so serious for most users, but should be important for
jinmei nomadic users who use IPv6 temporary addresses (for privacy extension).

I just committed it.  Thanks!

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: MBUF locking- this can't be right, can it?

2001-06-13 Thread Hajimu UMEMOTO

 On Wed, 13 Jun 2001 13:42:51 -0400
 Bosko Milekic [EMAIL PROTECTED] said:

bmilekic   Yes, I certainly didn't write that. I think it was KAME.

Yup, current KAME is based on 4.3-RELEASE which doesn't have
mtx_lock() issue.  It is my mistake during merging it into 5-CURRENT.
The fix looks good to me.  If there is no objection, I'll commit it.

bmilekic On Wed, Jun 13, 2001 at 10:37:22AM -0700, Matthew Jacob wrote:
 
 A recent change to the MFREE macro was made as noted below:
 
 /*
  * MFREE(struct mbuf *m, struct mbuf *n)
  * Free a single mbuf and associated external storage.
  * Place the successor, if any, in n.
  * 
  * we do need to check non-first mbuf for m_aux, since some of existing
  * code does not call M_PREPEND properly.
  * (example: call to bpf_mtap from drivers)
  */
 #define MFREE(m, n) do {\
 struct mbuf *_mm = (m); \
 \
 KASSERT(_mm-m_type != MT_FREE, (freeing free mbuf)); \
 if (_mm-m_flags  M_EXT)   \
 MEXTFREE(_mm);  \
 mtx_lock(mbuf_mtx);\
 mbtypes[_mm-m_type]--; \
 ++if ((_mm-m_flags  M_PKTHDR) != 0  _mm-m_pkthdr.aux) {  \
 ++m_freem(_mm-m_pkthdr.aux); \
 ++_mm-m_pkthdr.aux = NULL;   \
 ++}   \
 _mm-m_type = MT_FREE;  \
 mbtypes[MT_FREE]++; \
 (n) = _mm-m_next;  \
 _mm-m_next = mmbfree.m_head;   \
 mmbfree.m_head = _mm;   \
 MBWAKEUP(m_mballoc_wid, mmbfree.m_starved);\
 mtx_unlock(mbuf_mtx);  \
 } while (0)
 
 
 Unfortunately, m_freem also calls MFREE. Tsk. Now, it seems to me that even in
 cases where you *could* allow recursive locks, the right idea here would be to
 change it to:
 
 /*
  * MFREE(struct mbuf *m, struct mbuf *n)
  * Free a single mbuf and associated external storage.
  * Place the successor, if any, in n.
  * 
  * we do need to check non-first mbuf for m_aux, since some of existing
  * code does not call M_PREPEND properly.
  * (example: call to bpf_mtap from drivers)
  */
 #define MFREE(m, n) do {\
 struct mbuf *_mm = (m); \
   struct mbuf *_aux;  \
 \
 KASSERT(_mm-m_type != MT_FREE, (freeing free mbuf)); \
 if (_mm-m_flags  M_EXT)   \
 MEXTFREE(_mm);  \
 mtx_lock(mbuf_mtx);\
 mbtypes[_mm-m_type]--; \
 if ((_mm-m_flags  M_PKTHDR) != 0  _mm-m_pkthdr.aux) {  \
   _aux = _mm-m_pkthdr.aux;   \
 _mm-m_pkthdr.aux = NULL;   \
 } else {\
 _aux = NULL;\
 }   \
 _mm-m_type = MT_FREE;  \
 mbtypes[MT_FREE]++; \
 (n) = _mm-m_next;  \
 _mm-m_next = mmbfree.m_head;   \
 mmbfree.m_head = _mm;   \
 MBWAKEUP(m_mballoc_wid, mmbfree.m_starved);\
 mtx_unlock(mbuf_mtx);  \
 if (_aux)   \
 m_freem(_aux);  \
 } while (0)
 
 
 Comments?
 
 -matt
 
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-current in the body of the message
 

bmilekic -- 
bmilekic  Bosko Milekic
bmilekic  [EMAIL PROTECTED]


bmilekic To Unsubscribe: send mail to [EMAIL PROTECTED]
bmilekic with unsubscribe freebsd-current in the body of the message

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: MBUF locking- this can't be right, can it?

2001-06-13 Thread Hajimu UMEMOTO

 On Wed, 13 Jun 2001 14:15:53 -0400
 Bosko Milekic [EMAIL PROTECTED] said:

 Yup, current KAME is based on 4.3-RELEASE which doesn't have
 mtx_lock() issue.  It is my mistake during merging it into 5-CURRENT.
 The fix looks good to me.  If there is no objection, I'll commit it.

bmilekic   Nope, no objection here. :-)

I just committed.  Thanks!!

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



[CFR] latest KAME merge into FreeBSD

2001-06-04 Thread Hajimu UMEMOTO

Hi,

I just put the patch for merging latest KAME into FreeBSD:

  http://www.imasy.or.jp/~ume/ipv6/test/freebsd5-kame20010528-20010604.diff.gz

This is based on KAME snap 20010528 and against 5-CURRENT of Jun 2.
There are many many changes since last KAME merge (2701).
Please review it.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: usr.sbin/pim6[sd]d will be removed soon.

2001-06-02 Thread Hajimu UMEMOTO

hi,

 On Sat, 2 Jun 2001 12:22:03 -0500
 David W. Chapman Jr. [EMAIL PROTECTED] said:

dwcjr I wouldn't mind, but what exactly does pim do and do you need both pim6dd
dwcjr and pim6sd?

pim6[ds]d are an IPv6 mutlicast routing daemon.  pim6dd is for dense
mode and pim6sd is for sparse mode.  Someone may need pim6dd and
someone may need pim6sd according to their network configuration.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



usr.sbin/pim6[sd]d will be removed soon.

2001-06-02 Thread Hajimu UMEMOTO

Hi,

I heared from itojun that usr.sbin/pim6[sd]d has non-BSD license and
does not allow fee-based redistribution.  So, I will remove them from
the tree soon.  NetBSD was already done.
Could someone please make them ports?  ftp.kame.net:~ftp/pub/kame/misc
has pim6[sd]-*.tar.gz.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-current in the body of the message



Re: swap-backed md-based /tmp to replace mfs-based one

2001-03-11 Thread Hajimu UMEMOTO

 On Sun, 11 Mar 2001 13:17:58 -0800 (PST)
 David Wolfskill [EMAIL PROTECTED] said:

david Accordingly, I created the following shell script to accomplish a
david similar objective, based upon the above-mentioned example in the
david mdconfig man page.  At present, I have it sitting in
david /usr/local/etc/rc.d, which isn't ideal, but I wanted to find out if
david anyone had better approaches for doing this, suggestions for
david improvement, or arguments that what I'm trying to do is misguided and
david shouldn't be done:

I wrote following script obtained from manpage:

#!/bin/sh
mdconfig -a -t swap -s 128M -u 10
disklabel -r -w md10 auto
newfs /dev/md10c
tunefs -n enable /dev/md10c
mount /dev/md10c /tmp
chmod 1777 /tmp

Then, I put diskless_mount="/etc/rc.mount_tmp" into /etc/rc.conf.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



[CFR] number of processes forked since boot

2001-01-16 Thread Hajimu UMEMOTO

Hi,

I received the patch to add counter for fork() set from Paul.  I've
tested it on my -CURRENT and -STABLE boxes, and it seems fine for me.
So, I post his patch for review.

Thanks, Paul.

 fork.patch.gz

Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/



number of processes forked since boot

2001-01-15 Thread Hajimu UMEMOTO

Hi,

I wish to obtain number of processes forked since boot from userland.
So, I made a patch to intend to commit.
Any comment?

Index: lib/libc/gen/sysctl.3
diff -u lib/libc/gen/sysctl.3.orig lib/libc/gen/sysctl.3
--- lib/libc/gen/sysctl.3.orig  Fri Jan 12 02:39:22 2001
+++ lib/libc/gen/sysctl.3   Tue Jan 16 02:13:19 2001
@@ -294,6 +294,7 @@
 .It "KERN\_UPDATEINTERVAL  integer no"
 .It "KERN\_VERSION string  no"
 .It "KERN\_VNODE   struct vnodeno"
+.It "KERN\_NFORKS  integer no"
 .El
 .Pp
 .Bl -tag -width 6n
@@ -445,6 +446,8 @@
 .Va struct vnode *
 followed by the vnode itself
 .Va struct vnode .
+.It Li KERN_NFORKS
+Number of processes forked.
 .El
 .Ss CTL_MACHDEP
 The set of variables defined is architecture dependent.
Index: sbin/sysctl/sysctl.8
diff -u sbin/sysctl/sysctl.8.orig sbin/sysctl/sysctl.8
--- sbin/sysctl/sysctl.8.orig   Fri Jan 12 02:42:23 2001
+++ sbin/sysctl/sysctl.8Tue Jan 16 02:13:19 2001
@@ -145,6 +145,7 @@
 .It "kern.bootfile string  yes
 .It "kern.corefile string  yes
 .It "kern.logsigexit   integer yes
+.It "kern.nforks   integer no
 .It "vm.loadavgstruct  no
 .It "hw.machinestring  no
 .It "hw.model  string  no
Index: sys/kern/kern_fork.c
diff -u sys/kern/kern_fork.c.orig sys/kern/kern_fork.c
--- sys/kern/kern_fork.c.orig   Fri Jan 12 02:46:53 2001
+++ sys/kern/kern_fork.cTue Jan 16 02:30:26 2001
@@ -146,6 +146,9 @@
 intnprocs = 1; /* process 0 */
 static int nextpid = 0;
 
+static unsigned int nforks = 0;
+SYSCTL_UINT(_kern, KERN_NFORKS, nforks, CTLFLAG_RD, nforks, 0, "");
+
 /*
  * Random component to nextpid generation.  We mix in a random factor to make
  * it a little harder to predict.  We sanity check the modulus value to avoid
@@ -277,6 +280,8 @@
}
 
newproc-p_vmspace = NULL;
+
+   nforks++;
 
/*
 * Find an unused process ID.  We remember a range of unused IDs
Index: sys/sys/sysctl.h
diff -u sys/sys/sysctl.h.orig sys/sys/sysctl.h
--- sys/sys/sysctl.h.orig   Fri Jan 12 02:48:41 2001
+++ sys/sys/sysctl.hTue Jan 16 02:13:19 2001
@@ -328,7 +328,8 @@
 #defineKERN_PS_STRINGS 32  /* int: address of PS_STRINGS */
 #defineKERN_USRSTACK   33  /* int: address of USRSTACK */
 #defineKERN_LOGSIGEXIT 34  /* int: do we log sigexit procs? */
-#define KERN_MAXID 35  /* number of valid kern ids */
+#define KERN_NFORKS35  /* uint: number of forked */
+#define KERN_MAXID 36  /* number of valid kern ids */
 
 #define CTL_KERN_NAMES { \
{ 0, 0 }, \
@@ -366,6 +367,7 @@
{ "ps_strings", CTLTYPE_INT }, \
{ "usrstack", CTLTYPE_INT }, \
    { "logsigexit", CTLTYPE_INT }, \
+   { "nforks", CTLTYPE_UINT }, \
 }
 
 /*


--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: number of processes forked since boot

2001-01-15 Thread Hajimu UMEMOTO

Hi,

 On Mon, 15 Jan 2001 10:06:18 -0800
 Alfred Perlstein [EMAIL PROTECTED] said:

bright * Hajimu UMEMOTO [EMAIL PROTECTED] [010115 10:00] wrote:
 Hi,
 
 I wish to obtain number of processes forked since boot from userland.
 So, I made a patch to intend to commit.
 Any comment?

bright Why not just use a dynamic sysctl for this?

I think dynamic sysctl is useful for dynamic context.  But, here is
just static and it seems there is no advantage.  Isn't it?

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: number of processes forked since boot

2001-01-15 Thread Hajimu UMEMOTO

 On Mon, 15 Jan 2001 19:46:32 +0100 (CET)
 Paul Herman [EMAIL PROTECTED] said:

pherman On Tue, 16 Jan 2001, Hajimu UMEMOTO wrote:

 bright * Hajimu UMEMOTO [EMAIL PROTECTED] [010115 10:00] wrote:

  I wish to obtain number of processes forked since boot from userland.
  So, I made a patch to intend to commit.
  Any comment?

pherman I like the idea, but this belongs in vmeter with context switches,
pherman page faults, etc, doesn't it?  This is how OpenBSD does it, anyway.

I see.
You mean accessing uvmexp.forks via sysctl.
Does it solved by just moving nforks into vm_meter.c?

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: number of processes forked since boot

2001-01-15 Thread Hajimu UMEMOTO

 On Mon, 15 Jan 2001 21:07:08 +0100 (CET)
 Paul Herman [EMAIL PROTECTED] said:

pherman Yes, that's my read from the source.  What I also like about it is
pherman that it counts [vr]forks to boot, plus vmpages affected by the fork.

pherman After I first saw this in OBSD I was really motivated to do just what
pherman you've done for FreeBSD, but never got around to it.

I just moved nforks into vm_meter.c  Here is a patch:

Index: sys/kern/kern_fork.c
diff -u sys/kern/kern_fork.c.orig sys/kern/kern_fork.c
--- sys/kern/kern_fork.c.orig   Fri Jan 12 02:46:53 2001
+++ sys/kern/kern_fork.cTue Jan 16 04:53:18 2001
@@ -145,6 +145,7 @@
 
 intnprocs = 1; /* process 0 */
 static int nextpid = 0;
+extern unsigned int nforks;
 
 /*
  * Random component to nextpid generation.  We mix in a random factor to make
@@ -277,6 +278,8 @@
}
 
newproc-p_vmspace = NULL;
+
+   nforks++;
 
/*
 * Find an unused process ID.  We remember a range of unused IDs
Index: sys/vm/vm_meter.c
diff -u sys/vm/vm_meter.c.orig sys/vm/vm_meter.c
--- sys/vm/vm_meter.c.orig  Fri Jan 12 02:48:48 2001
+++ sys/vm/vm_meter.c   Tue Jan 16 04:51:49 2001
@@ -126,6 +126,10 @@
 SYSCTL_UINT(_vm, OID_AUTO, v_free_severe,
CTLFLAG_RW, cnt.v_free_severe, 0, "");
 
+unsigned int nforks = 0;
+SYSCTL_UINT(_vm, OID_AUTO, nforks, CTLFLAG_RD, nforks, 0,
+   "number of fork()s since boot");
+
 SYSCTL_STRUCT(_vm, VM_LOADAVG, loadavg, CTLFLAG_RD, 
 averunnable, loadavg, "Machine loadaverage history");
 

pherman If you like, I'll see if I can't come up with something
pherman similar.  Shouldn't be too hard.  I'll try that tonight.

Please do it.

pherman The hardest part would be finding a spot on the systat(1) display to
pherman put it. :-)

Exactly.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



[CFR] IPv6 support for lpd, syslogd and logger

2000-12-07 Thread Hajimu UMEMOTO

Hi,

I'd like to add IPv6 support for lpd, syslogd and logger.  You can
find the patches from:

http://www.imasy.or.jp/~ume/ipv6/FreeBSD/logger-ipv6-20001201.diff
http://www.imasy.or.jp/~ume/ipv6/FreeBSD/lpr-ipv6-20001206.diff
http://www.imasy.or.jp/~ume/ipv6/FreeBSD/syslogd-ipv6-20001201.diff

Please review.  If there is no objection, I'll commit it at next
weekend.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: if_fddisubr.c

2000-11-04 Thread Hajimu UMEMOTO

 On Sat, 4 Nov 100 02:09:36 -0600 (CST)
 Jim Bryant [EMAIL PROTECTED] said:

jbryant #include sys/malloc.h
jbryant needs to be added to the top of if_fddisubr.c
jbryant -current pukes on the first instance of MALLOC() without it...

Oops, my previous commit seems to broke it.  I just commit the fix.

This fix should be needed for -STABLE, too.  Unless this,
if_fddisubr.c is not compilable.
Jordan, please approve this fix to -STABLE.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: new rc.network6 and rc.firewall6

2000-10-28 Thread Hajimu UMEMOTO

 On Sat, 21 Oct 2000 18:38:33 -0700
 Jordan Hubbard [EMAIL PROTECTED] said:

jkh Sounds good to me.  My comments were, just to make it clear again,
jkh just food for thought and not out-and-out objections.  If even 47 more
jkh files in /etc is what it takes to get IPv6 fully supported, then so be
jkh it. :)

There are many discussion aboud having NetBSD style rc.d.  However, I
think it takes for a period of time.
Once, I wish to commit my changes to be in time for 4.2-RELEASE.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: make release breakage on today's -current

2000-10-24 Thread Hajimu UMEMOTO

 On Tue, 24 Oct 2000 07:55:42 -0400
 "John W. De Boskey" [EMAIL PROTECTED] said:

jwd The following patch brings the floppy size down enough to fix
jwd the problem. One is a leftover from the config file syntax
jwd change. Also, I don't know how useful INET6 is to a GENERIC
jwd kernel on todays' networks (faith  gif are already removed).

Please don't remove INET6.
IPv6 only install is usual thing at least around me. :-)
Though the person who installs FreeBSD via IPv6 is relatively few so
far, IPv6 enabled installer is important for IPv6 deployment.
I heared recent NetBSD's installer has IPv6 capability, too.  This is
demand of these days.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



new rc.network6 and rc.firewall6

2000-10-21 Thread Hajimu UMEMOTO

Hi,

I wish to update rc.network6 and introduce rc.firewall6.

- ipv6_prefix_* and ipv6_ifconfig_* work for end node

- rtsol should be work to only one interface

- new variable ipv6_defaultrouter is added

- ipv6_firewall_enable, ipv6_firewall_type,
ipv6_firewall_script, ipv6_firewall_logging are added to
introduce rc.firewall6.

I put it on:

http://www.imasy.or.jp/~ume/ipv6/FreeBSD/rc.network6.diff
http://www.imasy.or.jp/~ume/ipv6/FreeBSD/rc.firewall6

Please review it.

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



Re: (KAME-snap 3338) Re: Panic on current (12 Sept)

2000-09-18 Thread Hajimu UMEMOTO

 On Mon, 18 Sep 2000 10:00:53 +0200 (SAST)
 Reinier Bezuidenhout [EMAIL PROTECTED] said:

rbezuide As far as I recall ... the first kernel was before any of the SMP
rbezuide commits ... but in case it was not ... how do I go about
rbezuide going back to a "coarse grain lock" kernel ... can I set
rbezuide something in the config file or do I have to checkout old
rbezuide sources ??

There is a tag just before SMPNG merge.  You can do cvsup with:

src-all tag=PRE_SMPNG

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
[EMAIL PROTECTED]  [EMAIL PROTECTED]  [EMAIL PROTECTED]
http://www.imasy.org/~ume/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message



  1   2   >