Re: syslogd: using IPv6 as hostnames results in "IP mismatch"
Hi, >>>>> On Thu, 31 Jan 2019 08:24:38 +0100 >>>>> "O. Hartmann" said: ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \ ohartmann> fdff:dead:beef::; ohartmann> rejected in rule 1 due to IP mismatch. The -a option was broken. It should be fixed now. Please, try it. Sincerely, -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume/ ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: syslogd: using IPv6 as hostnames results in "IP mismatch"
Hi, >>>>> On Thu, 31 Jan 2019 08:24:38 +0100 >>>>> "O. Hartmann" said: ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \ ohartmann> fdff:dead:beef::; ohartmann> rejected in rule 1 due to IP mismatch. The -a option was broken. It should be fixed now. Please try it. Sincerely, -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: syslogd: using IPv6 as hostnames results in "IP mismatch"
Hi, >>>>> On Thu, 31 Jan 2019 08:24:38 +0100 >>>>> "O. Hartmann" said: ohartmann> validate: dgram from IP ffdff:dead:beef::, port 514, name \ ohartmann> fdff:dead:beef::; ohartmann> rejected in rule 1 due to IP mismatch. The -a option was broken. It should be fixed now. Please try it. Sincerely, -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: Some locale data are broken
Hi, >>>>> On Fri, 18 Nov 2016 09:35:01 +0100 >>>>> Jean-S9bastien P9dron <dumbb...@freebsd.org> said: dumbbell> What looks incorrect to me is the output of `locale -k` when no keyword dumbbell> is specified: dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k dumbbell> ... dumbbell> d_fmt="%m/%d/%y" dumbbell> ... dumbbell> altmon_1="January" dumbbell> ... dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k d_fmt dumbbell> d_fmt="%d.%m.%Y" dumbbell> $ LANG=fr_FR.UTF-8 LC_ALL=fr_FR.UTF-8 locale -k altmon_1 dumbbell> altmon_1="janvier" How about this patch? Sincerely, Index: usr.bin/locale/locale.c === --- usr.bin/locale/locale.c (revision 308220) +++ usr.bin/locale/locale.c (working copy) @@ -283,8 +283,9 @@ /* process '-c', '-k', or command line arguments. */ if (prt_categories || prt_keywords || argc > 0) { + if (prt_keywords) + setlocale(LC_ALL, ""); if (argc > 0) { - setlocale(LC_ALL, ""); while (argc > 0) { showdetails(*argv); argv++; -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume/ ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: Date formatting with en_US locale
Hi, >>>>> On Sat, 18 Jun 2016 18:25:51 -0500 >>>>> Eric van Gyzen <vangy...@freebsd.org> said: vangyzen> On 06/18/16 04:10 AM, Hajimu UMEMOTO wrote: > Does the attached patch fix your issue? > Though there are many locales it should be fixed, I've included only > en_US one, in this time. vangyzen> Yes, it fixes my issue with en_US. Thank you, Umemoto-san. You are welcome. I've just committed into HEAD. Sincerely, -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume/ ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: Date formatting with en_US locale
Hi, vangyzen> Above, I mentioned two issues. The other one is, the date format for vangyzen> en_US pads the month with a zero, but the day with a space. So, June 7 is: vangyzen> 06/ 7/16 vangyzen> That looks weird. It should pad both with zeros. I'd be happy to fix vangyzen> it, but I don't see how: There isn't an "xformat" callback in the vangyzen> cldr2def.pl script, and it's not clear how to add one. If you can vangyzen> explain, I'll do it. If you can fix it, I'll be grateful. ;) Does the attached patch fix your issue? Though there are many locales it should be fixed, I've included only en_US one, in this time. Sincerely, Index: share/timedef/en_US.UTF-8.src === --- share/timedef/en_US.UTF-8.src (revision 302002) +++ share/timedef/en_US.UTF-8.src (working copy) @@ -53,7 +53,7 @@ %I:%M:%S %p # # x_fmt -%m/%e/%y +%m/%d/%y # # c_fmt %A, %B %e, %Y at %I:%M:%S %p @@ -80,7 +80,7 @@ December # # md_order -m +md # # ampm_fmt %I:%M:%S %p Index: tools/tools/locale/tools/cldr2def.pl === --- tools/tools/locale/tools/cldr2def.pl (revision 302002) +++ tools/tools/locale/tools/cldr2def.pl (working copy) @@ -68,6 +68,7 @@ mdorder => \_mdorder, altmon => \_altmon, cformat => \_cformat, + dformat => \_dformat, dtformat => \_dtformat, cbabmon => \_abmon, cbampm => \_ampm, @@ -183,10 +184,9 @@ "abday" => "as", "day" => "as", "t_fmt" => "s", - "d_fmt" => "s", + "d_fmt" => "<dformat<d_fmt<s", "c_fmt" => "<cformat<d_t_fmt<s", "am_pm" => "<cbampm<am_pm<as", - "d_fmt" => "s", "d_t_fmt" => "<dtformat<d_t_fmt<s", "altmon" => "<altmon<mon<as", "md_order" => "<mdorder<d_fmt<s", @@ -225,6 +225,14 @@ return $s; }; +sub callback_dformat { + my $s = shift; + + $s =~ s/(%m(|[-.]))%e/$1%d/; + $s =~ s/%e((|[-.])%m)/%d$1/; + return $s; +}; + sub callback_dtformat { my $s = shift; my $nl = $callback{data}{l} . "_" . $callback{data}{c}; @@ -241,7 +249,8 @@ sub callback_mdorder { my $s = shift; return undef if (!defined $s); - $s =~ s/[^dm]//g; + $s =~ s/[^dem]//g; + $s =~ s/e/d/g; return $s; }; -- Hajimu UMEMOTO u...@mahoroba.org u...@freebsd.org http://www.mahoroba.org/~ume/ ___ freebsd-current@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"
Re: r225932 libsasl undefined references - buildworld failure
reference to `gss_accept_sec_context' mexas gssapi.c:(.text+0x3d12): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x3dc2): undefined reference to `gss_display_name' mexas gssapi.c:(.text+0x3f02): undefined reference to `GSS_C_NT_USER_NAME' mexas gssapi.c:(.text+0x3f10): undefined reference to `GSS_C_NT_USER_NAME' mexas gssapi.c:(.text+0x3f22): undefined reference to `gss_import_name' mexas gssapi.c:(.text+0x3f72): undefined reference to `gss_compare_name' mexas gssapi.c:(.text+0x3fa2): undefined reference to `gss_release_name' mexas gssapi.c:(.text+0x4022): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x42e2): undefined reference to `gss_wrap' mexas gssapi.c:(.text+0x43e2): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x4582): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x46d2): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x48a2): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x4d42): undefined reference to `gss_wrap_size_limit' mexas gssapi.c:(.text+0x4d92): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x4f82): undefined reference to `GSS_C_NT_HOSTBASED_SERVICE' mexas gssapi.c:(.text+0x4f90): undefined reference to `GSS_C_NT_HOSTBASED_SERVICE' mexas gssapi.c:(.text+0x4fa2): undefined reference to `gss_import_name' mexas gssapi.c:(.text+0x5042): undefined reference to `gss_release_cred' mexas gssapi.c:(.text+0x5092): undefined reference to `gss_acquire_cred' mexas gssapi.c:(.text+0x5142): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x52e2): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x5322): undefined reference to `gss_release_name' mexas gssapi.c:(.text+0x5422): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x54b2): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x5572): undefined reference to `gss_release_buffer' mexas gssapi.c:(.text+0x5692): undefined reference to `gss_release_buffer' mexas *** Error code 1 I suspect that you don't have /usr/local/lib/libsasl2.so.2 installed, due to the brokenness of devel/libtool on 10-CURRENT. Please refer the 20110928 entry of ports/UPDATING. Further, you may want to read the thread from http://lists.freebsd.org/pipermail/cvs-ports/2011-October/227399.html Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: 9.0-beta3 preferring ipv4 over ipv6 with ipv6_activate_all_interfaces=YES
Hi, On Fri, 14 Oct 2011 17:09:11 +0900 (JST) Hiroki Sato h...@freebsd.org said: hrs Thomas Steen Rasmussen tho...@gibfest.dk wrote hrs in 4e97d9f3.4020...@gibfest.dk: th On 14.10.2011 08:14, Hiroki Sato wrote: hrs th telnet www.freebsd.org 80 /dev/null th [tykling@tykburk ~]$ telnet www.freebsd.org 80 /dev/null th Trying 69.147.83.34... th Connected to red.freebsd.org. th Escape character is '^]'. th Connection closed by foreign host. hrs Thanks. There is no problem with the source address selection. The hrs last questions are: hrs % route get -inet www.freebsd.org hrs % route get -inet6 www.freebsd.org hrs % netstat -nrf inet6 hrs % ndp -r hrs I guess the second one returns route: writing to routing socket: No hrs such process on your box. Is it correct? AFAIK, recent Firefox implements Happy Eyeballs. So, I suspect it doesn't obey RFC 3484, anymore. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: cvs commit: ports/security/cyrus-sasl2 Makefile ports/security/cyrus-sasl2/files patch-plugins::gssapi.c
Hi, On Fri, 07 Oct 2011 16:48:52 -0700 Doug Barton do...@freebsd.org said: dougb In case anyone wants to take this on, this port fails to install on 10.0 dougb because it uses its own version of libtool. I took a quick look but dougb there wasn't a solution obvious enough for me. :) I didn't have 10-current box, yet. So, I've just upgraded my 9-current box to today's current, and tried to rebuild cyrus-sasl2 port on it. However, I couldn't reproduce the problem. It built just fine, here. Any thought? Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: System sendmail build fails with updated cyrus-sasl2 port
Hi, On Mon, 26 Sep 2011 15:58:03 +0400 Andrey Chernov a...@freebsd.org said: ache This is for 9 BETA2 or 10-CURRENT. ache Please fix it on either side. Apparently minor types mismatch within ache sasl_callback_t type. ache cc -O2 -pipe -march=pentium4 ache -I/usr/src/usr.sbin/sendmail/../../contrib/sendmail/src ache -I/usr/src/usr.sbin/sendmail/../../contrib/sendmail/include -I. -DNEWDB ache -DTCPWRAPPERS -DMAP_REGEX -DDNSMAP -DNETINET6 -DSTARTTLS -D_FFR_TLS_1 ache -I/usr/local/include -DSASL=2 -std=gnu99 -fstack-protector ache -Wsystem-headers -Werror -Wno-pointer-sign -c ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c ache cc1: warnings being treated as errors ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c:112: warning: ache initialization from incompatible pointer type ache /usr/src/usr.sbin/sendmail/../../contrib/sendmail/src/main.c:113: warning: ache initialization from incompatible pointer type ache *** Error code 1 It seems 2.1.25 requires to cast to sasl_callback_ft. How about the attached patch? Index: contrib/sendmail/src/main.c diff -u -p contrib/sendmail/src/main.c.orig contrib/sendmail/src/main.c --- contrib/sendmail/src/main.c.orig 2011-06-22 13:00:26.0 +0900 +++ contrib/sendmail/src/main.c 2011-09-27 00:32:34.0 +0900 @@ -109,8 +109,8 @@ GIDSET_T InitialGidSet[NGROUPS_MAX]; #if SASL static sasl_callback_t srvcallbacks[] = { - { SASL_CB_VERIFYFILE, safesaslfile, NULL }, - { SASL_CB_PROXY_POLICY, proxy_policy, NULL }, + { SASL_CB_VERIFYFILE, (sasl_callback_ft)safesaslfile, NULL }, + { SASL_CB_PROXY_POLICY, (sasl_callback_ft)proxy_policy, NULL }, { SASL_CB_LIST_END, NULL, NULL } }; #endif /* SASL */ Index: contrib/sendmail/src/sendmail.h diff -u contrib/sendmail/src/sendmail.h.orig contrib/sendmail/src/sendmail.h --- contrib/sendmail/src/sendmail.h.orig 2011-06-22 13:00:27.0 +0900 +++ contrib/sendmail/src/sendmail.h 2011-09-27 00:57:43.0 +0900 @@ -133,10 +133,15 @@ # if SASL == 2 || SASL = 2 # include sasl/sasl.h +# include sasl/saslplug.h # include sasl/saslutil.h +# if SASL_VERSION_FULL 0x020119 +typedef int (*sasl_callback_ft)(void); +# endif # else /* SASL == 2 || SASL = 2 */ # include sasl.h # include saslutil.h +typedef int (*sasl_callback_ft)(void); # endif /* SASL == 2 || SASL = 2 */ # if defined(SASL_VERSION_MAJOR) defined(SASL_VERSION_MINOR) defined(SASL_VERSION_STEP) # define SASL_VERSION (SASL_VERSION_MAJOR * 1) + (SASL_VERSION_MINOR * 100) + SASL_VERSION_STEP Index: contrib/sendmail/src/usersmtp.c diff -u -p contrib/sendmail/src/usersmtp.c.orig contrib/sendmail/src/usersmtp.c --- contrib/sendmail/src/usersmtp.c.orig 2011-09-27 00:51:44.0 +0900 +++ contrib/sendmail/src/usersmtp.c 2011-09-27 00:51:52.0 +0900 @@ -524,15 +524,15 @@ static int attemptauth __P((MAILER *, MC static sasl_callback_t callbacks[] = { - { SASL_CB_GETREALM, saslgetrealm, NULL }, + { SASL_CB_GETREALM, (sasl_callback_ft)saslgetrealm, NULL }, #define CB_GETREALM_IDX 0 - { SASL_CB_PASS, getsecret, NULL }, + { SASL_CB_PASS, (sasl_callback_ft)getsecret, NULL }, #define CB_PASS_IDX 1 - { SASL_CB_USER, getsimple, NULL }, + { SASL_CB_USER, (sasl_callback_ft)getsimple, NULL }, #define CB_USER_IDX 2 - { SASL_CB_AUTHNAME, getsimple, NULL }, + { SASL_CB_AUTHNAME, (sasl_callback_ft)getsimple, NULL }, #define CB_AUTHNAME_IDX 3 - { SASL_CB_VERIFYFILE, safesaslfile, NULL }, + { SASL_CB_VERIFYFILE, (sasl_callback_ft)safesaslfile, NULL }, #define CB_SAFESASL_IDX 4 { SASL_CB_LIST_END, NULL, NULL } }; -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: resolvconf script overwrites entries in resolv.conf - RDNSS/DNSSL related
Hi, On Mon, 8 Aug 2011 07:55:11 -0400 J.R. Oldroyd f...@opal.com said: Is there any chance that you could create a patch for 8.2 based on the commits in HEAD? That would be great! fbsd Better would be to ask hrs@ to MFC his commits to 8-stable. hrs@ posted MFC candidate patch for review. Please refer the thread started from: http://lists.freebsd.org/pipermail/freebsd-net/2011-June/029070.html The patches you will find in the thread are: http://people.freebsd.org/~hrs/rfc6106_stable8_20110612-1.diff http://people.freebsd.org/~ume/resolvconf-releng_8.diff You may be interested in the thread from the following as well: http://lists.freebsd.org/pipermail/freebsd-net/2011-June/029091.html Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: resolvconf script overwrites entries in resolv.conf - RDNSS/DNSSL related
Hi, On Mon, 08 Aug 2011 16:42:06 +1000 Mattia Rossi mro...@swin.edu.au said: mrossi Anyhow, the manpage is really not clear about name_servers_append, and mrossi it's not working as expected either: mrossi 1) If I put in a comma separated list of nameservers, I'll find that mrossi comma separated list in /etc/resolv.conf under a single nameserver mrossi tag. That doesn't work, as it's not a valid entry. Each nameserver mrossi needs to have a nameserver host entry. name_servers and name_servers_append is a space separated list of nameserver. mrossi 2) If I use multiple name_servers_append entries in mrossi /etc/resolvconf.conf, then only the last entry is used. I don't want mrossi only one DNS server there though, I want all three of them, as I mrossi already had the problem that one or the other didn't work properly. You can specify multiple nameservers in name_servers and/or name_servers_append. mrossi 3) If I read the description for name_servers in resolvconf.conf(5), I mrossi understand that this tag prepends the nameserver to my list. This is mrossi not what happens. Still not sure what actually happens there... It is strange to me. If you specify name_servers, it should be prepended to the nameserver list. I've just tried name_servers, and it did the job as expected, here. mrossi How do I get my 3 manual DNS entries properly into my resolv.conf ? Please specify your 3 servers as space separated list in name_servers or name_servers_append. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: CFR: importing openresolv
Hi, On Sun, 20 Feb 2011 18:21:18 + (UTC) Bjoern A. Zeeb b...@freebsd.org said: bz Do you have an updated patch for 3.4.1 or 3.3.6? I'd like to help to bz you get it in for 9.0-R. I wouldn't even mind if some ports would bz conflict with it for a while not making the situation any worse than bz it is these days. I didn't notice that openresolv was updated. I'll soon make a new diff for 3.4.1. hrs@ noticed that ppp(8) and uhsoctl(8) in our base tree touch /etc/resolv.conf. We need to change them to use resovlconf(8). Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: CFR: importing openresolv
Hi, On Tue, 22 Feb 2011 01:50:17 +0900 Hajimu UMEMOTO u...@freebsd.org said: bz Do you have an updated patch for 3.4.1 or 3.3.6? I'd like to help to bz you get it in for 9.0-R. I wouldn't even mind if some ports would bz conflict with it for a while not making the situation any worse than bz it is these days. ume I didn't notice that openresolv was updated. I'll soon make a new ume diff for 3.4.1. ume hrs@ noticed that ppp(8) and uhsoctl(8) in our base tree touch ume /etc/resolv.conf. We need to change them to use resovlconf(8). I've updated a patch for 3.4.1: http://www.imasy.or.jp/~ume/FreeBSD/openresolv-20110222.diff.gz If you have the previous patch applied, make sure to remove src/contrib/openresolv and src/sbin/resolvconf before applying new one. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: Files under src/ not used for building world
Hi, On Fri, 5 Nov 2010 17:16:47 -0400 John Baldwin j...@freebsd.org said: etc/periodic/security/610.ipf6denied jhb I wonder if this is stale due to ip6fw being removed? No, it seems to me that it is not related to ip6fw, and it calls ipfstat. Perhaps, some work for IPv6 support of IP Filter? Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org u...@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
CFR: importing openresolv
Hi, I wish to import openresolv 3.3.5 into our base tree. It makes merging the DNS server addresses informed from DHCP, DHCPv6, PPP, ... into /etc/resolv.conf easier. http://roy.marples.name/projects/openresolv My patch against 9-CURRENT can be obtained from: http://www.imasy.or.jp/~ume/FreeBSD/openresolv-20100818.diff.gz Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org u...@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: HEADS UP: COMPAT_IA32 renamed COMPAT_FREEBSD32
Hi, On Thu, 11 Mar 2010 08:50:05 -0600 Nathan Whitehorn nwhiteh...@freebsd.org said: nwhitehorn As a result of importing 32-bit compatibility support for non-x86 64-bit nwhitehorn platforms, the kernel options COMPAT_IA32 has been renamed nwhitehorn COMPAT_FREEBSD32 in revision 205014, so all kernel configurations nwhitehorn including this option must be modified accordingly. Doesn't this mean we cannot have FreeBSD version 32? :) Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan u...@mahoroba.org u...@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ freebsd-current@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to freebsd-current-unsubscr...@freebsd.org
Re: Can we get rid of kerb5 redefining macros?
Hi, On Mon, 1 Dec 2003 04:11:34 -0800 David O'Brien [EMAIL PROTECTED] said: obrien Ever since kerberos5 got hooked up to the build by default I'm getting obrien *TONS* (758) of CPP macros. An example is: obrien In file included from /usr/obj/usr/src/kerberos5/lib/libasn1/roken.h:77, obrien from /usr/src/crypto/heimdal/lib/vers/print_version.c:38: obrien /usr/src/crypto/heimdal/lib/roken/roken-common.h:183:1: warning: EAI_NODATA re obrien defined obrien In file included from /usr/obj/usr/src/kerberos5/lib/libasn1/roken.h:59, obrien from /usr/src/crypto/heimdal/lib/vers/print_version.c:38: obrien /usr/include/netdb.h:166:1: warning: this is the location of the previous defini obrien tion obrien Can a kerberos5 guy take a look at these? I made a patch for this. However, I forgot to sent it to Kerberos5 guy. Sincerely, Index: crypto/heimdal/lib/krb5/eai_to_heim_errno.c diff -u crypto/heimdal/lib/krb5/eai_to_heim_errno.c.orig crypto/heimdal/lib/krb5/eai_to_heim_errno.c --- crypto/heimdal/lib/krb5/eai_to_heim_errno.c.origThu Jun 21 11:11:31 2001 +++ crypto/heimdal/lib/krb5/eai_to_heim_errno.c Fri Nov 7 02:47:15 2003 @@ -47,8 +47,10 @@ switch(eai_errno) { case EAI_NOERROR: return 0; +#ifdef EAI_ADDRFAMILY case EAI_ADDRFAMILY: return HEIM_EAI_ADDRFAMILY; +#endif case EAI_AGAIN: return HEIM_EAI_AGAIN; case EAI_BADFLAGS: @@ -59,8 +61,10 @@ return HEIM_EAI_FAMILY; case EAI_MEMORY: return HEIM_EAI_MEMORY; +#if defined(EAI_NODATA) EAI_NODATA != EAI_NONAME case EAI_NODATA: return HEIM_EAI_NODATA; +#endif case EAI_NONAME: return HEIM_EAI_NONAME; case EAI_SERVICE: Index: crypto/heimdal/lib/krb5/verify_krb5_conf.c diff -u crypto/heimdal/lib/krb5/verify_krb5_conf.c.orig crypto/heimdal/lib/krb5/verify_krb5_conf.c --- crypto/heimdal/lib/krb5/verify_krb5_conf.c.orig Sat Oct 25 06:55:43 2003 +++ crypto/heimdal/lib/krb5/verify_krb5_conf.c Fri Nov 7 02:42:26 2003 @@ -156,7 +156,11 @@ hostname[strcspn(hostname, /)] = '\0'; ret = getaddrinfo(hostname, telnet /* XXX */, NULL, ai); if(ret != 0) { +#ifdef EAI_NODATA if(ret == EAI_NODATA) +#else + if(ret == EAI_NONAME) +#endif krb5_warnx(context, %s: host not found (%s), path, hostname); else krb5_warnx(context, %s: %s (%s), path, gai_strerror(ret), hostname); Index: crypto/heimdal/lib/roken/roken-common.h diff -u crypto/heimdal/lib/roken/roken-common.h.orig crypto/heimdal/lib/roken/roken-common.h --- crypto/heimdal/lib/roken/roken-common.h.origWed Sep 18 02:36:32 2002 +++ crypto/heimdal/lib/roken/roken-common.h Fri Nov 7 01:58:38 2003 @@ -171,22 +171,26 @@ #ifndef EAI_NOERROR #define EAI_NOERROR0 /* no error */ #endif - #ifndef EAI_ADDRFAMILY - #define EAI_ADDRFAMILY 1 /* address family for nodename not supported */ +#endif + +#ifndef EAI_NONAME + #define EAI_AGAIN 2 /* temporary failure in name resolution */ #define EAI_BADFLAGS 3 /* invalid value for ai_flags */ #define EAI_FAIL 4 /* non-recoverable failure in name resolution */ #define EAI_FAMILY 5 /* ai_family not supported */ #define EAI_MEMORY 6 /* memory allocation failure */ +#ifndef EAI_NODATA #define EAI_NODATA 7 /* no address associated with nodename */ +#endif #define EAI_NONAME 8 /* nodename nor servname provided, or not known */ #define EAI_SERVICE9 /* servname not supported for ai_socktype */ #define EAI_SOCKTYPE 10 /* ai_socktype not supported */ #define EAI_SYSTEM 11 /* system error returned in errno */ -#endif /* EAI_ADDRFAMILY */ +#endif /* EAI_NONAME */ /* flags for getaddrinfo() */ -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: another trap 12 while in kernel mode (now with trace)
Hi, On Wed, 19 Nov 2003 22:30:44 + (UTC) [EMAIL PROTECTED] (Bjoern A. Zeeb) said: db trace bzeeb-lists key_cmpspidx_withmask(deadc0de,c9b5c914) at key_cmpspidx_withmask+0x2c bzeeb-lists key_allocsp(0,c9b5c914,2,16000210,c1426f0a) at key_allocsp+0x8b Thank you for your report. I'm working on this. Please wait. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: /etc/rc.d/ipsec starts not in time
Hi, On Sat, 15 Nov 2003 15:21:34 -0800 Terry Lambert [EMAIL PROTECTED] said: It is not sufficient. There is setkey(8) in /usr/sbin. It means that we cannot protect NFS exported /usr by IPsec. If there is no objection, I wish to move setkey(8) into /sbin like NetBSD did. tlambert2 This type of order inversion is common. tlambert2 Can we simply delay exportation until later in the boot process? tlambert2 Wouldn't this have the same effect? Oops, I should explain the situation clearly. The client which mounts /usr by NFS cannot use IPsec due to lack of setkey(8). Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: /etc/rc.d/ipsec starts not in time
Hi, On Sun, 16 Nov 2003 12:10:12 +0200 Kostyuk Oleg [EMAIL PROTECTED] said: It is not sufficient. There is setkey(8) in /usr/sbin. It means that we cannot protect NFS exported /usr by IPsec. If there is no objection, I wish to move setkey(8) into /sbin like NetBSD did. tlambert2 This type of order inversion is common. tlambert2 Can we simply delay exportation until later in the boot process? tlambert2 Wouldn't this have the same effect? Oops, I should explain the situation clearly. The client which mounts /usr by NFS cannot use IPsec due to lack of setkey(8). cub I think, you not exactly understand my problem. I don't think so. cub I not export anything, not protect NFS exported /usr and cub have ordinary workstation with 40G HD and /usr on it. cub Using IPSec - hostorical behavior :), and i live without cub problems on 4.x . cub But I use NFS exports from others. cub And, in case if IPSec used between my mashine and NFS server, cub I can't boot smoothly - booting hold up on mounting NFS cub until I press Ctrl+C . cub Patch, which I send, resolve my problem. cub But I not sure - applicable this patch for diskless ? setkey(8) is in /usr/sbin. Currently, ipsec is done after mountcritremote. So, the user who use NFS mounted /usr can use setkey(8). It seems your patch changes to invoke ipsec before networking. It means that the user who use NFS mounted /usr cannot use setkey(8), anymore. So, I believe that moving setkey(8) into /sbin is required to establish your needs. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: /etc/rc.d/ipsec starts not in time
Hi, On Sun, 02 Nov 2003 15:49:35 +0200 Kostyuk Oleg [EMAIL PROTECTED] said: cubProblem is in order of starting /etc/rc.d/ipsec. cubIt must start BEFORE any network interaction, cubmay be even before configuring interfaces. cubBut I not sure in case with diskless mashines. cub-# BEFORE: DAEMON cub+# BEFORE: NETWORK It is not sufficient. There is setkey(8) in /usr/sbin. It means that we cannot protect NFS exported /usr by IPsec. If there is no objection, I wish to move setkey(8) into /sbin like NetBSD did. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
Hi, On Wed, 12 Nov 2003 16:22:38 +0100 Andre Oppermann [EMAIL PROTECTED] said: oppermann Ok, I found the bug. It was in the ipv6 hash function where I made oppermann a mistake with the hashmask. oppermann The updated patch is here: oppermann http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031112.patch oppermann Could you try again please? It does repeatable panic. Unfortunately, my laptop hanguped during dumping core, and I couldn't get core. So, I copied the output from ddb by hand. Fatal trap 12: page fault while in kernel mode fault virtual address = 0x1c fault code = supervisor read, page not present instruction pointer = 0x8:0xc05b68c5 stack pointer = 0x10:0xd208ea28 frame pointer = 0x10:0xd208ea64 code segment= base 0x0, limit 0x, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 27 (swi1: net) kernel: type 12 trap, code=0 Stopped at in6_selecthlim+0x35:cmpl$0,0x1c(%esi) db trace in6_selecthlim(0,0,28,0,fadd8ac9) at in6_selecthlim+0x35 syncache_respond(c3f6f000,c19a0600,1,c19a0600,0) at syncache_respond+0x31c syncache_add(d208eb80,d208ebf4,c1fc4836,d208eb4c,c19a0600) at syncache_add+0x4f4 tcp_input(c19a0600,28,0,d208ec40,6) at tcp_input+0xdae tcp6_input(d208ec84,d208ec60,6,d208ec84,28) at tcp6_input+0xf5 ip6_input(c19a0600,d018930f,39d40a1e,c0724474,0) at ip6_input+0xc18 netisr_processqueue(c06f0484,aa,7b1c1ccb,351110b4,c050250d) at netisr_processqueue+0xd9 swi_net(0,0,0,0,c199254c) at swi_net+0xd9 ithread_loop(c1988580,d208ed48,4d,55ff44fd,0) at ithread_loop+0x1d8 fork_exit(c04e4d90,c1988580,d208ed48) at fork_exit+0x80 fork_trampoline() at fork_trampoline+0x8 --- trap 0x1, eip = 0, esp = 0xd208ed7c, ebp = 0 --- db Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
Hi, On Sun, 09 Nov 2003 17:19:07 +0100 Andre Oppermann [EMAIL PROTECTED] said: oppermann The patch is here (relative to -CURRENT as of 2003-11-09): oppermann http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031109.patch The patch cannot be compiled: cc -c -O -pipe -march=pentium3 -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -fformat-extensions -std=c99 -g -nostdinc -I- -I. -I/usr/home/ume/cvs/freefall/current/src/sys -I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/acpica -I/usr/home/ume/cvs/freefall/current/src/sys/contrib/ipfilter -I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/ath -I/usr/home/ume/cvs/freefall/current/src/sys/contrib/dev/ath/freebsd -I/usr/home/ume/cvs/freefall/current/src/sys/contrib/ngatm -D_KERNEL -include opt_global.h -fno-common -finline-limit=15000 -fno-strict-aliasing -mno-align-long-strings -mpreferred-stack-boundary=2 -ffreestanding -Werror /usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c /usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c: In function `ip_forward': /usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c:1960: warning: implicit declaration of function `ipsec_getpolicybyaddr' /usr/home/ume/cvs/freefall/current/src/sys/netinet/ip_input.c:1963: warning: assignment makes pointer from integer without a cast *** Error code 1 There is no ipsec_getpolicybyaddr() for IPSEC. And, #ifdef is slightly complex. I don't tested it actually, yet. --- sys/netinet/ip_input.c.orig Wed Nov 12 00:08:42 2003 +++ sys/netinet/ip_input.c Wed Nov 12 00:18:50 2003 @@ -1957,10 +1957,17 @@ int ipsechdr; struct route *ro; +#ifdef IPSEC + sp = ipsec4_getpolicybyaddr(mcopy, + IPSEC_DIR_OUTBOUND, + IP_FORWARDING, + ipsecerror); +#else sp = ipsec_getpolicybyaddr(mcopy, IPSEC_DIR_OUTBOUND, IP_FORWARDING, ipsecerror); +#endif if (sp != NULL) { /* count IPsec header size */ @@ -1995,13 +2002,11 @@ #else KEY_FREESP(sp); #endif - ipstat.ips_cantfrag++; - break; - } else -#endif /*IPSEC || FAST_IPSEC*/ - destifp = ia-ia_ifp; -#if defined(IPSEC) || defined(FAST_IPSEC) + } else + destifp = ia-ia_ifp; } +#else + destifp = ia-ia_ifp; #endif /*IPSEC || FAST_IPSEC*/ ipstat.ips_cantfrag++; break; Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
Hi, On Sun, 09 Nov 2003 17:19:07 +0100 Andre Oppermann [EMAIL PROTECTED] said: oppermann The patch is here (relative to -CURRENT as of 2003-11-09): oppermann http://www.nrg4u.com/freebsd/tcphostcache+ipfastforward-20031109.patch It panics at boot around invoking rtsol(8): Fatal trap 12: page fault while in kernel mode fault virtual address = 0x80 fault code = supervisor write, page not present instruction pointer = 0x8:0xc05b5278 stack pointer = 0x10:0xd7be0944 frame pointer = 0x10:0xd7be0998 code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, def32 1, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 4912 (rtsol) trap number = 12 panic: page fault #0 doadump () at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:240 240 dumping++; (kgdb) bt #0 doadump () at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:240 #1 0xc04fad80 in boot (howto=256) at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:372 #2 0xc04fb168 in panic () at /usr/home/ume/cvs/freefall/current/src/sys/kern/kern_shutdown.c:550 #3 0xc0662316 in trap_fatal (frame=0xd7be0904, eva=0) at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:821 #4 0xc0661fb2 in trap_pfault (frame=0xd7be0904, usermode=0, eva=128) at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:735 #5 0xc0661b05 in trap (frame= {tf_fs = -1068629992, tf_es = -675414000, tf_ds = -675414000, tf_edi = -1010894932, tf_esi = -675411476, tf_ebp = -675411560, tf_isp = -675411664, tf_ebx = 0, tf_edx = -1010048384, tf_ecx = 0, tf_eax = 4, tf_trapno = 12, tf_err = 2, tf_eip = -1067756936, tf_cs = 8, tf_eflags = 66118, tf_esp = -675411440, tf_ss = -675411320}) at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:420 #6 0xc0652df8 in calltrap () at {standard input}:94 #7 0xc05b4b5b in in6_selectsrc (dstsock=0xd7be09ec, opts=0xd7be0a88, mopts=0x0, ro=0x0, laddr=0xc3bef7ac, errorp=0xd7be0a84) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/in6_src.c:242 #8 0xc05cda65 in rip6_output (m=0xc19a1000) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/raw_ip6.c:426 #9 0xc05ce4ec in rip6_send (so=0xc3bdf660, flags=0, m=0xc19a1000, nam=0x0, control=0x0, td=0xc3cbe280) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/raw_ip6.c:742 #10 0xc053a62d in sosend (so=0xc3bdf660, addr=0xc39bbb20, uio=0xd7be0bf4, top=0xc19a1000, control=0xc19a1100, flags=0, td=0xc3cbe280) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_socket.c:715 #11 0xc053ef7c in kern_sendit (td=0xc3cbe280, s=3, mp=0xd7be0ca4, flags=0, control=0x0) ---Type return to continue, or q return to quit--- at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:722 #12 0xc053ed9e in sendit (td=0x0, s=0, mp=0xd7be0ca4, flags=0) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:662 #13 0xc053f393 in sendmsg (td=0x0, uap=0xd7be0d10) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:900 #14 0xc06626a0 in syscall (frame= {tf_fs = 47, tf_es = 47, tf_ds = 47, tf_edi = 5, tf_esi = 1, tf_ebp = -1077940776, tf_isp = -675410572, tf_ebx = 134549504, tf_edx = 134545504, tf_ecx = 134545504, tf_eax = 28, tf_trapno = 12, tf_err = 2, tf_eip = 671923007, tf_cs = 31, tf_eflags = 514, tf_esp = -1077940852, tf_ss = 47}) at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:1010 #15 0xc0652e4d in Xint0x80_syscall () at {standard input}:136 ---Can't read userspace from dump, or kernel process--- (kgdb) frame 7 #7 0xc05b4b5b in in6_selectsrc (dstsock=0xd7be09ec, opts=0xd7be0a88, mopts=0x0, ro=0x0, laddr=0xc3bef7ac, errorp=0xd7be0a84) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/in6_src.c:242 242 if ((*errorp = in6_selectif(dstsock, opts, mopts, ro, ifp)) != 0) (kgdb) Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
Hi, On Tue, 11 Nov 2003 18:06:05 +0100 Andre Oppermann [EMAIL PROTECTED] said: oppermann However there is a problem in netkey/key.c with the static variable oppermann ipsec_esp_auth which is unused if IPSEC_ESP is not defined. Thanks. I've just committed to define ipsec_esp_auth only when IPSEC_ESP is defined. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
to quit--- at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/ip6_output.c:830 #27 0xc05cf5b9 in udp6_output (in6p=0xc3b2d900, m=0xc19a0b00, addr6=0xc19a0bf8, control=0xc199db00, td=0xc3840a00) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/udp6_output.c:297 #28 0xc05d03ce in udp6_send (so=0xc3c1b110, flags=0, m=0xc19a0a00, addr=0xc39bb5e0, control=0xc199db00, td=0xc3840a00) at /usr/home/ume/cvs/freefall/current/src/sys/netinet6/udp6_usrreq.c:758 #29 0xc053a62d in sosend (so=0xc3c1b110, addr=0xc39bb5e0, uio=0xd2e5ebf4, top=0xc19a0a00, control=0xc199db00, flags=0, td=0xc3840a00) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_socket.c:715 #30 0xc053ef7c in kern_sendit (td=0xc3840a00, s=6, mp=0xd2e5eca4, flags=0, control=0x0) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:722 #31 0xc053ed9e in sendit (td=0x0, s=0, mp=0xd2e5eca4, flags=0) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:662 #32 0xc053f393 in sendmsg (td=0x0, uap=0xd2e5ed10) at /usr/home/ume/cvs/freefall/current/src/sys/kern/uipc_syscalls.c:900 #33 0xc06626b0 in syscall (frame= {tf_fs = 47, tf_es = 47, tf_ds = 47, tf_edi = -1077941600, tf_esi = 2, tf_ebp = -1077941400, tf_isp = -756683404, tf_ebx = 0, tf_edx = 27, tf_ecx = -1077942160, tf_eax = 28, tf_trapno = 0, tf_err = 2, tf_eip = 673524543, tf_cs = 31, tf_eflags = 658, tf_esp = -1077941956, tf_ss = 47}) at /usr/home/ume/cvs/freefall/current/src/sys/i386/i386/trap.c:1010 #34 0xc0652e5d in Xint0x80_syscall () at {standard input}:136 ---Can't read userspace from dump, or kernel process--- (kgdb) frame 24 #24 0xc058e637 in tcp_hc_getmtu (inc=0x0) at /usr/home/ume/cvs/freefall/current/src/sys/netinet/tcp_hostcache.c:420 420 hc_entry = tcp_hc_lookup(inc); (kgdb) Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: tcp hostcache and ip fastforward for review
Hi, On Sun, 09 Nov 2003 17:19:07 +0100 Andre Oppermann [EMAIL PROTECTED] said: oppermann Hajimu-san, I'm looking especially for comments on whether my changes oppermann to IPv6 are correct wrt IPv6 concepts. (I hope they are). I don't see the patch in detail, yet, it seems your change will affect KAME's development. You should ask [EMAIL PROTECTED] for review your patch in detail before committing into FreeBSD. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Forward: HEADS UP! Default value of ip6_v6only changed
Hi, Our default of net.inet6.ip6.v6only was off in 4.X, and was changed to on on 5.X to follow NetBSD's practice. This behavior on 5.X breaks RFC2553/3493, and the change was intentional from security consideration. But, NetBSD changed it off by default. How do you think our default of on? ---BeginMessage--- The default value of ip6_v6only (sysctl net.inet6.ip6.v6only) has been changed. The new value brings us closer in line with current RFC-defined behavior and practices. Itojun still has significant concerns about the new default behavior. His concerns have been well-documented in ftp://ftp.itojun.org/pub/paper/draft-cmetz-v6ops-v4mapped-api-harmful-00.txt Best Regards, NetBSD OS PMC (core) -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ---End Message--- ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
HEADS-UP: switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542
Hi, I've just committed to switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542 (aka RFC2292bis). Though I believe this commit doesn't break backward compatibility againt existing binaries, it breaks backward compatibility of API. Now, the applications which use Advanced Sockets API such as telnet, ping6, mld6query and traceroute6 use RFC3542 API. Sincerely, ---BeginMessage--- ume 2003/10/24 11:26:30 PDT FreeBSD src repository Modified files: contrib/telnet/telnet commands.c lib/libc/net Makefile.inc getaddrinfo.c ip6opt.c rthdr.c lib/libsdp search.c sbin/ping6 Makefile ping6.8 ping6.c sys/netinet icmp6.h in.h in_pcb.h ip6.h sys/netinet6 icmp6.c in6.h in6_pcb.c in6_var.h ip6_input.c ip6_output.c ip6_var.h mld6.c nd6.c nd6.h nd6_rtr.c raw_ip6.c route6.c udp6_output.c usr.sbin/mld6query Makefile mld6.c usr.sbin/traceroute6 Makefile Added files: lib/libc/net inet6_opt_init.3 inet6_rth_space.3 Log: Switch Advanced Sockets API for IPv6 from RFC2292 to RFC3542 (aka RFC2292bis). Though I believe this commit doesn't break backward compatibility againt existing binaries, it breaks backward compatibility of API. Now, the applications which use Advanced Sockets API such as telnet, ping6, mld6query and traceroute6 use RFC3542 API. Obtained from: KAME Revision ChangesPath 1.33 +9 -16 src/contrib/telnet/telnet/commands.c 1.49 +14 -2 src/lib/libc/net/Makefile.inc 1.46 +276 -156 src/lib/libc/net/getaddrinfo.c 1.1 +291 -0src/lib/libc/net/inet6_opt_init.3 (new) 1.1 +254 -0src/lib/libc/net/inet6_rth_space.3 (new) 1.5 +227 -0src/lib/libc/net/ip6opt.c 1.6 +340 -210 src/lib/libc/net/rthdr.c 1.2 +1 -0 src/lib/libsdp/search.c 1.10 +2 -4 src/sbin/ping6/Makefile 1.19 +61 -71src/sbin/ping6/ping6.8 1.25 +200 -181 src/sbin/ping6/ping6.c 1.13 +25 -26src/sys/netinet/icmp6.h 1.81 +1 -0 src/sys/netinet/in.h 1.63 +6 -4 src/sys/netinet/in_pcb.h 1.8 +10 -11src/sys/netinet/ip6.h 1.43 +36 -5 src/sys/netinet6/icmp6.c 1.28 +90 -33src/sys/netinet6/in6.h 1.43 +1 -2 src/sys/netinet6/in6_pcb.c 1.17 +4 -1 src/sys/netinet6/in6_var.h 1.59 +33 -56src/sys/netinet6/ip6_input.c 1.62 +985 -246 src/sys/netinet6/ip6_output.c 1.20 +37 -4 src/sys/netinet6/ip6_var.h 1.14 +1 -1 src/sys/netinet6/mld6.c 1.35 +27 -38src/sys/netinet6/nd6.c 1.15 +28 -9 src/sys/netinet6/nd6.h 1.23 +0 -3 src/sys/netinet6/nd6_rtr.c 1.29 +25 -23src/sys/netinet6/raw_ip6.c 1.8 +1 -2 src/sys/netinet6/route6.c 1.13 +3 -2 src/sys/netinet6/udp6_output.c 1.5 +2 -2 src/usr.sbin/mld6query/Makefile 1.3 +97 -16src/usr.sbin/mld6query/mld6.c 1.8 +2 -2 src/usr.sbin/traceroute6/Makefile ---End Message--- -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: buildworld fails on Alpha?
Hi, On Fri, 24 Oct 2003 23:03:31 +0200 Wilko Bulte [EMAIL PROTECTED] said: wkb ll -Wno-format-y2k -Wno-uninitialized -c /usr/src/lib/libfetch/common.c wkb /usr/src/lib/libfetch/common.c:58: error: `EAINONAME' undeclared here (not It was fixed already. Please re-cvsup. Sorry for the mess. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
HEADS-UP: EAI_NODATA was deprecated
Hi, I've just committed to nuke EAI_NODATA. It was depricated in RFC3493 (aka RFC2553bis). Now, getaddrinfo(3) returns EAI_NONAME instead of EAI_NODATA. So, an application that looks EAI_NODATA, error handling will not work. At least, you need to recompile telnet(1). Sincerely, ---BeginMessage--- ume 2003/10/23 06:55:36 PDT FreeBSD src repository Modified files: contrib/telnet/telnet commands.c lib/libc/net getaddrinfo.3 getaddrinfo.c Log: EAI_ADDRFAMILY and EAI_NODATA was deprecated in RFC3493 (aka RFC2553bis). Now, getaddrinfo(3) returns EAI_NONAME instead of EAI_NODATA. Our getaddrinfo(3) nor getnameinfo(3) didn't use EAI_ADDRFAMILY. Obtained from: KAME Revision ChangesPath 1.32 +2 -2 src/contrib/telnet/telnet/commands.c 1.23 +0 -7 src/lib/libc/net/getaddrinfo.3 1.44 +4 -10 src/lib/libc/net/getaddrinfo.c ---End Message--- -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: HEADS-UP: EAI_NODATA was deprecated
Hi, On Thu, 23 Oct 2003 10:40:05 -0700 Terry Lambert [EMAIL PROTECTED] said: tlambert2 Please apply this patch: tlambert2 +#define EAI_NODATA EAINONAME /* To be removed on 23 APR 2004 */ Okay, applied. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: panic: mutex rtentry not owned at /usr/src/sys/net/route.c:225
Hi, On Sat, 18 Oct 2003 11:47:21 +0200 John Hay [EMAIL PROTECTED] said: jhay #2 0xc0482a18 in panic () at /usr/src/sys/kern/kern_shutdown.c:550 jhay #3 0xc047ad51 in _mtx_assert (m=0xc2a0da90, what=0, jhay file=0xc05b9e4f /usr/src/sys/net/route.c, line=225) jhay at /usr/src/sys/kern/kern_mutex.c:855 jhay #4 0xc04e0598 in rtfree (rt=0xc2a0da00) at /usr/src/sys/net/route.c:225 jhay #5 0xc0518291 in nd6_output (ifp=0xc2988800, origifp=0xc2988800, jhay m0=0xc12ae700, dst=0xc2a240dc, rt0=0xc361ca00) jhay at /usr/src/sys/netinet6/nd6.c:1917 I've just committed, and it should fix. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
HEADS-UP: SADB_X_AALG_RIPEMD160HMAC was changed
Hi, I've just corrected the value of SADB_X_AALG_RIPEMD160HMAC from 9 to 8. If you are using IPsec stuff, it breaks binary compatibility. When updating your kernel, you need to update libipsec, setkey, racoon and isakmpd appropriately. Sincerely, ---BeginMessage--- ume 2003/10/12 21:54:51 PDT FreeBSD src repository Modified files: lib/libipsec pfkey_dump.c sys/conf files sys/net pfkeyv2.h sys/netinet6 ah_core.c usr.sbin/setkey setkey.8 token.l Log: - support AES XCBC MAC for AH - correct SADB_X_AALG_RIPEMD160HMAC to 8 Obtained from: KAME Revision ChangesPath 1.10 +3 -0 src/lib/libipsec/pfkey_dump.c 1.831 +3 -2 src/sys/conf/files 1.10 +2 -1 src/sys/net/pfkeyv2.h 1.18 +7 -0 src/sys/netinet6/ah_core.c 1.26 +2 -0 src/usr.sbin/setkey/setkey.8 1.7 +1 -0 src/usr.sbin/setkey/token.l ---End Message--- -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: problem with IPv6 gif tunnel activation in rc.conf (latestcurrent)
Hi, On Sun, 10 Aug 2003 17:41:40 +0100 Matt [EMAIL PROTECTED] said: matt ipv6_network_interfaces=xl1 lo0 This line should be `ipv6_network_interfaces=xl1 gif0'. matt ipv6_ifconfig_xl1=fec0:0:0:1::1 prefixlen 64 matt ipv6_ifconfig_gif0=2001:470:1F00:::32F 2001:470:1F00:::32E prefixlen matt 128 matt ipv6_ifconfig_xl1_alias0=2001:470:1F00:507::1 prefixlen 64 Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: RELENG_5_1 doesnt build gifconfig
Hi, On Sat, 12 Jul 2003 18:16:48 +0200 Karl M. Joch [EMAIL PROTECTED] said: k.joch wanted to setup some ipsec tunnels and miss gifconfig. it is still in k.joch the source tree, but doesnt build with buildworld. cleaned out src and k.joch obj and cvs a new src tree but still the same. The feature of gifconfig(8) was merged into ifconfig(8), and gifconfig(8) was obsoleted for a long time. The source of gifconfig(8) was removed on recent 5-CURRENT. Please use tunnel option of ifconfig(8), instead. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: [acpi-jp 2408] Problems with 0619 and battery support
Hi, On Fri, 11 Jul 2003 20:21:07 -0700 Nate Lawson [EMAIL PROTECTED] said: nate I am attempting to import acpica-0619 into FreeBSD. The basic changes I nate made to get things working was to change calls to AcpiGetObjectInfo to use nate an ACPI_BUFFER and AcpiEnableGpe instead of AcpiEnableEvent for enabling nate our GPE handlers for the EC. With my changes, it compiles and boots fine. nate But it seems battery support is broken. Here is the dmesg output. I met similar problem and I cannot get battery status at all on today's -CURRENT. ACPI-0432: *** Error: Handler for [EmbeddedControl] returned AE_NO_HARDWARE_RESPONSE ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.RBAT] (Node 0xc3138f20), AE_AML_NO_RETURN_VALUE ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.RVSN] (Node 0xc3138ea0), AE_AML_NO_RETURN_VALUE ACPI-1287: *** Error: Method execution failed [\\_SB_.PCI0.ISA_.EC0_.BAT0._BST] (Node 0xc3138dc0), AE_AML_NO_RETURN_VALUE [EMAIL PROTECTED]:1012% apm APM version: 1.2 APM Management: Disabled AC Line status: on-line Battery status: charging Remaining battery life: invalid value (0x) Remaining battery time: unknown Number of batteries: 2 Battery 0: Battery status: not present Battery 1: Battery status: not present Resume timer: Thu Jan 1 08:59:59 1970 Resume on ring indicator: disabled APM Capabilities: unknown [EMAIL PROTECTED]:1013% sysctl hw.acpi.battery hw.acpi.battery.life: -1 hw.acpi.battery.time: -1 hw.acpi.battery.state: 7 hw.acpi.battery.units: 2 hw.acpi.battery.info_expire: 10 nate I've attached the diff. Please let me know if there's something I should nate be aware of that changed calling _BIF. Unfortunately, the patch couldn't be compiled. cc -O -pipe -march=pentium3 -I/usr/src/sys/modules/acpi/../../contrib/dev/acpica -D_KERNEL -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -fformat-extensions -std=c99 -DKLD_MODULE -nostdinc -I- -I/usr/src/sys/modules/acpi/../../contrib/dev/acpica -I. -I@ -I@/dev -I@/../include -fno-common -g -mno-align-long-strings -mpreferred-stack-boundary=2 -ffreestanding -Wall -Wredundant-decls -Wnested-externs -Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Winline -Wcast-qual -fformat-extensions -std=c99 -c /usr/src/sys/dev/acpica/acpi.c /usr/src/sys/dev/acpica/acpi.c: In function `acpi_identify': bus_if.h:79: warning: inlining failed in call to `BUS_ADD_CHILD' /usr/src/sys/dev/acpica/acpi.c:264: warning: called from here /usr/src/sys/dev/acpica/acpi.c: In function `acpi_isa_get_logicalid': /usr/src/sys/dev/acpica/acpi.c:716: warning: passing arg 2 of `AcpiGetObjectInfo' from incompatible pointer type /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union /usr/src/sys/dev/acpica/acpi.c:722: error: request for member `Value' in something not a structure or union . . . Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED],jp.}FreeBSD.org http://www.imasy.org/~ume/ ___ [EMAIL PROTECTED] mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-current To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: rsync --daemon problems
Hi, On Thu, 6 Feb 2003 19:33:10 -0500 David Rhodus [EMAIL PROTECTED] said: david On one machine that rsync start's on, I get this from netstat. david tcp6 0 0 *.873 *.* david LISTEN It seems the daemon mode of rsync depends on an IPv4-mapped IPv6 address. Since an IPv4-mapped IPv6 address is off by default on 5-CURRENT, rsync doesn't listen on IPv4. Further, rsync has a bug that it always listen on 1st entry's address of the result of getaddrinfo() call. Please try attached patch. With this patch, rsync listen on both an IPv4 and an IPv6. Sincerely, Index: socket.c diff -u socket.c.orig socket.c --- socket.c.orig Mon Jan 27 12:35:09 2003 +++ socket.c Sat Feb 8 00:06:59 2003 @@ -292,11 +292,11 @@ * @param bind_address Local address to bind, or NULL to allow it to * default. **/ -static int open_socket_in(int type, int port, const char *bind_address, - int af_hint) +static int *open_socket_in(int type, int port, const char *bind_address, + int af_hint) { int one=1; - int s; + int *s, *socks, maxs; struct addrinfo hints, *all_ai, *resp; char portbuf[10]; int error; @@ -310,41 +310,65 @@ if (error) { rprintf(FERROR, RSYNC_NAME : getaddrinfo: bind address %s: %s\n, bind_address, gai_strerror(error)); - return -1; + return NULL; + } + + /* Count max number of sockets we may open */ + for (maxs = 0, resp = all_ai; resp; resp = resp-ai_next, maxs++) + ; + socks = malloc((maxs + 1) * sizeof(int)); + if (!socks) { + rprintf(FERROR, + RSYNC_NAME couldn't allocate memory for sockets); + return NULL; } /* We may not be able to create the socket, if for example the * machine knows about IPv6 in the C library, but not in the * kernel. */ + *socks = 0; /* num of sockets counter at start of array */ + s = socks + 1; for (resp = all_ai; resp; resp = resp-ai_next) { - s = socket(resp-ai_family, resp-ai_socktype, + *s = socket(resp-ai_family, resp-ai_socktype, resp-ai_protocol); - if (s == -1) + if (*s == -1) /* See if there's another address that will work... */ continue; - setsockopt(s, SOL_SOCKET, SO_REUSEADDR, + setsockopt(*s, SOL_SOCKET, SO_REUSEADDR, (char *)one, sizeof one); +#ifdef IPV6_V6ONLY + if (resp-ai_family == AF_INET6) + setsockopt(*s, IPPROTO_IPV6, IPV6_V6ONLY, + (char *)one, sizeof one); +#endif + /* now we've got a socket - we need to bind it */ - if (bind(s, all_ai-ai_addr, all_ai-ai_addrlen) 0) { + if (bind(*s, resp-ai_addr, resp-ai_addrlen) 0) { /* Nope, try another */ - close(s); + close(*s); continue; } - freeaddrinfo(all_ai); - return s; + (*socks)++; + s++; } - rprintf(FERROR, RSYNC_NAME : open inbound socket on port %d failed: - %s\n, - port, - strerror(errno)); + if (all_ai) + freeaddrinfo(all_ai); - freeaddrinfo(all_ai); - return -1; + if (*socks == 0) { + rprintf(FERROR, + RSYNC_NAME : open inbound socket on port %d failed: + %s\n, + port, + strerror(errno)); + free(socks); + return NULL; + } + return socks; } @@ -376,19 +400,29 @@ void start_accept_loop(int port, int (*fn)(int, int)) { - int s; + fd_set deffds; + int *s, maxfd, i, j; extern char *bind_address; extern int default_af_hint; /* open an incoming socket */ s = open_socket_in(SOCK_STREAM, port, bind_address, default_af_hint); - if (s == -1) + if (s == NULL) exit_cleanup(RERR_SOCKETIO); /* ready to listen */ - if (listen(s, 5) == -1) { - close(s); - exit_cleanup(RERR_SOCKETIO); + FD_ZERO(deffds); + maxfd = -1; + for (i = 1; i = *s; i++) { + if (listen(s[i], 5) == -1) { + for (j = 1; j = i; j++) +close(s[j]); + free(s); + exit_cleanup(RERR_SOCKETIO); + } + FD_SET(s[i], deffds); + if (maxfd s[i]) + maxfd = s[i]; } @@ -406,16 +440,20 @@ forever */ log_close(); - FD_ZERO(fds); - FD_SET(s, fds); + FD_COPY(deffds, fds); - if (select(s+1, fds, NULL, NULL, NULL) != 1) { + if (select(maxfd + 1, fds, NULL, NULL, NULL) != 1) { continue; } - if(!FD_ISSET(s, fds)) continue; - - fd = accept(s,(struct sockaddr *)addr,addrlen); + fd = -1; + for (i = 1; i = *s; i++) { + if (FD_ISSET(s[i], fds)) { +fd = accept(s[i], (struct sockaddr *)addr, + addrlen); +break; + } + } if (fd == -1) continue; @@ -430,7 +468,7 @@ if ((pid = fork()) == 0) { int ret; - close(s); + close(s[i]); /* open log file in child before possibly giving up privileges */ log_open(); @@ -452,6 +490,7 @@ close(fd); } } + free(s); } -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/
Re: Linux networking emulation broken?
Hi, On Thu, 6 Feb 2003 22:28:26 + David Malone [EMAIL PROTECTED] said: dwmalone On Thu, Feb 06, 2003 at 11:00:21AM -0800, Kris Kennaway wrote: I'm also seeing this with Linux Phoenix, though I haven't tcpdumped the output. dwmalone I'm guessing the short patch at: dwmalone http://www.maths.tcd.ie/~dwmalone/linux_sendmsg.patch dwmalone should help. Can you try it and let me know? Oops, thanks! Though I cannot test it for now, it seems correct to me. However, I think that where bsd_args.msg = (caddr_t)((nmsg == NULL) ? linux_args.msg : nmsg); it is sufficient to just substitute nmsg for bsd_args.msg: bsd_args.msg = (caddr_t) nmsg; Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: if_sis.c failed to attach my SiS630 ethernet controller with the latest commit
Hi, Sun, 26 Jan 2003 14:31:28 +0900 (JST), Toshiomi Moriki [EMAIL PROTECTED] said: toshiomi I found the same problem in my FreeBSD box. toshiomi Isn't anyone have further informations about this problem? I have same problem here with my laptop which has SiS630 chipset. I backed out if_sis.c to 1.59, then it works fine. sis0@pci0:1:1: class=0x02 card=0x14551043 chip=0x09001039 rev=0x82 hdr=0x00 vendor = 'Silicon Integrated Systems (SiS)' device = 'SiS900 Fast Ethernet/Home Networking Ctrlr' class= network subclass = ethernet Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [CFR] IPv6 support for Linux sym
Hi, On Mon, 20 Jan 2003 20:48:56 -0500 (EST) Andrew Gallatin [EMAIL PROTECTED] said: gallatin The ifdefs are there because the linux hack^W OS uses a different gallatin syscall table on each platform, with a different ABI (eg, the same gallatin syscall may take 3 args on x86 and 2 on alpha). They basically never gallatin cleaned up after bootstrapping themselves from OSF/1. gallatin The #ifndef alpha code is not compiled because it will never be gallatin referred to on the alpha.. The osf1 compat code is a much better gallatin match for the linux networking syscalls, so that's what's used. On gallatin alpha, the linux compat module depends on the osf1 compat module.. Umm, I see. Thank you for clarification. gallatin Naively, I'm uncertain why you're having compilation problems on gallatin alpha, since the code is just ifdef'ed out there anyway ;) My previous patch had two problems on alpha: - sys/alpha/linux/linux.h did not define LINUX_AF_INET6. - linux_connect() called linux_sa_get(). linux_sa_get() calls linux_to_bsd_domain(). But, linux_to_bsd_domain() was not compiled in on alpha. I believe that these problems were gone in my current patch. Maybe, you saw new one. :) Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [CFR] IPv6 support for Linux sym
Hi, On Sun, 19 Jan 2003 19:59:57 + David Malone [EMAIL PROTECTED] said: dwmalone I have a patch which is quite similar to this, but also reduces the dwmalone use of the stackgap in the Linux networking code and breaks out dwmalone things like socket, bind and listen into an implimentation and a dwmalone syscall wrapper (extending Ian's work in this area). I took these dwmalone patches far enough to get the linux version of telnet to speak IPv6. Your approach of having syscall wrapper reduces the overhead of copyout(), and seems good. I thought that doing copyout() is slightly lengthy. However, only connect() and bind() have an wrapper. We need more wrappers for converting `to' field of sendto() and `msg_name' field of sendmsg(). These are not simple than the wrapper for connect() and bind(). I have no idea how these should be wrapped at the moment. dwmalone 1) I hadn't figured out the best way to deal with syscalls dwmalone which copyout a sockaddr - I suspect we need a per-sysvec dwmalone sockaddr copyout function to do this cleanly, but I'm open dwmalone to suggestion. Maybe yes. dwmalone 2) The patches wouldn't compile on the alpha 'cos of some dwmalone ifdefs in the linux emulation code. I just hadn't got around dwmalone to resolving this. Oops, thank you for pointing this out. It seems that other than linux_connect() are ifdef'ed by __alpha__. Is it right? Is there any problem removing #ifdef __alpha__ and compiling the codes in on FreeBSD/Alpha? dwmalone Maybe we could see if we could combine these patches? My patch is dwmalone available at: dwmalone http://www.maths.tcd.ie/~dwmalone/linux-socket I think so, too. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [CFR] IPv6 support for Linux sym
Hi, Mon, 20 Jan 2003 18:18:41 +0900, Hajimu UMEMOTO [EMAIL PROTECTED] said: dwmalone Maybe we could see if we could combine these patches? My patch is dwmalone available at: dwmalone http://www.maths.tcd.ie/~dwmalone/linux-socket ume I think so, too. I've tried to merge your patch into my patch, then replaced the previous one. How about this? http://www.imasy.or.jp/~ume/FreeBSD/linux-ipv6.diff Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
[CFR] IPv6 support for Linux sym
Hi, I wrote an IPv6 support for Linux sym. I've tested it with RHL8's ftp(1) and ports/www/linux-phoenix, and it seems nicely running with both an IPv4 and an IPv6. You can obtain my patch from: http://www.imasy.or.jp/~ume/FreeBSD/linux-ipv6.diff Please review it. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [resolution] Re: sendmail (Re: 5.0-RC2 informal PR: 90 sec sendmail delay)
Hi, On Sat, 04 Jan 2003 12:47:29 -0800 Terry Lambert [EMAIL PROTECTED] said: tlambert2 The FreeBSD library bug is that the /etc/hosts file entry: tlambert2 ::1 tlambert2 is not canonized before being compared, for the reverse lookup. No, it does. I've tested it with following program: #include sys/types.h #include sys/socket.h #include netinet/in.h #include stdio.h #include netdb.h main() { struct sockaddr_in6 sin6; struct hostent *ht; int error; char hbuf[NI_MAXHOST]; ht = gethostbyaddr((char *)in6addr_loopback, sizeof(struct in6_addr), AF_INET6); if (!ht) errx(1, gethostbyaddr: lookup faild); printf(gethostbyaddr: %s\n, ht-h_name); ht = getipnodebyaddr((char *)in6addr_loopback, sizeof(struct in6_addr), AF_INET6, error); if (!ht) errx(1, getipnodebyaddr: lookup faild %d, error); printf(getipnodebyaddr: %s\n, ht-h_name); memset(sin6, 0, sizeof(sin6)); memcpy(sin6.sin6_addr, in6addr_loopback, sizeof(struct in6_addr)); sin6.sin6_family = AF_INET6; sin6.sin6_len = sizeof(sin6); if (getnameinfo((struct sockaddr *)sin6, sizeof(sin6), hbuf, sizeof(hbuf), NULL, 0, 0) != 0) errx(1, getnameinfo: lookup faild); printf(getnameinfo: %s\n, hbuf); } Then, it returned as expected: ume@mille:1082% ./revtest gethostbyaddr: localhost getipnodebyaddr: localhost getnameinfo: localhost where my /etc/host.conf is: hosts #bind and my /etc/hosts contains: ::1 localhost localhost.mahoroba.org 127.0.0.1 localhost localhost.mahoroba.org When I commented the ::1 line out in /etc/hosts, the test program returned: me@mille:1087% ./revtest revtest: gethostbyaddr: lookup faild So, I cannot understand what you say. tlambert2 It can probably be worked around by spcifying: tlambert2 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1 tlambert2 as the left hand side for the IPv6 loopback address, instead of ::1, tlambert2 in the /etc/hosts file. I don't recommend this, since it would not tlambert2 encourage the author of the IPv6 resovler code to fix the bug they tlambert2 introduced. You don't need to do it at all. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: problem with phoenix
Hi, On Mon, 18 Nov 2002 10:51:16 -0600 John Newman [EMAIL PROTECTED] said: jnn I'm running a recently (as in today) cvsup'd current box. Today I compiled jnn phoenix 0.4. Oddly enough it would say Connection refused to any URL. jnn Looking at truss/tcpdump I realized it was ALWAYS trying to connect to jnn an ipv6 address, for any site. I searched around google and found this jnn link: Please copy ports/www/mozilla-devel/files/patch-nsprpub::pr::src::pthreads::ptio.c into ports/www/phoenix/files, then recompile phoenix. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [CFR] ipfilter IPv6 support in rc
Hi, On Wed, 30 Oct 2002 16:50:20 +0100 Ronald van der Pol [EMAIL PROTECTED] said: Ronald.vanderPol On Tue, Oct 29, 2002 at 00:38:39 +0900, Hajimu UMEMOTO wrote: Please review it. If there is no objection, I'll commit it at next weekend. Ronald.vanderPol Reviewed -stable, looks OK. Would be nice to have this fix. Thanks. Thanks! I've just committed it. I'll do MFC it after 1 week. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
[CFR] ipfilter IPv6 support in rc
Hi, Current rc doesn't support IPv6 setup for ipfilter. So I made the patches. The former is for both 4-STABLE and 5-CURRENT. In addition to the former one, 5-CURRENT requires the latter one for /etc/rc.d/ipfilter. This patch is not for /etc/rc.network6 as usual IPv6 related setups but for /etc/rc.network. I tried to add IPv6 part of ipfilter setups within /etc/rc.network6. However, it was difficult to do so. For example, flushing rules by `ipf -Fa' affects both IPv4 and IPv6. So, I gave up it, and expanded /etc/rc.network. Please review it. If there is no objection, I'll commit it at next weekend. Sincerely, Index: etc/defaults/rc.conf === RCS file: /home/ncvs/src/etc/defaults/rc.conf,v retrieving revision 1.159 diff -u -r1.159 rc.conf --- etc/defaults/rc.conf 5 Sep 2002 20:14:40 - 1.159 +++ etc/defaults/rc.conf 28 Oct 2002 10:30:53 - @@ -311,6 +311,10 @@ ipv6_firewall_quiet=NO # Set to YES to suppress rule display ipv6_firewall_logging=NO # Set to YES to enable events logging ipv6_firewall_flags= # Flags passed to ip6fw when type is a file +ipv6_ipfilter_rules=/etc/ipf6.rules # rules definition file for ipfilter, + # see /usr/src/contrib/ipfilter/rules + # for examples +ipv6_ipfilter_flags= # additional flags for ipfilter ## ### System console options # Index: etc/rc.network === RCS file: /home/ncvs/src/etc/rc.network,v retrieving revision 1.137 diff -u -r1.137 rc.network --- etc/rc.network 20 Sep 2002 18:31:55 - 1.137 +++ etc/rc.network 28 Oct 2002 10:30:54 - @@ -101,10 +101,20 @@ esac case ${ipfilter_enable} in [Yy][Ee][Ss]) - if [ -r ${ipfilter_rules} ]; then + if [ -r ${ipfilter_rules} -o \ + -r ${ipv6_ipfilter_rules} ]; then echo -n ' ipfilter' -${ipfilter_program:-/sbin/ipf} -Fa -f \ -${ipfilter_rules} ${ipfilter_flags} +${ipfilter_program:-/sbin/ipf} -Fa +if [ -r ${ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} \ + -f ${ipfilter_rules} \ + ${ipfilter_flags} +fi +if [ -r ${ipv6_ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} -6 \ + -f ${ipv6_ipfilter_rules} \ + ${ipv6_ipfilter_flags} +fi else ipfilter_enable=NO echo -n ' NO IPF RULES' Index: etc/rc.d/ipfilter === RCS file: /home/ncvs/src/etc/rc.d/ipfilter,v retrieving revision 1.4 diff -u -r1.4 ipfilter --- etc/rc.d/ipfilter 12 Oct 2002 10:31:31 - 1.4 +++ etc/rc.d/ipfilter 28 Oct 2002 10:59:20 - @@ -16,7 +16,7 @@ case ${OSTYPE} in FreeBSD) - stop_precmd=test -f ${ipfilter_rules} + stop_precmd=test -f ${ipfilter_rules} -o -f ${ipv6_ipfilter_rules} ;; NetBSD) stop_precmd=test -f /etc/ipf.conf -o -f /etc/ipf6.conf @@ -49,7 +49,8 @@ fi # check for ipfilter rules - if [ ! -r ${ipfilter_rules} ]; then + if [ ! -r ${ipfilter_rules} ] [ ! -r ${ipv6_ipfilter_rules} ] + then warn 'IP-filter: NO IPF RULES' return 1 fi @@ -78,8 +79,15 @@ echo Enabling ipfilter. case ${OSTYPE} in FreeBSD) - ${ipfilter_program:-/sbin/ipf} -Fa -f \ - ${ipfilter_rules} ${ipfilter_flags} + ${ipfilter_program:-/sbin/ipf} -Fa + if [ -r ${ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} \ + -f ${ipfilter_rules} ${ipfilter_flags} + fi + if [ -r ${ipv6_ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} -6 \ + -f ${ipv6_ipfilter_rules} ${ipv6_ipfilter_flags} + fi ;; NetBSD) /sbin/ipf -E -Fa @@ -114,8 +122,15 @@ case ${OSTYPE} in FreeBSD) - ${ipfilter_program:-/sbin/ipf} -I -Fa -f \ - ${ipfilter_rules} ${ipfilter_flags} + ${ipfilter_program:-/sbin/ipf} -I -Fa + if [ -r ${ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} -I \ + -f ${ipfilter_rules} ${ipfilter_flags} + fi + if [ -r ${ipv6_ipfilter_rules} ]; then + ${ipfilter_program:-/sbin/ipf} -I -6 \ + -f ${ipv6_ipfilter_rules} ${ipv6_ipfilter_flags} + fi ;; NetBSD) /sbin/ipf -I -Fa -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/
HEADS UP: Re: cvs commit: src/sys/net pfkeyv2.h
Hi, I've just committed the following changes. This broke binary compatibility of IPsec related applications. When upgrading your kernel, you need to recompile libipsec, netstat(1) and setkey(8). If you are using racoon(8) or isakmpd(8), you need to reinstall it from ports, too. Sincerely, On Tue, 15 Oct 2002 13:59:56 -0700 (PDT) Hajimu UMEMOTO [EMAIL PROTECTED] said: ume ume 2002/10/15 13:59:56 PDT ume Modified files: ume sys/net pfkeyv2.h ume Log: ume Correct the definitions of SADB_* to be compatible with ume RFC2407/IANA assignment. This change breaks binary ume compatibility. So, you need to recompile IPsec related ume applications. ume Revision ChangesPath ume 1.8 +16 -16src/sys/net/pfkeyv2.h -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Missing groff_mwww.7.gz while installing world in new directory
Hi, On Sat, 12 Oct 2002 12:36:26 -0700 (PDT) Shizuka Kudo [EMAIL PROTECTED] said: shizukakudo_99 I just built a new world with latest source. If I make installworld with DESTDIR=/newdir, it fails shizukakudo_99 with groff_mwww.7.gz missing. I believe this was related to the recent upgrade of groff and shizukakudo_99 groff_mwww was changed to groff_www. Looking at src/gnu/usr.bin/groff/tmac/Makefile still finds a shizukakudo_99 MLINK reference to groff_mwww.7. shizukakudo_99 Did anybody have the same problem? Yes, I just met same problem here. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [PATCH] 'ata_dmasetup: transfer active on this device!' problem on resume
Hi, Thu, 05 Sep 2002 11:40:39 +0900 (JST), Mitsuru IWASAKI [EMAIL PROTECTED] said: iwasaki My patches will do those things during suspend time; iwasaki - wait for DMA transfer completion if it is on the way. iwasaki - cancel new requests (yes, it's possible even during suspend iwasakitime) for ATA disks and remain them in ATA queue. Oh, it's great. My problem was gone. Thanks! -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: sshd doesn't log hostname into utmp correctly
Hi, Thu, 01 Aug 2002 16:39:45 +0900 $B$N9o$K!V(Bume$B!W!"$9$J$o$A(B Hajimu UMEMOTO [EMAIL PROTECTED] $B;a[)$/(B ume Current sshd doesn't handle actual size of struct sockaddr correctly, ume and does copy it as long as just size of struct sockaddr. So, sshd ume deesn't log hostname into utmp correctly. ume Here is a proposed patch to fix this problem. Please review it. I discussed about this on [EMAIL PROTECTED] as use requested. Then, this problem is occur only under FreeBSD because of our hack. However, this is potential problem of OpenSSH-portable, and they agreed to fix this. But, there is no fixed version of OpenSSH-portable available, yet. This problem is serious and I received the claim from many people especially from Japan. This problem is occur only when connecting via IPv6, and there are many people who are using IPv6 in Japan. So, I wish to fix this problem in time for 4.7-RELEASE. I wish to commit this fix. Any objection or any idea? Sincerely, ume [2 sshd-loghost.diff text/x-patch; US-ASCII (7bit)] ume Index: crypto/openssh/monitor.c ume diff -u crypto/openssh/monitor.c.orig crypto/openssh/monitor.c ume --- crypto/openssh/monitor.c.orig Thu Jul 11 08:04:07 2002 ume +++ crypto/openssh/monitor.c Thu Aug 1 15:21:58 2002 ume @@ -1113,8 +1113,8 @@ ume * the address be 0.0.0.0. ume */ umememset(from, 0, sizeof(from)); ume + fromlen = sizeof(from); umeif (packet_connection_is_on_socket()) { ume - fromlen = sizeof(from); umeif (getpeername(packet_get_connection_in(), ume(struct sockaddr *) from, fromlen) 0) { umedebug("getpeername: %.100s", strerror(errno)); ume @@ -1124,7 +1124,7 @@ ume/* Record that there was a login on that tty from the remote host. */ record_login(s-pid, s-tty, pw-pw_name, pw-pw_uid, umeget_remote_name_or_ip(utmp_len, options.verify_reverse_mapping), ume - (struct sockaddr *)from); ume + (struct sockaddr *)from, fromlen); ume } ume static void ume Index: crypto/openssh/session.c ume diff -u crypto/openssh/session.c.orig crypto/openssh/session.c ume --- crypto/openssh/session.c.orig Sun Jul 28 00:43:29 2002 ume +++ crypto/openssh/session.c Thu Aug 1 15:22:21 2002 ume @@ -721,8 +721,8 @@ ume * the address be 0.0.0.0. ume */ umememset(from, 0, sizeof(from)); ume + fromlen = sizeof(from); umeif (packet_connection_is_on_socket()) { ume - fromlen = sizeof(from); umeif (getpeername(packet_get_connection_in(), ume(struct sockaddr *) from, fromlen) 0) { umedebug("getpeername: %.100s", strerror(errno)); ume @@ -735,7 +735,7 @@ umerecord_login(pid, s-tty, pw-pw_name, pw-pw_uid, umeget_remote_name_or_ip(utmp_len, umeoptions.verify_reverse_mapping), ume - (struct sockaddr *)from); ume + (struct sockaddr *)from, fromlen); ume #ifdef USE_PAM ume/* ume Index: crypto/openssh/sshlogin.c ume diff -u crypto/openssh/sshlogin.c.orig crypto/openssh/sshlogin.c ume --- crypto/openssh/sshlogin.c.orig Sat Jul 13 12:53:57 2002 ume +++ crypto/openssh/sshlogin.c Thu Aug 1 15:24:36 2002 ume @@ -66,12 +66,12 @@ ume */ ume void ume record_login(pid_t pid, const char *ttyname, const char *user, uid_t uid, ume -const char *host, struct sockaddr * addr) ume +const char *host, struct sockaddr * addr, socklen_t addrlen) ume { umestruct logininfo *li; umeli = login_alloc_entry(pid, user, host, ttyname); ume - login_set_addr(li, addr, sizeof(struct sockaddr)); ume + login_set_addr(li, addr, addrlen); umelogin_login(li); umelogin_free_entry(li); ume } ume Index: crypto/openssh/sshlogin.h ume diff -u crypto/openssh/sshlogin.h.orig crypto/openssh/sshlogin.h ume --- crypto/openssh/sshlogin.h.orig Sat Jul 13 12:53:57 2002 ume +++ crypto/openssh/sshlogin.h Thu Aug 1 15:26:40 2002 ume @@ -16,7 +16,7 @@ ume void ume record_login(pid_t, const char *, const char *, uid_t, ume -const char *, struct sockaddr *); ume +const char *, struct sockaddr *, socklen_t); ume void record_logout(pid_t, const char *, const char *); ume u_long get_last_login_time(uid_t, const char *, char *, u_int); -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: Call for testers: acpica-unix-20020815
Hi, Mon, 26 Aug 2002 02:37:36 +0900 (JST), Mitsuru IWASAKI [EMAIL PROTECTED] said: iwasaki If you have this problem w/ X running, and don't have w/o X, iwasaki please try attached patches. iwasaki Index: isa/syscons_isa.c iwasaki === iwasaki RCS file: /home/ncvs/src/sys/isa/syscons_isa.c,v iwasaki retrieving revision 1.17 iwasaki diff -u -r1.17 syscons_isa.c iwasaki --- isa/syscons_isa.c 30 Jun 2001 10:15:06 - 1.17 iwasaki +++ isa/syscons_isa.c 16 Feb 2002 13:11:50 - I need this patch to do suspend/resume my laptop (Victor InterLink XP). This patch is also required for FIVA. It may better to have kernel option or sysctl to enable/disable this function. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: location of setkey in /etc/rc.d/ipsec
Hi, On Thu, 1 Aug 2002 10:45:08 -0700 David O'Brien [EMAIL PROTECTED] said: obrien On Thu, Aug 01, 2002 at 01:40:55AM +0900, Hajimu UMEMOTO wrote: makonnen Thanks for spotting this. I think the following patch might be better. Thanks! I've just committed your version. obrien We probably should have decided if setkey should have been moved to obrien /sbin first. Is it reasonable to run setkey before /usr is mounted? Yes, I think it is reasonable. ipsec setup is done before mounting NFS. So, setkey cannot be executed on NFS mounted /usr. If there is no objection, I'll move setkey into /sbin. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: sshd doesn't log hostname into utmp correctly
Hi, On 01 Aug 2002 11:05:46 +0200 Dag-Erling Smorgrav [EMAIL PROTECTED] said: des Hajimu UMEMOTO [EMAIL PROTECTED] writes: Current sshd doesn't handle actual size of struct sockaddr correctly, and does copy it as long as just size of struct sockaddr. So, sshd deesn't log hostname into utmp correctly. Here is a proposed patch to fix this problem. Please review it. des Could you please submit it to [EMAIL PROTECTED]? Yes, I'll sent it. Can I commit it to FreeBSD repo.? -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: sshd doesn't log hostname into utmp correctly
Hi, On 01 Aug 2002 17:18:23 +0200 Dag-Erling Smorgrav [EMAIL PROTECTED] said: des Hajimu UMEMOTO [EMAIL PROTECTED] writes: des Could you please submit it to [EMAIL PROTECTED]? Yes, I'll sent it. Can I commit it to FreeBSD repo.? des No, please wait and see what the OpenSSH developers say. Okay, I just sent my previous patch (+ fix for utmpx part) to [EMAIL PROTECTED] Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: location of setkey in /etc/rc.d/ipsec
Hi, On Mon, 29 Jul 2002 00:33:02 -0700 Mike Makonnen [EMAIL PROTECTED] said: makonnen Thanks for spotting this. I think the following patch might be better. Thanks! I've just committed your version. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Removing INET6 does stop the crashes.
Hi, Tue, 30 Jul 2002 02:12:41 +0900, Hajimu UMEMOTO [EMAIL PROTECTED] said: wa1ter Yes, it stops the crashes. If I set v6only = 0 then the machine wa1ter works normally; if set to 1 then I get connection refused from wa1ter any server I try to connect to. Is that normal v6only behavior? ume It is expected behaivior. However, I realized that Mozilla still has ume the problem that IPv4-mapped IPv6 address is used to connect to IPv4 ume site. It should be fixed by Mozilla side. I heared that NetBSD ume pkgsrc has a workaround to this problem: ume http://cvsweb.no.netbsd.org/bsdweb.cgi/pkgsrc/www/mozilla/patches/patch-be?rev=1.8content-type=text/x-cvsweb-markup ume Our port should have it, too. This patch is for ports/www/mozilla, and enables IPv4-mapped IPv6 address per socket basis. Please try it. Sincerely, Index: nsprpub/pr/src/pthreads/ptio.c diff -u nsprpub/pr/src/pthreads/ptio.c.orig nsprpub/pr/src/pthreads/ptio.c --- nsprpub/pr/src/pthreads/ptio.c.orig Fri Apr 12 03:14:39 2002 +++ nsprpub/pr/src/pthreads/ptio.c Tue Jul 30 18:52:11 2002 @@ -3414,6 +3414,17 @@ if (osfd == -1) pt_MapError(_PR_MD_MAP_SOCKET_ERROR, errno); else { +#if (defined(_PR_INET6_PROBE) || defined(_PR_INET6)) \ + defined(__FreeBSD__) defined(IPV6_V6ONLY) + if (domain == PR_AF_INET6) { + int opt = 0; + if (setsockopt(osfd, IPPROTO_IPV6, IPV6_V6ONLY, + opt, sizeof(opt))) { +close(osfd); +return NULL; + } + } +#endif fd = pt_SetMethods(osfd, ftype, PR_FALSE, PR_FALSE); if (fd == NULL) close(osfd); } -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/
Re: Removing INET6 does stop the crashes.
Hi, On Mon, 29 Jul 2002 08:11:50 -0700 walt [EMAIL PROTECTED] said: After reading Scott Long's recent post I tried removing INET6 from my kernel config and the crashes due to mozilla are now definitely gone. Thank you for fixing it. I tried to fix as the same way as you did, then during committing my fix, I found that it was already fixed by you. :-) wa1ter Yes, it stops the crashes. If I set v6only = 0 then the machine wa1ter works normally; if set to 1 then I get connection refused from wa1ter any server I try to connect to. Is that normal v6only behavior? It is expected behaivior. However, I realized that Mozilla still has the problem that IPv4-mapped IPv6 address is used to connect to IPv4 site. It should be fixed by Mozilla side. I heared that NetBSD pkgsrc has a workaround to this problem: http://cvsweb.no.netbsd.org/bsdweb.cgi/pkgsrc/www/mozilla/patches/patch-be?rev=1.8content-type=text/x-cvsweb-markup Our port should have it, too. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
location of setkey in /etc/rc.d/ipsec
Hi, I found that setup of IPsec doesn't work correctly if you are using /etc/rc.d/. While NetBSD has setkey in /sbin, FreeBSD has it in /usr/sbin. However, the location is hardcoded in /etc/rc.d/ipsec. Here is a patch. It may be a time to consider to move setkey into /sbin as NetBSD did. Sincerely, --- etc/rc.d/ipsec.orig Fri Jun 14 17:30:58 2002 +++ etc/rc.d/ipsec Mon Jul 29 00:03:28 2002 @@ -45,7 +45,7 @@ ipsec_start() { echo Installing ipsec manual keys/policies. - /sbin/setkey -f $ipsec_file + setkey -f $ipsec_file } ipsec_stop() @@ -56,16 +56,16 @@ # it is very questionable to do this during shutdown session, since # it can hang any of remaining IPv4/v6 session. # - /sbin/setkey -F - /sbin/setkey -FP + setkey -F + setkey -FP } ipsec_reload() { echo Reloading ipsec manual keys/policies. - /sbin/setkey -F - /sbin/setkey -FP - /sbin/setkey -f $ipsec_file + setkey -F + setkey -FP + setkey -f $ipsec_file } load_rc_config $name -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
HEADS UP: an IPv4-mapped IPv6 address off by default
Hi, I've just committed to change an IPv4-mapped IPv6 address off by default. The existing applications may be affected this change. The applications which depend on an IPv4-mapped IPv6 address will become listen only an IPv6 socket. Apache2 is known having this problem. You may need to specify the Listen directive explicitly in your httpd.conf like as follows: Listen 0.0.0.0:80 Listen [::]:80 If you still want to use an IPv4-mapped IPv6 address, please specify ipv6_ipv4mapping=YES in your /etc/rc.conf. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: HEADS UP: an IPv4-mapped IPv6 address off by default
Hi, On Thu, 25 Jul 2002 12:50:49 -0400 Jeroen C.van Gelderen [EMAIL PROTECTED] said: jeroen May I ask what motivated this change? Yes. There is discussion that an IPv4-mapped IPv6 address has potential security weakness in developping application and/or operating servers. NetBSD's default is off, and OpenBSD doesn't support an IPv4-mapped IPv6 address. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: HEADS UP: prefix(8) and gifconfig(8) are obsoleted.
Hi, On Sat, 15 Jun 2002 16:30:01 -0700 Brooks Davis [EMAIL PROTECTED] said: brooks [1 text/plain; us-ascii (quoted-printable)] brooks On Sun, Jun 16, 2002 at 03:14:17AM +0900, Hajimu UMEMOTO wrote: I committed to don't install prefix(8) and gifconfig(8). ifconfig(8) has the facilities provided by these commands. Please use ifconfig(8). gifconfig - ifconfig tunnel/deletetunnel prefix- ifconfig eui64 I'll do cvs remove after a mean time. I have no plan to MFC this due to backward compatibility issue. brooks After RELENG_4 is unfrozen, it would probably be a good idea to modify brooks these utilities to warn of their obsolesence when run to try and get brooks people to switch now. Okay, I'll do it for gifconfig(8). Current prefix(8) does that by replacing it with a wrapper script since 11 months ago. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
HEADS UP: prefix(8) and gifconfig(8) are obsoleted.
Hi, I committed to don't install prefix(8) and gifconfig(8). ifconfig(8) has the facilities provided by these commands. Please use ifconfig(8). gifconfig - ifconfig tunnel/deletetunnel prefix- ifconfig eui64 I'll do cvs remove after a mean time. I have no plan to MFC this due to backward compatibility issue. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Perl scripts that need rewriting - Progress!
Hi, On Thu, 09 May 2002 20:33:22 +0100 Mark Murray [EMAIL PROTECTED] said: mark /usr/sbin/scriptdump This script is from KAME. It seems that NetBSD doesn't install it. Is someone actually using it? If okay, I'll change to don't install it. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Patch to fix the build of the smbfs.ko kernel module
Hi, On Sun, 17 Mar 2002 15:38:48 -0800 Maxime Henrion [EMAIL PROTECTED] said: mux Actually, this patch is wrong because it won't ever compile des_enc.S. mux Whatever I do, des_enc.c gets compiled and I can't figure out how to mux compile a .S file with bsd.kmod.mk. If someone with more make(1) clue mux than me could help out, that would be appreciated. Did you make sure to do make depend after changing your Makefile? I tried it and I could reproduce your problem with `make buildkernel NOCLEAN=YES NO_KERNELDEPEND=YES'. Then, I tried with `make buildkernel NOCLEAN=YES', and the problem was gone. Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Patch to fix the build of the smbfs.ko kernel module
Hi, On Sat, 16 Mar 2002 01:32:04 -0800 Maxime Henrion [EMAIL PROTECTED] said: mux Since the addition of optimized 3DES encryption for x86, the build of the mux smbfs kernel module has been broken (on all platforms). This is because mux new files are now needed (des_enc.S for x86, des_enc.c for other mux archs). The attached patch fixes this problem. Oops, I've forgot about smbfs.ko. It seems fine to me. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: cvs commit: src/usr.bin/ftp Makefile cmds.c cmdtab.c complet
Hi, On Fri, 14 Dec 2001 08:43:49 +0200 (SAT) John Hay [EMAIL PROTECTED] said: On 13-Dec-2001 Mike Heffner wrote: | mikeh 2001/12/13 15:46:45 PST jhay ... | Log: | Connect lukemftp to the build as the default ftp client. Lukemftp | supports most of the previous features of FreeBSD ftp, but has been | better maintained and includes new features. Short summary of differences: jhay ... Differences/Losses: *) FTP_PASSIVE_MODE vs. FTP_MODE *) -4/-6 for forcing IPV4/IPV6 jhay Any chance of getting -4/-6 or something like it, back? It is very useful jhay here in our environment that have a lot of dual-stack machines. I think it is still useful in the environment where IPv6 link is relatively slow than IPv4 link. How about this patch? Index: contrib/lukemftp/src/fetch.c === RCS file: /home/ncvs/src/contrib/lukemftp/src/fetch.c,v retrieving revision 1.1.1.1 diff -u -u -r1.1.1.1 fetch.c --- contrib/lukemftp/src/fetch.c19 Jul 2001 16:26:13 - 1.1.1.1 +++ contrib/lukemftp/src/fetch.c22 Dec 2001 14:47:28 - @@ -617,7 +617,7 @@ memset(hints, 0, sizeof(hints)); hints.ai_flags = 0; - hints.ai_family = AF_UNSPEC; + hints.ai_family = family; hints.ai_socktype = SOCK_STREAM; hints.ai_protocol = 0; error = getaddrinfo(host, NULL, hints, res0); Index: contrib/lukemftp/src/ftp.1 === RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp.1,v retrieving revision 1.1.1.1 diff -u -u -r1.1.1.1 ftp.1 --- contrib/lukemftp/src/ftp.1 19 Jul 2001 16:26:13 - 1.1.1.1 +++ contrib/lukemftp/src/ftp.1 22 Dec 2001 14:47:29 - @@ -77,7 +77,7 @@ Internet file transfer program .Sh SYNOPSIS .Nm -.Op Fl AadefginpRtvV +.Op Fl 46AadefginpRtvV .Bk -words .Op Fl o Ar output .Ek @@ -146,6 +146,14 @@ Options may be specified at the command line, or to the command interpreter. .Bl -tag -width port +.It Fl 4 +Forces +.Nm +to use IPv4 addresses only. +.It Fl 6 +Forces +.Nm +to use IPv6 addresses only. .It Fl A Force active mode ftp. By default, Index: contrib/lukemftp/src/ftp.c === RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp.c,v retrieving revision 1.1.1.1 diff -u -u -r1.1.1.1 ftp.c --- contrib/lukemftp/src/ftp.c 19 Jul 2001 16:26:14 - 1.1.1.1 +++ contrib/lukemftp/src/ftp.c 22 Dec 2001 14:47:31 - @@ -149,7 +149,7 @@ memset(hints, 0, sizeof(hints)); portnum = parseport(port, FTP_PORT); hints.ai_flags = AI_CANONNAME; - hints.ai_family = AF_UNSPEC; + hints.ai_family = family; hints.ai_socktype = SOCK_STREAM; hints.ai_protocol = 0; error = getaddrinfo(host, NULL, hints, res0); Index: contrib/lukemftp/src/ftp_var.h === RCS file: /home/ncvs/src/contrib/lukemftp/src/ftp_var.h,v retrieving revision 1.1.1.1 diff -u -u -r1.1.1.1 ftp_var.h --- contrib/lukemftp/src/ftp_var.h 19 Jul 2001 16:26:14 - 1.1.1.1 +++ contrib/lukemftp/src/ftp_var.h 22 Dec 2001 14:47:31 - @@ -279,6 +279,8 @@ GLOBAL charremotepwd[MAXPATHLEN]; /* remote dir */ GLOBAL char *username; /* name of user logged in as. (dynamic) */ +GLOBAL sa_family_t family; /* address family to use for connections */ + GLOBAL char*ftpport; /* port number to use for FTP connections */ GLOBAL char*httpport; /* port number to use for HTTP connections */ GLOBAL char*gateport; /* port number to use for gateftp connections */ Index: contrib/lukemftp/src/main.c === RCS file: /home/ncvs/src/contrib/lukemftp/src/main.c,v retrieving revision 1.1.1.1 diff -u -u -r1.1.1.1 main.c --- contrib/lukemftp/src/main.c 19 Jul 2001 16:26:14 - 1.1.1.1 +++ contrib/lukemftp/src/main.c 22 Dec 2001 14:47:32 - @@ -171,6 +171,7 @@ upload_path = NULL; isupload = 0; reply_callback = NULL; + family = AF_UNSPEC; /* * Get the default socket buffer sizes if we don't already have them. @@ -255,8 +256,16 @@ } } - while ((ch = getopt(argc, argv, Aadefgino:pP:r:RtT:u:vV)) != -1) { + while ((ch = getopt(argc, argv, 46Aadefgino:pP:r:RtT:u:vV)) != -1) { switch (ch) { + case '4': + family = AF_INET; + break; + + case '6': + family = AF_INET6; + break; + case 'A': activefallback = 0; passivemode = 0; -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume
Re: About stscasestr() prototyped with string.h of current lib
Hi, On Fri, 2 Nov 2001 12:01:19 +0300 Andrey A. Chernov [EMAIL PROTECTED] said: ache On Fri, Nov 02, 2001 at 17:36:04 +0900, NINOMIYA Hideyuki wrote: In implementation with current, even if you implemented it for the reason that Linux included, there is the problem that behavior is different from Linux in about prototyping reference. ache 1) Our strcasestr() implementation is not related to Linux that way. ache 2) Program must not prototype by itself system-wide functions and should ache relay on system headers instead. ache 3) Programs which not follows rule #2 must be fixed by removing ache prototypes in question from their headers. I think nin said that having strcasestr() in our standard header breaks existing program. That is, our header seems not confirm standard. Mew2 could be compiled even on Linux which has strcasestr(). Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: lpd: Host name for your address (fe80:....%xl0) unknown
On Tue, 2 Oct 2001 12:30:33 -0400 Garance A Drosihn [EMAIL PROTECTED] said: drosih On the print *client* machine, you start lpd with '-4', meaning that drosih it (the client) should only accept jobs from IPv4-style connections. drosih Note that this flag only effects what lpd will accept, this flag has drosih no effect on what lpr/lpq/lprm will do when they need to connect to drosih a remote queue. Yes, it's right. drosih The print queue for 'lp' on oink refers to a remote machine that drosih is named neutron. That hostname maps to an IPv6 address. Thus, drosih lpq/lpr/lprm have no choice on how to connect to that remote host. drosih They use the IPv6 address. (note, for instance, that your 'ping6' drosih knows about neutron via IPv6, not IPv4). So, the print client drosih connects to the print server via IPv6. When the print client drosih connects to the print server, the print server looks up the IPv6 drosih address of the *client*, because the client made an IPv6 connection drosih to the server. Again, this has nothing to do with 'lpd -4' on the drosih client. The print server apparently can not find a hostname to drosih match the IPv6 address of the client, so it returns the first error drosih message, listing the IPv6 address of the client. No, a client does query RR for IPv6 and A RR for IPv4. If RR is found, a client tries to connect using IPv6, 1st. However, lpd accepts only IPv4 connection, in this case. Then, if A RR is found, a client falls down and tries to connect using IPv4. So, a client never connects using IPv6 to an IPv4 only listening server. drosih Assuming that all of the above is correct, then I *think* everything drosih is working the way it is supposed to. However, I do not know the drosih finer points of how IPv6 is supposed to work. Can a single hostname drosih have both an IPv4 address and an IPv6 address? (as far as DNS is drosih concerned, I mean). This I do not know. In any case, the parameters drosih to 'lpd' are not going to effect how 'lpq' handles the printcap file. It is usual way that a dual stack host has both RR and A RR. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: lpd: Host name for your address (fe80:....%xl0) unknown
On Mon, 1 Oct 2001 15:29:43 +0200 Alexander Langer [EMAIL PROTECTED] said: alex Thus spake Dag-Erling Smorgrav ([EMAIL PROTECTED]): alex@oink ~ $ lpq lpd: Host name for your address (fe80::250:baff:fed4:a512%xl0) unknown The server is reporting that it can't figure out who you are, and therefore won't let you access the printer. See hosts.lpd(5). The client is merely repeating the error message it got from the server. alex It's still using IPv6 though I told it to do IPv4. Still, I cannot understand why it occures, and I cannot reproduce it, here. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: lpd: Host name for your address (fe80:....%xl0) unknown
On Mon, 1 Oct 2001 14:21:28 +0200 Alexander Langer [EMAIL PROTECTED] said: alex BTW, the lpd server (neutron) is a alex FreeBSD neutron.cichlids.com 4.3-STABLE FreeBSD 4.3-STABLE #0: Tue Jun 5 01:38:27 CEST 2001 [EMAIL PROTECTED]:/storage/obj/storage/src/sys/NEUTRON i386 alex I think the problem is on the server-side. (since the error messages alex contains a xl0 string, which is the server's NIC). Yes, lpd has this message, while lpq hasn't. I'm trying to reproduce it on my 4.4-RELEASE box. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: lpd: Host name for your address (fe80:....%xl0) unknown
Hi, On Sun, 30 Sep 2001 14:54:31 +0200 Alexander Langer [EMAIL PROTECTED] said: alex I don't think that I like this behaviour: alex alex@oink ~ $ ps ax | grep lpd alex 15328 ?? Ss 0:00.01 lpd -4 alex 15329 ?? S 0:00.02 lpd -4 alex alex@oink ~ $ lpq alex lpd: Host name for your address (fe80::250:baff:fed4:a512%xl0) unknown Sorry, but I cannot see this message, here. Could you please tell me how did you do? alex Odd. Is a link-local address supposed to have a host name anyways? No. The resolver doesn't do reverse lookup at all. So, I believe you cannot play with lpr by specifying link-local address. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: IPSEC/IPSEC_ESP module(s)
On Thu, 2 Aug 2001 02:57:55 -0700 Kris Kennaway [EMAIL PROTECTED] said: kris On Tue, Jul 31, 2001 at 04:55:53PM -0600, [EMAIL PROTECTED] wrote: Has anyone attempted to make a loadable module out of IPSEC yet? kris I doubt it would be possible: it has hooks all through the network kris code. Is there any chance to enable IPSEC in GENERIC? -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Use of M_WAITOK in if_addmulti().
Hi, Current if_addmulti() calls MALLOC() with M_WAITOK. However, if_addmulti() can be called from in[6]_addmulti() with splnet(). It may lead kernel panic. So, I wish to change to use M_NOWAIT. Any comment? Index: sys/net/if.c diff -u sys/net/if.c.orig sys/net/if.c --- sys/net/if.c.orig Wed Jul 4 20:28:47 2001 +++ sys/net/if.cSun Jul 15 23:47:15 2001 @@ -1412,8 +1412,8 @@ llsa = 0; } - MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK); - MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_WAITOK); + MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_NOWAIT); + MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_NOWAIT); bcopy(sa, dupsa, sa-sa_len); ifma-ifma_addr = dupsa; @@ -1441,9 +1441,9 @@ ifma-ifma_refcount++; } else { MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, - M_IFMADDR, M_WAITOK); + M_IFMADDR, M_NOWAIT); MALLOC(dupsa, struct sockaddr *, llsa-sa_len, - M_IFMADDR, M_WAITOK); + M_IFMADDR, M_NOWAIT); bcopy(llsa, dupsa, llsa-sa_len); ifma-ifma_addr = dupsa; ifma-ifma_ifp = ifp; -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: Use of M_WAITOK in if_addmulti().
ume Index: sys/net/if.c ume diff -u sys/net/if.c.orig sys/net/if.c ume --- sys/net/if.c.orig Mon Jul 16 01:39:34 2001 ume +++ sys/net/if.c Mon Jul 16 01:51:49 2001 Oops, it was wrong version. Index: sys/net/if.c diff -u sys/net/if.c.orig sys/net/if.c --- sys/net/if.c.orig Mon Jul 16 01:39:34 2001 +++ sys/net/if.cMon Jul 16 01:51:49 2001 @@ -1412,8 +1412,14 @@ llsa = 0; } - MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_WAITOK); - MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_WAITOK); + MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, M_IFMADDR, M_NOWAIT); + if (ifma == NULL) + return (ENOBUFS); + MALLOC(dupsa, struct sockaddr *, sa-sa_len, M_IFMADDR, M_NOWAIT); + if (dupsa == NULL) { + FREE(ifma, M_IFMADDR); + return (ENOBUFS); + } bcopy(sa, dupsa, sa-sa_len); ifma-ifma_addr = dupsa; @@ -1441,9 +1447,15 @@ ifma-ifma_refcount++; } else { MALLOC(ifma, struct ifmultiaddr *, sizeof *ifma, - M_IFMADDR, M_WAITOK); + M_IFMADDR, M_NOWAIT); + if (ifma == NULL) + return (ENOBUFS); MALLOC(dupsa, struct sockaddr *, llsa-sa_len, - M_IFMADDR, M_WAITOK); + M_IFMADDR, M_NOWAIT); + if (dupsa == NULL) { + FREE(ifma, M_IFMADDR); + return (ENOBUFS); + } bcopy(llsa, dupsa, llsa-sa_len); ifma-ifma_addr = dupsa; ifma-ifma_ifp = ifp; -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: syslogd and -a
On Mon, 2 Jul 2001 08:25:38 -0700 Crist J. Clark [EMAIL PROTECTED] said: cristjc That's exactly what happens in the syslogd(8) code. However, I think cristjc that should be, cristjc n = m cristjc . cristjc . cristjc . cristjc ((h m) == n) I think it should be: ((h m) == (n m)) cristjc That is, why allow the user to enter a network number that is not cristjc /really/ the network number? Either flag an error or do the cristjc calculation for the user. I think doing the calculation is the more cristjc sensible choice. Commiting it to CURRENT now. When I committed IPv6 support to syslogd, I didn't mask address to keep compatibility with IPv4. So, I'll commit to IPv6 side, later. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: syslogd and -a
On Mon, 2 Jul 2001 12:25:42 -0700 Kris Kennaway [EMAIL PROTECTED] said: kris This doesn't seem to work with IPv6. Isn't there a libc function kris which can be used to do this? Yup, there is no api for masking address ether libc nor standard. I'll commit the following patch for IPv6: Index: usr.sbin/syslogd/syslogd.c === RCS file: /home/ncvs/src/usr.sbin/syslogd/syslogd.c,v retrieving revision 1.79 diff -u -r1.79 syslogd.c --- usr.sbin/syslogd/syslogd.c 2001/07/02 15:26:47 1.79 +++ usr.sbin/syslogd/syslogd.c 2001/07/02 19:39:32 @@ -2033,7 +2033,7 @@ reject = 0; for (j = 0; j 16; j += 4) { if ((*(u_int32_t *)sin6-sin6_addr.s6_addr[i] *(u_int32_t *)m6p-sin6_addr.s6_addr[i]) - != *(u_int32_t *)a6p-sin6_addr.s6_addr[i]) { + != (*(u_int32_t +*)a6p-sin6_addr.s6_addr[i] *(u_int32_t *)m6p-sin6_addr.s6_addr[i])) { ++reject; break; } -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [patch] netinet6/ip6_fw.c: use syslog for logging
Fri, 22 Jun 2001 20:06:34 +0900, Jun Kuriyama [EMAIL PROTECTED] said: kuriyama I found logs from ipfw(8) and ip6fw(8) are stored to different place. kuriyama Former one is into security.info via syslog(3) but latter one is kuriyama into kern.crit via kernel printf(). kuriyama The reason of this difference is came from missing merge from kuriyama ip_fw.c. And I hope this patch will be first step to synchronize kuriyama ip_fw.c and ip6_fw.c. kuriyama So, I made a patch to merge the difference revision 1.117 and 1.118 of kuriyama ip_fw.c into ip6_fw.c to use syslog(3) interface for ip6fw(8) logging. It seems fine to me. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [patch] netinet6/ip6_fw.c: use syslog for logging
Fri, 22 Jun 2001 20:06:34 +0900, Jun Kuriyama [EMAIL PROTECTED] said: kuriyama I found logs from ipfw(8) and ip6fw(8) are stored to different place. kuriyama Former one is into security.info via syslog(3) but latter one is kuriyama into kern.crit via kernel printf(). kuriyama The reason of this difference is came from missing merge from kuriyama ip_fw.c. And I hope this patch will be first step to synchronize kuriyama ip_fw.c and ip6_fw.c. kuriyama So, I made a patch to merge the difference revision 1.117 and 1.118 of kuriyama ip_fw.c into ip6_fw.c to use syslog(3) interface for ip6fw(8) logging. kuriyama Please review this patch carefully because I'm not kernel hacker. Okay, I'll take a look this. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
HEAD UP: rtadvd_enable's default is changed to NO
Hi, Currently, rtadvd_enable's default is YES. It means that IPv6 router runs rtadvd(8) by default. This breaks the following description in RFC2461: AdvSendAdvertisements A flag indicating whether or not the router sends periodic Router Advertisements and responds to Router Solicitations. Default: FALSE Note that AdvSendAdvertisements MUST be FALSE by default so that a node will not accidentally start acting as a router unless it is explicitly configured by system management to send Router Advertisements. So, I'll change default value of rtadvd_enable to NO, soon. If you are running rtadvd(8) in your IPv6 router, please make sure to set rtadvd_enable to YES in your /etc/rc.conf. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: [CFR] latest KAME merge into FreeBSD
Hi, Mon, 18 Jun 2001 12:10:22 +0900, JINMEI Tatuya / [EMAIL PROTECTED] said: jinmei Thanks for the effort. Could you apply the following patch? The fix jinmei is not so serious for most users, but should be important for jinmei nomadic users who use IPv6 temporary addresses (for privacy extension). I just committed it. Thanks! -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: MBUF locking- this can't be right, can it?
On Wed, 13 Jun 2001 13:42:51 -0400 Bosko Milekic [EMAIL PROTECTED] said: bmilekic Yes, I certainly didn't write that. I think it was KAME. Yup, current KAME is based on 4.3-RELEASE which doesn't have mtx_lock() issue. It is my mistake during merging it into 5-CURRENT. The fix looks good to me. If there is no objection, I'll commit it. bmilekic On Wed, Jun 13, 2001 at 10:37:22AM -0700, Matthew Jacob wrote: A recent change to the MFREE macro was made as noted below: /* * MFREE(struct mbuf *m, struct mbuf *n) * Free a single mbuf and associated external storage. * Place the successor, if any, in n. * * we do need to check non-first mbuf for m_aux, since some of existing * code does not call M_PREPEND properly. * (example: call to bpf_mtap from drivers) */ #define MFREE(m, n) do {\ struct mbuf *_mm = (m); \ \ KASSERT(_mm-m_type != MT_FREE, (freeing free mbuf)); \ if (_mm-m_flags M_EXT) \ MEXTFREE(_mm); \ mtx_lock(mbuf_mtx);\ mbtypes[_mm-m_type]--; \ ++if ((_mm-m_flags M_PKTHDR) != 0 _mm-m_pkthdr.aux) { \ ++m_freem(_mm-m_pkthdr.aux); \ ++_mm-m_pkthdr.aux = NULL; \ ++} \ _mm-m_type = MT_FREE; \ mbtypes[MT_FREE]++; \ (n) = _mm-m_next; \ _mm-m_next = mmbfree.m_head; \ mmbfree.m_head = _mm; \ MBWAKEUP(m_mballoc_wid, mmbfree.m_starved);\ mtx_unlock(mbuf_mtx); \ } while (0) Unfortunately, m_freem also calls MFREE. Tsk. Now, it seems to me that even in cases where you *could* allow recursive locks, the right idea here would be to change it to: /* * MFREE(struct mbuf *m, struct mbuf *n) * Free a single mbuf and associated external storage. * Place the successor, if any, in n. * * we do need to check non-first mbuf for m_aux, since some of existing * code does not call M_PREPEND properly. * (example: call to bpf_mtap from drivers) */ #define MFREE(m, n) do {\ struct mbuf *_mm = (m); \ struct mbuf *_aux; \ \ KASSERT(_mm-m_type != MT_FREE, (freeing free mbuf)); \ if (_mm-m_flags M_EXT) \ MEXTFREE(_mm); \ mtx_lock(mbuf_mtx);\ mbtypes[_mm-m_type]--; \ if ((_mm-m_flags M_PKTHDR) != 0 _mm-m_pkthdr.aux) { \ _aux = _mm-m_pkthdr.aux; \ _mm-m_pkthdr.aux = NULL; \ } else {\ _aux = NULL;\ } \ _mm-m_type = MT_FREE; \ mbtypes[MT_FREE]++; \ (n) = _mm-m_next; \ _mm-m_next = mmbfree.m_head; \ mmbfree.m_head = _mm; \ MBWAKEUP(m_mballoc_wid, mmbfree.m_starved);\ mtx_unlock(mbuf_mtx); \ if (_aux) \ m_freem(_aux); \ } while (0) Comments? -matt To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message bmilekic -- bmilekic Bosko Milekic bmilekic [EMAIL PROTECTED] bmilekic To Unsubscribe: send mail to [EMAIL PROTECTED] bmilekic with unsubscribe freebsd-current in the body of the message To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: MBUF locking- this can't be right, can it?
On Wed, 13 Jun 2001 14:15:53 -0400 Bosko Milekic [EMAIL PROTECTED] said: Yup, current KAME is based on 4.3-RELEASE which doesn't have mtx_lock() issue. It is my mistake during merging it into 5-CURRENT. The fix looks good to me. If there is no objection, I'll commit it. bmilekic Nope, no objection here. :-) I just committed. Thanks!! -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
[CFR] latest KAME merge into FreeBSD
Hi, I just put the patch for merging latest KAME into FreeBSD: http://www.imasy.or.jp/~ume/ipv6/test/freebsd5-kame20010528-20010604.diff.gz This is based on KAME snap 20010528 and against 5-CURRENT of Jun 2. There are many many changes since last KAME merge (2701). Please review it. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: usr.sbin/pim6[sd]d will be removed soon.
hi, On Sat, 2 Jun 2001 12:22:03 -0500 David W. Chapman Jr. [EMAIL PROTECTED] said: dwcjr I wouldn't mind, but what exactly does pim do and do you need both pim6dd dwcjr and pim6sd? pim6[ds]d are an IPv6 mutlicast routing daemon. pim6dd is for dense mode and pim6sd is for sparse mode. Someone may need pim6dd and someone may need pim6sd according to their network configuration. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
usr.sbin/pim6[sd]d will be removed soon.
Hi, I heared from itojun that usr.sbin/pim6[sd]d has non-BSD license and does not allow fee-based redistribution. So, I will remove them from the tree soon. NetBSD was already done. Could someone please make them ports? ftp.kame.net:~ftp/pub/kame/misc has pim6[sd]-*.tar.gz. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with unsubscribe freebsd-current in the body of the message
Re: swap-backed md-based /tmp to replace mfs-based one
On Sun, 11 Mar 2001 13:17:58 -0800 (PST) David Wolfskill [EMAIL PROTECTED] said: david Accordingly, I created the following shell script to accomplish a david similar objective, based upon the above-mentioned example in the david mdconfig man page. At present, I have it sitting in david /usr/local/etc/rc.d, which isn't ideal, but I wanted to find out if david anyone had better approaches for doing this, suggestions for david improvement, or arguments that what I'm trying to do is misguided and david shouldn't be done: I wrote following script obtained from manpage: #!/bin/sh mdconfig -a -t swap -s 128M -u 10 disklabel -r -w md10 auto newfs /dev/md10c tunefs -n enable /dev/md10c mount /dev/md10c /tmp chmod 1777 /tmp Then, I put diskless_mount="/etc/rc.mount_tmp" into /etc/rc.conf. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
[CFR] number of processes forked since boot
Hi, I received the patch to add counter for fork() set from Paul. I've tested it on my -CURRENT and -STABLE boxes, and it seems fine for me. So, I post his patch for review. Thanks, Paul. fork.patch.gz Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/
number of processes forked since boot
Hi, I wish to obtain number of processes forked since boot from userland. So, I made a patch to intend to commit. Any comment? Index: lib/libc/gen/sysctl.3 diff -u lib/libc/gen/sysctl.3.orig lib/libc/gen/sysctl.3 --- lib/libc/gen/sysctl.3.orig Fri Jan 12 02:39:22 2001 +++ lib/libc/gen/sysctl.3 Tue Jan 16 02:13:19 2001 @@ -294,6 +294,7 @@ .It "KERN\_UPDATEINTERVAL integer no" .It "KERN\_VERSION string no" .It "KERN\_VNODE struct vnodeno" +.It "KERN\_NFORKS integer no" .El .Pp .Bl -tag -width 6n @@ -445,6 +446,8 @@ .Va struct vnode * followed by the vnode itself .Va struct vnode . +.It Li KERN_NFORKS +Number of processes forked. .El .Ss CTL_MACHDEP The set of variables defined is architecture dependent. Index: sbin/sysctl/sysctl.8 diff -u sbin/sysctl/sysctl.8.orig sbin/sysctl/sysctl.8 --- sbin/sysctl/sysctl.8.orig Fri Jan 12 02:42:23 2001 +++ sbin/sysctl/sysctl.8Tue Jan 16 02:13:19 2001 @@ -145,6 +145,7 @@ .It "kern.bootfile string yes .It "kern.corefile string yes .It "kern.logsigexit integer yes +.It "kern.nforks integer no .It "vm.loadavgstruct no .It "hw.machinestring no .It "hw.model string no Index: sys/kern/kern_fork.c diff -u sys/kern/kern_fork.c.orig sys/kern/kern_fork.c --- sys/kern/kern_fork.c.orig Fri Jan 12 02:46:53 2001 +++ sys/kern/kern_fork.cTue Jan 16 02:30:26 2001 @@ -146,6 +146,9 @@ intnprocs = 1; /* process 0 */ static int nextpid = 0; +static unsigned int nforks = 0; +SYSCTL_UINT(_kern, KERN_NFORKS, nforks, CTLFLAG_RD, nforks, 0, ""); + /* * Random component to nextpid generation. We mix in a random factor to make * it a little harder to predict. We sanity check the modulus value to avoid @@ -277,6 +280,8 @@ } newproc-p_vmspace = NULL; + + nforks++; /* * Find an unused process ID. We remember a range of unused IDs Index: sys/sys/sysctl.h diff -u sys/sys/sysctl.h.orig sys/sys/sysctl.h --- sys/sys/sysctl.h.orig Fri Jan 12 02:48:41 2001 +++ sys/sys/sysctl.hTue Jan 16 02:13:19 2001 @@ -328,7 +328,8 @@ #defineKERN_PS_STRINGS 32 /* int: address of PS_STRINGS */ #defineKERN_USRSTACK 33 /* int: address of USRSTACK */ #defineKERN_LOGSIGEXIT 34 /* int: do we log sigexit procs? */ -#define KERN_MAXID 35 /* number of valid kern ids */ +#define KERN_NFORKS35 /* uint: number of forked */ +#define KERN_MAXID 36 /* number of valid kern ids */ #define CTL_KERN_NAMES { \ { 0, 0 }, \ @@ -366,6 +367,7 @@ { "ps_strings", CTLTYPE_INT }, \ { "usrstack", CTLTYPE_INT }, \ { "logsigexit", CTLTYPE_INT }, \ + { "nforks", CTLTYPE_UINT }, \ } /* -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: number of processes forked since boot
Hi, On Mon, 15 Jan 2001 10:06:18 -0800 Alfred Perlstein [EMAIL PROTECTED] said: bright * Hajimu UMEMOTO [EMAIL PROTECTED] [010115 10:00] wrote: Hi, I wish to obtain number of processes forked since boot from userland. So, I made a patch to intend to commit. Any comment? bright Why not just use a dynamic sysctl for this? I think dynamic sysctl is useful for dynamic context. But, here is just static and it seems there is no advantage. Isn't it? -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: number of processes forked since boot
On Mon, 15 Jan 2001 19:46:32 +0100 (CET) Paul Herman [EMAIL PROTECTED] said: pherman On Tue, 16 Jan 2001, Hajimu UMEMOTO wrote: bright * Hajimu UMEMOTO [EMAIL PROTECTED] [010115 10:00] wrote: I wish to obtain number of processes forked since boot from userland. So, I made a patch to intend to commit. Any comment? pherman I like the idea, but this belongs in vmeter with context switches, pherman page faults, etc, doesn't it? This is how OpenBSD does it, anyway. I see. You mean accessing uvmexp.forks via sysctl. Does it solved by just moving nforks into vm_meter.c? -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: number of processes forked since boot
On Mon, 15 Jan 2001 21:07:08 +0100 (CET) Paul Herman [EMAIL PROTECTED] said: pherman Yes, that's my read from the source. What I also like about it is pherman that it counts [vr]forks to boot, plus vmpages affected by the fork. pherman After I first saw this in OBSD I was really motivated to do just what pherman you've done for FreeBSD, but never got around to it. I just moved nforks into vm_meter.c Here is a patch: Index: sys/kern/kern_fork.c diff -u sys/kern/kern_fork.c.orig sys/kern/kern_fork.c --- sys/kern/kern_fork.c.orig Fri Jan 12 02:46:53 2001 +++ sys/kern/kern_fork.cTue Jan 16 04:53:18 2001 @@ -145,6 +145,7 @@ intnprocs = 1; /* process 0 */ static int nextpid = 0; +extern unsigned int nforks; /* * Random component to nextpid generation. We mix in a random factor to make @@ -277,6 +278,8 @@ } newproc-p_vmspace = NULL; + + nforks++; /* * Find an unused process ID. We remember a range of unused IDs Index: sys/vm/vm_meter.c diff -u sys/vm/vm_meter.c.orig sys/vm/vm_meter.c --- sys/vm/vm_meter.c.orig Fri Jan 12 02:48:48 2001 +++ sys/vm/vm_meter.c Tue Jan 16 04:51:49 2001 @@ -126,6 +126,10 @@ SYSCTL_UINT(_vm, OID_AUTO, v_free_severe, CTLFLAG_RW, cnt.v_free_severe, 0, ""); +unsigned int nforks = 0; +SYSCTL_UINT(_vm, OID_AUTO, nforks, CTLFLAG_RD, nforks, 0, + "number of fork()s since boot"); + SYSCTL_STRUCT(_vm, VM_LOADAVG, loadavg, CTLFLAG_RD, averunnable, loadavg, "Machine loadaverage history"); pherman If you like, I'll see if I can't come up with something pherman similar. Shouldn't be too hard. I'll try that tonight. Please do it. pherman The hardest part would be finding a spot on the systat(1) display to pherman put it. :-) Exactly. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
[CFR] IPv6 support for lpd, syslogd and logger
Hi, I'd like to add IPv6 support for lpd, syslogd and logger. You can find the patches from: http://www.imasy.or.jp/~ume/ipv6/FreeBSD/logger-ipv6-20001201.diff http://www.imasy.or.jp/~ume/ipv6/FreeBSD/lpr-ipv6-20001206.diff http://www.imasy.or.jp/~ume/ipv6/FreeBSD/syslogd-ipv6-20001201.diff Please review. If there is no objection, I'll commit it at next weekend. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: if_fddisubr.c
On Sat, 4 Nov 100 02:09:36 -0600 (CST) Jim Bryant [EMAIL PROTECTED] said: jbryant #include sys/malloc.h jbryant needs to be added to the top of if_fddisubr.c jbryant -current pukes on the first instance of MALLOC() without it... Oops, my previous commit seems to broke it. I just commit the fix. This fix should be needed for -STABLE, too. Unless this, if_fddisubr.c is not compilable. Jordan, please approve this fix to -STABLE. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: new rc.network6 and rc.firewall6
On Sat, 21 Oct 2000 18:38:33 -0700 Jordan Hubbard [EMAIL PROTECTED] said: jkh Sounds good to me. My comments were, just to make it clear again, jkh just food for thought and not out-and-out objections. If even 47 more jkh files in /etc is what it takes to get IPv6 fully supported, then so be jkh it. :) There are many discussion aboud having NetBSD style rc.d. However, I think it takes for a period of time. Once, I wish to commit my changes to be in time for 4.2-RELEASE. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: make release breakage on today's -current
On Tue, 24 Oct 2000 07:55:42 -0400 "John W. De Boskey" [EMAIL PROTECTED] said: jwd The following patch brings the floppy size down enough to fix jwd the problem. One is a leftover from the config file syntax jwd change. Also, I don't know how useful INET6 is to a GENERIC jwd kernel on todays' networks (faith gif are already removed). Please don't remove INET6. IPv6 only install is usual thing at least around me. :-) Though the person who installs FreeBSD via IPv6 is relatively few so far, IPv6 enabled installer is important for IPv6 deployment. I heared recent NetBSD's installer has IPv6 capability, too. This is demand of these days. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
new rc.network6 and rc.firewall6
Hi, I wish to update rc.network6 and introduce rc.firewall6. - ipv6_prefix_* and ipv6_ifconfig_* work for end node - rtsol should be work to only one interface - new variable ipv6_defaultrouter is added - ipv6_firewall_enable, ipv6_firewall_type, ipv6_firewall_script, ipv6_firewall_logging are added to introduce rc.firewall6. I put it on: http://www.imasy.or.jp/~ume/ipv6/FreeBSD/rc.network6.diff http://www.imasy.or.jp/~ume/ipv6/FreeBSD/rc.firewall6 Please review it. -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
Re: (KAME-snap 3338) Re: Panic on current (12 Sept)
On Mon, 18 Sep 2000 10:00:53 +0200 (SAST) Reinier Bezuidenhout [EMAIL PROTECTED] said: rbezuide As far as I recall ... the first kernel was before any of the SMP rbezuide commits ... but in case it was not ... how do I go about rbezuide going back to a "coarse grain lock" kernel ... can I set rbezuide something in the config file or do I have to checkout old rbezuide sources ?? There is a tag just before SMPNG merge. You can do cvsup with: src-all tag=PRE_SMPNG -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED] http://www.imasy.org/~ume/ To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message