Re: NCR/FXP and coredumps

2000-03-22 Thread sthaug

> > 1) I managed to crash an intel N440BX mobo with an fxp card and the
> > onboard ncr drivers.  Lots of network traffic (ping floods) and disk IO
> > (rawio in parallel on two disks) took it down in something like two
> > hours. I know this is a known bug, I'm just offering core dumps and
> > testing services in fixing it if anyone wants to take a stab at it.
> 
> DG has looked at this extensively and the current feeling is that this is
> a hardware bug.  Using the sym driver instead of the ncr driver
> apparently helps somewhat, but the problem still happens.  The generally
> recommended option is to buy an Adaptec SCSI controller and use that
> instead of the on-board SCSI.  That works flawlessly.

I can confirm that the sym driver has cured all such problems for us.
Not a single crash after switching to the sym driver.

Steinar Haug, Nethelp consulting, [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Tiny GENERIC patch

2000-03-22 Thread Doug Barton

I was doing some kernel debugging tonight and decided that I needed a
backup plan. Since I already had built my test kernel I thought the
attached would be a good idea. It has the added benefit of moving the
existing kernel.GENERIC to kernel.GENERIC.old in the 'make install'
step. Wording in the comment could probably be better...

FWIW,

Doug
-- 
"So, the cows were part of a dream that dreamed itself into
existence? Is that possible?" asked the student incredulously.
The master simply replied, "Mu."

Index: GENERIC
===
RCS file: /usr/ncvs/src/sys/i386/conf/GENERIC,v
retrieving revision 1.249
diff -u -r1.249 GENERIC
--- GENERIC 2000/03/21 17:00:58 1.249
+++ GENERIC 2000/03/23 07:47:11
@@ -26,6 +26,7 @@
 maxusers   32
 
 #makeoptions   DEBUG=-g#Build kernel with gdb(1) debug symbols
+makeoptionsKERNEL=kernel.GENERIC   #Remove for building a custom kernel
 
 optionsMATH_EMULATE#Support for x87 emulation
 optionsINET#InterNETworking



Is this a bug?

2000-03-22 Thread Matthew Zahorik

While making a slew of diskless machines I've tracked down a kernel panic.

FreeBSD 4.0-RELEASE, kernel with BOOTP* enabled.

Each machine has a private and public network attached.  It netboots from
the private network.  Because of that, I didn't set a gw address in
bootptab.  The public network interface is brought up by the rc scripts.

After booting, since there was no gateway, the BOOTP code makes an
assumption and sets itself as the gateway and therefore starts proxy-arp.
The relevant bit of code in ./nfs/bootp_subr.c:

if (!gotgw) {
  /* Use proxyarp */
  gw.sin_addr.s_addr = myaddr.sin_addr.s_addr;
}

While the network table is in this state, if you ping anything outside of
the local network it causes a kernel panic (unaligned access fault) the
kernel in ip_input:310

ie.  From the console after boot, ping locally and it's fine.  Ping anything
off the local subnet and the kernel panics.  Definately don't start sendmail
with a non-local resolver.  Also don't telnet into the box, causing a
request to a non-local resolver.

This was on an Alpha box.  It may not reproduce on Intel, since it's more
tolerant of off-alignment memory access.

What I really need to know is, is this a bug or a is the proxy-arp gateway
assumption a desired behavior?  While the routing table is in this state,
you're an errant IP packet away from a panic (:

Since setting a gateway which was unreachable until the public interface
came up didn't seem like a great idea to me, my solution was to program out
the offending assumptions.  If gw isn't received in the bootp reply, no
default route is set.  Diffs against ./nfs/boop_subr.c are available if the
default behavior is wrong or considered obsolete.

- Matt

--
Matthew Zahorik  Director of Systems and Networking - BiznessOnline.com
[EMAIL PROTECTED]  President of AlbanyNet Inc. - a BiznessOnline subsidiary
[EMAIL PROTECTED]Voice: (518) 292-1001  Fax: (518) 626-0793



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: NCR/FXP and coredumps

2000-03-22 Thread Brooks Davis

On Wed, Mar 22, 2000 at 10:50:47PM -0500, David Miller wrote:
> Two item:
> 
> 1) I managed to crash an intel N440BX mobo with an fxp card and the
> onboard ncr drivers.  Lots of network traffic (ping floods) and disk IO
> (rawio in parallel on two disks) took it down in something like two
> hours. I know this is a known bug, I'm just offering core dumps and
> testing services in fixing it if anyone wants to take a stab at it.

DG has looked at this extensively and the current feeling is that this is
a hardware bug.  Using the sym driver instead of the ncr driver
apparently helps somewhat, but the problem still happens.  The generally
recommended option is to buy an Adaptec SCSI controller and use that
instead of the on-board SCSI.  That works flawlessly.

-- Brooks

-- 
Any statement of the form "X is the one, true Y" is FALSE.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: possible bug in kernel/if_ether.c

2000-03-22 Thread Matthew Dillon

:SMP 2 cpus
:IdlePTD 3100672
:initial pcb at 281960
:panicstr: page fault
:panic messages:
:---
:Fatal trap 12: page fault while in kernel mode
:mp_lock = 0002; cpuid = 0; lapic.id = 
:fault virtual address   = 0x8
:fault code  = supervisor read, page not present
:instruction pointer = 0x8:0xc01997c8
:stack pointer   = 0x10:0xff806fa4
:frame pointer   = 0x10:0xff806fac
:code segment= base 0x0, limit 0xf, type 0x1b
:= DPL 0, pres 1, def32 1, gran 1
:processor eflags= interrupt enabled, resume, IOPL = 0
:current process = Idle
:interrupt mask  =  <- SMP: XXX
:trap number = 12
:panic: page fault
:mp_lock = 0002; cpuid = 0; lapic.id = 
:boot() called on cpu#0
:
:syncing disks... 11 11 
:...
:#0  boot (howto=256) at ../../kern/kern_shutdown.c:304
:304 dumppcb.pcb_cr3 = rcr3();
:(kgdb) bt
:#0  boot (howto=256) at ../../kern/kern_shutdown.c:304
:#1  0xc01549fc in poweroff_wait (junk=0xc0259c2f, howto=0)
:at ../../kern/kern_shutdown.c:554
:#2  0xc022983b in trap_fatal (frame=0xff806f64, eva=8)
:at ../../i386/i386/trap.c:924
:#3  0xc02294d1 in trap_pfault (frame=0xff806f64, usermode=0, eva=8)
:at ../../i386/i386/trap.c:817
:#4  0xc02290a3 in trap (frame={tf_fs = 1107296280, tf_es = 16, 
:  tf_ds = -1056178160, tf_edi = -1, tf_esi = 0, tf_ebp = -8360020, 
:  tf_isp = -8360048, tf_ebx = 0, tf_edx = -1071016096, tf_ecx = 1, 
:  tf_eax = -1056143360, tf_trapno = 12, tf_err = 0, tf_eip = -1072064568, 
:  tf_cs = 8, tf_eflags = 66118, tf_esp = 0, tf_ss = 0})
:at ../../i386/i386/trap.c:423
:#5  0xc01997c8 in arpintr () at ../../netinet/if_ether.c:447
:
:
:--2oS5YaxWCcQjTEyO
:Content-Type: text/plain; charset=us-ascii
:Content-Description: kgdb crash1
:Content-Disposition: attachment; filename=snuffy2
:
:
:SMP 2 cpus

Very, very weird.  Can you disassemble the 'arpintr' function from your
kernel binary?

gdb -k /kernel  (or kernel.debug if you have it)
disassemble arpintr

:Fatal trap 12: page fault while in kernel mode
:mp_lock = 0102; cpuid = 1; lapic.id = 0100
:fault virtual address   = 0x8
:fault code  = supervisor read, page not present
:instruction pointer = 0x8:0xc01997c8
:stack pointer   = 0x10:0xff80dfa4

I can't pinpoint the fault point since my kernel is compiled up
differently, but I suspect it's at the line I've indicated below.

Unfortunately, it makes no sense whatsoever because %ebx would have to
be NULL and that case already checked.  I suspect the actual fault
address is somewhere else if you do the dissassembly it should help.

splx(s);
if (m == 0 || (m->m_flags & M_PKTHDR) == 0)
panic("arpintr");

if (m->m_len < sizeof(struct arphdr) &&
(m = m_pullup(m, sizeof(struct arphdr)) == NULL)) {
log(LOG_ERR, "arp: runt packet -- m_pullup failed.");
continue;


0xc01aa6b5 :testl  %ebx,%ebx
---Type  to continue, or q  to quit---
0xc01aa6b7 :je 0xc01aa6bf 
0xc01aa6b9 :testb  $0x2,0x12(%ebx)
0xc01aa6bd :jne0xc01aa6cc 
0xc01aa6bf :pushl  $0xc0281c0e
0xc01aa6c4 :call   0xc015f700 
0xc01aa6c9 :   leal   0x0(%esi),%esi
0xc01aa6cc :   cmpl   $0x7,0xc(%ebx)
0xc01aa6d0 :   jbe0xc01aa71c 
0xc01aa6d2 :   movl   0x8(%ebx),%ecx   <
0xc01aa6d5 :   testl  %ecx,%ecx
0xc01aa6d7 :   je 0xc01aa71c  
0xc01aa6d9 :   movzwl (%ecx),%eax

-Matt



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



possible bug in kernel/if_ether.c

2000-03-22 Thread Jim Mercer


i have a new system, dual pentium 550's, 512meg ram, dual adaptec 29160,
realtek ethernet.  (dmesg.boot enclosed)

it has been having intermittent reboots, with no syslog output.

i thought maybe we were having heat issues, or power issues, but maybe it
is a kernel bug.

i enabled dumpdev and now i have dumps.
(arg, and it just crashed while i was snarfing the attached info)

both crashes occur in the same place in the kernel.

i think maybe that indicates a potential kernel/driver bug.

please find attached:

dmesg.boot
gdb -k info - crash 0
gdb -k info - crash 1

last second info:
nuffy# ifconfig rl0
rl0: flags=8843 mtu 1500
inet 209.167.108.145 netmask 0xff80 broadcast 209.167.108.255
inet 209.167.108.146 netmask 0x broadcast 209.167.108.146
ether 00:00:21:ef:1d:a4 
media: autoselect (none) status: active
supported media: autoselect 100baseTX  100baseTX 10baseT/UTP 
 10baseT/UTP 100baseTX 

is it possible that the bug is being triggered because the driver has not
selected a media type?

i did notice that the ethernet performance sucked, but i wasn't sure if that
was because the machine i was ftp'ing to sucked, or because this interface
was not specifically set to a media.

i elected not to set the media, because the machine is remote from me, and 
didn't want to have it lose the connection.

i will physically visit the machine tomorrow.

-- 
[ Jim Mercer [EMAIL PROTECTED]  +1 416 506-0654 ]
[  Reptilian Research -- Longer Life through Colder Blood  ]
[  Don't be fooled by cheap Finnish imitations; BSD is the One True Code.  ]


...
SMP 2 cpus
IdlePTD 3100672
initial pcb at 281960
panicstr: page fault
panic messages:
---
Fatal trap 12: page fault while in kernel mode
mp_lock = 0002; cpuid = 0; lapic.id = 
fault virtual address   = 0x8
fault code  = supervisor read, page not present
instruction pointer = 0x8:0xc01997c8
stack pointer   = 0x10:0xff806fa4
frame pointer   = 0x10:0xff806fac
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = Idle
interrupt mask  =  <- SMP: XXX
trap number = 12
panic: page fault
mp_lock = 0002; cpuid = 0; lapic.id = 
boot() called on cpu#0

syncing disks... 11 11 
...
#0  boot (howto=256) at ../../kern/kern_shutdown.c:304
304 dumppcb.pcb_cr3 = rcr3();
(kgdb) bt
#0  boot (howto=256) at ../../kern/kern_shutdown.c:304
#1  0xc01549fc in poweroff_wait (junk=0xc0259c2f, howto=0)
at ../../kern/kern_shutdown.c:554
#2  0xc022983b in trap_fatal (frame=0xff806f64, eva=8)
at ../../i386/i386/trap.c:924
#3  0xc02294d1 in trap_pfault (frame=0xff806f64, usermode=0, eva=8)
at ../../i386/i386/trap.c:817
#4  0xc02290a3 in trap (frame={tf_fs = 1107296280, tf_es = 16, 
  tf_ds = -1056178160, tf_edi = -1, tf_esi = 0, tf_ebp = -8360020, 
  tf_isp = -8360048, tf_ebx = 0, tf_edx = -1071016096, tf_ecx = 1, 
  tf_eax = -1056143360, tf_trapno = 12, tf_err = 0, tf_eip = -1072064568, 
  tf_cs = 8, tf_eflags = 66118, tf_esp = 0, tf_ss = 0})
at ../../i386/i386/trap.c:423
#5  0xc01997c8 in arpintr () at ../../netinet/if_ether.c:447




SMP 2 cpus
IdlePTD 3100672
initial pcb at 281960
panicstr: page fault
panic messages:
---
Fatal trap 12: page fault while in kernel mode
mp_lock = 0102; cpuid = 1; lapic.id = 0100
fault virtual address   = 0x8
fault code  = supervisor read, page not present
instruction pointer = 0x8:0xc01997c8
stack pointer   = 0x10:0xff80dfa4
frame pointer   = 0x10:0xff80dfac
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = Idle
interrupt mask  =  <- SMP: XXX
trap number = 12
panic: page fault
mp_lock = 0102; cpuid = 1; lapic.id = 0100
boot() called on cpu#1

syncing disks... 48 47 21 



#0  boot (howto=256) at ../../kern/kern_shutdown.c:304
#1  0xc01549fc in poweroff_wait (junk=0xc0259c2f, howto=0)
at ../../kern/kern_shutdown.c:554
#2  0xc022983b in trap_fatal (frame=0xff80df64, eva=8)
at ../../i386/i386/trap.c:924
#3  0xc02294d1 in trap_pfault (frame=0xff80df64, usermode=0, eva=8)
at ../../i386/i386/trap.c:817
#4  0xc02290a3 in trap (frame={tf_fs = 1107296280, tf_es = 16, 
  tf_ds = -1056178160, tf_edi = -1, tf_esi = 1, tf_ebp = -8331348, 
  tf_isp = -8331376, tf_ebx = 0, tf_edx = -1071016096, tf_ecx = 16777217, 
  tf_eax = -1056133376, tf_trapno = 12, tf_err = 0, tf_eip = -1072064568, 
  tf_cs = 8, tf_eflags = 66118, tf_esp = 0, tf_ss = 1})
at ../../i386/i386/trap.c:423
#5  0xc01997c8 in arpintr () at ../../netinet/if_ether.c:447




Copyright (c) 1992-2000 The 

RE: Question about PCI vendor 0x127a

2000-03-22 Thread Allen Pulsifer

> Still funny that www.pcisig.com doesn't list 0x127a ...

It costs $2500 per year to be a member of the PCI-SIG.  If you stop
paying, they delete you from their vendor list.  A lot of companies
join just to get assigned a vendor id, then they stop paying after
the first year.  So if you want to know the vendor id of a
company that's no longer paying dues, you have to look at the
unofficial list maintained by Jim Boemler at
http://www.yourvote.com/pci/.

Allen


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



NCR/FXP and coredumps

2000-03-22 Thread David Miller

Two item:

1) I managed to crash an intel N440BX mobo with an fxp card and the
onboard ncr drivers.  Lots of network traffic (ping floods) and disk IO
(rawio in parallel on two disks) took it down in something like two
hours. I know this is a known bug, I'm just offering core dumps and
testing services in fixing it if anyone wants to take a stab at it.

2) I have a production 3.2R system running on the same kind of
hardware. I've done everything I did on the crashed system to try and pin
down the problem but the core dumps are useless:(

To review, I added 'makeoptions DEBUG="-g"' to the file, relinked the
kernel, cp kernel to kernel.debug and ran "strip -g kernel".  Booted on
the new kernel.  Added da0b to the rc.conf as the dumpdev, and added
savecore -N /sys/compile/STAGING-1/kernel.debug /var/crash to /etc/ec.

I get the coredumps fine:

Mar 19 04:24:45 staging-1 savecore: reboot after panic: m_copym
Mar 19 04:24:45 staging-1 savecore: writing core to /var/crash/vmcore.3
Mar 19 04:25:49 staging-1 savecore: writing kernel to /var/crash/kernel.3

But they don't seem to work:(

staging-1:STAGING-1# gdb -k
GNU gdb 4.18
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you
are
welcome to change it and/or distribute copies of it under certain
conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for
details.
This GDB was configured as "i386-unknown-freebsd".
(kgdb) symbol-file kernel.debug
Reading symbols from kernel.debug...done.
(kgdb) exec-file /var/crash/kernel.3
(kgdb) core-file /var/crash/vmcore.3
IdlePTD 2985984
kernel symbol `gd_curpcb' not found.
(kgdb) where
No stack.
(kgdb) 


Any ideas?  This is about the most important box I have, and it's crashing
once or twice per week.  The core dump I could examine for 1) was from a
3.4-stable system.


The dirty details:

FreeBSD 3.2R, as shipped on CD
kernel config file pretty standard - single CPU, most unnecessary drivers
commented out, available to anyone who wants to see it
Hardware:

TruSolutions 2U rack server with Intel N440BX mobo, onboard FXP and NCR,
second Intel Pro 10/100B, two ibm fast wide scsi drives.

Thanks,

--- David




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Question about PCI vendor 0x127a

2000-03-22 Thread Ulf Zimmermann

On Wed, Mar 22, 2000 at 10:15:43PM -0500, Allen Pulsifer wrote:
> >From http://www.yourvote.com/pci/
> 
> Rockwell Semiconductor Systems
>  714-221-4600
> Vendor ID: 0x127A
> Short Name: Rockwell Semi
> Contact: [EMAIL PROTECTED]
> Web Site: http://www.rockwell.com
> 
> 
>   Device ID:
>   0x1002
> Chip Number: RC56HCFPCI
> Description: Modem enumerator
> 
>   Device ID:
>   0x1025
> Description: PCI modem
> 
>   Device ID:
>   0x2005
> Chip Number: RS56/SP-PCI11P1
> Description: Single chip 56K V90 modem/spkrphone
> 
>   Device ID:
>   0x2014
> Description: PCI modem

Ahh, right, the modem, I forgot about it. Still funny that www.pcisig.com
doesn't list 0x127a in their list sorted by hex.

> 
> 
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED]]On Behalf Of Ulf Zimmermann
> > Sent: Wednesday, March 22, 2000 9:59 PM
> > To: [EMAIL PROTECTED]
> > Subject: Question about PCI vendor 0x127a 
> > 
> > 
> > I have this Sony Notebook Z505R, running 4.0-RC3 and works great. But I 
> > noticed there is still one unknown card:
> > 
> > pci0:  (vendor=0x127a, dev=0x2005) at 11.0 irq 9
> > 
> > Checking out www.pcisig.com, this vendor id is not listed. Anyone have
> > an idea what part of the notebook it could be ?
> > 
> > -- 
> > Regards, Ulf.
> > 
> > -
> > Ulf Zimmermann, 1525 Pacific Ave., Alameda, CA-94501, #: 510-769-2936
> > Alameda Networks, Inc. | http://www.Alameda.net  | Fax#: 510-521-5073
> > 
> > 
> > To Unsubscribe: send mail to [EMAIL PROTECTED]
> > with "unsubscribe freebsd-hackers" in the body of the message

-- 
Regards, Ulf.

-
Ulf Zimmermann, 1525 Pacific Ave., Alameda, CA-94501, #: 510-769-2936
Alameda Networks, Inc. | http://www.Alameda.net  | Fax#: 510-521-5073


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: Question about PCI vendor 0x127a

2000-03-22 Thread Allen Pulsifer

>From http://www.yourvote.com/pci/

Rockwell Semiconductor Systems
 714-221-4600
Vendor ID: 0x127A
Short Name: Rockwell Semi
Contact: [EMAIL PROTECTED]
Web Site: http://www.rockwell.com


  Device ID:
  0x1002
Chip Number: RC56HCFPCI
Description: Modem enumerator

  Device ID:
  0x1025
Description: PCI modem

  Device ID:
  0x2005
Chip Number: RS56/SP-PCI11P1
Description: Single chip 56K V90 modem/spkrphone

  Device ID:
  0x2014
Description: PCI modem


> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Ulf Zimmermann
> Sent: Wednesday, March 22, 2000 9:59 PM
> To: [EMAIL PROTECTED]
> Subject: Question about PCI vendor 0x127a 
> 
> 
> I have this Sony Notebook Z505R, running 4.0-RC3 and works great. But I 
> noticed there is still one unknown card:
> 
> pci0:  (vendor=0x127a, dev=0x2005) at 11.0 irq 9
> 
> Checking out www.pcisig.com, this vendor id is not listed. Anyone have
> an idea what part of the notebook it could be ?
> 
> -- 
> Regards, Ulf.
> 
> -
> Ulf Zimmermann, 1525 Pacific Ave., Alameda, CA-94501, #: 510-769-2936
> Alameda Networks, Inc. | http://www.Alameda.net  | Fax#: 510-521-5073
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-hackers" in the body of the message


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Question about PCI vendor 0x127a

2000-03-22 Thread Ulf Zimmermann

I have this Sony Notebook Z505R, running 4.0-RC3 and works great. But I 
noticed there is still one unknown card:

pci0:  (vendor=0x127a, dev=0x2005) at 11.0 irq 9

Checking out www.pcisig.com, this vendor id is not listed. Anyone have
an idea what part of the notebook it could be ?

-- 
Regards, Ulf.

-
Ulf Zimmermann, 1525 Pacific Ave., Alameda, CA-94501, #: 510-769-2936
Alameda Networks, Inc. | http://www.Alameda.net  | Fax#: 510-521-5073


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



nm output

2000-03-22 Thread Chuck Robey

I'm looking through a nm listing for a static (unstripped) binary, and I
keep seeing these things with the name ".Ltext0".

Anyone ever see these things, or have any idea what they are?


Chuck Robey| Interests include C & Java programming, FreeBSD,
[EMAIL PROTECTED]  | electronics, communications, and signal processing.

New Year's Resolution:  I will not sphroxify gullible people into looking up
fictitious words in the dictionary.




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 3,4

2000-03-22 Thread Kris Kennaway

On Wed, 22 Mar 2000, sdf dsg wrote:

> When are the 3.4 release comming, and i dont want some beta things?

3.4 has been out for 4 months now. Please don't post this kind of thing to
FreeBSD-hackers - it's not on-topic.

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe <[EMAIL PROTECTED]>



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How a normal user can crash any linux system (fwd)

2000-03-22 Thread Dan Hollis

On Wed, 22 Mar 2000, Jim Bryant wrote:
> well, there are other ways to make a system slow to a crawl
> #!/bin/csh
> /usr/games/primes 1 4294967295 >&/dev/null&
> [...]

/etc/security/limits.conf

get the idea? :)

-Dan



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How a normal user can crash any linux system (fwd)

2000-03-22 Thread Matthew Dillon

:In reply:
:> This is cross-posted to both linux-kernel and freebsd-hackers, please
:> set your replies properly.
:> 
:> > I found the following by accident playing with PVM. If you start the
:> > 'gexample' from the examples directory with dimension=1 and no of
:> > tasks=32 on one machine, it becomes almost immediately completely un-
:> > usable and begins with heavy swapping. Considering how much memory
:> > would be necessary for this computation before starting it would have
:> > avoided the trouble.
:
:well, there are other ways to make a system slow to a crawl
:
:a good preventative measure is to never give shell accounts unless
:everyone is accountable.
:
:#!/bin/csh
:/usr/games/primes 1 4294967295 >&/dev/null&
:/usr/games/primes 1 4294967295 >&/dev/null&
:/usr/games/primes 1 4294967295 >&/dev/null&
:...

Generally speaking if a user wants to crash a machine, he can crash
a machine.  We've probably 'fixed' a dozen crashability holes in the
last year but the count comes from a virtually unlimited supply.  Short
of being ridiculously draconian there will always be a way to twist
the resource limits you are given to take a machine down or DOS it into
unusability.  And resource limits do not cover every conceivable facet.

For example, just before the 4.0 release it was found that one can
easily run the kernel out of vm_map_entry resources by mmap()ing 
hundreds of thousands of tiny files.  We added a vm.max_proc_mmap
sysctl to control that.  And it still quite easy to bypass the datasize
resource limit through the use of MAP_ANON mmap's.

What resource limits are good at doing is preventing 'stupid user'
mistakes.  For example, at BEST we capped the CGI exec time at 10 cpu
seconds (else our web servers would build up hundreds of broken CGI
processes), but we set it as a soft limit so users who know what they
are doing can unlimit it.  I imposed a 40 process and 64 descriptor
limit as being reasonable, but that's still 2560 descriptors to a 
user trying to mess things up on purpose.  

Quotas are useful for preventing a user from accidently filling up
a disk partition.  For example, I had a 100MB quota on /tmp, but
quotas can be bypassed in a number of ways - for example, excessive
syslogging (log files are owned by root).

Resource limits are useful for protecting against a purposeful DOS 
attack insofar as it is generally the script kiddies who don't know
their asses from their fingers who are trying to crash the machines.
There is no way to protect against someone who knows what they are
doing.

So, in conclusion, resource limits are absolutely necessary in keeping
a multi-user machine running smoothly, but the necessity has virtually
nothing to do with preventing purposeful attacks.

-Matt




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 100Bit Fast Ethernet EISA card - anyone?

2000-03-22 Thread Brian Beattie

On Wed, 22 Mar 2000, Wilko Bulte wrote:

> On Tue, Mar 21, 2000 at 10:20:14PM -0500, Matthew N. Dodd wrote:
> > On Tue, 21 Mar 2000, Wilko Bulte wrote:
> > > An FDDI ISA card would not be much fun (performance wise)
> > 
> > But they exist, as do ISA 100baseTX cards.  :)
> 
> Duh.. Considering the premium price FDDI always had that is a surprise to
> me to be honest. Like a V8 in a VW Beetle ;-)
>

Maybe, but that has been done too! :)
 
> -- 
> Wilko Bulte   Arnhem, The Netherlands   
> http://www.tcja.nlThe FreeBSD Project: http://www.freebsd.org
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-hackers" in the body of the message
> 

Brian Beattie| This email was produced using professional quality,
[EMAIL PROTECTED]  | standards based software.  Users of Microsoft
[EMAIL PROTECTED]  | products or other substandard software should
www.aracnet.com/~beattie | contact the author about receiving a Free upgrade to
 | FreeBSD or Linux.   "FreeBSD: The power to serve"



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: 100Bit Fast Ethernet EISA card - anyone?

2000-03-22 Thread Wilko Bulte

On Tue, Mar 21, 2000 at 10:20:14PM -0500, Matthew N. Dodd wrote:
> On Tue, 21 Mar 2000, Wilko Bulte wrote:
> > An FDDI ISA card would not be much fun (performance wise)
> 
> But they exist, as do ISA 100baseTX cards.  :)

Duh.. Considering the premium price FDDI always had that is a surprise to
me to be honest. Like a V8 in a VW Beetle ;-)

-- 
Wilko Bulte Arnhem, The Netherlands   
http://www.tcja.nl  The FreeBSD Project: http://www.freebsd.org


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How a normal user can crash any linux system (fwd)

2000-03-22 Thread Alfred Perlstein

* Jim Bryant <[EMAIL PROTECTED]> [000322 14:19] wrote:
> In reply:
> > This is cross-posted to both linux-kernel and freebsd-hackers, please
> > set your replies properly.
> > 
> > > I found the following by accident playing with PVM. If you start the
> > > 'gexample' from the examples directory with dimension=1 and no of
> > > tasks=32 on one machine, it becomes almost immediately completely un-
> > > usable and begins with heavy swapping. Considering how much memory
> > > would be necessary for this computation before starting it would have
> > > avoided the trouble.
> 
> well, there are other ways to make a system slow to a crawl
> 
> a good preventative measure is to never give shell accounts unless
> everyone is accountable.

True.

> 
> #!/bin/csh
> /usr/games/primes 1 4294967295 >&/dev/null&



> /usr/games/primes 1 4294967295 >&/dev/null&
> # etc, ...
> #
> # [get the idea?]

why are you 'scripting' in csh? eww.

No i don't get the idea, login.conf in FreeBSD is able to limit a user
to a maximum amount of processes, I think even cputime limitations work
but I haven't tried them.

Yes, and one shouldn't give accounts out to irresponcible/thoughtless
people.  'rmuser' is your friend.

-- 
-Alfred Perlstein - [[EMAIL PROTECTED]|[EMAIL PROTECTED]]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How a normal user can crash any linux system (fwd)

2000-03-22 Thread Jim Bryant

In reply:
> This is cross-posted to both linux-kernel and freebsd-hackers, please
> set your replies properly.
> 
> > I found the following by accident playing with PVM. If you start the
> > 'gexample' from the examples directory with dimension=1 and no of
> > tasks=32 on one machine, it becomes almost immediately completely un-
> > usable and begins with heavy swapping. Considering how much memory
> > would be necessary for this computation before starting it would have
> > avoided the trouble.

well, there are other ways to make a system slow to a crawl

a good preventative measure is to never give shell accounts unless
everyone is accountable.

#!/bin/csh
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
/usr/games/primes 1 4294967295 >&/dev/null&
# etc, ...
#
# [get the idea?]

jim
-- 
All opinions expressed are mine, if you|  "I will not be pushed, stamped,
think otherwise, then go jump into turbid  |  briefed, debriefed, indexed, or
radioactive waters and yell WAHOO !!!  |  numbered!" - #1, "The Prisoner"
--
[EMAIL PROTECTED]   KC5VDJ - HF to 23cm  KC5VDJ@NW0I.#NEKS.KS.USA.NOAM
HF/VHF: IC-706MkII   VHF/UHF/SHF: IC-T81AKPC3+ & PK-232MBXGrid: EM28px
--
  ET has one helluva sense of humor, always anal-probing right-wing schizos!


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: if_fxp driver

2000-03-22 Thread Wes Peters

Dennis wrote:
> 
> At 12:51 PM 3/21/00 -0700, you wrote:
> >Dennis wrote:
> >>
> >> Shoot me for using an available resource.
> >
> >Shoot you for wasting a resource that could better spend their time
> >developing FreeBSD instead of answering questions for people to lazy
> >or stupid to look for themselves.
> 
> Its very sad what's happened to this team. If asking a yes/no question is a
> "waste of a resource" then there is no resource at all. Whatever, the linux
> driver works.

If you go back and read the list charter, something you seem to either
be unaware of or completely ignore, this list is for discussing
developing software on or for FreeBSD.  Not for clueless newbie
questions like "does FreeBSD work on my hardware?", that's what the
-questions list is for.

You seem to think the purpose of this list is for you to denigrate the
work of the people who make FreeBSD, broadcast your own lovely little
brand of FUD, and point out how much better Linux is for your
customers.  That's just fine, but this is NOT the appropriate channel
for your opinions.  If you want to present code that you think will
fix the problem, fine.  If you want to present diagnostics that think
will fix the problem, fine.  If you want user support questions, ask
in -questions.  If you want to opine that Linux is superior and
FreeBSD a waste of time, as you have done so often lately, go do it
somewhere else.  This is not the appropriate venue.


-- 
"Where am I, and what am I doing in this handbasket?"

Wes Peters Softweyr LLC
[EMAIL PROTECTED]   http://softweyr.com/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: splFoo() question

2000-03-22 Thread Greg Lehey

On Tuesday, 21 March 2000 at  7:46:57 +0100, Poul-Henning Kamp wrote:
> In message <[EMAIL PROTECTED]>, Wes Peters writes:
>> Poul-Henning Kamp wrote:
>>>
>>> In message <[EMAIL PROTECTED]>, Warner Losh writes:
>>>
 I'd like to be able to do some simple spl locking in a driver that I'm
 writing.  While I could go the splhigh() route, I'm concerned that
 spending lots of time at splhigh could cause problems, and some of my
 critical sections look to be very expensive.  They only need
 protection against the card itself, not against the entire system.  It
 just seems to be an overly large hammer.
>>>
>>> I miss this too.
>>
>> Semaphores?
>
> spl*() are semaphores.

spl*() are interrupt lockouts.  The difference is very evident in an
SMP environment.

Greg
--
Finger [EMAIL PROTECTED] for PGP public key
See complete headers for address and phone numbers


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Odd TCP problem

2000-03-22 Thread Dan Moschuk


Greetings,

I've encounted somewhat of an odd problem that seemed to appear out of 
nowhere after my last -current upgrade a week or two ago.  I rebuild last
night and the problem is still around.

Basically, near the end of the TCP transaction, consistant retransmission
leads to the connection timing out.

In the first example, my -current laptop is talking to a postgres database
server running solaris7 on an ultra sparc.  The program runs, and in the
exact same spot each time (updating the last record) it stops.  Here's a
tcpdump:

14:20:01.894645 spirit.1100 > eclipse.5432: P 1176338:1176373(35) ack 136575 win 17520 
(DF)
14:20:01.897467 eclipse.5432 > spirit.1100: P 136575:136624(49) ack 1176373 win 8760 
(DF)
14:20:01.897951 spirit.1100 > eclipse.5432: P 1176373:1176756(383) ack 136624 win 
17520 (DF)
14:20:01.908113 eclipse.5432 > spirit.1100: P 136624:136649(25) ack 1176756 win 8760 
(DF)
14:20:01.910717 spirit.1100 > eclipse.5432: . 1176756:1178216(1460) ack 136649 win 
17520 (DF)
14:20:01.911188 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:20:01.978311 eclipse.5432 > spirit.1100: . ack 1178216 win 8760 (DF)
14:20:02.977968 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:20:04.977986 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:20:08.978058 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:20:16.978187 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:20:32.978432 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)
14:21:04.978917 spirit.1100 > eclipse.5432: P 1178216:1178807(591) ack 136649 win 
17520 (DF)

This continues until spirit gives up and resets the connection.

As you can see, its like eclipse vanished.  Now, running a tcpdump on eclipse
shows that these packets are in fact reaching the machine, its just not
responding to them.

It's not a problem with postgres itself, as the same problem can also be
observed sending mail.  Everything goes fine until after the DATA stage,
where we become stuck in the above retransmission loop.

Ideas?

-- 
Dan Moschuk ([EMAIL PROTECTED])
"Waste not fresh tears on old griefs."


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: md_image compression?

2000-03-22 Thread Mike Smith


If you're using the loader, don't bother.  It'll do this for you as it 
loads the image.  See eg. how the install floppies work.

> I'm sort of thinking in my head about adding the ability for the
> md driver to handle gziped images. md's drvinit() looks like
> the perfect place to do this. if strcmp(type,"md_image_gzip") then
> gunzip the image and so on.
> 
> Obviously this trades RAM for disk space. The target implementation
> is the i-opener -> X terminal transmogrification. I think I can cram
> the whole thing into the 16M flash card, and with compression of that
> image, I can cram a lot more. To implement it, I have some questions:
> 
> 1. Is there a way to de-allocate or otherwise reuse the original
> compressed image after the unzip is finished?
> 
> 2. What is the best strategy for allocating the output image?
> malloc(9)?
> 
> 3. This would effectively add libz to the kernel. Does anyone
> object, given the proviso that this whole mess would hide inside
> of an option (MD_PRELOAD_GZIP springs to mind)? Perhaps instead
> the md unzipper could be loaded as a module. The module could
> be thrown away using the same mechanism as #1 once the
> decompression is finished.
> 
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-hackers" in the body of the message
> 

-- 
\\ Give a man a fish, and you feed him for a day. \\  Mike Smith
\\ Tell him he should learn how to fish himself,  \\  [EMAIL PROTECTED]
\\ and he'll hate you for a lifetime. \\  [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: openssh + krb5 (followup)

2000-03-22 Thread Kris Kennaway

On Wed, 22 Mar 2000, Sheldon Hearn wrote:

> > Interoperability with MIT krb5 still seems to be an issue.
> 
> Bleh, more FUD.  The problem is in operability with non-FreeBSD openssh!
> We use supported_authentication values for KRB5 that neither Datafellows
> SSH nor OpenBSD SSH use. :-(

Hmm..I thought OpenBSD's OpenSSH didn't support krb5, only
krb4. Regardless, we should fix this to bring ourselves in line
(preferably with both).

Kris


In God we Trust -- all others must submit an X.509 certificate.
-- Charles Forsythe <[EMAIL PROTECTED]>



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Loopback device and 127.0.0.1address

2000-03-22 Thread Doug Barton

Never cross-post to both -questions and -hackers, thanks.

On Wed, 22 Mar 2000, Daniel Hilevich wrote:

> Hi,
> Does anyone have an idea why after creating 128 loopack devices and
> configuring lo127 to 127.0.0.1 (instead of the default lo0) I am
> experiencing many problems in interprocess communication using sockets?
> Are lo0 and 127.0.0.1 (INADDR_LOOPBACK) tightly coupled?

Errr... Haven't you just answered your own question? While we all
wish it were otherwise I think you've already shown that there are places
in the code that depend on lo0 == 127.0.0.1.

Good luck,

Doug
-- 
"While the future's there for anyone to change, still you know it seems, 
 it would be easier sometimes to change the past"

 - Jackson Browne, "Fountain of Sorrow"



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: How a normal user can crash any linux system (fwd)

2000-03-22 Thread Alfred Perlstein

This is cross-posted to both linux-kernel and freebsd-hackers, please
set your replies properly.

> -- Forwarded message --
> Date: Wed, 22 Mar 2000 16:02:40 +0100
> From: Michael Lampe <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: How a normal user can crash any linux system
> 
> I found the following by accident playing with PVM. If you start the
> 'gexample' from the examples directory with dimension=1 and no of
> tasks=32 on one machine, it becomes almost immediately completely un-
> usable and begins with heavy swapping. Considering how much memory
> would be necessary for this computation before starting it would have
> avoided the trouble.
> 
> So the processes go on allocating memory until physical memory and swap
> is exhausted. At this point processes are killed and now things are
> really
> becoming interesting: One would expect that the misbehaving gexample
> processes are killed or maybe other processes started by the same user.
> 
> Actually random processes are killed: I've seen klogd, syslogd, cron,
> gpm
> and inetd disappear. In some cases the machine was unaccessible locally
> as
> well as remotely, but the kernel seemed to be still running -- ping
> showed
> the machine still up.
> 
> Apart from the specific system processes that are killed, the problem
> can be
> reproduced under many different configurations. I have tried SuSE 6.0
> with
> kernel 2.2.12, SuSE 6.2 with kernel 2.2.14, LinuxPPC R4/R5 (Red Hat 5.x
> based)
> with some recent 2.2.x kernels and finally the SuSE pre-release for PPC.
> PVM
> was 3.4.x.
> 
> Any comments 
> 

* Ronald G. Minnich <[EMAIL PROTECTED]> [000322 09:57] wrote:
> anybody want to try this on -current?

No, a normal user shouldn't be able to crash any unix box with proper
limits in place, this local DoS only works if there are no limitations.

Please people, this is a 20 year old trick that I'm really tired of
hearing come up every other month.

It's called a forkbomb with a twist, it's old, boring and doesn't
affect people with properly configured systems.

Please consult your Operating System's documentation on how to setup
limits. 

If you want to know why random processes are sometimes killed then
you need to buy and read an OS book.

thanks,
-- 
-Alfred Perlstein - [[EMAIL PROTECTED]|[EMAIL PROTECTED]]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ISO

2000-03-22 Thread Aleksandr A.Babaylov

p_a_r writes:
> Where can i download the 3-4-stable as an iso image??
ftp://ftp.freebsd.org/pub/FreeBSD/releases/i386/ISO-IMAGES/3.4-install.iso

-- 
@BABOLO  http://links.ru/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



How a normal user can crash any linux system (fwd)

2000-03-22 Thread Ronald G. Minnich

anybody want to try this on -current?

ron

-- Forwarded message --
Date: Wed, 22 Mar 2000 16:02:40 +0100
From: Michael Lampe <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: How a normal user can crash any linux system

I found the following by accident playing with PVM. If you start the
'gexample' from the examples directory with dimension=1 and no of
tasks=32 on one machine, it becomes almost immediately completely un-
usable and begins with heavy swapping. Considering how much memory
would be necessary for this computation before starting it would have
avoided the trouble.

So the processes go on allocating memory until physical memory and swap
is exhausted. At this point processes are killed and now things are
really
becoming interesting: One would expect that the misbehaving gexample
processes are killed or maybe other processes started by the same user.

Actually random processes are killed: I've seen klogd, syslogd, cron,
gpm
and inetd disappear. In some cases the machine was unaccessible locally
as
well as remotely, but the kernel seemed to be still running -- ping
showed
the machine still up.

Apart from the specific system processes that are killed, the problem
can be
reproduced under many different configurations. I have tried SuSE 6.0
with
kernel 2.2.12, SuSE 6.2 with kernel 2.2.14, LinuxPPC R4/R5 (Red Hat 5.x
based)
with some recent 2.2.x kernels and finally the SuSE pre-release for PPC.
PVM
was 3.4.x.

Any comments 

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: if_fxp driver

2000-03-22 Thread Dennis

At 12:51 PM 3/21/00 -0700, you wrote:
>Dennis wrote:
>> 
>> At 08:45 PM 3/20/00 -0800, David Greenman wrote:
>> >>I hope your happy, but do you know the answer to my question? Has the
>> >>driver been updated recently?
>> >
>> >   Not to fix the problem that you are reporting. The solution might be as
>> >simple as adding another PHY identifier to the list of supported ones.
I need
>> >to find some time to sit down with one of the not-working cards and fiddle
>> >with it. I was going to do that this past weekend, but then got sick
with a
>> >virus. It's on my list.
>> 
>> Ok. Thanks. Mr. Peters thinks that I should spend a half day searching for,
>> installing and testing the "latest driver" (of course latest depends on
>> where you happen to download it from), when it seems to me that asking the
>> developers if a particuar issue has been corrected is a more reasonable
>> approach.
>> 
>> Shoot me for using an available resource.
>
>Shoot you for wasting a resource that could better spend their time
>developing FreeBSD instead of answering questions for people to lazy
>or stupid to look for themselves.

Its very sad what's happened to this team. If asking a yes/no question is a
"waste of a resource" then there is no resource at all. Whatever, the linux
driver works.

db


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: IP

2000-03-22 Thread Marc Nicholas

Use the "alias" descriptor in ifconfig. You may wish to attach alias
addresses to a loopback interface rather than a physical interface, too.


-marc

On Wed, 22 Mar 2000, Kasper Kristiansson wrote:

> I wonder how i can add more than one ip number on the same network card.
> 
> ./Kasper
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-hackers" in the body of the message
> 



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



IP

2000-03-22 Thread Kasper Kristiansson

I wonder how i can add more than one ip number on the same network card.

./Kasper


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



3,4

2000-03-22 Thread sdf dsg

When are the 3.4 release comming, and i dont want some beta things?


Mike Hammer
Helsingborg, Bårslöv
__
Get Your Private, Free Email at http://www.hotmail.com



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: STABLE

2000-03-22 Thread Lloyd Rennie

On Wed, 22 Mar 2000, p_a_r wrote:

> Hello were can i dównload freebsd3.4-stable as an iso image ??

This should be on FreeBSD-questions.

ftp://ftp.freebsd.org/.0/FreeBSD/releases/i386/ISO-IMAGES/3.4-install.iso

Or one of the MANY mirrors, as specified on www.freebsd.org

--
Lloyd Rennie   VBCnet GB Ltd [EMAIL PROTECTED]
tel +44 (0) 117 929 1316http://www.vbc.netfax +44 (0) 117 927 2015





To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



ISO

2000-03-22 Thread p_a_r

Where can i download the 3-4-stable as an iso image??

+--+
| The coolest site for free home pages, email, chat, e-cards, movie info.. |
|   http://www.goplay.com - it's time to Go Play!  |
+--+


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



RE: STABLE

2000-03-22 Thread Markus Döhr

> Hello were can i dównload freebsd3.4-stable as an iso image ??

do a "freebsd*.iso" search on

http://ftpsearch.lycos.com


-- 
Markus DoehrTel: +49 6503 917 152
IT AdminFax: +49 6503 917 190
SAP R/3 Basis e-Mail: [EMAIL PROTECTED]
AUBI Baubeschläge GmbH  http://www.aubi.de


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



STABLE

2000-03-22 Thread p_a_r

Hello were can i dównload freebsd3.4-stable as an iso image ??

+--+
| The coolest site for free home pages, email, chat, e-cards, movie info.. |
|   http://www.goplay.com - it's time to Go Play!  |
+--+


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: openssh + krb5 (followup)

2000-03-22 Thread Sheldon Hearn



On Wed, 22 Mar 2000 16:11:21 +0200, Sheldon Hearn wrote:

> Interoperability with MIT krb5 still seems to be an issue.

Bleh, more FUD.  The problem is in operability with non-FreeBSD openssh!
We use supported_authentication values for KRB5 that neither Datafellows
SSH nor OpenBSD SSH use. :-(

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Loopback device and 127.0.0.1address

2000-03-22 Thread Daniel Hilevich

Hi,
Does anyone have an idea why after creating 128 loopack devices and
configuring lo127 to 127.0.0.1 (instead of the default lo0) I am
experiencing many problems in interprocess communication using sockets?
Are lo0 and 127.0.0.1 (INADDR_LOOPBACK) tightly coupled?

Thanks,
---
Daniel Hilevich mailto:[EMAIL PROTECTED]
Tel: +972-4-9592203  ext. 214
Charlotte's Web Networks LTD.
http://www.cwnt.com




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: openssh + krb5 (followup)

2000-03-22 Thread Sheldon Hearn



On Sat, 18 Mar 2000 13:01:09 +0200, Sheldon Hearn wrote:

> $ ssh -v -l root axl.ops
> [...]
> debug: Trying Kerberos V5 authentication.
> ssh in free(): warning: chunk is already free.
> [...]

This was caused by a stale krb5.keytab on my box.  It would have been
nice if a more useful error message had been created, but the point is
that kerberized ssh works.

Interoperability with MIT krb5 still seems to be an issue.

Ciao,
Sheldon.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message