Re: bin/179451: new installer: Install fails on raid

2013-06-28 Thread remko
Old Synopsis: Install fails on raid
New Synopsis: new installer: Install fails on raid

Responsible-Changed-From-To: freebsd-i386-freebsd-bugs
Responsible-Changed-By: remko
Responsible-Changed-When: Fri Jun 28 06:39:53 UTC 2013
Responsible-Changed-Why: 
This is not something i386 specific, assign to the bugs pool.

http://www.freebsd.org/cgi/query-pr.cgi?pr=179451
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/179901: [netinet] [patch] Multicast SO_REUSEADDR handled incorrectly

2013-06-28 Thread Bernd Walter
On Mon, Jun 24, 2013 at 03:59:24AM +, lini...@freebsd.org wrote:
 Old Synopsis: [patch] Multicast SO_REUSEADDR handled incorrectly
 New Synopsis: [netinet] [patch] Multicast SO_REUSEADDR handled incorrectly
 
 Responsible-Changed-From-To: freebsd-bugs-freebsd-net
 Responsible-Changed-By: linimon
 Responsible-Changed-When: Mon Jun 24 03:59:05 UTC 2013
 Responsible-Changed-Why: 
 Over to maintainer(s).
 
 http://www.freebsd.org/cgi/query-pr.cgi?pr=179901
 ___
 freebsd-...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/freebsd-net
 To unsubscribe, send any mail to freebsd-net-unsubscr...@freebsd.org

I don't know if this is related or a different bug, but the same
mentioned commits are suspicious for us.
We had been running with our own IPv6 software into the same REUSEADDR
problem and changed to REUSEPORT as this is how it is done in mcastread
from mcast-tools port.
Don't know where we originally got the REUSEADDR from, probably a Stevens
book.
So far binding works with this change in our software.
However we only receive packets from network and not packets from
the host itself.
We use multicast to notify multiple processes on multiple machines,
including the machine itself.
To reproduce:
 - use two hosts
 - start mcastread on each of them on an interface with shared LAN
 - send via mcastsend on one host
 - packets are received on the other host, but not with the mcastread
   on the same host

-- 
B.Walter be...@bwct.de http://www.bwct.de
Modbus/TCP Ethernet I/O Baugruppen, ARM basierte FreeBSD Rechner uvm.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


misc/180052: www/squid3x ports: some helpers are not built/installed

2013-06-28 Thread Eugene Zheganin

Number: 180052
Category:   misc
Synopsis:   www/squid3x ports: some helpers are not built/installed
Confidential:   no
Severity:   non-critical
Priority:   low
Responsible:freebsd-bugs
State:  open
Quarter:
Keywords:   
Date-Required:
Class:  sw-bug
Submitter-Id:   current-users
Arrival-Date:   Fri Jun 28 10:50:00 UTC 2013
Closed-Date:
Last-Modified:
Originator: Eugene Zheganin
Release:10.x-CURRENT
Organization:
Vivat-Trade LLC
Environment:
FreeBSD taiga 10.0-CURRENT FreeBSD 10.0-CURRENT #1 r247150M: Mon Mar  4 
17:57:07 YEKT 2013 emz@taiga:/usr/obj/usr/src/sys/TAIGADBG  amd64
Description:
Selecting both

[x] AUTH_KERB
[x] AUTH_LDAP

should add the kerberos_ldap_group helper to the 
--enable-external-acl-helpers= configure option, and the port should 
build/install this helper.

This a reference implementation that supports SASL/GSSAPI authentication
to an ldap server. It is mainly intended to connect to Active Directory or 
Openldap based ldap servers. Thi is a very popular helper nowadays, it has a 
killer feature - it supports nested LDAP groups up to given nesting level, 
which is crucial in Windows/AD environment, where most of groups are usually 
nested.


How-To-Repeat:

Fix:


Release-Note:
Audit-Trail:
Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: ports/180052: www/squid3x ports: some helpers are not built/installed

2013-06-28 Thread remko
Synopsis: www/squid3x ports: some helpers are not built/installed

Responsible-Changed-From-To: freebsd-bugs-freebsd-ports-bugs
Responsible-Changed-By: remko
Responsible-Changed-When: Fri Jun 28 11:47:10 UTC 2013
Responsible-Changed-Why: 
reassign to ports team

http://www.freebsd.org/cgi/query-pr.cgi?pr=180052
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: misc/180052: www/squid3x ports: some helpers are not built/installed

2013-06-28 Thread Eugene M. Zheganin
Yup, my mistake. I figured out that selecting AUTH_LDAP and AUTH_SASL
gives the squid_kerb_group helper (which not that obvious, but OK).
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


kern/180060: ZFS kernel panic, solaris assert on dsl_prop_unregister

2013-06-28 Thread James TD Smith

Number: 180060
Category:   kern
Synopsis:   ZFS kernel panic, solaris assert on dsl_prop_unregister
Confidential:   no
Severity:   non-critical
Priority:   low
Responsible:freebsd-bugs
State:  open
Quarter:
Keywords:   
Date-Required:
Class:  sw-bug
Submitter-Id:   current-users
Arrival-Date:   Fri Jun 28 15:20:00 UTC 2013
Closed-Date:
Last-Modified:
Originator: James TD Smith
Release:9.1
Organization:
Environment:
FreeBSD masada.internal.mohorovi.cc 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #5 
r251934: Tue Jun 18 15:41:34 BST 2013 
r...@masada.internal.mohorovi.cc:/usr/obj/usr/src/sys/MASADA  amd64
Description:
I've had two ZFS-related kernel panics over the last few days. Both have 
happened since I upgraded to 9.1-RELEASE-4 on the 18th. PR 154447 has similar 
backtraces but was on 8.2, I can't find any other references to a similar 
problem.

It's a mixed UFS/ZFS system, root is on UFS with a single 4-disk RAIDZ1 pool 
used for backups, a media library, poudriere and a few other jails. 

I replaced one of the disks in the pool earlier this week which had been 
failing for a while and have been tuning the ZFS settings based on this guide: 
http://icesquare.com/wordpress/how-to-improve-zfs-performance/ after I upgraded 
to 4Gb RAM.

Jun 25 08:12:57 masada kernel: panic: solaris assert: dsl_prop_unregister(ds, 
atime, atime_changed_cb, zfsvfs) == 0, file: 
/usr/src/sys/modules/zfs/../../cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_vfsops.c,
 line: 1199
Jun 25 08:12:57 masada kernel: cpuid = 0
Jun 25 08:12:57 masada kernel: KDB: stack backtrace:
Jun 25 08:12:57 masada kernel: #0 0x80926c96 at kdb_backtrace+0x66
Jun 25 08:12:57 masada kernel: #1 0x808f0cae at panic+0x1ce
Jun 25 08:12:57 masada kernel: #2 0x816b5647 at 
zfs_unregister_callbacks+0x1b7
Jun 25 08:12:57 masada kernel: #3 0x816b58c5 at zfsvfs_teardown+0x175
Jun 25 08:12:57 masada kernel: #4 0x816b5a2b at zfs_suspend_fs+0x1b
Jun 25 08:12:57 masada kernel: #5 0x816aa229 at zfs_ioc_rollback+0xf9
Jun 25 08:12:57 masada kernel: #6 0x816abd46 at zfsdev_ioctl+0xe6
Jun 25 08:12:57 masada kernel: #7 0x807e077b at devfs_ioctl_f+0x7b
Jun 25 08:12:57 masada kernel: #8 0x80938715 at kern_ioctl+0x115
Jun 25 08:12:57 masada kernel: #9 0x8093894d at sys_ioctl+0xfd
Jun 25 08:12:57 masada kernel: #10 0x80be71d6 at amd64_syscall+0x546

Jun 28 04:08:02 masada kernel: panic: solaris assert: dsl_prop_unregister(ds, 
snapdir, snapdir_changed_cb, zfsvfs) == 0, file: 
/usr/src/sys/modules/zfs/../..
/cddl/contrib/opensolaris/uts/common/fs/zfs/zfs_vfsops.c, line: 1217
Jun 28 04:08:02 masada kernel: cpuid = 1
Jun 28 04:08:02 masada kernel: KDB: stack backtrace:
Jun 28 04:08:02 masada kernel: #0 0x80926c96 at kdb_backtrace+0x66
Jun 28 04:08:02 masada kernel: #1 0x808f0cae at panic+0x1ce
Jun 28 04:08:02 masada kernel: #2 0x816b570d at 
zfs_unregister_callbacks+0x27d
Jun 28 04:08:02 masada kernel: #3 0x816b58c5 at zfsvfs_teardown+0x175
Jun 28 04:08:02 masada kernel: #4 0x816b5a2b at zfs_suspend_fs+0x1b
Jun 28 04:08:02 masada kernel: #5 0x816aa229 at zfs_ioc_rollback+0xf9
Jun 28 04:08:02 masada kernel: #6 0x816abd46 at zfsdev_ioctl+0xe6
Jun 28 04:08:02 masada kernel: #7 0x807e077b at devfs_ioctl_f+0x7b
Jun 28 04:08:02 masada kernel: #8 0x80938715 at kern_ioctl+0x115
Jun 28 04:08:02 masada kernel: #9 0x8093894d at sys_ioctl+0xfd
Jun 28 04:08:02 masada kernel: #10 0x80be71d6 at amd64_syscall+0x546
How-To-Repeat:
I think it's more likely to happen under heavy IO load. This machine has 
rsnaphot backups scheduled to run every 4 hours, both of the crashes have 
occurred shortly after a backup began. It was also building packages with 
poudriere at the same time in both instances.
Fix:



Release-Note:
Audit-Trail:
Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD 7.1/amd64

2013-06-28 Thread John Baldwin
The following reply was made to PR kern/131597; it has been noted by GNATS.

From: John Baldwin j...@freebsd.org
To: bug-follo...@freebsd.org,
 guilla...@morinfr.org
Cc: k...@freebsd.org,
 thera...@freebsd.org
Subject: Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD 7.1/amd64
Date: Fri, 28 Jun 2013 08:47:55 -0400

 Looking at this again, the patch committed in 178807 is just wrong and should 
 be reverted.  There is no state in rtld that needs to be protected via a write 
 lock.  GCC is too lazy to use their own locking to protect shared state 
 between threads and wants the runtime linker to enforce this.  Their 
 justification that glibc doesn't allow concurrent execution of this isn't a 
 valid excuse.  For an API like this that just walks a list and invokes a 
 callback, if the callback manipulates shared state owned by the caller, the 
 caller should be responsible for sychronizing access to it, not rtld!
 
 Instead I think we should apply the patch in the original GCC bug to our in-
 tree GCC and to our GCC ports.  This should remove the sigprocmask calls and
 not penalize other users of dl_iterate_phdr() for GCC's poor behavior.
 
 -- 
 John Baldwin
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD 7.1/amd64

2013-06-28 Thread Konstantin Belousov
The following reply was made to PR kern/131597; it has been noted by GNATS.

From: Konstantin Belousov kostik...@gmail.com
To: John Baldwin j...@freebsd.org
Cc: bug-follo...@freebsd.org, guilla...@morinfr.org, thera...@freebsd.org
Subject: Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD
 7.1/amd64
Date: Fri, 28 Jun 2013 20:17:21 +0300

 --hhtCH1hro9pJkPIH
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 Content-Transfer-Encoding: quoted-printable
 
 On Fri, Jun 28, 2013 at 08:47:55AM -0400, John Baldwin wrote:
  Looking at this again, the patch committed in 178807 is just wrong and sh=
 ould=20
  be reverted.  There is no state in rtld that needs to be protected via a =
 write=20
  lock.  GCC is too lazy to use their own locking to protect shared state=
 =20
  between threads and wants the runtime linker to enforce this.  Their=20
  justification that glibc doesn't allow concurrent execution of this isn't=
  a=20
  valid excuse.  For an API like this that just walks a list and invokes a=
 =20
  callback, if the callback manipulates shared state owned by the caller, t=
 he=20
  caller should be responsible for sychronizing access to it, not rtld!
 =20
  Instead I think we should apply the patch in the original GCC bug to our =
 in-
  tree GCC and to our GCC ports.  This should remove the sigprocmask calls =
 and
  not penalize other users of dl_iterate_phdr() for GCC's poor behavior.
 
 In other words, we should become knowingly incompatible with the stock
 GCC and with other consumers of dl_iterate_phdr(), like libunwind ?
 E.g. libunwind ability to unwind from the signal handler relies on
 this behaviour.
 
 --hhtCH1hro9pJkPIH
 Content-Type: application/pgp-signature
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v2.0.20 (FreeBSD)
 
 iQIcBAEBAgAGBQJRzcUgAAoJEJDCuSvBvK1BBuwQAIWoFrFkw9Op7RybuuAw9K5h
 f49+JDpcscYrQcF8KSYWiUdV3ZcoBnubqKpT+6vWm5MQ4PwUCEv3ouKAhD/oe4n+
 oJg3pQz+mFicI7s0Wr3rJFyf0vO5wcHnxDOq7XdjHIPlGqTZcnOjubdCJ42xpZkT
 7004JA8B8WHitjh+9qJGQWOUDfBzUWDE3WwieqpYnKricnFhJh8/6gTg6abbZGkE
 6szxxKdPMUHJ28X54HU1DV9A2TJgfjLsGIzneQtfpOp7TTIyTKfn2hFHp5eLhWB/
 voH0HAegdg7ew3MaCl2fnGKb6UR0h3yShowp3KfH1LozmZNDw6C/6VSKwy55aSYY
 GaVXlWEhniim7NaRgP2okdMPEz07pUt3KoIN5mQGrlvgusTUa7YXcrwCm97l72dT
 EqjgffvFUPmmHP38jhgf/wkI1aQ6tY7eSqSLDM+MMBX6TnPKx4EAr3H/tc79idEx
 O89zUHFJPuI7YY563O+dR0Bm09kIDPVNb3hTG09JF2KCxY3QYlje8Iu5ndKOLCi+
 HvFwnTLpDEFEd22oNWdSeNUq97Rr2mAMSv5dk9A+a8mtsRbzPSeuylIKSEEKquDu
 USJ2ZyISoTnZbb6Iz6SYkZRn8vOBRUfBbpPRcAJh2FkBTegl7JE7dS3tM7C26uzf
 MxGTc8YbAXTWA1XFxyZR
 =hwdp
 -END PGP SIGNATURE-
 
 --hhtCH1hro9pJkPIH--
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD 7.1/amd64

2013-06-28 Thread Konstantin Belousov
The following reply was made to PR kern/131597; it has been noted by GNATS.

From: Konstantin Belousov kostik...@gmail.com
To: John Baldwin j...@freebsd.org
Cc: bug-follo...@freebsd.org, guilla...@morinfr.org, thera...@freebsd.org
Subject: Re: kern/131597: [kernel] c++ exceptions very slow on FreeBSD
 7.1/amd64
Date: Fri, 28 Jun 2013 20:45:38 +0300

 --8C4Pdt+UNHoLxtm5
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 Content-Transfer-Encoding: quoted-printable
 
 On Fri, Jun 28, 2013 at 01:38:39PM -0400, John Baldwin wrote:
  On Friday, June 28, 2013 1:17:21 pm Konstantin Belousov wrote:
   On Fri, Jun 28, 2013 at 08:47:55AM -0400, John Baldwin wrote:
Looking at this again, the patch committed in 178807 is just wrong an=
 d should=20
be reverted.  There is no state in rtld that needs to be protected vi=
 a a write=20
lock.  GCC is too lazy to use their own locking to protect shared sta=
 te=20
between threads and wants the runtime linker to enforce this.  Their=
 =20
justification that glibc doesn't allow concurrent execution of this i=
 sn't a=20
valid excuse.  For an API like this that just walks a list and invoke=
 s a=20
callback, if the callback manipulates shared state owned by the calle=
 r, the=20
caller should be responsible for sychronizing access to it, not rtld!
   =20
Instead I think we should apply the patch in the original GCC bug to =
 our in-
tree GCC and to our GCC ports.  This should remove the sigprocmask ca=
 lls and
not penalize other users of dl_iterate_phdr() for GCC's poor behavior.
  =20
   In other words, we should become knowingly incompatible with the stock
   GCC and with other consumers of dl_iterate_phdr(), like libunwind ?
   E.g. libunwind ability to unwind from the signal handler relies on
   this behaviour.
 =20
  Does libunwind depend on rtld single-threading to lock state shared with
  other threads?  If it does it should manage that itself.  If GCC and/or
  libunwind want to share arbitrary state between threads, or protect state
  from being accessed by a signal handler, then GCC and/or libunwind should
  manage that.  rtld can't possibly (and shouldn't) know the rules about
  how that state that is private to GCC/libunwind is managed.
 libunwind depends on the dl_iterate_phdr() signal-safety.
 
 =20
  What if you had a consumer of this that wanted to access the state outside
  of the callback?  Then it already has to manage all the locking itself to
  be safe anyway.
 =20
  Put another way, requiring dl_iterate_phdr() to providing locking for con=
 sumers
  would be equivalent to code assuming that C++'s for_each() template in
  algorithm provided locking to callers.  That is entirely upside-down.
 
 I think I should revive the fast sigprocmask patch.
 
 --8C4Pdt+UNHoLxtm5
 Content-Type: application/pgp-signature
 
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v2.0.20 (FreeBSD)
 
 iQIcBAEBAgAGBQJRzcvBAAoJEJDCuSvBvK1B9UgP/jne8523ys+JZDGUn9izYhJk
 LlT5LSSARhTcbREEsIevB5VQt2pbDtKsca/fCtLmaasPN5cb8XgLeyy1J3caB742
 LdrXLcczv8PvSJM0D7EDTH6ktGrmAl0i9cHb8sLqHuPAD7/ZNBJRfJXWdRe4Rs3r
 /A78kqAdyGlJAupQ+2ocbtsIOg8F1G3L3b7iZ+gA7+txErCv5th6H3+lXalpF+8X
 40FDUvpoU9roOesa9vKcQLFWcBMedLkVmTujmHrvFfMuz6zXu+0Anje5Zc0LPOSu
 hst4vYimFxn/VXQuU5qmGKhhz0o0jtwJzdF836aJotx2tsQWuBLWZiKSBffKQFeB
 D6aK0GlMlK/i6LQD+LeJbjB+k0/jxgK6ZtdetUPnPCUjeHE5IKDrm1Z0yMzMC/20
 H5AQ3WdFR7Jvu11ZK6jp2aqX6BDUTTwW85c1Y/k2n5+I48vD1EDXRDO73aQkHyM8
 0EU5kCPS1CRbXsf4XeGlye/YhJBNS7Hp/tdNSjhSjHckA78xLUsoKeo6LfCmFtG6
 GT8oDSmyugQl6QwCNzNp9bjKJ3wSI1TZjBr8GNQI/kXZJpaJkFb6mzLLLhUbjtt/
 XHrA2gaJDE9eTlOohoBO8zJ8bXe1ykK/YuduXdsAfpqKH4KckkEqUiA1ptrMV7C6
 9olJnLJJMrgbMjv955u6
 =/5H4
 -END PGP SIGNATURE-
 
 --8C4Pdt+UNHoLxtm5--
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/179901: [netinet] [patch] Multicast SO_REUSEADDR handled incorrectly

2013-06-28 Thread Bernd Walter
On Fri, Jun 28, 2013 at 12:15:14PM +0200, Bernd Walter wrote:
 On Mon, Jun 24, 2013 at 03:59:24AM +, lini...@freebsd.org wrote:
  Old Synopsis: [patch] Multicast SO_REUSEADDR handled incorrectly
  New Synopsis: [netinet] [patch] Multicast SO_REUSEADDR handled incorrectly
  
  Responsible-Changed-From-To: freebsd-bugs-freebsd-net
  Responsible-Changed-By: linimon
  Responsible-Changed-When: Mon Jun 24 03:59:05 UTC 2013
  Responsible-Changed-Why: 
  Over to maintainer(s).
  
  http://www.freebsd.org/cgi/query-pr.cgi?pr=179901
  ___
  freebsd-...@freebsd.org mailing list
  http://lists.freebsd.org/mailman/listinfo/freebsd-net
  To unsubscribe, send any mail to freebsd-net-unsubscr...@freebsd.org
 
 I don't know if this is related or a different bug, but the same
 mentioned commits are suspicious for us.
 We had been running with our own IPv6 software into the same REUSEADDR
 problem and changed to REUSEPORT as this is how it is done in mcastread
 from mcast-tools port.
 Don't know where we originally got the REUSEADDR from, probably a Stevens
 book.
 So far binding works with this change in our software.
 However we only receive packets from network and not packets from
 the host itself.
 We use multicast to notify multiple processes on multiple machines,
 including the machine itself.
 To reproduce:
  - use two hosts
  - start mcastread on each of them on an interface with shared LAN
  - send via mcastsend on one host
  - packets are received on the other host, but not with the mcastread
on the same host

It is unrelated, but I have found the cause for it and filed kern/180065
together with a working patch.
The reason is that the packets have no valid checksums when processed
in ip6_input because of delayed checksum changes.

-- 
B.Walter be...@bwct.de http://www.bwct.de
Modbus/TCP Ethernet I/O Baugruppen, ARM basierte FreeBSD Rechner uvm.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


kern/180065: Multicast loopback to own host broken

2013-06-28 Thread Bernd Walter

Number: 180065
Category:   kern
Synopsis:   Multicast loopback to own host broken
Confidential:   no
Severity:   non-critical
Priority:   low
Responsible:freebsd-bugs
State:  open
Quarter:
Keywords:   
Date-Required:
Class:  sw-bug
Submitter-Id:   current-users
Arrival-Date:   Fri Jun 28 18:50:00 UTC 2013
Closed-Date:
Last-Modified:
Originator: Bernd Walter
Release:9.1-STABLE
Organization:
Environment:
Description:
Using IPv6 multicast it is impossible to receive packets on the same host.
Problem is that the packet checksums are not calculated yet when the packet is 
handed over to if_simloop() and get dropped later in udp6_input().
The fix handles the problem with IPv6, but it wasn't verified if IPv4 code has 
a similar bug.

How-To-Repeat:
send packet via mcastsend from mcast-tools port and try to receive the packet 
with mcread on the same host.
Another host can receive the packet, but no process on the same host.

Fix:
Index: netinet6/ip6_output.c
===
--- netinet6/ip6_output.c   (revision 251406)
+++ netinet6/ip6_output.c   (working copy)
@@ -749,6 +749,13 @@
   }
   if ((im6o == NULL  in6_mcast_loop) ||
   (im6o  im6o-im6o_multicast_loop)) {
+
+   if (m-m_pkthdr.csum_flags  CSUM_DELAY_DATA_IPV6) {
+   plen = m-m_pkthdr.len - sizeof(*ip6);
+   in6_delayed_cksum(m, plen, sizeof(struct ip6_hdr));
+   m-m_pkthdr.csum_flags = ~CSUM_DELAY_DATA_IPV6;
+   }
+
/*
 * Loop back multicast datagram if not expressly
 * forbidden to do so, even if we have not joined


Release-Note:
Audit-Trail:
Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


kern/180067: Multicast support within jails

2013-06-28 Thread Bernd Walter

Number: 180067
Category:   kern
Synopsis:   Multicast support within jails
Confidential:   no
Severity:   non-critical
Priority:   low
Responsible:freebsd-bugs
State:  open
Quarter:
Keywords:   
Date-Required:
Class:  change-request
Submitter-Id:   current-users
Arrival-Date:   Fri Jun 28 19:00:00 UTC 2013
Closed-Date:
Last-Modified:
Originator: Bernd Walter
Release:9.1-STABLE
Organization:
Environment:
Description:
To have multicast support in Jails it is required to allow group addresses to 
be configured for the jail.
In reality this is impossible as multicast groups are not always a local 
decision.
It also disallows joining the same multicast group within multiple jails.
The tiny patch allows IPv6 multicast adresses to be used within jails without 
special configuration.
It is used in production since more than one year, but considered more as an 
example than a complete patch.
A similar check should also be done for IPv4 and maybe placed under a sysctl or 
jail option which is disabled by default.
This change was worked out together with Aron Schlesinger a...@paefchen.net.

How-To-Repeat:

Fix:
Index: kern/kern_jail.c
===
--- kern/kern_jail.c(revision 251406)
+++ kern/kern_jail.c(working copy)
@@ -3282,6 +3282,9 @@
 {
int i, a, z, d;
 
+   if (IN6_IS_ADDR_MULTICAST(ia6))
+  return (0);
+
/*
 * Check the primary IP.
 */


Release-Note:
Audit-Trail:
Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/180060: [zfs] [panic] ZFS kernel panic, solaris assert on dsl_prop_unregister

2013-06-28 Thread linimon
Old Synopsis: ZFS kernel panic, solaris assert on dsl_prop_unregister
New Synopsis: [zfs] [panic] ZFS kernel panic, solaris assert on 
dsl_prop_unregister

Responsible-Changed-From-To: freebsd-bugs-freebsd-zfs-devel
Responsible-Changed-By: linimon
Responsible-Changed-When: Fri Jun 28 19:57:40 UTC 2013
Responsible-Changed-Why: 

Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=180060
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/180065: [netinet6] [patch] Multicast loopback to own host broken

2013-06-28 Thread linimon
Old Synopsis: Multicast loopback to own host broken
New Synopsis: [netinet6] [patch] Multicast loopback to own host broken

Responsible-Changed-From-To: freebsd-bugs-freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Fri Jun 28 19:59:39 UTC 2013
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=180065
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


Re: kern/180067: [jail] [patch] fix multicast support within jails

2013-06-28 Thread linimon
Old Synopsis: Multicast support within jails
New Synopsis: [jail] [patch] fix multicast support within jails

Responsible-Changed-From-To: freebsd-bugs-freebsd-jail
Responsible-Changed-By: linimon
Responsible-Changed-When: Fri Jun 28 20:00:04 UTC 2013
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=180067
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org


conf/180078: [PATCH] make /etc and /var writable on CD media

2013-06-28 Thread Garrett Cooper

Number: 180078
Category:   conf
Synopsis:   [PATCH] make /etc and /var writable on CD media
Confidential:   no
Severity:   non-critical
Priority:   low
Responsible:freebsd-bugs
State:  open
Quarter:
Keywords:   
Date-Required:
Class:  sw-bug
Submitter-Id:   current-users
Arrival-Date:   Sat Jun 29 03:20:00 UTC 2013
Closed-Date:
Last-Modified:
Originator: Garrett Cooper
Release:10-CURRENT
Organization:
EMC Isilon
Environment:
FreeBSD fuji-current.local 10.0-CURRENT FreeBSD 10.0-CURRENT #3 
r+b278358-dirty: Sun Jun  9 16:05:39 PDT 2013 
root@fuji-current.local:/usr/obj/usr/src/sys/FUJI-NOCOMPAT  i386
Description:
The attached patch makes /etc/ and /var/ writable via /etc/rc.initdiskless 
which allows me to use /etc and /var as volatile filesystems [until reboot], 
accomplishing some of the following basic tasks:

- Starting the hostid service (needed for doing things with ZFS).
- Starting sshd (otherwise it can't write out keys to /etc/ssh/ .
- Setting passwords / adding custom users.
- Start dhclient (dhclient requires write access to /etc/resolv.conf and 
/var/run/{interface}.leases

Etc.
How-To-Repeat:

Fix:


Patch attached with submission follows:

diff --git a/release/amd64/mkisoimages.sh b/release/amd64/mkisoimages.sh
index e4093d7..6ae3713 100644
--- a/release/amd64/mkisoimages.sh
+++ b/release/amd64/mkisoimages.sh
@@ -40,6 +40,15 @@ LABEL=`echo $1 | tr '[:lower:]' '[:upper:]'`; shift
 NAME=$1; shift
 
 publisher=The FreeBSD Project.  http://www.FreeBSD.org/;
+dirs=etc var
+for d in $dirs; do
+   mkdir -p $1/conf/base/$d/
+   echo 30720  $1/conf/base/$d/md_size
+   tar cf - -C $1/$d/ . | tar xpvf - -C $1/conf/base/$d/
+done
+:  $1/etc/diskless
 echo /dev/iso9660/$LABEL / cd9660 ro 0 0  $1/etc/fstab
 makefs -t cd9660 $bootable -o rockridge -o label=$LABEL -o 
publisher=$publisher $NAME $*
+chflags -R 0 $1/conf
+rm -Rf $1/conf
 rm $1/etc/fstab
diff --git a/release/i386/mkisoimages.sh b/release/i386/mkisoimages.sh
index e4093d7..6ae3713 100644
--- a/release/i386/mkisoimages.sh
+++ b/release/i386/mkisoimages.sh
@@ -40,6 +40,15 @@ LABEL=`echo $1 | tr '[:lower:]' '[:upper:]'`; shift
 NAME=$1; shift
 
 publisher=The FreeBSD Project.  http://www.FreeBSD.org/;
+dirs=etc var
+for d in $dirs; do
+   mkdir -p $1/conf/base/$d/
+   echo 30720  $1/conf/base/$d/md_size
+   tar cf - -C $1/$d/ . | tar xpvf - -C $1/conf/base/$d/
+done
+:  $1/etc/diskless
 echo /dev/iso9660/$LABEL / cd9660 ro 0 0  $1/etc/fstab
 makefs -t cd9660 $bootable -o rockridge -o label=$LABEL -o 
publisher=$publisher $NAME $*
+chflags -R 0 $1/conf
+rm -Rf $1/conf
 rm $1/etc/fstab
diff --git a/release/ia64/mkisoimages.sh b/release/ia64/mkisoimages.sh
index b5cec32..7d8c27a 100644
--- a/release/ia64/mkisoimages.sh
+++ b/release/ia64/mkisoimages.sh
@@ -76,8 +76,17 @@ else
 fi
 
 publisher=The FreeBSD Project.  http://www.FreeBSD.org/;
+dirs=etc var
+for d in $dirs; do
+   mkdir -p $1/conf/base/$d/
+   echo 30720  $1/conf/base/$d/md_size
+   tar cf - -C $1/$d/ . | tar xpvf - -C $1/conf/base/$d/
+done
+:  $1/etc/diskless
 echo /dev/iso9660/$LABEL / cd9660 ro 0 0  $BASE/etc/fstab
 makefs -t cd9660 $BOOTOPTS -o rockridge -o label=$LABEL -o 
publisher=$publisher $NAME $BASE $*
+chflags -R 0 $1/conf
+rm -Rf $1/conf
 rm $BASE/etc/fstab
 rm -f $EFIPART
 exit 0
diff --git a/release/pc98/mkisoimages.sh b/release/pc98/mkisoimages.sh
index 5a19b4d..803f936 100644
--- a/release/pc98/mkisoimages.sh
+++ b/release/pc98/mkisoimages.sh
@@ -40,6 +40,15 @@ LABEL=`echo $1 | tr '[:lower:]' '[:upper:]'`; shift
 NAME=$1; shift
 
 publisher=The FreeBSD Project.  http://www.FreeBSD.org/;
+dirs=etc var
+for d in $dirs; do
+   mkdir -p $1/conf/base/$d/
+   echo 30720  $1/conf/base/$d/md_size
+   tar cf - -C $1/$d/ . | tar xpvf - -C $1/conf/base/$d/
+done
+:  $1/etc/diskless
 echo /dev/iso9660/$LABEL / cd9660 ro 0 0  $1/etc/fstab
 makefs -t cd9660 $bootable -o rockridge -o label=$LABEL -o 
publisher=$publisher $NAME $*
+chflags -R 0 $1/conf
+rm -Rf $1/conf
 rm $1/etc/fstab
diff --git a/release/powerpc/mkisoimages.sh b/release/powerpc/mkisoimages.sh
index 7ba4649..0117ca6 100644
--- a/release/powerpc/mkisoimages.sh
+++ b/release/powerpc/mkisoimages.sh
@@ -62,8 +62,17 @@ LABEL=`echo $1 | tr '[:lower:]' '[:upper:]'`; shift
 NAME=$1; shift
 
 publisher=The FreeBSD Project.  http://www.FreeBSD.org/;
+dirs=etc var
+for d in $dirs; do
+   mkdir -p $1/conf/base/$d/
+   echo 30720  $1/conf/base/$d/md_size
+   tar cf - -C $1/$d/ . | tar xpvf - -C $1/conf/base/$d/
+done
+:  $1/etc/diskless
 echo /dev/iso9660/$LABEL / cd9660 ro 0 0  $1/etc/fstab
 makefs -t cd9660 $bootable -o rockridge -o label=$LABEL -o 
publisher=$publisher $NAME $*
+chflags -R 0 $1/conf
+rm -Rf $1/conf
 rm $1/etc/fstab
 rm /tmp/hfs-boot-block
 rm -rf $1/ppc
diff --git a/release/sparc64/mkisoimages.sh b/release/sparc64/mkisoimages.sh
index 82cadab..c2f9fc4 100644
--- 

Re: conf/180078: [PATCH] make /etc and /var writable on CD media

2013-06-28 Thread gjb
Synopsis: [PATCH] make /etc and /var writable on CD media

Responsible-Changed-From-To: freebsd-bugs-re
Responsible-Changed-By: gjb
Responsible-Changed-When: Sat Jun 29 03:30:15 UTC 2013
Responsible-Changed-Why: 
re@ territory.


http://www.freebsd.org/cgi/query-pr.cgi?pr=180078
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to freebsd-bugs-unsubscr...@freebsd.org