Re: kern/165903: mbuf leak

2013-04-10 Thread Eugene M. Zheganin
Hi.

On 11.04.2013 01:39, Chris Forgeron wrote:
>  I do not experience the error if I load up vmware tools and use the vmx3f0 
> adapter, it's just with em0.
>
>  I have set the mbufs to very high numbers (322144) to buy more time between 
> lockups/crashes. Most often the systems stay functional, they just need a 
> reboot or more mbufs if I add them. Some times they lock up or crash as I 
> ifconfig down/up the adapter or attempt to add more mbufs via sysctl.
>
>  1) Is anyone else able to reproduce this problem? The PR is still open, 
> which says to me not all of us can be having this problem or there would be 
> more drive to fix.
>  2) What do I need to help with to advance this problem? It's not just my 
> systems, as evidenced by the original poster of the PR.
>
(I'm the author of the PR).
I was experiencing this on 9.0 'till some -STABLE, after that the leak
was gone on the exactly same configuration. This server is equipped with
bce(4) interfaces only, so I don't see any connection with interface
driver. I think it's more configuration related. I created this pr in
order to investigate why one of my 9.x servers hangs periodically. Since
that I tried lots of 9-STABLE snapshots, none of them fixed my problem.
Last month I decided to switch to 10.x. The uptime is 37 days so far,
none of my 9.x snapshots was able to stand that long. Even if this
machine will crash while I write this - this definitely means that 10.x
right now is at least equally stable as 9.x is, and can run as smoothly
as 9.x does.

My advice - use 10.0-CURRENT, 9.0 and all of it's descendant versions
are broken beyond repair, imo. Switching to 10.x was a hard decision for
me too, I was too scared by the '-CURRENT' karma. Seems like it's not
that creepy.

Eugene.
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Release ISO images have broken RockRidge data

2013-04-10 Thread Eugene Grosbein
11.04.2013 00:27, Warren Block пишет:
> On Wed, 10 Apr 2013, Eugene Grosbein wrote:
> 
>> 09.04.2013 21:58, Mark Saad ?:
>>
 While not the same you can always do this

 mdconfig -a -t vnode -f yourfreebsd-version.iso

 mount -t cd9660 /dev/md0 /cdrom

 Then use pax, cpio , cp, rsync etc to copy the data off the image .
>>
>> This way breaks hardlinks, so /rescue expands to 690M instead of 5M.
> 
> rsync will support hard links with -H.

Rsync won't be able to _detect_ already broken hardlinks.
It won't dig inside ISO image for them and mdconfig/mount break them.

So, rsync is not an option.

Eugene Grosbein

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

Re: svn - but smaller?

2013-04-10 Thread John Mehr




On Tue, 9 Apr 2013 17:05:28 +0200
 "Patrick M. Hausen"  wrote:

Hi, all,

first a big big thank you to John an all others involved 
for all the work.


A bit more slowly than cvsup but definitely a lot more 
convenient than
using plain subversion. Part of the slow performance may 
be due to the
fact that there is no local German svn mirror, yet. I'll 
try with my own mirror

in a couple of days.

I immediately asked myself: how can I set this up so I 
can use "make update"
like I'm used to? SVN_UPDATE looks for a .svn directory, 
so it cannot work with

svnup.

Here's how:

root@gordon:/ # cat /etc/make.conf 
SUP_UPDATE=		yes

SUP=/usr/local/bin/svnup
SUPHOST=svn0.us-east.freebsd.org
SUPFLAGS=
SUPFILE=-b base/stable/9 -l /usr/src
PORTSSUPFILE=   -b base/head -l /usr/ports

OK, this gives a big warning banner and it's an abuse of 
a mechanism intended

for another utility … but it works nonetheless ;-)

I therefore propose an extension to 
/usr/src/Makefile.inc1 like this:


update:
.if defined(SVNUP_UPDATE)
@echo 
"--"

@echo ">>> Running ${SVNUP}"
@echo 
"--"

.if defined(SVNUPFLAGS)
@${SVNUP} ${SVNUPFLAGS} -h ${SVNUPHOST}
.endif
…

Just a rough sketch - I can put more thought into this 
if nobody else is already

working on it.

Best regards,
Patrick M. Hausen
Leiter Netzwerke und Sicherheit
--
punkt.de GmbH * Kaiserallee 13a * 76133 Karlsruhe
Tel. 0721 9109 0 * Fax 0721 9109 100
i...@punkt.de   http://www.punkt.de
Gf: Jürgen Egeling  AG Mannheim 108285



___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to 
"freebsd-stable-unsubscr...@freebsd.org"




Hello,

I've added support for a configuration/preferences file to 
store commonly used settings for an arbitrary number of 
branches (ports, stable, current, etc.).  For the default 
groups, they can easily be synchronized by executing 
"svnup ports", "svnup stable", etc.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Release ISO images have broken RockRidge data

2013-04-10 Thread Warren Block

On Wed, 10 Apr 2013, Thomas Schmitt wrote:


Hi,

Warren Block wrote:

sync will support hard links with -H


But how shall rsync know that the files in the ISO image stem from
hardlink siblings on the hard disk where the image was produced ?


Well, no it won't recreate them by inferral.  Although that would be 
kind of a neat option for rsync, which can already deal with checksums. 
But when copying files, it does support hard links.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: kern/165903: mbuf leak

2013-04-10 Thread Jeremy Chadwick
On Wed, Apr 10, 2013 at 04:53:47PM -0700, Jeremy Chadwick wrote:
> On Wed, Apr 10, 2013 at 07:39:31PM +, Chris Forgeron wrote:
> >  I've updated the PR on this via bug track email (hopefully, it bounced my 
> > first email) , but I thought I should bring it to the attention of the list 
> > as it's still happening, and the original PR was from March 2012.
> > 
> >  The PR is here: http://www.freebsd.org/cgi/query-pr.cgi?pr=165903&cat=
> > 
> >  I am experiencing the same mbuf leak on fresh 9.1-RELEASE machines 
> > (AMD64). Most of my machines are ESXi 5.1 VM's running the e1000 (em0) NIC. 
> > This VM is stock, just one freebsd-update done, nothing custom.
> > 
> >  I have also experienced this condition on an older 9.0-STABLE from Jul 1st 
> > 2012. I did not notice it much before that date, but I can't tell for sure. 
> > I have a few machines on that build that I still use, so confirmation was 
> > easy.
> > 
> >  I do not experience the error if I load up vmware tools and use the vmx3f0 
> > adapter, it's just with em0.
> > 
> >  I have set the mbufs to very high numbers (322144) to buy more time 
> > between lockups/crashes. Most often the systems stay functional, they just 
> > need a reboot or more mbufs if I add them. Some times they lock up or crash 
> > as I ifconfig down/up the adapter or attempt to add more mbufs via sysctl.
> > 
> >  1) Is anyone else able to reproduce this problem? The PR is still open, 
> > which says to me not all of us can be having this problem or there would be 
> > more drive to fix.
> >  2) What do I need to help with to advance this problem? It's not just my 
> > systems, as evidenced by the original poster of the PR.
> 
> 1. This PR does not contain output from "dmesg" nor "pciconf -lvbc", nor
> does your Email.  Output from this matters.
> 
> 2. Please try 9.1-STABLE and see if there is an improvement; there have
> been a huge number of changes/fixes to em(4) between 9.1-RELEASE and
> now.  You can try this:
> 
> https://pub.allbsd.org/FreeBSD-snapshots/amd64-amd64/9.1-RELENG_9-r249290-JPSNAP/

Other output that would be useful on a machine where the current mbuf
count is actively very high:

* vmstat -z
* netstat -Q
* netstat -n -x

It would also be beneficial to provide any sysctl.conf and loader.conf
adjustments you do.

-- 
| Jeremy Chadwick   j...@koitsu.org |
| UNIX Systems Administratorhttp://jdc.koitsu.org/ |
| Mountain View, CA, US|
| Making life hard for others since 1977. PGP 4BD6C0CB |
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: kern/165903: mbuf leak

2013-04-10 Thread Jeremy Chadwick
On Wed, Apr 10, 2013 at 07:39:31PM +, Chris Forgeron wrote:
>  I've updated the PR on this via bug track email (hopefully, it bounced my 
> first email) , but I thought I should bring it to the attention of the list 
> as it's still happening, and the original PR was from March 2012.
> 
>  The PR is here: http://www.freebsd.org/cgi/query-pr.cgi?pr=165903&cat=
> 
>  I am experiencing the same mbuf leak on fresh 9.1-RELEASE machines (AMD64). 
> Most of my machines are ESXi 5.1 VM's running the e1000 (em0) NIC. This VM is 
> stock, just one freebsd-update done, nothing custom.
> 
>  I have also experienced this condition on an older 9.0-STABLE from Jul 1st 
> 2012. I did not notice it much before that date, but I can't tell for sure. I 
> have a few machines on that build that I still use, so confirmation was easy.
> 
>  I do not experience the error if I load up vmware tools and use the vmx3f0 
> adapter, it's just with em0.
> 
>  I have set the mbufs to very high numbers (322144) to buy more time between 
> lockups/crashes. Most often the systems stay functional, they just need a 
> reboot or more mbufs if I add them. Some times they lock up or crash as I 
> ifconfig down/up the adapter or attempt to add more mbufs via sysctl.
> 
>  1) Is anyone else able to reproduce this problem? The PR is still open, 
> which says to me not all of us can be having this problem or there would be 
> more drive to fix.
>  2) What do I need to help with to advance this problem? It's not just my 
> systems, as evidenced by the original poster of the PR.

1. This PR does not contain output from "dmesg" nor "pciconf -lvbc", nor
does your Email.  Output from this matters.

2. Please try 9.1-STABLE and see if there is an improvement; there have
been a huge number of changes/fixes to em(4) between 9.1-RELEASE and
now.  You can try this:

https://pub.allbsd.org/FreeBSD-snapshots/amd64-amd64/9.1-RELENG_9-r249290-JPSNAP/

-- 
| Jeremy Chadwick   j...@koitsu.org |
| UNIX Systems Administratorhttp://jdc.koitsu.org/ |
| Mountain View, CA, US|
| Making life hard for others since 1977. PGP 4BD6C0CB |
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


kern/165903: mbuf leak

2013-04-10 Thread Chris Forgeron
Hello,

 I've updated the PR on this via bug track email (hopefully, it bounced my 
first email) , but I thought I should bring it to the attention of the list as 
it's still happening, and the original PR was from March 2012.

 The PR is here: http://www.freebsd.org/cgi/query-pr.cgi?pr=165903&cat=

 I am experiencing the same mbuf leak on fresh 9.1-RELEASE machines (AMD64). 
Most of my machines are ESXi 5.1 VM's running the e1000 (em0) NIC. This VM is 
stock, just one freebsd-update done, nothing custom.

 I have also experienced this condition on an older 9.0-STABLE from Jul 1st 
2012. I did not notice it much before that date, but I can't tell for sure. I 
have a few machines on that build that I still use, so confirmation was easy.

 I do not experience the error if I load up vmware tools and use the vmx3f0 
adapter, it's just with em0.

 I have set the mbufs to very high numbers (322144) to buy more time between 
lockups/crashes. Most often the systems stay functional, they just need a 
reboot or more mbufs if I add them. Some times they lock up or crash as I 
ifconfig down/up the adapter or attempt to add more mbufs via sysctl.

 1) Is anyone else able to reproduce this problem? The PR is still open, which 
says to me not all of us can be having this problem or there would be more 
drive to fix.
 2) What do I need to help with to advance this problem? It's not just my 
systems, as evidenced by the original poster of the PR.

Thanks.


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


FreeBSD 8.4-RC1 Now Available

2013-04-10 Thread Glen Barber
The first RC build of the 8.4-RELEASE release cycle is now available
on the FTP servers for the amd64, i386, and pc98 architectures.  The
SHA256/MD5 sums are tacked on to the bottom of this message.  The ISO
images and, for architectures that support it, the memory stick images
are available here:

  ftp://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/8.4/

(or any of the FreeBSD mirror sites).

If you notice problems you can report them through the normal Gnats PR
system or here on the -stable mailing list.

If you would like to use SVN to do a source based update of an existing
system use "releng/8.4". If you would like to use csup/cvsup mechanisms
instead the branch tag to use is "RELENG_8_4".

Please be aware that cvsup and CVS are both deprecated, and while
upgrades using CVS or cvsup may work now they will not be supported for
security updates through the life of 8.4.

Important notice when upgrading from 8.4-BETA1 to 8.4-RC1:

 - There was an accidental breakage in the OpenSSL ABI in the BETA1
   build that was fixed before this RC build.  Applications built
   against OpenSSL may need to be rebuilt after upgrading to
   8.4-RC1 from 8.4-BETA1.

The freebsd-update(8) utility supports binary upgrades of i386 and amd64
systems running earlier FreeBSD releases.  Systems running earlier
FreeBSD releases can upgrade as follows:

# freebsd-update upgrade -r 8.4-RC1

During this process, FreeBSD Update may ask the user to help by merging
some configuration files or by confirming that the automatically performed
merging was done correctly.

# freebsd-update install

The system must be rebooted with the newly installed kernel before
continuing.

# shutdown -r now

After rebooting, freebsd-update needs to be run again to install the new
userland components:

# freebsd-update install

It is recommended to rebuild and install all applications if possible,
especially if upgrading from an earlier FreeBSD release, for example,
FreeBSD 7.x.  Alternatively, the user can install misc/compat7x and other
compatibility libraries, afterwards the system must be rebooted into the
new userland:

# shutdown -r now

Finally, after rebooting, freebsd-update needs to be run again to remove
stale files:

# freebsd-update install

Checksums:

SHA256 (FreeBSD-8.4-RC1-amd64-bootonly.iso) = 
a5f1bce4c5aefeef12353da6f637275310df6315417a1c9b6022da4106ea4c4c
SHA256 (FreeBSD-8.4-RC1-amd64-disc1.iso) = 
9adf9e15ff288085a53831ad238cd7320225f186dfb3faac11ba2189689f4678
SHA256 (FreeBSD-8.4-RC1-amd64-disc2.iso) = 
faad5199011bd23302b2b8916b7a0abbd0f755e15bdb90a289972e7dfc3c752a
SHA256 (FreeBSD-8.4-RC1-amd64-disc3.iso) = 
9c907f4d74f28965a8a6ce683a946f9aeaba37dbbd97ca63f7fc3f28b839d9bd
SHA256 (FreeBSD-8.4-RC1-amd64-dvd1.iso) = 
6f6c706ea1cb6f045d0df596bf85873784e3b42bb22ae3fe26d54deb4115f63e
SHA256 (FreeBSD-8.4-RC1-amd64-livefs.iso) = 
1110f7ced80df95fb8354bac2614c866dcc608fc9c1c1b823d832d3cb93ce16a
SHA256 (FreeBSD-8.4-RC1-amd64-memstick.img) = 
10f3b891df47345c800d1210a1881baf473114aaea9a44d4ce0f86e5ba09221f
SHA256 (FreeBSD-8.4-RC1-i386-bootonly.iso) = 
116b34780cf6c684fb6ac541630d2e863613bd66447f894b77ce682ba2bedb38
SHA256 (FreeBSD-8.4-RC1-i386-disc1.iso) = 
ba1d20cc407d392e61469ec4b5c49b68187317a651165bf8693d690eaf1c8539
SHA256 (FreeBSD-8.4-RC1-i386-disc2.iso) = 
1b35d1b3430910a6c558f36d4417bc8a5cc030f3233f2f1a27f9732971f71aed
SHA256 (FreeBSD-8.4-RC1-i386-disc3.iso) = 
a948ee4707450f55b416fc42972629dafe84d22ec14ecf5f89772f07e44e0d31
SHA256 (FreeBSD-8.4-RC1-i386-dvd1.iso) = 
32bc73f2881baf4cde80d04c830604643dfc1dd33ec6cfccd72cbe40cb7f8584
SHA256 (FreeBSD-8.4-RC1-i386-livefs.iso) = 
e9e280849935605f595380ce0455720332598c6ab4a2a57cee38c13cb3d0e8a6
SHA256 (FreeBSD-8.4-RC1-i386-memstick.img) = 
5aed82b6679a92448096287128075e636f6cd34f338e93a39ee8610fa995fb83
SHA256 (FreeBSD-8.4-RC1-pc98-bootonly.iso) = 
7ad9faea2fb1276b42c104b608a6fac6d0a5b83a56b952eab9c7c6165ffd819f
SHA256 (FreeBSD-8.4-RC1-pc98-disc1.iso) = 
191ec9361e64b205354de0a7522f4302dc35bb8e167e393df886040b5a14476b
SHA256 (FreeBSD-8.4-RC1-pc98-livefs.iso) = 
f38592cd6b4336a3e6444335dc6e9cc1ac173063481878c82105e4af487259f6

MD5 (FreeBSD-8.4-RC1-amd64-bootonly.iso) = 5f39ee60f64e11d1e1098272926a7c40
MD5 (FreeBSD-8.4-RC1-amd64-disc1.iso) = cdc885b419049ce2a324e3c491c53c0c
MD5 (FreeBSD-8.4-RC1-amd64-disc2.iso) = f82e6b3067c16888636558c7070c4a0d
MD5 (FreeBSD-8.4-RC1-amd64-disc3.iso) = e3d031665ee0f7bd3108921fab665cd4
MD5 (FreeBSD-8.4-RC1-amd64-dvd1.iso) = a721eba1bb0ff6b415c96f063b6f50f6
MD5 (FreeBSD-8.4-RC1-amd64-livefs.iso) = 2bab297001dce4b5d8b75cc9adf0bc49
MD5 (FreeBSD-8.4-RC1-amd64-memstick.img) = 32d73c87cd326ba33d1710d1d80924a6
MD5 (FreeBSD-8.4-RC1-i386-bootonly.iso) = 985a7dcfa7e7832c4b078c28140889f0
MD5 (FreeBSD-8.4-RC1-i386-disc1.iso) = 20bcbd7b4c842e23c4b40b7d95cb7189
MD5 (FreeBSD-8.4-RC1-i386-disc2.iso) = 99cdd663e248f7153f83ef2efca78126
MD5 (FreeBSD-8.4-RC1-i386-disc3.iso) = 0fdc4e0d4becafed7becea7e283dc956
MD5 (FreeBSD-8.4-RC1-i386-dvd1.iso) = 9452ea665417bf8e3b37e6a2df9e0471

Re: fusefs-kmod does not work on 8-STABLE?

2013-04-10 Thread Torfinn Ingolfsen
On Wed, 10 Apr 2013 06:33:10 -0500
Mark Felder  wrote:

> FUSE is pretty bad outside of FreeBSD 10 where it's rewritten and part of  
> the kernel. If your environment would be OK with making the leap to  
> FreeBSD 10 I'd recommend it.

Ate there any bugreports or known problems?
Except for one machine (see this thread[1]), it works fine (good enough) for me 
on a number of FreeBSD machines, and have done so
for some years now. I haven't tested fusefs much under FreeBSD 9.0 and newer, I 
mostly use it with FreeBSD 8.x.
I'm only using sshfs and gphotofs.

References:
1) http://forums.freebsd.org/showthread.php?t=37302
-- 
Torfinn Ingolfsen 
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Release ISO images have broken RockRidge data

2013-04-10 Thread Thomas Schmitt
Hi,

Warren Block wrote:
> sync will support hard links with -H

But how shall rsync know that the files in the ISO image stem from
hardlink siblings on the hard disk where the image was produced ? 



I succeeded with this post-processing on a Linux system with bash
after xorriso -for backup ... -extract / livefs :

Learn the block address of content of /rescue/cat in the ISO image:

  lba=$(xorriso -indev ../FreeBSD-8.4-BETA1-amd64-livefs.iso \
-find /rescue/cat -exec report_lba -- 2>/dev/null | \
fgrep cat | \
awk '{print $6}')

(Should yield 35682 with that image)

Get a list of all files with that block address, except /rescue/cat :

  siblings=$(xorriso -indev ../FreeBSD-8.4-BETA1-amd64-livefs.iso \
 -find / -sort_lba -lba_range "$lba" 1 \
 -exec report_lba -- \
2>/dev/null | \
 grep '^File data lba' | awk '{print $12}' | \
 sed -e "s/'//g" | grep -v '^/rescue/cat$' )

(This should yield 137 files:
   /rescue/[ ... /rescue/zpool
)

Delete them in livefs/ and re-create them as links to livefs/rescue/cat:

  for i in $siblings
  do
rm livefs$i
ln livefs/rescue/cat livefs$i
  done


This brings the size of livefs/rescue from 676772 KiB to 4924 KiB.
ls -l livefs/rescue reports:

  total 676768
  -r-xr-xr-x 138 thomas thomas 5007184 2013-03-20 04:14 [
  -r-xr-xr-x 138 thomas thomas 5007184 2013-03-20 04:14 atacontrol
  ...
  -r-xr-xr-x 138 thomas thomas 5007184 2013-03-20 04:14 zpool



(Confessedly one could get the file list as well by ls -l and grepping
 for the size of livefs/rescue/cat.)




Have a nice day :)

Thomas

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Release ISO images have broken RockRidge data

2013-04-10 Thread Warren Block

On Wed, 10 Apr 2013, Eugene Grosbein wrote:


09.04.2013 21:58, Mark Saad ?:


While not the same you can always do this

mdconfig -a -t vnode -f yourfreebsd-version.iso

mount -t cd9660 /dev/md0 /cdrom

Then use pax, cpio , cp, rsync etc to copy the data off the image .


This way breaks hardlinks, so /rescue expands to 690M instead of 5M.


rsync will support hard links with -H.
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Ghosted logins in w/who

2013-04-10 Thread damonray
Got it. I'll double check to make sure everything was recompiled
correctly. Thanks!
Damon

On 4/10/2013 at 9:49 AM, "Tom Evans"  wrote:On Wed, Apr 10, 2013 at
3:09 PM,   wrote:
> If I wipe the utmp file all the w/who content goes away, resets if
you
> will. But in a matter of moments the problem reappears.. is this
> something that needs to be submitted as a bug report do you think?
> Thanks!
> Damon
>

Hi Damon

Fabian was explaining to you that utmp was replaced by utmpx.

All programs in base that wrote to utmp now write to utmpx instead. If
you still have programs not from base that write to utmp, you will get
incorrect/crazy values reported - you must rebuild all tools that
currently write to utmp so that they no longer do so.

Cheers

Tom
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Ghosted logins in w/who

2013-04-10 Thread Tom Evans
On Wed, Apr 10, 2013 at 3:09 PM,   wrote:
> If I wipe the utmp file all the w/who content goes away, resets if you
> will. But in a matter of moments the problem reappears.. is this
> something that needs to be submitted as a bug report do you think?
> Thanks!
> Damon
>

Hi Damon

Fabian was explaining to you that utmp was replaced by utmpx.

All programs in base that wrote to utmp now write to utmpx instead. If
you still have programs not from base that write to utmp, you will get
incorrect/crazy values reported - you must rebuild all tools that
currently write to utmp so that they no longer do so.

Cheers

Tom
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Ghosted logins in w/who

2013-04-10 Thread Ronald Klop

On Wed, 10 Apr 2013 16:09:52 +0200,  wrote:


If I wipe the utmp file all the w/who content goes away, resets if you
will. But in a matter of moments the problem reappears.. is this
something that needs to be submitted as a bug report do you think?
Thanks!
Damon


Did you upgrade correctly? Did you also ran make delete-old and make  
delete-old-libs? And did you rebuild all ports after that?

Some things might use the old stuff still.

Ronald.



On 4/9/2013 at 9:42 AM, "Fabian Wenk"  wrote:Hello Daniel

On 09.04.2013 12:07, Daniel Braniss wrote:

something changed beteen 8 and 9 with respect of handling of utmp,
I tried to research this but got bogged down with other things.


According to /usr/src/UPDATING:

20100113:
  The utmp user accounting database has been replaced with utmpx,
  the user accounting interface standardized by POSIX.
  Unfortunately the semantics of utmp and utmpx don't match,
  making it practically impossible to support both interfaces.
  The user accounting database is used by tools like finger(1),
  last(1), talk(1), w(1) and ac(8).

  All applications in the base system use utmpx.  This means only
  local binaries (e.g. from the ports tree) may still use these
  utmp database files.  These applications must be rebuilt to make
  use of utmpx.

  After the system has been upgraded, it is safe to remove the old
  log files (/var/run/utmp, /var/log/lastlog and /var/log/wtmp*),
  assuming their contents is of no importance anymore.  Old wtmp
  databases can only be used by last(1) and ac(8) after they have
  been converted to the new format using wtmpcvt(1).
Could this have any impact regarding this issue with telnet login?
bye
Fabian
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to
"freebsd-stable-unsubscr...@freebsd.org"
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: Ghosted logins in w/who

2013-04-10 Thread damonray
If I wipe the utmp file all the w/who content goes away, resets if you
will. But in a matter of moments the problem reappears.. is this
something that needs to be submitted as a bug report do you think?
Thanks!
Damon

On 4/9/2013 at 9:42 AM, "Fabian Wenk"  wrote:Hello Daniel

On 09.04.2013 12:07, Daniel Braniss wrote:
> something changed beteen 8 and 9 with respect of handling of utmp,
> I tried to research this but got bogged down with other things.

According to /usr/src/UPDATING:

20100113:
  The utmp user accounting database has been replaced with utmpx,
  the user accounting interface standardized by POSIX.
  Unfortunately the semantics of utmp and utmpx don't match,
  making it practically impossible to support both interfaces.
  The user accounting database is used by tools like finger(1),
  last(1), talk(1), w(1) and ac(8).

  All applications in the base system use utmpx.  This means only
  local binaries (e.g. from the ports tree) may still use these
  utmp database files.  These applications must be rebuilt to make
  use of utmpx.

  After the system has been upgraded, it is safe to remove the old
  log files (/var/run/utmp, /var/log/lastlog and /var/log/wtmp*),
  assuming their contents is of no importance anymore.  Old wtmp
  databases can only be used by last(1) and ac(8) after they have
  been converted to the new format using wtmpcvt(1).
Could this have any impact regarding this issue with telnet login?
bye
Fabian
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to
"freebsd-stable-unsubscr...@freebsd.org"
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"


Re: fusefs-kmod does not work on 8-STABLE?

2013-04-10 Thread Mark Felder
FUSE is pretty bad outside of FreeBSD 10 where it's rewritten and part of  
the kernel. If your environment would be OK with making the leap to  
FreeBSD 10 I'd recommend it.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"