Re: Limitations in FreeBSD

1999-11-07 Thread Andreas Dobloug

* Matthew Dillon
| FreeBSD boxes can handle up to 4 Gigabytes of main memory.

Is this true for the Alpha kernels too?

-- 
Andreas Dobloug : email: [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: writing much slower than reading...

1999-11-07 Thread Matthew Dillon

:well, I am working on writing a capture program to do 640x480x12bpp@30fps
:to a raw disk, but writing to the raw device is SOOO slow...  the reason
:I say it's slow is the fact that it takes 8 times the system time writing
:than reading...
:
:a bit about the system...  k6/2-250, 100mhz system bus, pc100 64meg dimm,
:VIA MVP3 chipset (IDE DMA enabled), IBM-DPTA-372730 hard disk, Hauppauge
:WinCast/TV Model 61351 B226, 3.3-RELEASE...
:
:now the hard disk can push and pull around 20meg/sec w/o any problems..
:but when I time the disk I get:
:$ time dd if=/dev/rwd0s1g of=/dev/null bs=64k count=2048
:2048+0 records in
:2048+0 records out
:134217728 bytes transferred in 5.747521 secs (23352281 bytes/sec)
:5.75 real 0.01 user 0.21 sys
:$ time dd if=/dev/zero of=/dev/rwd0s1g bs=64k count=2048
:2048+0 records in
:2048+0 records out
:134217728 bytes transferred in 6.281820 secs (21366057 bytes/sec)
:6.28 real 0.00 user 1.68 sys
:
:now, why does it cost SOOO much more processing time to write than
:read??  are there plans to fix this slow down?  is it possible? can't
:we just dma write out of userland since we are blocking on the write?
:
:-- 
:  John-Mark Gurney Voice: +1 408 975 9651

It doesn't necessarily, but your use of dd is causing the numbers to 
look skewed.  

It's real simple:  when you read from the raw disk into a fixed buffer
the system is DMAing directly into the buffer.  dd then 'writes' the 
buffer to /dev/null, which is a NOP.  There is no effect on the cpu's
L1 and L2 caches because the cpu never reads or copies the data anywhere.

When you write to a raw disk with your dd, it is reading a block from 
/dev/zero into its local buffer which involves a zeroing operation
that the read code never had to do, then dd writes the buffer to disk.

So the write test is doing an extra scan of the buffer *and* blowing up 
the cpu's L1 and L2 caches due to that scan while the read test is doing
no buffer copies at all so the cpu isn't touching the buffer at all - 
leaving the L1 and L2 caches pretty much alone.

-Matt



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



SIMPLELOCK_DEBUG and apause

1999-11-07 Thread Assar Westerlund

Why trying to debug some locking code of my own I enabled
SIMPLELOCK_DEBUG, only to find out that I was getting lots of
`simple_unlock: lock not held' in lockmgr -> acquire -> apause.

Looking closer at `apause' it seems rather clear that it can cause
this.  I proposed simple change is below.

Comments?

/assar

--- kern_lock.c.origMon Nov  8 03:55:26 1999
+++ kern_lock.c Mon Nov  8 04:24:13 1999
@@ -116,9 +119,11 @@
simple_lock(&lkp->lk_interlock);
if ((lkp->lk_flags & flags) == 0)
return 0;
+   simple_unlock(&lkp->lk_interlock);
break;
}
}
+   simple_lock(&lkp->lk_interlock);
}
return 1;
 }


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



SMP changes from 3.0 to 3.3?

1999-11-07 Thread Travis Cole


At work we have 18 or so web servers runing FreeBSD 3.0 on daul PIIs.
When they see very high loads (~300+) the SMP starts do get confused
and things randomly fail.

Were there signifigant SMP changes from 3.0-RELEASE to 3.3-RELEASE
that may make SMP more stable at high loads?  Are their any signifiant
SMP changes at all from 3.0-RELEASE to 3.3-RELEASE?

Or should I just go try and read the comit logs and see if I can
make any sense of this my self?  Last time I tried, I didn't
get to far :(

Thanks much.

-- 
--Travis

"Linux is something for Windows haters, BSD is something for Unix lovers" 
(Heike S., Febr. 98) 


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Running unattended (ifo FFS thread)

1999-11-07 Thread Jesper Skriver

On Sun, Nov 07, 1999 at 04:57:54PM +0100, Dag-Erling Smorgrav wrote:
> Kevin Day <[EMAIL PROTECTED]> writes:
> > The problem is that 'fsck -py' ignores the 'p' and will fsck every time,
> > even if it's unneeded. This takes ages for me. I believe I submitted a PR
> > with a 'fix' to fsck.
> 
> 'fsck -p || fsck -y' should do the trick.

What about at rc.conf knob, that make /etc/rc use this instead of the
normal fsck -p ??

This could be useful for servers at remote sites.

Should I submit a PR with a diff ?

/Jesper

-- 
Jesper Skriver (JS4261-RIPE), Network manager  
Tele Danmark DataNet, IP section (AS3292)

One Unix to rule them all, One Resolver to find them,
One IP to bring them all and in the zone to bind them.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ARM support

1999-11-07 Thread Stephane E. Potvin

Mike Smith wrote:
> 
> > To whoever that may interest, I've now got a nearly working freebsd
> > loader for the NetWinder. It currently only uses the serial console and
> > miss internal hard driver support but work is underway for both these
> > issues.
> 
> Cool!  Does the NetWinder use OpenFirmware, or some other firmware
> interface?

Unfortunately no. It uses a stripped down linux kernel as firmware.
That's why I switched to work on the bootloader: the darn thing doesn't
seems to grok ufs right. It's bad because the disk/video support have to
be done from the ground up. Adding support to the Shark/acorn computers
will probably be a lot easier.

> > I'm making some progress too in getting world to compile but work in
> > this area is more slower as I've got no way to test what I compile and
> > I'm not that at ease with most of the code.
> 
> If you're interested in sharing your work, I have a DNA ('shark') here
> that was loaned to the Project for just this purpose.  I'd be really
> interested to see your cross-build bits integrated into our tree ASAP.

I'd really like this to happens too but right now I think that would be
near impossible. binutils 2.9.1 doesn't really support arm/elf so I'm
currently using a recent snapshot of binutils (2.9.5) with gcc 2.95.1.
I'm using a boatload of very ugly hacks to make this combitation work
with current...

As soon as the binutils crew releases something more official so that it
could be added into the tree I'll be more than happy to send pr's for
what I've got so far.

Steph

--
Stephane E. Potvin
InnoMediaLogic Inc. - http://www.multichassis.com/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ARM support

1999-11-07 Thread Mike Smith

> To whoever that may interest, I've now got a nearly working freebsd
> loader for the NetWinder. It currently only uses the serial console and
> miss internal hard driver support but work is underway for both these
> issues.

Cool!  Does the NetWinder use OpenFirmware, or some other firmware 
interface?

> I'm making some progress too in getting world to compile but work in
> this area is more slower as I've got no way to test what I compile and
> I'm not that at ease with most of the code.

If you're interested in sharing your work, I have a DNA ('shark') here 
that was loaned to the Project for just this purpose.  I'd be really 
interested to see your cross-build bits integrated into our tree ASAP.

-- 
\\ Give a man a fish, and you feed him for a day. \\  Mike Smith
\\ Tell him he should learn how to fish himself,  \\  [EMAIL PROTECTED]
\\ and he'll hate you for a lifetime. \\  [EMAIL PROTECTED]




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread Brian Fundakowski Feldman

On Sat, 6 Nov 1999, Warner Losh wrote:

> There are ways that the user can see the code to execute it, but not
> read it normally.  procfs breaches this inability to read the file.
> Also, there are many related problems which make a proper fix for this
> that is more complicated than removing /proc/xxx/file nearly
> impossible.  "Proper" here means "A fix which will prevent the
> disclosure of a file to unauthorized people which would normally not
> be able to read the file."
> 
> I'm convinced that it would be hard to codify all the security checks
> needed to access the file originally into a single number which would
> allow people that could read the original file to read /proc/xxx/file
> and disallow people who couldn't read the file to also be disallowed
> from reading /proc/xxx/file.

It sounds to me that what you really want are the semantics of a
symbolic link and not the semantics of a hard link.  Is it just me,
or does it seem as if the pathname of the executable being stored as
a virtual symlink in procfs as "file" would solve these security
problems?

-- 
 Brian Fundakowski Feldman   \  FreeBSD: The Power to Serve!  /
 [EMAIL PROTECTED]`--'



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread Brian Fundakowski Feldman

On Sun, 7 Nov 1999, Sean Eric Fagan wrote:

> I don't, but what I like doesn't matter, it seems -- Warner knows everything.
> So I'm sure he knows better than I do the overhead this will impose, and the
> impracticality in a general system.
> 
> Unix really isn't set up to carry around 'official pathnames,' due to the
> existence of symlinks and other fun stuff.  Other systems are set up for this
> -- my favourite was EMBOS, by ELXSI -- and there are some _really_ nifty
> things you can do, if you have it.  (Watchdogs and program-based-access-lists
> are my two favourite, the latter allowing you to get rid of SUID/SGID in many
> cases.  There is a paper available on implementing watchdogs under unix
> [4.2bsd, I believe] that discusses some of this.  If you're willing to cover
> 60-80% of the cases, instead of 95-100%, it's considerably easier.)
> 

The _REALLY_ obvious solution to this is to find the real path on exec()
and store the pointer in proc.  How is this full of "overhead" and
"impractical"?

-- 
 Brian Fundakowski Feldman   \  FreeBSD: The Power to Serve!  /
 [EMAIL PROTECTED]`--'



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ARM support

1999-11-07 Thread Doug Rabson

On Sun, 7 Nov 1999, Stephane E. Potvin wrote:

> To whoever that may interest, I've now got a nearly working freebsd
> loader for the NetWinder. It currently only uses the serial console and
> miss internal hard driver support but work is underway for both these
> issues.
> 
> I'm making some progress too in getting world to compile but work in
> this area is more slower as I've got no way to test what I compile and
> I'm not that at ease with most of the code.

Hey, good work! If you have any questions on porting the kernel, don't
hesitate to contact me. I also have a fair knowledge of ARM too, although
its a bit dated (the last ARM machine I owned was an ARM3).

--
Doug Rabson Mail:  [EMAIL PROTECTED]
Nonlinear Systems Ltd.  Phone: +44 181 442 9037




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



ARM support

1999-11-07 Thread Stephane E. Potvin

To whoever that may interest, I've now got a nearly working freebsd
loader for the NetWinder. It currently only uses the serial console and
miss internal hard driver support but work is underway for both these
issues.

I'm making some progress too in getting world to compile but work in
this area is more slower as I've got no way to test what I compile and
I'm not that at ease with most of the code.

--
Stephane E. Potvin
InnoMediaLogic Inc. - http://www.multichassis.com/


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Running unattended (ifo FFS thread)

1999-11-07 Thread Dag-Erling Smorgrav

Kevin Day <[EMAIL PROTECTED]> writes:
> The problem is that 'fsck -py' ignores the 'p' and will fsck every time,
> even if it's unneeded. This takes ages for me. I believe I submitted a PR
> with a 'fix' to fsck.

'fsck -p || fsck -y' should do the trick.

DES
-- 
Dag-Erling Smorgrav - [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ftpd feature: lock file being stored

1999-11-07 Thread Jos Backus

On Sun, Nov 07, 1999 at 05:44:51PM +0900, Daniel C. Sobral wrote:
> Actually, use fstat to check against ftpd, and lockf between the
> scripts. :-)

Good idea :) I think that I'll do just that.

Cheers,
-- 
Jos Backus _/  _/_/_/"Modularity is not a hack."
  _/  _/   _/-- D. J. Bernstein
 _/  _/_/_/ 
_/  _/  _/_/
[EMAIL PROTECTED] _/_/   _/_/_/use Std::Disclaimer;


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread David Malone

> >You can make hard links to
> 
> No, you cannot.

Yes you can - you just need to make sure the target directory is on
the same filesystem as the *original* file.

11:30:gonzo 9% cp /bin/sleep /tmp
11:30:gonzo 10% ls -l /tmp/sleep*
-r-xr-xr-x  1 dwmalone  wheel  45224 Nov  7 11:30 /tmp/sleep
11:30:gonzo 11% /tmp/sleep 10 &
[1] 636
11:31:gonzo 12% ln /proc/636/file /tmp/sleep2
11:31:gonzo 13% ls -l /tmp/sleep*
-r-xr-xr-x  2 dwmalone  wheel  45224 Nov  7 11:30 /tmp/sleep
-r-xr-xr-x  2 dwmalone  wheel  45224 Nov  7 11:30 /tmp/sleep2
11:32:gonzo 14% chmod u+s /tmp/sleep2
11:32:gonzo 15% ls -l /tmp/sleep* /proc/636/file
-r-sr-xr-x  2 dwmalone  wheel  45224 Nov  7 11:30 /proc/636/file
-r-sr-xr-x  2 dwmalone  wheel  45224 Nov  7 11:30 /tmp/sleep
-r-sr-xr-x  2 dwmalone  wheel  45224 Nov  7 11:30 /tmp/sleep2

David.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread David Malone

> Err... I don't see the problem. The permissions of the hardlink will
> be different, so the user might be able to see the "code", but won't
> be able to run the suid (because the hardlink won't have the suid
> bit set).

Suid bit is stored in the inode, not the directory entry, so it will
be set. I've tested it - try running su in one window, don't type
the password, and then run /proc/pid/file and typing the password.

David.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread Julian Elischer


On Sun, 7 Nov 1999, Sean Eric Fagan wrote:

> In article <[EMAIL PROTECTED]> you write:
> >Brian Fundakowski Feldman wrote:
> >> It sounds to me that what you really want are the semantics of a
> >> symbolic link and not the semantics of a hard link.  Is it just me,
> >> or does it seem as if the pathname of the executable being stored as
> >> a virtual symlink in procfs as "file" would solve these security
> >> problems?
> >M... I like that...
> 
> I don't, but what I like doesn't matter, it seems -- Warner knows everything.
> So I'm sure he knows better than I do the overhead this will impose, and the
> impracticality in a general system.
> 
> Unix really isn't set up to carry around 'official pathnames,' due to the
> existence of symlinks and other fun stuff.  Other systems are set up for this

Linux is now one of them..
the file descriptor now (I was told) leads to a name cache entry, which is
the name under which it was openned. THat in turn has a pointer to teh
directory that it was in...etc.


> -- my favourite was EMBOS, by ELXSI -- and there are some _really_ nifty
> things you can do, if you have it.  (Watchdogs and program-based-access-lists
> are my two favourite, the latter allowing you to get rid of SUID/SGID in many
> cases.  There is a paper available on implementing watchdogs under unix
> [4.2bsd, I believe] that discusses some of this.  If you're willing to cover
> 60-80% of the cases, instead of 95-100%, it's considerably easier.)
> 
> 
> 
> To Unsubscribe: send mail to [EMAIL PROTECTED]
> with "unsubscribe freebsd-hackers" in the body of the message
> 



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: ftpd feature: lock file being stored

1999-11-07 Thread Daniel C. Sobral

Jos Backus wrote:
> 
> Scanning the directory for new files, as the aforementioned script does. If
> you have more than one script doing this at the same time, both may conclude
> that a given file is ``available'' and try to act upon it. Inevitably, one of
> those scripts will fail. Hence my solution. But maybe I don't quite understand
> the problem :-)
> 
> (Yes, I know you will say, "Don't run more than one script at a time then.".
> But whether this is possible really depends on the application and moreover
> seems to be an unecessary restriction.)

Actually, use fstat to check against ftpd, and lockf between the
scripts. :-)

--
Daniel C. Sobral(8-DCS)
[EMAIL PROTECTED]
[EMAIL PROTECTED]

What y'all wanna do?
Wanna be hackers? Code crackers? Slackers
Wastin' time with all the chatroom yakkers?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: loader security problem

1999-11-07 Thread Daniel C. Sobral

Alexey Zelkin wrote:
> 
> IMHO, it would be nice to have password protected loader(8) (like linux lilo)
> or just ACLs for loader(8)'s "more" command (like unavailable for viewing
> files)

cat >/boot/passwd.4th <> /boot/loader.rc

Say... does LILO have a scripting language?

--
Daniel C. Sobral(8-DCS)
[EMAIL PROTECTED]
[EMAIL PROTECTED]

What y'all wanna do?
Wanna be hackers? Code crackers? Slackers
Wastin' time with all the chatroom yakkers?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Procfs' pointers to files.

1999-11-07 Thread Sean Eric Fagan

In article <[EMAIL PROTECTED]> you write:
>Brian Fundakowski Feldman wrote:
>> It sounds to me that what you really want are the semantics of a
>> symbolic link and not the semantics of a hard link.  Is it just me,
>> or does it seem as if the pathname of the executable being stored as
>> a virtual symlink in procfs as "file" would solve these security
>> problems?
>M... I like that...

I don't, but what I like doesn't matter, it seems -- Warner knows everything.
So I'm sure he knows better than I do the overhead this will impose, and the
impracticality in a general system.

Unix really isn't set up to carry around 'official pathnames,' due to the
existence of symlinks and other fun stuff.  Other systems are set up for this
-- my favourite was EMBOS, by ELXSI -- and there are some _really_ nifty
things you can do, if you have it.  (Watchdogs and program-based-access-lists
are my two favourite, the latter allowing you to get rid of SUID/SGID in many
cases.  There is a paper available on implementing watchdogs under unix
[4.2bsd, I believe] that discusses some of this.  If you're willing to cover
60-80% of the cases, instead of 95-100%, it's considerably easier.)



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message