Re: Making /etc/defaults/rc.conf a configuration file.

2000-10-04 Thread Doug Barton

Neil Blakey-Milner wrote:
> 
> Hi,
> 
> With these patches, and the new tiny util 'sourceconf', we can make
> /etc/defaults/rc.conf and /etc/defaults/periodic.conf configuration
> files again, such that they can be parsed by things other than 'sh'.

I have been very sick the last few days, so I haven't commented on this
yet. 

> It also allows you to set 'rc_conf_files' (or, actually, whatever you
> set filevar to) in lower places than the default file, so that you don't
> change the default file.

Can you give more details about this process? I'm not sure how it would
work to change the list of conf files other than in the default location
if you're going to source the defaults anyway. 
 
> This only shows how to replace things using rc.conf - changing scripts
> to use periodic.conf is as simple as replacing
> 
> if [ -r /etc/defaults/periodic.conf ]
> then
> . /etc/defaults/periodic.conf
> source_periodic_confs
> fi
> 
> with
> 
> rcfile=/etc/defaults/periodic.conf listvar=periodic_conf_files .  /etc/sourceconf

But you're basically doing exactly the same thing(s), just in a
different order. With all due respect to Neil, I stated previously that
I feel like this is a solution in search of a problem. I'm not arguing
for the status quo necessarily, I'm just concerned that when something
comes along down the road that *does* need to do something differently,
we will end up redoing all of this stuff again. 

For what it's worth, I do not oppose the change, however I would like
to see some comments in the sourceconf file as to what is going on where
and why. I can't help feeling that sourceconf_start and sourceconf_dosrc
could just as easily be in the same function, but in my current state
I'm probably missing something. Also, in the sc.patch the entry for
/etc/rc has ". /etc/sourceconfs" instead of ". /etc/sourceconf". 

In any case, if the patch has been thoroughly tested under a variety of
different configurations, it's probably worth putting in -current. It
would probably be worth comparing what you're doing here to the work
that's happening on the rc files in netbsd that some here have discussed
bringing over, in whole or in part. 

Doug


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: IDE drives doing BBR?

2000-10-04 Thread Matthew Jacob

> > Or do I just write nul's to the block or 0's, and it's supposed to do it
> > automatically?  or do I just punt.
> 
> 'dd if=/dev/zero of=/dev/ad1 bs=4k' works great; takes about an hour to
> scrub the entire disk.  Run until clean.  Running it right now in fact.

Err, Umm, I wouldn't assume that drives always know that writes have
failed. Do a read pass too.




To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: IDE drives doing BBR?

2000-10-04 Thread Doug White

On Wed, 4 Oct 2000, Jaye Mathisen wrote:

> Remember reading on hackers somewhere that newer drives like IBM supported
> this feature.  I'm getting a few bad blocks on a 75GB IBM drive (at least
> according to the ata driver), and rather than replacing it and moves on,
> the disk basically dies.
> 
> However, I run the IBM drive fitness test, it works some magic in there
> writing data to the drive, and the drive is back, and the failed block now
> seems fine.
> 

Ran into this today actually ...

Yes the IBMs do automatic block remapping ... you may have to scrub the
disk a few times to get the bad blocks out.  Now you have 75GB of
potentially bad blocks so you have to scrub pretty completely.

> Or do I just write nul's to the block or 0's, and it's supposed to do it
> automatically?  or do I just punt.

'dd if=/dev/zero of=/dev/ad1 bs=4k' works great; takes about an hour to
scrub the entire disk.  Run until clean.  Running it right now in fact.

Doug White|  FreeBSD: The Power to Serve
[EMAIL PROTECTED] |  www.FreeBSD.org



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: anonymous memory map vs mmap on /dev/zero

2000-10-04 Thread Ronald G Minnich

On Wed, 4 Oct 2000, FengYue wrote:

> It seems that mmap on /dev/zero is more portable.

no really, It won't work at all correctly on linux, and on Tru64 it does
the totally wrong thing, but the (fd = -1, MAP_ANONYMOUS) does the right
thing on tru64. 

It's disappointing that this works so unportably :-(

ron



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



anonymous memory map vs mmap on /dev/zero

2000-10-04 Thread FengYue


Hi, excluding the extra kernel calls of open()/close() on /dev/zero,
which one of the following would be more efficient: 

1) Using mmap on /dev/zero
2) Using mmap with MAP_ANON flag

The purpose is, ofcourse, to share the memory (R&W) among all child
processes.

It seems that mmap on /dev/zero is more portable.

Thanks



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: IDE drives doing BBR?

2000-10-04 Thread Andresen,Jason R.

Jaye Mathisen wrote:
> 
> Used ABBR on SCSI disks all the time, very nice.
> 
> Remember reading on hackers somewhere that newer drives like IBM supported
> this feature.  I'm getting a few bad blocks on a 75GB IBM drive (at least
> according to the ata driver), and rather than replacing it and moves on,
> the disk basically dies.
> 
> However, I run the IBM drive fitness test, it works some magic in there
> writing data to the drive, and the drive is back, and the failed block now
> seems fine.
> 
> So is there some equivalent of camcontrol or scsicmd for ATA drives that
> turns on this feature, and allows my running system to take advantage of
> it?
> 
> Or do I just write nul's to the block or 0's, and it's supposed to do it
> automatically?  or do I just punt.

Or a possible third option: A 75GB IBM HD is probablly still within the
warentee period.  Assuming you don't play fetch with your dog and the
HD, you can probabally get it replaced.  

-- 
   _  __  ___    ___   __
  / \/ \  | ||_ _||  _ \|___| | Jason Andresen -- [EMAIL PROTECTED]
 / /\/\ \ | | | | | |/ /|_|_  | Views expressed may not reflect those 
/_/\_\|_| |_| |_|\_\|___| | of the Mitre Corporation.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



IDE drives doing BBR?

2000-10-04 Thread Jaye Mathisen



Used ABBR on SCSI disks all the time, very nice.

Remember reading on hackers somewhere that newer drives like IBM supported
this feature.  I'm getting a few bad blocks on a 75GB IBM drive (at least
according to the ata driver), and rather than replacing it and moves on,
the disk basically dies.

However, I run the IBM drive fitness test, it works some magic in there
writing data to the drive, and the drive is back, and the failed block now
seems fine.

So is there some equivalent of camcontrol or scsicmd for ATA drives that
turns on this feature, and allows my running system to take advantage of
it?

Or do I just write nul's to the block or 0's, and it's supposed to do it
automatically?  or do I just punt.



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Automatic updates (was Re: How long for -stable...)

2000-10-04 Thread Warner Losh

In message <[EMAIL PROTECTED]> Jordan Hubbard writes:
: > I think that we can do a lot with cvsupd.  I've used cvsupd to grab
: > binaries on an experimental basis and it seems to work great.  I've
: 
: Hmmm.  Does cvsupd also move a target out of the way if it already
: exists and it's in the process of replacing it?  What if the target is
: chflag'd but can be unprotected at the current security level?
: 
: What I'm trying to say is that if you have "/sbin/init" and cvsupd is
: about to replace it, I would expect the steps to be something like
: this:
: 
: Receive new init as /sbin/init.${pid} (or something)
:  |
:  |<+
:  | Yes |Yes
:  \/   No   |No
:  Mv /sbin/init.${pid} /sbin/init  --> chflags noschg /sbin/init --> Fail
:|
:| Yes
:\/
:Done
: 
: If cvsupd does that or can be gimmicked to do that (add
: --potentially-hose-me flag? ;) then I'd say it's a serious
: contender for being part of a binary update process.

I don't know.  I seem to recall that jdp told me at the talk I gave
last year that it just wipes the flags completely and doesn't honor
them. 

I think it deals well with this, but I've not tried to replace init on
a running system.  Given that the Pluto upgrade went well, I'd expect
the answer is yes, it works.

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Automatic updates (was Re: How long for -stable...)

2000-10-04 Thread Nate Williams

> > I think that we can do a lot with cvsupd.  I've used cvsupd to grab
> > binaries on an experimental basis and it seems to work great.  I've
> 
> Hmmm.  Does cvsupd also move a target out of the way if it already
> exists and it's in the process of replacing it?  What if the target is
> chflag'd but can be unprotected at the current security level?

I know the author, and I'll bet you he could be convinced to modify it
to do what we need. *grin*



Nate


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Automatic updates (was Re: How long for -stable...)

2000-10-04 Thread Jordan Hubbard

> I think that we can do a lot with cvsupd.  I've used cvsupd to grab
> binaries on an experimental basis and it seems to work great.  I've

Hmmm.  Does cvsupd also move a target out of the way if it already
exists and it's in the process of replacing it?  What if the target is
chflag'd but can be unprotected at the current security level?

What I'm trying to say is that if you have "/sbin/init" and cvsupd is
about to replace it, I would expect the steps to be something like
this:

Receive new init as /sbin/init.${pid} (or something)
 |
 |<+
 | Yes |Yes
 \/   No   |No
 Mv /sbin/init.${pid} /sbin/init  --> chflags noschg /sbin/init --> Fail
   |
   | Yes
   \/
   Done

If cvsupd does that or can be gimmicked to do that (add
--potentially-hose-me flag? ;) then I'd say it's a serious
contender for being part of a binary update process.

- Jordan


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Automatic updates (was Re: How long for -stable...)

2000-10-04 Thread Warner Losh

In message <[EMAIL PROTECTED]> Nate Williams writes:
: [ Culled the list way down, and moved it to -hackers ]
: 
: > We could also look into providing an "update" command or something
: > which would pull either sources or binaries over from a snapshot box
: > and make the process of getting up to the branch-head a lot easier.
: > It's long been on my wishlist and I'm at the point where I'd be
: > willing to devote some BSDi resources to both writing the software
: > and setting up a build box for creating the relevant binaries on an
: > ongoing basis.
: 
: Whoo hoo.  Sounds like a *great* plan!

I think that we can do a lot with cvsupd.  I've used cvsupd to grab
binaries on an experimental basis and it seems to work great.  I've
also worked at companies that did this on all their workstations on
boot and they updated one area and then rebooted 20-odd machines to
update them.  Not without its problems, but a lot less hair than even
an installworld.

Warner


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



How to allocate kernel memory with PG_NC_PCD set

2000-10-04 Thread Alexander N. Kabaev

The subject says it all :)

What is the best way to allocate kernel memory with non-cacheable bit set? Or,
better yet, is it possible to change caching bit on an already kmalloc'ed
memory block? Will something like this work?

pt_entry_t pte;
pte = (pt_entry_t)vtopte(vaddr);
*pte |= PG_NC_PCD;
invtlb();


--
E-Mail: Alexander N. Kabaev <[EMAIL PROTECTED]>
Date: 04-Oct-00
Time: 12:12:22
--


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message