XL driver checksum producing corrupted but checksum-correct packets

2004-01-23 Thread Matthew Dillon
I tracked down an occassional buildworld failure on DragonFly to my
XL driver, which is synchronized to 4.x's XL driver.

What was occuring was that NFS would send an access/lookup RPC and the
data in the packet would get corrupted by the XL hardware, and the XL
hardware would apply a valid checksum to the corrupted packet so the NFS
receiver had no idea that the packet contained corrupted data.  By
tcpdumping on both the client and the server I observed the client 
believing it had sent a valid access RPC and the server receiving
a corrupted access RPC with a valid checksum, then returning an error
back to the client e.g. like EPROTONOSUPPORT.

The corruption seemed to occur about one out of every million packets or
so.  In DFly the corruption was especially detectable doing buildworlds
with /usr/src mounted via NFSv3/UDP, with /usr/bin/* residented (A DFly
feature which replaced the prior prelinking code we had with something
much better, which FreeBSD-5.x might want to adopt since 5.x is using
dynamic binaries for /bin now).  About once every 3 buildworlds, 
typicaly mkdep failing with weird open() errors returned by the server
after it had tried to process the corrupted NFS access/lookup rpc 
request.  I also observed it with /usr/bin/* not residented but at a
much lower frequency... once every 10 buildworlds.  I'm not sure why 
there was a difference.

Turning off hardware checksums with ifconfig solved the problem, and
I made it the default for DFly.  I recommend that FreeBSD turn off
hardware assisted checksums in the XL driver by default too.

Here is the pciconf -l output for the XL PCI card I am using:

[EMAIL PROTECTED]:6:0:   class=0x02 card=0x764610b7 chip=0x764610b7 rev=0x30 
hdr=0x00

-Matt
Matthew Dillon 
<[EMAIL PROTECTED]>
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: read-only compressed fs (call for testers) [UPDATE]

2004-01-23 Thread Dario Freni
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

> Thank you by the FreeSBIE team.

 You can try a FreeSBIE iso with the geom_ugz patch (compressed fs) at:

http://www.willystudios.com/freesbie/FreeSBIE-cloop-test.iso.bz2

 I haven't exact numbers to explain the perfomance growth, but it's
really _very_ fast compared to "normal" version. As filename said, this
is a test version, then any feedback is appreciated. 

Bye,
Dario

- -- 
Dario Freni ([EMAIL PROTECTED]) - SaturNero on IRCNet, Azzurra
Gruppo Utenti FreeBSD Italia (http://www.gufi.org)
GPG Public key at http://www.saturnero.net/saturnero.asc
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.2 (FreeBSD)

iD8DBQFAEdU3Z1XqWj1OqUERAsONAKDAMP7L/UIJYwC6r+SSuoA+tqt28gCcDstb
nrcFjHFrhvQzuvFZguJcUk4=
=OCPC
-END PGP SIGNATURE-
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


FreeBSD 5.2-RELEASE buildworld failure.

2004-01-23 Thread erek
I cvsuped today using tag RELENG_5_2 (i'm already using 5.2-RELEASE), i
noticed there was only documentation changes, and no real source changes,
i was preparing to recompile everything using some different
optimizations:
"
erek# cat /etc/make.conf
CFLAGS+= -pipe -march=athlon-xp -mcpu=athlon-xp -mmmx -m3dnow -ffast-math
-msse -mfpmath=sse,387
CXXFLAGS+= -pipe -march=athlon-xp -mcpu=athlon-xp -mmmx -m3dnow
-ffast-math   -msse -mfpmath=sse,387
COPTFLAGS+= -pipe -march=athlon-xp -mcpu=athlon-xp -mmmx -m3dnow
-ffast-math -msse -mfpmath=sse,387
"
Previously i had unroll-loops in my optimizations and i heard this could
actually be slower on modern CPUs, so i removed it.

During the buildworld I get this VERY odd error:

"mkdep -f .depend -a-DIN_GCC -DHAVE_CONFIG_H
-DPREFIX=\"/usr/obj/usr/src/i386
/usr\" -I/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc1plus/../cc_tools
-I/usr
/src/gnu/usr.bin/cc/cc1plus/../cc_tools
-I/usr/src/gnu/usr.bin/cc/cc1plus/../../
../../contrib/gcc
-I/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/conf
ig -I/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp -I.
-I/usr/obj/u
sr/src/i386/legacy/usr/include  parse+%DIKED.c
/usr/src/gnu/usr.bin/cc/cc1plus/.
./../../../contrib/gcc/main.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contri
b/gcc/cp/cp-lang.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/c-opt
s.c /usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/call.c
/usr/src/g
nu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/class.c
/usr/src/gnu/usr.bin/cc
/cc1plus/../../../../contrib/gcc/cp/cvt.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../
../../contrib/gcc/cp/decl.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/
gcc/cp/decl2.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/error.
c /usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/except.c
/usr/src/g
nu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/expr.c
/usr/src/gnu/usr.bin/cc/
cc1plus/../../../../contrib/gcc/cp/friend.c
/usr/src/gnu/usr.bin/cc/cc1plus/../.
./../../contrib/gcc/cp/init.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contri
b/gcc/cp/lex.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/mangle
.c /usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/method.c
/usr/src/
gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/pt.c
/usr/src/gnu/usr.bin/cc/c
c1plus/../../../../contrib/gcc/cp/ptree.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../
../../contrib/gcc/cp/repo.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/
gcc/cp/rtti.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/search.
c /usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/semantics.c
/usr/sr
c/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/spew.c
/usr/src/gnu/usr.bin/
cc/cc1plus/../../../../contrib/gcc/cp/tree.c
/usr/src/gnu/usr.bin/cc/cc1plus/../
../../../contrib/gcc/cp/typeck.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../con
trib/gcc/cp/typeck2.c
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp
/dump.c /usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp/optimize.c
In file included from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/tcon
fig.h:17,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/hcon
fig.h:2,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/conf
ig.h:1,
 from
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp
/parse.y:31,
 from /usr/src/contrib/gcc/cp/lex.c:33:
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:62:25: attempt to use
poisoned
 "malloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:63:25: attempt to use
poisoned
 "calloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:64:25: attempt to use
poisoned
 "realloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:65:25: attempt to use
poisoned
 "strdup"
In file included from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/tcon
fig.h:17,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/hcon
fig.h:2,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/conf
ig.h:1,
 from
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp
/parse.y:31,
 from /usr/src/contrib/gcc/cp/pt.c:37:
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:62:25: attempt to use
poisoned
 "malloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:63:25: attempt to use
poisoned
 "calloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:64:25: attempt to use
poisoned
 "realloc"
/usr/src/gnu/usr.bin/cc/cc_tools/freebsd-native.h:65:25: attempt to use
poisoned
 "strdup"
In file included from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/tcon
fig.h:17,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/hcon
fig.h:2,
 from
/usr/obj/usr/src/i386/usr/src/gnu/usr.bin/cc/cc_tools/conf
ig.h:1,
 from
/usr/src/gnu/usr.bin/cc/cc1plus/../../../../contrib/gcc/cp
/parse.

Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Don Lewis
On 23 Jan, Stuart Pook wrote:
>> send() for UDP should block if the socket is filled and the interface
>> can't drain the data fast enough.
> 
> It doesn't (at least I cannot make it block)
> 
>> Good question.  There is not feedback loop like in tcp, so handling this
>> blocking and releasing would be a little bit harder to do for UDP.
> 
> Send(2) indicates that it should do so.
> 
>> > I have written a test program,
>> > http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
>> > not block on FreeBSD.  It does with Linux and Solaris.
>> 
>> Do you know what the behaviour of Net- and/or OpenBSD is?
> 
> NetBSD is the same as FreeBSD.  I have not tested OpenBSD.
> MacOS X is similiar to FreeBSD in that send doesn't block, howver
> the send does not give an error: the packet is just thrown away.

Which is the same result as you would get if the bottleneck is just one
network hop away instead of at the local NIC.

Even if you changed the network stack to block or return an error when
it detected that it was tossing packets away, the application has no way
of knowing that all, a majority of, or even any of its data was getting
though even though it wasn't blocked by send() and didn't receive any
error returns.  Think about the case of a gigabit LAN connected to the
Internet over a modem link.  Even with a stack that blocked send() so
that no packets were lost in the stack, the application would think it
was sending data to a peer on the Internet at gigabit speeds, but in
reality most of the traffic would be silently dropped.  Even within the
LAN, traffic could be dropped if the outgoing switch port was more
congested than the link from the sending host to the NIC.

If you want to send a lot of data as fast as possible using UDP, then
you'll probably need to reinvent the TCP congestion avoidance algorithms
in your application so that you don't overly impact the network.  The
application can't rely on send() blocking or returning errors, since you
don't know that the local network interface is the bottleneck.  Since
the bottleneck could be anywhere, the application code is simpler if it
relies on cues that are the same no matter where the bottleneck is
located rather than adding extra code just to handle a local bottleneck.

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Julian Elischer


On Fri, 23 Jan 2004, Andre Oppermann wrote:

> Stuart Pook wrote:
> >>send() for UDP should block if the socket is filled and the interface
> >>can't drain the data fast enough.
> > 
> > It doesn't (at least I cannot make it block)
> 
> This stuff is rather complex.  A send() on a UDP socket processes right
> down to the if_output.  If that fails because the ifqueue is full, the
> packet will be free()d right away.  No luck with blocking and retrying.
> 
> >>Good question.  There is not feedback loop like in tcp, so handling this
> >>blocking and releasing would be a little bit harder to do for UDP.
> > 
> > Send(2) indicates that it should do so.
> 
> True.  The only thing I can offer is that when one packet produces an
> ENOBUFS, the socket will block on the next one for a couple of milliseconds.
> Doing the full program requires significant changes to the current structure
> of the BSD network code.
> 
> You could do the same in userland with a call to nanosleep(2) when you get
> a ENOBUFS.

from memory that is what ping -f does..


> 
> >>>I have written a test program,
> >>>http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
> >>>not block on FreeBSD.  It does with Linux and Solaris.
> >>
> >>Do you know what the behaviour of Net- and/or OpenBSD is?
> > 
> > NetBSD is the same as FreeBSD.  I have not tested OpenBSD.
> > MacOS X is similiar to FreeBSD in that send doesn't block, howver
> > the send does not give an error: the packet is just thrown away.
> 
> Browsing through the code I see that none of the BSDs are able to block
> on an UDP send.
> 
> -- 
> Andre
> 
> ___
> [EMAIL PROTECTED] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
> 

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


VOIP/Asterisk/Zaptel hardware for *BSD

2004-01-23 Thread Troy Settle

All,

I'm posting this here because I think a number of you may be interested in
seeing a strong open source VOIP solution for FreeBSD.

There's currently $1200 available as a bounty for someone to get Zaptel
drivers written/ported to FreeBSD and get Asterisk up and running.

For details on this bounty, please see:

  http://bugs.digium.com/bug_view_page.php?bug_id=847

I think this would be a great win for the FreeBSD community.  If anyone on
this list knows someone who might be interested in taking this bounty,
please forward this along.  If you wish to up the bounty, please feel free
to post it.

--
  Troy Settle
  Pulaski Networks
  http://www.psknet.com
  540.994.4254 ~ 866.477.5638
  Pulaski Chamber 2002 Small Business Of The Year
 

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-isp
To unsubscribe, send any mail to "[EMAIL PROTECTED]"
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: 4.9 kernel panics on a poweredge 2650

2004-01-23 Thread Andrew Kinney
On 23 Jan 2004 at 13:50, Bogdan TARU wrote:

> 
> 
>  Hi hackers,
> 
>  I am experiencing kernel panics on a poweredge 2650 each day around
>  3am (usually the machine comes up at 3:04am). The kernel panics are
>  reproductable by running: /etc/periodic/security/100.chksetuid (in
>  fact by runnning find on /usr with -perms). The problem lies
>  somewhere in /usr/ports. Deleting the /usr/ports tree doesn't solve
>  it, trying a cvs up of /usr/ports results in a crash again.
> 

Our experience is that repetitive crashes when dealing with large 
numbers of files (like the ports tree) generally points to hitting 
some OS resource limit.  Some things to check that may or may not 
apply to this particular problem:

sysctl vm.zone

Make sure you're not hitting any of those limits.

sysctl vm.kvm_size
sysctl vm.kvm_free

If kvm_free is running low just prior to the crash, you might want to 
increase your KVA_PAGES (see lint) and rebuild your kernel.

Of course, this is all hit and miss guess work until you have a crash 
dump, so getting a crash dump and a traceback from a kernel identical 
to your running kernel with debugging symbols would be a logical 
first step if you want to avoid any guessing.  If your tracebacks 
show failures in random locations, you're probably looking at bad 
RAM.  If you always fail in the same spot with each crash, then it is 
just a matter of determining why and correcting it.

I believe the freebsd  developer's handbook has instructions on how 
to setup a system to do an automatic crash dump for any panic.  It is 
relatively straightforward.

Sincerely,
Andrew Kinney
President and
Chief Technology Officer
Advantagecom Networks, Inc.
http://www.advantagecom.net


___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Pseudo device question

2004-01-23 Thread Anand Subramanian
Hi All,
If I have a pseudo-device on FreeBSD 5.1 created using the make_dev call
does anyone know how to grow this special file? I mean I don't want to
write to this file initially but grow this device memory to a somewhat
large limit. This is because I need to mmap this pseudo device into a user
process memory and then use the mmaped memory...Can I do this by defining
an ioctl() on this special file? If so what do I have to do to allocate
some memory and to attach the allocated memory to this device?


Thanks,
Anand



___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Patch for MDMFS.C

2004-01-23 Thread Rob MacGregor
Having wanted to mount a mfs file system with a specific user and mode I 
discovered that mdmfs.c doesn't support such an option when called as 
mount_mfs.

So, in a fit of lunacy/desparation I made a quick mod to it to provide such 
support, by disabling the automatic compat mode if another flag was given 
(it was either that or create mount_md).  I had to use -Z as just about 
everything else was used, but it means that the following now works:

md/var/spool/MIMEDefangmfs
rw,async,-Z,-s256m,-p0700,-wmailnull:mailnull2 0

I've attached a patch that supports this for people's thoughts and comments. 
 I'm afraid I didn't patch the man page, primarily because it's been too 
long and I suspect I'd break things.  If my providing a patch for the man 
page is important then I'll see about doing that too.

I don't follow this list I'm afraid, so if you want me to see something 
you'll need to CC me.

TIA

--
Rob  |  What part of "no" was it you didn't understand?
_
Use MSN Messenger to send music and pics to your friends 
http://www.msn.co.uk/messenger

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: fopen() on a pipe blocks multi threated applications.

2004-01-23 Thread rmkml
I use fbsd v4.9 release.


On Fri, 23 Jan 2004, rmkml wrote:

> Date: Fri, 23 Jan 2004 18:37:55 +0100 (CET)
> From: rmkml <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: fopen() on a pipe blocks multi threated applications.
>
> Hi
>
> fopen() on a pipe blocks multi threated applications.
>
> If pipe is not ready for reading, fopen blocks every thread until STREAM
> is ready.
>
> Is there a good reason for this ?
>
> Regards
>
> [EMAIL PROTECTED]
> ___
> [EMAIL PROTECTED] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


fopen() on a pipe blocks multi threated applications.

2004-01-23 Thread rmkml
Hi

fopen() on a pipe blocks multi threated applications.

If pipe is not ready for reading, fopen blocks every thread until STREAM
is ready.

Is there a good reason for this ?

Regards

[EMAIL PROTECTED]
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Luigi Rizzo
On Fri, Jan 23, 2004 at 06:09:20PM +0100, Andre Oppermann wrote:
...
> >>send() for UDP should block if the socket is filled and the interface
> >>can't drain the data fast enough.
> > 
> > It doesn't (at least I cannot make it block)
> 
> This stuff is rather complex.  A send() on a UDP socket processes right
> down to the if_output.  If that fails because the ifqueue is full, the
> packet will be free()d right away.  No luck with blocking and retrying.

and there would be no point in blocking given that the protocol (UDP)
is unreliable and designed not to give any guarantee whatsoever.
The most you can get is an error code on return from send()/write()
and friends.
Furthermore, send() and write() block on the socket buffer filling
up, not on the interface queue. Because UDP has no output socket
buffer, there is no way it can block.
Finally, overflows in the interface queue are never handled by send()
kernel code, not even for TCP: in this case, it is just TCP
congestion control that acts and, either at the next incoming ACK,
or upon a timeout, tries a retransmission.

> > Send(2) indicates that it should do so.

i admit the manpage should definitely be clarified -- it says 'if
no message space is available at the socket...', but it does cover
the UDP behaviour.

Technically, in the UDP case there is always space at the sending
socket, because that space is never used - by definition of the UDP
protocol - and the packet goes straight to the ip layer and then
down to the interface.

cheers
luigi
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Andre Oppermann
Stuart Pook wrote:
send() for UDP should block if the socket is filled and the interface
can't drain the data fast enough.
It doesn't (at least I cannot make it block)
This stuff is rather complex.  A send() on a UDP socket processes right
down to the if_output.  If that fails because the ifqueue is full, the
packet will be free()d right away.  No luck with blocking and retrying.
Good question.  There is not feedback loop like in tcp, so handling this
blocking and releasing would be a little bit harder to do for UDP.
Send(2) indicates that it should do so.
True.  The only thing I can offer is that when one packet produces an
ENOBUFS, the socket will block on the next one for a couple of milliseconds.
Doing the full program requires significant changes to the current structure
of the BSD network code.
You could do the same in userland with a call to nanosleep(2) when you get
a ENOBUFS.
I have written a test program,
http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
not block on FreeBSD.  It does with Linux and Solaris.
Do you know what the behaviour of Net- and/or OpenBSD is?
NetBSD is the same as FreeBSD.  I have not tested OpenBSD.
MacOS X is similiar to FreeBSD in that send doesn't block, howver
the send does not give an error: the packet is just thrown away.
Browsing through the code I see that none of the BSDs are able to block
on an UDP send.
--
Andre
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Ruslan Ermilov
On Fri, Jan 23, 2004 at 04:25:07PM +0100, Stuart Pook wrote:
> The documentation for send(2) says
> 
>   If no messages space is available at the socket to hold the message to be
>   transmitted, then send() normally blocks, unless the socket has been
>   placed in non-blocking I/O mode.  The select(2) call may be used to
>   determine when it is possible to send more data.
>   
> I cannot get send (or sendto which is what really interests me)
> to block on FreeBSD 4.9.  When I send as fast as I can to a socket,
> send rapidly fails with ENOBUFS.  I am not surprised that the kernel is
> running out of mbufs but I am surprised that send does not block until
> more become available.
> 
> Select does not block either.  It always says that I can write to the
> socket and then send fails with ENOBUFS.
> 
> The udp_output function in /sys/netinet/udp_usrreq.c, seems clear:
> 
> /*
>  * Calculate data length and get a mbuf
>  * for UDP and IP headers.
>  */
> M_PREPEND(m, sizeof(struct udpiphdr), M_DONTWAIT);
> if (m == 0) {
> error = ENOBUFS;
> if (addr)
> splx(s);
> goto release;
> }
> 
> There is no sign of send blocking waiting for a mbuf or of it returning
> EAGAIN if the socket is non-blocking.
> 
> Is the documentation for send(2) wrong or is there some way to make
> send and sendto block?
> 
> I have used setsockopt(s, SOL_SOCKET, SO_SNDBUF) to reduce the size
> of the output queue for the socket but send still returns ENOBUFS and
> never blocks or returns EAGAIN.
> 
UDP sockets don't use send buffer (like TCP does) for storing data,
only receive buffer, so SO_SNDBUF only affects the maximum size of
one write operation.


Cheers,
-- 
Ruslan Ermilov
FreeBSD committer
[EMAIL PROTECTED]


pgp0.pgp
Description: PGP signature


Re: 5.2 install cd hangs on boot

2004-01-23 Thread Peter Schuller
> when i try to boot the freebsd install cd on my laptop (Ibm thinkpad
> t40) it hangs after:
>
> cbb1:  mem 0x5100-0x51000fff irq 11 at
> device 0.1 on pci2
> cardbus1:  on cbb1
> pccard1: <16-bit PCCard bus> on cbb1
> cbb1: [MPSAFE]

I had similar problems with CardBus on the T40p. You may be interested in:

   http://www.scode.org/freebsdt40p.html

Also freebsd-mobile is probably the better list for questions like these.

I never did have trouble with the install CD though; but I ran with all PCMCIA 
slots empty. If you have any cards inserted, try removing them before booting 
the installation CD.

-- 
/ Peter Schuller, InfiDyne Technologies HB

PGP userID: 0xE9758B7D or 'Peter Schuller <[EMAIL PROTECTED]>'
Key retrieval: Send an E-Mail to [EMAIL PROTECTED]
E-Mail: [EMAIL PROTECTED] Web: http://www.scode.org


___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Stuart Pook
> send() for UDP should block if the socket is filled and the interface
> can't drain the data fast enough.

It doesn't (at least I cannot make it block)

> Good question.  There is not feedback loop like in tcp, so handling this
> blocking and releasing would be a little bit harder to do for UDP.

Send(2) indicates that it should do so.

> > I have written a test program,
> > http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
> > not block on FreeBSD.  It does with Linux and Solaris.
> 
> Do you know what the behaviour of Net- and/or OpenBSD is?

NetBSD is the same as FreeBSD.  I have not tested OpenBSD.
MacOS X is similiar to FreeBSD in that send doesn't block, howver
the send does not give an error: the packet is just thrown away.

Stuart
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: 4.9 kernel panics on a poweredge 2650

2004-01-23 Thread Bogdan TARU

 The box is remote (>300km), so cannot go into single user (have
 serial to it, but some stupid serial terminal server -- don't
 ask). Have tried to run fsck on the /usr partition (mounted, though
 -- so read only), but it didn't find any problems.

 bogdan

On Fri, Jan 23, 2004 at 01:24:07PM -, Steven Hartland wrote:
> may be a silly question have ur booted into single user and force checked
> the disk may be some sort of fs corruption?
> 
> Steve / K
> - Original Message - 
> From: "Bogdan TARU" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: 23 January 2004 12:50
> Subject: 4.9 kernel panics on a poweredge 2650
> 
> 
> >
> >
> > Hi hackers,
> >
> >  I am experiencing kernel panics on a poweredge 2650 each day around
> >  3am (usually the machine comes up at 3:04am). The kernel panics are
> >  reproductable by running: /etc/periodic/security/100.chksetuid (in
> >  fact by runnning find on /usr with -perms). The problem lies
> >  somewhere in /usr/ports. Deleting the /usr/ports tree doesn't solve
> >  it, trying a cvs up of /usr/ports results in a crash again.
> >
> >  I googled around a lil' bit, and found:
> >  http://lists.freebsd.org/pipermail/freebsd-hackers/2003-April/000192.html,
> >  and also Terry's answer, but that addresses freebsd 4.7. But my box
> >  is running 4.9-release, and the systems was cleanly installed with
> >  4.9 from the very beginning, so not upgraded from 4.7 or any other
> >  previous version.
> >
> >  The dmesg looks like:
> >
> > Copyright (c) 1992-2003 The FreeBSD Project.
> > Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993,
> > 1994
> > The Regents of the University of California. All rights
> > reserved.
> > FreeBSD 4.9-RELEASE #1: Mon Nov 17 23:47:49 CET 2003
> > root@:/usr/src/sys/compile/saturn
> > Timecounter "i8254"  frequency 1193182 Hz
> > Timecounter "TSC"  frequency 1790761584 Hz
> > CPU: Intel(R) Xeon(TM) CPU 1.80GHz (1790.76-MHz 686-class CPU)
> >   Origin = "GenuineIntel"  Id = 0xf27  Stepping = 7
> >
> Features=0xbfebfbff T,TM,PBE>
> >   Hyperthreading: 2 logical CPUs
> > real memory  = 2147418112 (2097088K bytes)
> > avail memory = 2088136704 (2039196K bytes)
> > Preloaded elf kernel "kernel" at 0xc0312000.
> > Warning: Pentium 4 CPU: PSE disabled
> > Pentium Pro MTRR support enabled
> > Using $PIR table, 9 entries at 0xc00fc430
> > npx0:  on motherboard
> > npx0: INT 16 interface
> > pcib0:  on motherboard
> > pci0:  on pcib0
> > pci0:  (vendor=0x1028, dev=0x000c) at 4.0 irq 11
> > pci0:  (vendor=0x1028, dev=0x0008) at 4.1 irq 10
> > pci0:  (vendor=0x1028, dev=0x000d) at 4.2 irq 7
> > pci0:  at 14.0
> > atapci0:  port
> > 0x8b0-0x8bf,0x8d8-0x8db,0x8d0-0x8d7,0x8c8-0x8cb,0x8c0-0x8c7 at device
> > 15.1 on pci0
> > ata0: at 0x1f0 irq 14 on atapci0
> > ata1: at 0x170 irq 15 on atapci0
> > pci0:  at 15.2 irq 5
> > isab0:  at device 15.3 on
> > pci0
> > isa0:  on isab0
> > pcib1:  on motherboard
> > pci1:  on pcib1
> > pcib2:  on motherboard
> > pci2:  on pcib2
> > pcib3:  on motherboard
> > pci3:  on pcib3
> > bge0:  mem
> > 0xfcf1-0xfcf1 irq 11 at device 6.0 on pci3
> > bge0: Ethernet address: 00:06:5b:f6:48:38
> > miibus0:  on bge0
> > brgphy0:  on miibus0
> > brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> > 1000baseTX-FDX, auto
> > bge1:  mem
> > 0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
> > bge1: Ethernet address: 00:06:5b:f6:48:39
> > miibus1:  on bge1
> > brgphy1:  on miibus1
> > brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> > 1000baseTX-FDX, auto
> > bge1:  mem
> > 0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
> > bge1: Ethernet address: 00:06:5b:f6:48:39
> > miibus1:  on bge1
> > brgphy1:  on miibus1
> > brgphy1:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> > 1000baseTX-FDX, auto
> > pcib4:  on
> > motherboard
> > pci4:  on pcib4
> > pcib8:  at device 8.0 on
> > pci4
> > pci5:  on pcib8
> > pci5:  (vendor=0x9005, dev=0x00c5) at 6.0 irq 7
> > pci5:  (vendor=0x9005, dev=0x00c5) at 6.1 irq 11
> > aac0:  mem 0xf000-0xf7ff irq 7 at device 8.1
> > on pci4
> > aac0: i960RX 100MHz, 118MB cache memory, optional battery present
> > aac0: Kernel 2.7-1, Build 3170, S/N 5010d3
> > aac0: Supported
> > Options=75c
> > pcib5:  on
> > motherboard
> > pci6:  on pcib5
> > pcib6:  on
> > motherboard
> > pci7:  on pcib6
> > pcib7:  on
> > motherboard
> > pci8:  on pcib7
> > orm0:  at iomem
> > 0xc-0xc7fff,0xc8000-0xcbfff,0xec000-0xe on isa0
> > pmtimer0 on isa0
> > fdc0:  at port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on
> > isa0
> > fdc0: FIFO enabled, 8 bytes threshold
> > fd0: <1440-KB 3.5" drive> on fdc0 drive 0
> > atkbdc0:  at port 0x60,0x64 on isa0
> > vga0:  at port 0x3c0-0x3df iomem 0xa-0xb on
> > isa0
> > sc0:  at flags 0x100 on isa0
> > sc0: VGA <16 virtual consoles, flags=0x300>
> > sio0 at port 0x3f8-0x3ff irq 4 flags 0x10 on isa0
> > sio0: type 16550A
> > sio1 at port 0x2f8-0x2ff irq 3 on isa0
> > sio1: t

5.2 install cd hangs on boot

2004-01-23 Thread Pierre Börjesson
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
this is my first post to freebsd mailinglists so i hope that im sending
it to the right place ;)
when i try to boot the freebsd install cd on my laptop (Ibm thinkpad
t40) it hangs after:
cbb1:  mem 0x5100-0x51000fff irq 11 at
device 0.1 on pci2
cardbus1:  on cbb1
pccard1: <16-bit PCCard bus> on cbb1
cbb1: [MPSAFE]
anyone that have experienced this or might know of a solution ?
I tried booting without acpi but that didnt help ;(
from the info i found at google etc it seems that freebsd is known to
have problems with certain laptop models... but i havent found any
solutions though ;(
// pierre
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.3-nr1 (Windows XP)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFAEUMYbKmHCtV7OGcRAnMvAKDZNH7z3/00FExYM7zGwKPUwV0yJACg2oyD
gmNZZmM3euGkFCAfM3H5plg=
=ZrD8
-END PGP SIGNATURE-
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Andre Oppermann
Stuart Pook wrote:
The documentation for send(2) says

If no messages space is available at the socket to hold the message to be
transmitted, then send() normally blocks, unless the socket has been
placed in non-blocking I/O mode.  The select(2) call may be used to
determine when it is possible to send more data.

I cannot get send (or sendto which is what really interests me)
to block on FreeBSD 4.9.  When I send as fast as I can to a socket,
send rapidly fails with ENOBUFS.  I am not surprised that the kernel is
running out of mbufs but I am surprised that send does not block until
more become available.
Select does not block either.  It always says that I can write to the
socket and then send fails with ENOBUFS.
send() for UDP should block if the socket is filled and the interface
can't drain the data fast enough.
The udp_output function in /sys/netinet/udp_usrreq.c, seems clear:

/*
 * Calculate data length and get a mbuf
 * for UDP and IP headers.
 */
M_PREPEND(m, sizeof(struct udpiphdr), M_DONTWAIT);
if (m == 0) {
error = ENOBUFS;
if (addr)
splx(s);
goto release;
}

There is no sign of send blocking waiting for a mbuf or of it returning
EAGAIN if the socket is non-blocking.

Is the documentation for send(2) wrong or is there some way to make
send and sendto block?
Good question.  There is not feedback loop like in tcp, so handling this
blocking and releasing would be a little bit harder to do for UDP.
I have used setsockopt(s, SOL_SOCKET, SO_SNDBUF) to reduce the size
of the output queue for the socket but send still returns ENOBUFS and
never blocks or returns EAGAIN.
I note that send on Linux and Solaris blocks and that on these systems
select can be used to wait until the send will not block.
I have written a test program,
http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
not block on FreeBSD.  It does with Linux and Solaris.
Do you know what the behaviour of Net- and/or OpenBSD is?

--
Andre
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


send(2) does not block, send(2) man page wrong?

2004-01-23 Thread Stuart Pook
The documentation for send(2) says

If no messages space is available at the socket to hold the message to be
transmitted, then send() normally blocks, unless the socket has been
placed in non-blocking I/O mode.  The select(2) call may be used to
determine when it is possible to send more data.

I cannot get send (or sendto which is what really interests me)
to block on FreeBSD 4.9.  When I send as fast as I can to a socket,
send rapidly fails with ENOBUFS.  I am not surprised that the kernel is
running out of mbufs but I am surprised that send does not block until
more become available.

Select does not block either.  It always says that I can write to the
socket and then send fails with ENOBUFS.

The udp_output function in /sys/netinet/udp_usrreq.c, seems clear:

/*
 * Calculate data length and get a mbuf
 * for UDP and IP headers.
 */
M_PREPEND(m, sizeof(struct udpiphdr), M_DONTWAIT);
if (m == 0) {
error = ENOBUFS;
if (addr)
splx(s);
goto release;
}

There is no sign of send blocking waiting for a mbuf or of it returning
EAGAIN if the socket is non-blocking.

Is the documentation for send(2) wrong or is there some way to make
send and sendto block?

I have used setsockopt(s, SOL_SOCKET, SO_SNDBUF) to reduce the size
of the output queue for the socket but send still returns ENOBUFS and
never blocks or returns EAGAIN.

I note that send on Linux and Solaris blocks and that on these systems
select can be used to wait until the send will not block.

I have written a test program,
http://www.infres.enst.fr/~pook/send/server.c, that shows that send does
not block on FreeBSD.  It does with Linux and Solaris.

thanks for your help
Stuart
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: 4.9 kernel panics on a poweredge 2650

2004-01-23 Thread Steven Hartland
may be a silly question have ur booted into single user and force checked
the disk may be some sort of fs corruption?

Steve / K
- Original Message - 
From: "Bogdan TARU" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: 23 January 2004 12:50
Subject: 4.9 kernel panics on a poweredge 2650


>
>
> Hi hackers,
>
>  I am experiencing kernel panics on a poweredge 2650 each day around
>  3am (usually the machine comes up at 3:04am). The kernel panics are
>  reproductable by running: /etc/periodic/security/100.chksetuid (in
>  fact by runnning find on /usr with -perms). The problem lies
>  somewhere in /usr/ports. Deleting the /usr/ports tree doesn't solve
>  it, trying a cvs up of /usr/ports results in a crash again.
>
>  I googled around a lil' bit, and found:
>  http://lists.freebsd.org/pipermail/freebsd-hackers/2003-April/000192.html,
>  and also Terry's answer, but that addresses freebsd 4.7. But my box
>  is running 4.9-release, and the systems was cleanly installed with
>  4.9 from the very beginning, so not upgraded from 4.7 or any other
>  previous version.
>
>  The dmesg looks like:
>
> Copyright (c) 1992-2003 The FreeBSD Project.
> Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993,
> 1994
> The Regents of the University of California. All rights
> reserved.
> FreeBSD 4.9-RELEASE #1: Mon Nov 17 23:47:49 CET 2003
> root@:/usr/src/sys/compile/saturn
> Timecounter "i8254"  frequency 1193182 Hz
> Timecounter "TSC"  frequency 1790761584 Hz
> CPU: Intel(R) Xeon(TM) CPU 1.80GHz (1790.76-MHz 686-class CPU)
>   Origin = "GenuineIntel"  Id = 0xf27  Stepping = 7
>
Features=0xbfebfbff
>   Hyperthreading: 2 logical CPUs
> real memory  = 2147418112 (2097088K bytes)
> avail memory = 2088136704 (2039196K bytes)
> Preloaded elf kernel "kernel" at 0xc0312000.
> Warning: Pentium 4 CPU: PSE disabled
> Pentium Pro MTRR support enabled
> Using $PIR table, 9 entries at 0xc00fc430
> npx0:  on motherboard
> npx0: INT 16 interface
> pcib0:  on motherboard
> pci0:  on pcib0
> pci0:  (vendor=0x1028, dev=0x000c) at 4.0 irq 11
> pci0:  (vendor=0x1028, dev=0x0008) at 4.1 irq 10
> pci0:  (vendor=0x1028, dev=0x000d) at 4.2 irq 7
> pci0:  at 14.0
> atapci0:  port
> 0x8b0-0x8bf,0x8d8-0x8db,0x8d0-0x8d7,0x8c8-0x8cb,0x8c0-0x8c7 at device
> 15.1 on pci0
> ata0: at 0x1f0 irq 14 on atapci0
> ata1: at 0x170 irq 15 on atapci0
> pci0:  at 15.2 irq 5
> isab0:  at device 15.3 on
> pci0
> isa0:  on isab0
> pcib1:  on motherboard
> pci1:  on pcib1
> pcib2:  on motherboard
> pci2:  on pcib2
> pcib3:  on motherboard
> pci3:  on pcib3
> bge0:  mem
> 0xfcf1-0xfcf1 irq 11 at device 6.0 on pci3
> bge0: Ethernet address: 00:06:5b:f6:48:38
> miibus0:  on bge0
> brgphy0:  on miibus0
> brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> 1000baseTX-FDX, auto
> bge1:  mem
> 0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
> bge1: Ethernet address: 00:06:5b:f6:48:39
> miibus1:  on bge1
> brgphy1:  on miibus1
> brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> 1000baseTX-FDX, auto
> bge1:  mem
> 0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
> bge1: Ethernet address: 00:06:5b:f6:48:39
> miibus1:  on bge1
> brgphy1:  on miibus1
> brgphy1:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
> 1000baseTX-FDX, auto
> pcib4:  on
> motherboard
> pci4:  on pcib4
> pcib8:  at device 8.0 on
> pci4
> pci5:  on pcib8
> pci5:  (vendor=0x9005, dev=0x00c5) at 6.0 irq 7
> pci5:  (vendor=0x9005, dev=0x00c5) at 6.1 irq 11
> aac0:  mem 0xf000-0xf7ff irq 7 at device 8.1
> on pci4
> aac0: i960RX 100MHz, 118MB cache memory, optional battery present
> aac0: Kernel 2.7-1, Build 3170, S/N 5010d3
> aac0: Supported
> Options=75c
> pcib5:  on
> motherboard
> pci6:  on pcib5
> pcib6:  on
> motherboard
> pci7:  on pcib6
> pcib7:  on
> motherboard
> pci8:  on pcib7
> orm0:  at iomem
> 0xc-0xc7fff,0xc8000-0xcbfff,0xec000-0xe on isa0
> pmtimer0 on isa0
> fdc0:  at port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on
> isa0
> fdc0: FIFO enabled, 8 bytes threshold
> fd0: <1440-KB 3.5" drive> on fdc0 drive 0
> atkbdc0:  at port 0x60,0x64 on isa0
> vga0:  at port 0x3c0-0x3df iomem 0xa-0xb on
> isa0
> sc0:  at flags 0x100 on isa0
> sc0: VGA <16 virtual consoles, flags=0x300>
> sio0 at port 0x3f8-0x3ff irq 4 flags 0x10 on isa0
> sio0: type 16550A
> sio1 at port 0x2f8-0x2ff irq 3 on isa0
> sio1: type 16550A
> IP Filter: v3.4.31 initialized.  Default = pass all, Logging =
> disabled
> ata0-slave: ATAPI identify retries exceeded
> acd0: CDROM  at ata0-master PIO4
> aacd0:  on aac0
> aacd0: 139997MB (286714368 sectors)
>
>
>  Any ideas?
>
>  Thank you,
>  bogdan
> ___
> [EMAIL PROTECTED] mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "[EMAIL PROTECTED]"
>


This e.mail is private and confidential between Multiplay (UK) Ltd. and the person or

4.9 kernel panics on a poweredge 2650

2004-01-23 Thread Bogdan TARU


Hi hackers,

 I am experiencing kernel panics on a poweredge 2650 each day around
 3am (usually the machine comes up at 3:04am). The kernel panics are
 reproductable by running: /etc/periodic/security/100.chksetuid (in
 fact by runnning find on /usr with -perms). The problem lies
 somewhere in /usr/ports. Deleting the /usr/ports tree doesn't solve
 it, trying a cvs up of /usr/ports results in a crash again.

 I googled around a lil' bit, and found:
 http://lists.freebsd.org/pipermail/freebsd-hackers/2003-April/000192.html,
 and also Terry's answer, but that addresses freebsd 4.7. But my box
 is running 4.9-release, and the systems was cleanly installed with
 4.9 from the very beginning, so not upgraded from 4.7 or any other
 previous version.

 The dmesg looks like:

Copyright (c) 1992-2003 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993,
1994
The Regents of the University of California. All rights
reserved.
FreeBSD 4.9-RELEASE #1: Mon Nov 17 23:47:49 CET 2003
root@:/usr/src/sys/compile/saturn
Timecounter "i8254"  frequency 1193182 Hz
Timecounter "TSC"  frequency 1790761584 Hz
CPU: Intel(R) Xeon(TM) CPU 1.80GHz (1790.76-MHz 686-class CPU)
  Origin = "GenuineIntel"  Id = 0xf27  Stepping = 7
  
Features=0xbfebfbff
  Hyperthreading: 2 logical CPUs
real memory  = 2147418112 (2097088K bytes)
avail memory = 2088136704 (2039196K bytes)
Preloaded elf kernel "kernel" at 0xc0312000.
Warning: Pentium 4 CPU: PSE disabled
Pentium Pro MTRR support enabled
Using $PIR table, 9 entries at 0xc00fc430
npx0:  on motherboard
npx0: INT 16 interface
pcib0:  on motherboard
pci0:  on pcib0
pci0:  (vendor=0x1028, dev=0x000c) at 4.0 irq 11
pci0:  (vendor=0x1028, dev=0x0008) at 4.1 irq 10
pci0:  (vendor=0x1028, dev=0x000d) at 4.2 irq 7
pci0:  at 14.0
atapci0:  port
0x8b0-0x8bf,0x8d8-0x8db,0x8d0-0x8d7,0x8c8-0x8cb,0x8c0-0x8c7 at device
15.1 on pci0
ata0: at 0x1f0 irq 14 on atapci0
ata1: at 0x170 irq 15 on atapci0
pci0:  at 15.2 irq 5
isab0:  at device 15.3 on
pci0
isa0:  on isab0
pcib1:  on motherboard
pci1:  on pcib1
pcib2:  on motherboard
pci2:  on pcib2
pcib3:  on motherboard
pci3:  on pcib3
bge0:  mem
0xfcf1-0xfcf1 irq 11 at device 6.0 on pci3
bge0: Ethernet address: 00:06:5b:f6:48:38
miibus0:  on bge0
brgphy0:  on miibus0
brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
1000baseTX-FDX, auto
bge1:  mem
0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
bge1: Ethernet address: 00:06:5b:f6:48:39
miibus1:  on bge1
brgphy1:  on miibus1
brgphy0:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
1000baseTX-FDX, auto
bge1:  mem
0xfcf0-0xfcf0 irq 10 at device 8.0 on pci3
bge1: Ethernet address: 00:06:5b:f6:48:39
miibus1:  on bge1
brgphy1:  on miibus1
brgphy1:  10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX,
1000baseTX-FDX, auto
pcib4:  on
motherboard
pci4:  on pcib4
pcib8:  at device 8.0 on
pci4
pci5:  on pcib8
pci5:  (vendor=0x9005, dev=0x00c5) at 6.0 irq 7
pci5:  (vendor=0x9005, dev=0x00c5) at 6.1 irq 11
aac0:  mem 0xf000-0xf7ff irq 7 at device 8.1
on pci4
aac0: i960RX 100MHz, 118MB cache memory, optional battery present
aac0: Kernel 2.7-1, Build 3170, S/N 5010d3
aac0: Supported
Options=75c
pcib5:  on
motherboard
pci6:  on pcib5
pcib6:  on
motherboard
pci7:  on pcib6
pcib7:  on
motherboard
pci8:  on pcib7
orm0:  at iomem
0xc-0xc7fff,0xc8000-0xcbfff,0xec000-0xe on isa0
pmtimer0 on isa0
fdc0:  at port 0x3f0-0x3f5,0x3f7 irq 6 drq 2 on
isa0
fdc0: FIFO enabled, 8 bytes threshold
fd0: <1440-KB 3.5" drive> on fdc0 drive 0
atkbdc0:  at port 0x60,0x64 on isa0
vga0:  at port 0x3c0-0x3df iomem 0xa-0xb on
isa0
sc0:  at flags 0x100 on isa0
sc0: VGA <16 virtual consoles, flags=0x300>
sio0 at port 0x3f8-0x3ff irq 4 flags 0x10 on isa0
sio0: type 16550A
sio1 at port 0x2f8-0x2ff irq 3 on isa0
sio1: type 16550A
IP Filter: v3.4.31 initialized.  Default = pass all, Logging =
disabled
ata0-slave: ATAPI identify retries exceeded
acd0: CDROM  at ata0-master PIO4
aacd0:  on aac0
aacd0: 139997MB (286714368 sectors)


 Any ideas?

 Thank you,
 bogdan
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: symlink: /home -> /usr/home vs. /home -> usr/home in default installation

2004-01-23 Thread William M. Grim
Andriy Tkachuk wrote:



The idea is this: if you mount your / to another
place (for example /mnt on another computer), your
/mnt/home will point to correct place (/mnt/usr/home)
instead of /usr/home.
What do you, falks, think about this?

Thanks.
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to 
"[EMAIL PROTECTED]"


That idea seems good to me.  I don't forsee any issues with it.

--
William Michael Grim
Student, Southern Illinois University at Edwardsville
Unix Network Administrator, SIUE, Computer Science dept.
Phone: (217) 341-6552
Email: [EMAIL PROTECTED]
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


symlink: /home -> /usr/home vs. /home -> usr/home in default installation

2004-01-23 Thread Andriy Tkachuk


The idea is this: if you mount your / to another
place (for example /mnt on another computer), your
/mnt/home will point to correct place (/mnt/usr/home)
instead of /usr/home.
What do you, falks, think about this?

Thanks.
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Ethereal build issues

2004-01-23 Thread Jeff Mitchell
Hackers--

Just wanted to give you a heads-up on an issue I had.  I have a freshly-made
5.2 box and I was installing Ethereal from the ports tree.  For whatever
reason the file resolv.c in
/usr/ports/net/ethereal/work/ethereal-0.9.14/epan could not find the file
adns.h, which was in the default location of /usr/local/include.  Hard
coding the path in resolv.c fixed the issue.

--Jeff

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


KTRACE flags

2004-01-23 Thread Divacky Roman
Hi

Is there any way  how can I see which proceses are ktraced? It would be
neat to have this feature...

roman

___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "[EMAIL PROTECTED]"