Re: mtx_unlock in kernel
On 3/23/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: If I want to use mtx_unlock for some threads, should I use mtx_lock() before? I admit, I don't understand your question, but anyway: man 9 mutex -- Pietro Cerutti - ASCII Ribbon Campaign - against HTML e-mail and proprietary attachments www.asciiribbon.org ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: FreeBSD panics...
On Thursday 22 March 2007 20:58, Sławomir Babiński SYSINFO wrote: Can anyone look at this and sell any tips why my server panics? Wrong list. This should have been sent to -current or -net ... [EMAIL PROTECTED]:/root# uname -a FreeBSD mercury.msi.pl 6.2-STABLE FreeBSD 6.2-STABLE #7: Wed Mar 21 19:20:18 CET 2007 [EMAIL PROTECTED]:/usr/obj/usr/src/sys/cobaltus i386 ... #7 0xc0743318 in m_copydata (m=0x0, off=0, len=1, cp=0xc502bf08 essful\r\n257 \/\ is the current directory\r\n250 CWó\f) at /usr/src/sys/kern/uipc_mbuf.c:543 #8 0xc048d71d in ippr_ftp_process (fin=0xe2d4db30, nat=0xca66e400, ftp=0xc502be00, rv=1) at ip_ftp_pxy.c:1192 #9 0xc048db2c in ippr_ftp_in (fin=0xe2d4db30, aps=0x0, nat=0xca66e400) at ip_ftp_pxy.c:1358 #10 0xc0492dfb in appr_check (fin=0xe2d4db30, nat=0xca66e400) at /usr/src/sys/contrib/ipfilter/netinet/ip_proxy.c:540 #11 0xc048a8af in fr_natin (fin=0xe2d4db30, nat=0xca66e400, natadd=1, nflags=1) at /usr/src/sys/contrib/ipfilter/netinet/ip_nat.c:4105 #12 0xc048a744 in fr_checknatin (fin=0xe2d4db30, passp=0xe2d4db2c) at /usr/src/sys/contrib/ipfilter/netinet/ip_nat.c:4040 #13 0xc047c666 in fr_check (ip=0xc4a18820, hlen=20, ifp=0x0, out=0, mp=0xe2d4dc18) at /usr/src/sys/contrib/ipfilter/netinet/fil.c:2466 Looks like a good example why it is a bad idea to have an application proxy running in the kernel. More to the point, could you provide fin in frames 8 through 12 and the local variables in frame 8, too? -- /\ Best regards, | [EMAIL PROTECTED] \ / Max Laier | ICQ #67774661 X http://pf4freebsd.love2party.net/ | [EMAIL PROTECTED] / \ ASCII Ribbon Campaign | Against HTML Mail and News pgpWa7Y8eHspB.pgp Description: PGP signature
Re: FreeBSD panics...
On 3/23/07, Max Laier [EMAIL PROTECTED] wrote: On Thursday 22 March 2007 20:58, Sławomir Babiński SYSINFO wrote: Can anyone look at this and sell any tips why my server panics? Wrong list. This should have been sent to -current or -net ... or rather to -stable... FreeBSD mercury.msi.pl 6.2-STABLE FreeBSD 6.2-STABLE #7: Wed Mar 21 -- Pietro Cerutti - ASCII Ribbon Campaign - against HTML e-mail and proprietary attachments www.asciiribbon.org ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: sendto() giving EPERM outside a jail
In [EMAIL PROTECTED], Daniel O'Connor [EMAIL PROTECTED] wrote: Hi, I am trying to port miniupnpd (http://miniupnp.tuxfamily.org/) and by in large it seems to work fine (evil idea as it is :) However it spews out a lot of.. miniupnpd[13010]: sendto(udp_notify): Operation not permitted According to my reading of the man page it is not possible to get this error unless I'm using jails (which I'm not). The code in question does.. That's probably a buglet in the man page. memset(sockname, 0, sizeof(struct sockaddr_in)); sockname.sin_family = AF_INET; sockname.sin_port = htons(PORT); sockname.sin_addr.s_addr = inet_addr(UPNP_MCAST_ADDR); while(known_service_types[i]) { snprintf(bufr, sizeof(bufr), NOTIFY * HTTP/1.1\r\n HOST:%s:%d\r\n ... n = sendto(s, bufr, strlen(bufr), 0, (struct sockaddr *)sockname, sizeof(struct sockaddr_in) ); (line 278 of miniupnpd.c). Can someone shed light on what the problem is? The application appears to work fine even with this error though. man setsockopt, search for SO_BROADCAST. -- Steve Watt KD6GGD PP-ASEL-IA ICBM: 121W 56' 57.5 / 37N 20' 15.3 Internet: steve @ Watt.COM Whois: SW32-ARIN Free time? There's no such thing. It just comes in varying prices... ___ freebsd-hackers@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-hackers To unsubscribe, send any mail to [EMAIL PROTECTED]