predictive prefetching

2003-09-26 Thread Aaron Smith
Kroeger's Predictive Prefetching paper:

  http://www.usenix.org/events/usenix01/full_papers/kroeger/kroeger_html/index.html

I'm assuming a lot of people saw this talk at USENIX. These are pretty
interesting results; has anyone considered working on supporting this in
FreeBSD? I'm interested in doing so, please drop me a note if you have
comments or ideas on the best approach.

--Aaron
___
[EMAIL PROTECTED] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to [EMAIL PROTECTED]


ftpd patch that saves me a lot of hassle

2002-01-19 Thread Aaron Smith

I got sick of (presumably) warez people probing my anonymous ftp site and
dropping all kinds of hard-to-delete trash in incoming, so I patched my
ftpd to only allow directories to start with alphanumerics. There's
probably a better solution, but this works for me so I figure'd I'd share.

Combining this with a umask that doesn't allow reading uploaded files keeps
things reasonably well in hand.

--Aaron


Index: ftpd.c
===
RCS file: /usr/cvs/src/libexec/ftpd/ftpd.c,v
retrieving revision 1.62.2.15
diff -u -r1.62.2.15 ftpd.c
--- ftpd.c  2001/12/18 18:35:55 1.62.2.15
+++ ftpd.c  2002/01/19 09:47:42
@@ -2216,6 +2216,12 @@
 {
 
LOGCMD(mkdir, name);
+
+   if (!isalnum(*name)) {
+   reply(521, Bite me.);
+   return;
+   }
+
if (mkdir(name, 0777)  0)
perror_reply(550, name);
else

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: ftpd patch that saves me a lot of hassle

2002-01-19 Thread Aaron Smith

The reason I only test the first character is that lots of filenames I
actually want uploaded may have some funkiness somewhere in their midst.
With an alnum first character I can deal with trash using tab completion
and not block the files I deal with normally.

isprint() is too liberal to save me time -- one careless evening, deleting
a directory named '~' made me have to go to backups. isprint allows a great
deal of stuff i don't want to hassle with, like ~ and .

Allowing directories to start with underscore sounds reasonable to me,
though. Another idea would be mapping certain special characters to
underscore. Does anyone know if other ftpds like luke's or wu address this
issue?

I wasn't proposing this as a default inclusion, but as far as that goes: a
non-default option noted in the setting up an anonymous FTP site section
of the ftpd docs seems the most appropriate option. It's just to save
administrators of anonymous ftp sites a little headache of hidden files and
those beginning with spaces or garbage.

Lots of people will be bitten by this if they don't know about it, especially
if it applies to non-anonymous users. Why can't I upload my file? It
should probably test whether the user is anonymous.

If people actually would use such an ftpd option, I'll clean it up and
submit a new patch with doc changes.

Aaron

On Sat, Jan 19, 2002 at 01:02:24PM -0800, Michael Smith wrote:
 
 Use isprint() on the entire string; this will give the desired result in 
 most cases.  It should probably be optional (defaulting to on, since it's 
 a security measure).
 
 
  What?  You don't like directories named '...w^Ha^Hr^He^Hz^H^H^H' ?
  
  I like it, but there are a few problems.  What about underscore?  And
  will this mess up people using ftp outside the U.S.?
  
  -Matt
  Matthew Dillon 
  [EMAIL PROTECTED]
  
  
  :I got sick of (presumably) warez people probing my anonymous ftp site and
  :dropping all kinds of hard-to-delete trash in incoming, so I patched my
  :ftpd to only allow directories to start with alphanumerics. There's
  :probably a better solution, but this works for me so I figure'd I'd share.
  :
  :Combining this with a umask that doesn't allow reading uploaded files keeps
  :things reasonably well in hand.
  :
  :--Aaron
  :
  :
  :Index: ftpd.c
  :===
  :RCS file: /usr/cvs/src/libexec/ftpd/ftpd.c,v
  :retrieving revision 1.62.2.15
  :diff -u -r1.62.2.15 ftpd.c
  :--- ftpd.c 2001/12/18 18:35:55 1.62.2.15
  :+++ ftpd.c 2002/01/19 09:47:42
  :@@ -2216,6 +2216,12 @@
  : {
  : 
  :   LOGCMD(mkdir, name);
  :+
  :+  if (!isalnum(*name)) {
  :+  reply(521, Bite me.);
  :+  return;
  :+  }
  :+
  :   if (mkdir(name, 0777)  0)
  :   perror_reply(550, name);
  :   else
  :
  :To Unsubscribe: send mail to [EMAIL PROTECTED]
  :with unsubscribe freebsd-hackers in the body of the message
  :
  
  
  To Unsubscribe: send mail to [EMAIL PROTECTED]
  with unsubscribe freebsd-hackers in the body of the message
 

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



Re: ftpd patch that saves me a lot of hassle

2002-01-19 Thread Aaron Smith

On Sat, Jan 19, 2002 at 12:46:03PM -0800, Julian Elischer wrote:
 if you make your incoming Write-only then they will hav elottle point in 
 puting stuff there..

It is already write-only, but I still get lots of directory trees created
and populated with files they cannot read.

 We do this, in several places, and have a script move the incoming stuff
 elsewhere at regular intervals too.
 
 (not that I disagree with your patch but I often mode 'dot files'
 e.g. .cshrc, or even CVS # files

This patch only deals with directories, but I definitely see your point.

 On Sat, 19 Jan 2002, Aaron Smith wrote:
 
  I got sick of (presumably) warez people probing my anonymous ftp site and
  dropping all kinds of hard-to-delete trash in incoming, so I patched my
  ftpd to only allow directories to start with alphanumerics. There's
  probably a better solution, but this works for me so I figure'd I'd share.
  
  Combining this with a umask that doesn't allow reading uploaded files keeps
  things reasonably well in hand.
  
  --Aaron
  
  
  Index: ftpd.c
  ===
  RCS file: /usr/cvs/src/libexec/ftpd/ftpd.c,v
  retrieving revision 1.62.2.15
  diff -u -r1.62.2.15 ftpd.c
  --- ftpd.c  2001/12/18 18:35:55 1.62.2.15
  +++ ftpd.c  2002/01/19 09:47:42
  @@ -2216,6 +2216,12 @@
   {
   
  LOGCMD(mkdir, name);
  +
  +   if (!isalnum(*name)) {
  +   reply(521, Bite me.);
  +   return;
  +   }
  +
  if (mkdir(name, 0777)  0)
  perror_reply(550, name);
  else
  
  To Unsubscribe: send mail to [EMAIL PROTECTED]
  with unsubscribe freebsd-hackers in the body of the message
  
 
 
 To Unsubscribe: send mail to [EMAIL PROTECTED]
 with unsubscribe freebsd-hackers in the body of the message

To Unsubscribe: send mail to [EMAIL PROTECTED]
with unsubscribe freebsd-hackers in the body of the message



gzip's custom i386 asm should be disabled

2001-03-20 Thread Aaron Smith

gzip's i386 assembly code, activated by default in the FreeBSD source tree,
produces poor performance on an i686 core (PPro/P2/P3). This is due to the
'partial register stall' problem, explained in a URL recently brought up on
the list, http://www.emulators.com/pentium4.htm.

In the course of learning more about partial register stalls I came across
the following i686 and i586 assembly optimizations for gzip:
http://www.muppetlabs.com/~breadbox/software/assembly.html.

This optimized i686 asm avoids partial reg stall and is between 20-40%
faster, with higher compression levels achieving greater benefit from the
patch. The i586 patch is usually only 5% faster, but in some cases achieves
a 25% speedup.

For completeness, I also ran some tests on a non-asm gcc 2.95.2 compile,
with and without -march=pentiumpro. Here are the results (three runs,
averaged, caches warmed with some throwaway runs) on a Pentium II 400,
linux-2.4.2.tar, --best.

   [type]  [user secs] [time (as % of slowest)]
 i386 asm:175   100%
   no asm, -O:142  81.1%
  no asm, -O2:139  79.4%
 no asm, -O -march=pentiumpro:136  77.7%
no asm, -O2 -march=pentiumpro:140  80.0%
 i686 asm:124  70.8%

I'm interested in other people's results/tests. Particularly, I should do
some runs with -mcpu=pentiumpro as well.

An important part of the equation is to make sure it doesn't hurt i586
machines. I did several tests on a Pentium 200MMX; the i386 asm and the
gcc-emitted asm are not measurably different on that CPU.

Brian Raiter ([EMAIL PROTECTED], author of the i586/i686 asm patches)
has contacted the gzip maintainers, but it's been years since a release and
there may not be another gzip release. I have seen a 1.2.4a release which
had his files in a contrib/ directory, but they were not active in any way.

Since I would imagine a large percentage of FreeBSD users run on i686
cores, it'd be great to get this pretty significant speed increase into our
tree.

The i686 patch is neat (30% faster!) but its improvement over gcc's emitted
assembly is small. Disabling the old i386 assembly seems a good first
step. Attached is a patch that disables the custom asm.

I'm interested in hearing everyone's comments.

Aaron


Index: Makefile
===
RCS file: /usr/cvs/src/gnu/usr.bin/gzip/Makefile,v
retrieving revision 1.21
diff -u -r1.21 Makefile
--- Makefile1999/08/27 23:35:48 1.21
+++ Makefile2001/03/20 23:59:48
@@ -8,11 +8,6 @@
 CFLAGS+=-DSTDC_HEADERS=1 -DHAVE_UNISTD_H=1 -DDIRENT=1
 GREP_LIBZ?=YES
 
-.if ${MACHINE_ARCH} == "i386"
-SRCS+= match.S
-CFLAGS+=-DASMV
-.endif
-
 MLINKS= gzip.1 gunzip.1  gzip.1 zcat.1  gzip.1 gzcat.1
 MLINKS+= zdiff.1 zcmp.1
 



Re: locked accounts and adduser

2000-03-02 Thread Aaron Smith

On Tue, Jan 18, 2000 at 05:14:26PM -0500, Ben Rosengart wrote:
 I thought it would be nice if one could create locked accounts with
 adduser.  So I asked my nice Perl-hacking coworker Evan Leon to come up
 with a patch.
 
 Enter password []: 
 Use an empty password or lock the password? lock no [yes]: lock
 
 ...
 
 # grep user /etc/master.passwd 
 user:*:1001:1001::0:0:Joe User:/home/user:/bin/sh
 
 The patch is attached.  Anyone like it?  Any chance it could be

i like this. i hope it gets committed; i would definitely use it.
did any committers pick this up?

 Another idea I have is to allow adduser to accept a hashed password
 instead of a plaintext one.  Perhaps if this goes over well, Evan and I
 will work on that next.

i'd find this useful as well.

aaron


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



user-space filesystems

2000-03-02 Thread Aaron Smith

hello,

i've done some searching and i've seen discussion of userland fs
before. has there been any progress in the user-space filesystem area? i
have a nifty project and i would like to avoid using loopback NFS; have we
got anything akin to linux's userfs yet?

if freebsd doesn't have this capability, where would a good place to start
be on loopback NFS? maybe somebody has a loopback NFS skeleton i can start
from?

any pointers/discussion would be helpful.

aaron

here's one of the messages that made me say "yeah, like that!":

 Date:  Sat, 17 Jul 1999 14:57:45 -0400
 From:  "David E. Cross" [EMAIL PROTECTED]
 To:[EMAIL PROTECTED]
 Subject:   USFS (User Space File System)
 Message-ID:  [EMAIL PROTECTED]
 
 I am looking at a project that will require a user based process to
 interact with the system as if it were a filesystem.  The traditional way I
 have seen this done is as the system NFS mounting itself (ala AMD).  I
 would really like a more clean approach to this.  What I am interested in
 is a 'User Space File System' that would interact with a user process in a
 similiar manor to how nfsd's do.  A process would issue a mount (ok, this
 is different than NFSDs), then it would make a special system call with a
 structure, that call would return whenever a request was pending with the
 structure filled in with the appropriate information.  The user process
 would fulfill the request, pack the return data into the structure and call
 kernel again.
 
 I have a number of questions on more specific ideas (like caching,
 inode/vnode interaction, etc).  But I am just feeling arround for what
 people think about this.  Any ideas/comments?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Proposal: Add generic username for 3rd-party MTA's

1999-09-01 Thread Aaron Smith

this strikes me as unecessary. anybody installing a new mta can create the
necessary users and name them appropriately.

port maintainers have already solved this problem (see the install glue
for the qmail port, which as has been mentioned creates _seven_ users.) it is
not particularly hard, and the existing solution does a fine job.

i have a feeling this "smtp" user would sit unused while people create
qmail-* users, a 'postfix' user, etc. i'm a qmail user, i would end up
ignoring this user if it were added, and it will be equally useless to the
large number of people who stick with the bundled (superuser) sendmail.

aaron

On Wed, Sep 01, 1999 at 06:33:06PM +0200, Sheldon Hearn wrote:
 
 Hi folks,
 
 I plan to add a user ``smtp'' with UID 25 and a member of group
 ``mail'', for use in running non-priveledged MTA's in FreeBSD. This is
 primarily for the convenience of maintainers of mail ports.
 
 The last time I brought this up, my request was blown away in a flurry
 of arguments against incorporating other MTA's into the base system.
 
   !!! DON'T GO THERE  !!!
 
 This has nothing to do with what's in the base system. This has to do
 with making it easier for people to run 3rd-party software, which isn't
 part of the base system, in a non-priveledged state.


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Status of FBSD sparc porting?

1999-09-01 Thread Aaron Smith

there has been some discussion recently, and lots of volunteering. however,
i don't think anyone has done any real work yet. i have a couple of sparcs
to use for it, and several other people have sparc boxes waiting to test
and contribute but no one has yet stepped up to lead the effort forward.

from what i can tell the hard parts are:
 - pmap/mmu issues?
 - dealing with the different bus architecture(s)

#2 is probably partially addressed by the new-bus work going on in -current
which i don't know a lot about, maybe someone else can comment. both issues
were tackled by net/openBSD for their sparcness, but there's enough
divergence to make picking up the changes non-trivial, otherwise someone
would have finished this already.  however i think having the other
sparc-capable BSDs as a reference will be helpful.

my plan was to install openBSD on one of my sparcs and use it to compile
FreeBSD code and start banging on this stuff, but i have not had enough
free time to get going on it.

aaron

On Wed, Sep 01, 1999 at 07:14:10PM -0400, BSD Bob wrote:
 Hello
 
 I have been running FBSD for about 5 years, and am relatively comfortable
 with it on x86 machines.  But, I also run several sparcs of various
 flavors, at home.  What is the status of the FBSD Sparc port?
 
 Thanks
 
 Bob


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Proposal: Add generic username for 3rd-party MTA's

1999-09-01 Thread Aaron Smith
this strikes me as unecessary. anybody installing a new mta can create the
necessary users and name them appropriately.

port maintainers have already solved this problem (see the install glue
for the qmail port, which as has been mentioned creates _seven_ users.) it is
not particularly hard, and the existing solution does a fine job.

i have a feeling this smtp user would sit unused while people create
qmail-* users, a 'postfix' user, etc. i'm a qmail user, i would end up
ignoring this user if it were added, and it will be equally useless to the
large number of people who stick with the bundled (superuser) sendmail.

aaron

On Wed, Sep 01, 1999 at 06:33:06PM +0200, Sheldon Hearn wrote:
 
 Hi folks,
 
 I plan to add a user ``smtp'' with UID 25 and a member of group
 ``mail'', for use in running non-priveledged MTA's in FreeBSD. This is
 primarily for the convenience of maintainers of mail ports.
 
 The last time I brought this up, my request was blown away in a flurry
 of arguments against incorporating other MTA's into the base system.
 
   !!! DON'T GO THERE  !!!
 
 This has nothing to do with what's in the base system. This has to do
 with making it easier for people to run 3rd-party software, which isn't
 part of the base system, in a non-priveledged state.


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Status of FBSD sparc porting?

1999-09-01 Thread Aaron Smith
there has been some discussion recently, and lots of volunteering. however,
i don't think anyone has done any real work yet. i have a couple of sparcs
to use for it, and several other people have sparc boxes waiting to test
and contribute but no one has yet stepped up to lead the effort forward.

from what i can tell the hard parts are:
 - pmap/mmu issues?
 - dealing with the different bus architecture(s)

#2 is probably partially addressed by the new-bus work going on in -current
which i don't know a lot about, maybe someone else can comment. both issues
were tackled by net/openBSD for their sparcness, but there's enough
divergence to make picking up the changes non-trivial, otherwise someone
would have finished this already.  however i think having the other
sparc-capable BSDs as a reference will be helpful.

my plan was to install openBSD on one of my sparcs and use it to compile
FreeBSD code and start banging on this stuff, but i have not had enough
free time to get going on it.

aaron

On Wed, Sep 01, 1999 at 07:14:10PM -0400, BSD Bob wrote:
 Hello
 
 I have been running FBSD for about 5 years, and am relatively comfortable
 with it on x86 machines.  But, I also run several sparcs of various
 flavors, at home.  What is the status of the FBSD Sparc port?
 
 Thanks
 
 Bob


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: New tests for test(1)

1999-08-12 Thread Aaron Smith

this seems undesirable to me, since using it immediately makes your shell
scripts nonportable. i liked the ls -t suggestion though.

--
Aaron Smith
[EMAIL PROTECTED]

On Thu, Aug 12, 1999 at 11:18:50AM +0200, Graham Wheeler wrote:
 thinking - wouldn't it be a good idea to add some new tests to test(1),
 to compare files based on criteria like size or modification date?
 
 Anyone else think this is a good idea?


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: New tests for test(1)

1999-08-12 Thread Aaron Smith
this seems undesirable to me, since using it immediately makes your shell
scripts nonportable. i liked the ls -t suggestion though.

--
Aaron Smith
aa...@mutex.org

On Thu, Aug 12, 1999 at 11:18:50AM +0200, Graham Wheeler wrote:
 thinking - wouldn't it be a good idea to add some new tests to test(1),
 to compare files based on criteria like size or modification date?
 
 Anyone else think this is a good idea?


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Inetd and wrapping.

1999-06-27 Thread Aaron Smith

On Sun, 27 Jun 1999 22:26:34 EDT, John Baldwin writes:
Let's say I have two services, foo and bar, with food and bard.  I want to
wrap food, but *NOT* bard and they are both in /etc/inetd.conf.  How do
you propose to solve this with the internal wrapping (which is a good
idea, IMO as it eliminates an exec())?

i wouldn't...i'd have to either pay the (small) cost of wrapping or pay the
(less small) tcpd exec and not use internal wrapping. it's "nice" to save
the exec, but intensely performance or latency sensitive daemons probably
shouldn't be starting out of inetd, they should be standalone and
preforked or threaded...

aaron


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Inetd and wrapping.

1999-06-27 Thread Aaron Smith
On Sun, 27 Jun 1999 22:26:34 EDT, John Baldwin writes:
Let's say I have two services, foo and bar, with food and bard.  I want to
wrap food, but *NOT* bard and they are both in /etc/inetd.conf.  How do
you propose to solve this with the internal wrapping (which is a good
idea, IMO as it eliminates an exec())?

i wouldn't...i'd have to either pay the (small) cost of wrapping or pay the
(less small) tcpd exec and not use internal wrapping. it's nice to save
the exec, but intensely performance or latency sensitive daemons probably
shouldn't be starting out of inetd, they should be standalone and
preforked or threaded...

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



ufs/ffs resize?

1999-06-25 Thread Aaron Smith

anybody done any work on a utility for growing ufs filesystems?

aaron


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message



Re: Inetd and wrapping.

1999-06-25 Thread Aaron Smith
On Fri, 25 Jun 1999 10:14:48 +0200, Sheldon Hearn writes:
I think I prefer the suggestion I saw from someone else, which would
allow

ftpstream  tcp nowait/10/10/wrap root  ...

This can be done in such a way as to be backward compatible. Looks like
something for the week-end, if I can convince my wife that it's a good
idea. :-)

could you please restate the argument for this? i still haven't heard a
decent reason for this sort of conf format perturbation. every small whack
like this makes freebsd weirder to administrate -- there is a value to
sharing the same inetd.conf format with lots of other platforms.

if people have their undies in a wad over this, can't they compile inetd
without LIBWRAP?

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Inetd and wrapping.

1999-06-25 Thread Aaron Smith
On Fri, 25 Jun 1999 16:05:05 +0200, Sheldon Hearn writes:
We'll also end up with an inetd that _can_ wrap if it's told to (-w
and -ww). So we end up offering a better super-server than we had
before, with no backward compatibility problems, and no additional
incompatibilities with other systems (I can't find an inetd that uses
the -w flag for anything).

hi sheldon,

i have no problem with -w options, but i am still surprised that you want
to go ahead with the conf format change. i'm going to present my rebuttal
here, but the only argument i could dig up was there is missing
functionality.

(john baldwin? not sure) raised the issue that before, he could control
which services were wrapped. now, all services are wrapped. why is this
bad? what has been lost?

can the user no longer get the old behavior? no, he can. undefining LIBWRAP
at compile time (or a runtime flag) plus tcpd gets him exactly where he was
before. this will be even less of an issue with -w flags or an inverted
default.

performance incurred by reading default allow rules on invocations?  no,
for several reasons. the hosts.allow file is going to be in the cache. the
design is first matched, so one can also place the service one is concerned
about at the beginning of the lists. but third and most importantly: if
startup performance is an issue to the extent that the small overhead of
this call is important, you should not be using inetd. you should have a
standalone daemon. (which you can decide to wrap or not wrap). the overhead
here is going to in reality be small.

logging configurability? i seem to remember something about this, and while
i am trying to come up with a difference, i can't see one. hosts.allow is
very configurable logging wise. the messages come from inetd, yes...but
they can be separated out by severity/facility. i can't imagine logging
differences is a good reason. so to this one too i have to say no.

we already have a service-by-service control file hosts.allow that
provides the ability to in EFFECT control what gets wrapped. please do
not duplicate that functionality again -- we can do without it. it's an
additional complexity that buys us *nothing*.

The additional option in inetd.conf is not something I want. However,
it's something someone has made a legitimate public argument for, to
which I can't come up with a decent rebuttal.

i hope i've made a persuasive case that a *conf file format change* isn't
justified here. it doesn't make sense, especially if you are, as you have
mentioned, going to switch unwrapped to default and require -w for
wrapping.

thanks,
aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Inetd and wrapping.

1999-06-25 Thread Aaron Smith
On Fri, 25 Jun 1999 20:12:01 BST, David Malone writes:
This isn't so much a conf format change, as a conf format extension.
It is the same type of extension as was added to support max child
and max child per minute - which aren't a standard inetd feature.
All old inetd.conf files remain valid.

hey, that's a pretty neat feature. i confess i wasn't aware of that.  out
of curiosity, can old inetds read this without choking? (sheldon said
backwards compatible the other day but i'm not sure if he meant upwards
compatible...)

(It's not like inetd.conf is all that machine independant anyway,
as it is full of paths to programs and contains services specific
to that machine. You'd never condider rdisting it between machines
of a different architecture for example).

agreed; what i was trying to get at is the mental difference in dealing
with it. i didn't realize there was an extension already in place -- i
should have checked the man page over when i saw sheldon's first message
about wait/10/10/nowrap.

in order to make this compatible won't one have to specify the not-so-pretty
wait/0/0/nowrap? i guess wait/nowrap could be made to work. that's less
ugly. is 0 already an alias for unlimited?

i am less bothered by this change given the maxchild precedent, if there
are definitely people who will *use* this. if people don't actually use it,
it will just become a chunk of legacy extra-complexity.

Some people think that doing the hosts.allow lookup is too expensive
for some services but not others. (It requires opening /etc/hosts.allow,
reading it in line by line and possibly doing DNS lookups).

you won't have to go to disk, though (it will be cached for all cases in
which you care), and if you've got an early allow rule for the service, you
won't have to do any lookups. and like you say, if it's that sensitive, why
is it starting out of inetd?

all: sorry if i came off too strident. i have a sore spot for feeping
creaturism. :)

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



ufs/ffs resize?

1999-06-25 Thread Aaron Smith
anybody done any work on a utility for growing ufs filesystems?

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



synch primitives (was Re: Microsoft performance)

1999-06-24 Thread Aaron Smith
On Thu, 24 Jun 1999 20:14:19 CDT, Alfred Perlstein writes:
I'm not sure what you mean by the refernce to malloc types, I just
thought something along the lines of mutex_t with an API
for trying, allocating, freeing and initializing them.

i'd really like to implement some of the basic solaris primitives: mutex,
cv (condition variable), sema p/v. i sent a message to the smp list on this
at one point but didn't get much of a response other than cranky noises
about super fine-grained locking isn't worth it. what i'd like to see is
the groundwork laid for finER locking so that we can gradually break up the
points of contention. mutex/cv/sema are intuitive and taught in every OS
course; i don't feel simple_lock or lockmgr are desirable or adequate.

i'm willing to work on it, but i can't get to it for at least a couple of
months, so i'm hoping someone else wants to work on it too.

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Serial Console Wierdness

1999-06-22 Thread Aaron Smith
'cu' hangs up really easily. use 'kermit' (it's in ports) and the hangup
problem will disappear. i tried to find an option to cu to modify its
hangup behavior but to no avail.

your second problem sounds like it could be terminal sizing -- have you
tried this with a default 80x24 window, set and exported TERM properly, etc?

i was not able to get my console to work properly past 38400 baud; i am not
sure why. 38400 has been just fine speed-wise for me, though, so i'm not
that upset. :)

(also see http://www.arctic.org/~aaron/tips/freebsd-serial-console)

aaron

On Tue, 22 Jun 1999 13:31:33 EDT, Bill G. writes:
I got a serial console working on COM2, to which I have connected
another FreeBSD box.  I connect with 'cu' fine, but I'm running into
a couple of problems which I haven't been able to find and answer
for.

o  When I connect, when the machine is first turned on, I get
   disconnected twice during the boot up sequence (cu reports
   Got hangup signal) -- looks like when the sio1 device is
   probed, and also when getty runs.

o  9600 was rather slow, so I changed it to 115200, which worked,
   however I had a few problems with terminal display -- any
   output that scrolls down past the bottom of the screen gets
   'garbled'.  (IE, I run clear; ls -l /  -- the first 23 lines
   look ok then it gets messed up).  Same results from console
   mode of my client machine and from an xterm.  I thought that
   115200 might be too fast, so I slowed it down to 38400, but
   same trouble.  I'm not sure if this occured at 9600.

Any thoughts / ideas / suggestions would be appreciated.  Thanks,


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



inetd/tcpd...changing hosts.allow...plus a documentation issue

1999-06-20 Thread Aaron Smith
hi all,

[this is all on 3.2-RELEASE]

i recently had some problems getting inetd tcp wrappers to do the right
thing. i tried a sample configuration where i allowed telnet explicitly:

ALL : localhost : allow
telnetd : ALL : allow
ALL : ALL : deny

unfortunately incoming telnet was still denied. at first i tried HUPping
inetd to reread the hosts.allow, but after looking at the source it appears
to re-read its information each time hosts_access is called. has anyone
else had problems updating this file and getting inetd to reflect the new
behavior?

note that tcpdmatch telnetd client_host was reporting access granted
and yet inetd was refusing the connection. killing inetd COMPLETELY and
restarting inetd caused it to start accepting the connections.

i'm looking at it a bit but perhaps a maintainer knows if something is
being cached here?

on another note, LIBWRAP_INTERNAL looks like it must be defined for
internal services to be wrapped, yet it is not defined during freebsd's
compile -- only LIBWRAP is. yet freebsd's inetd man page says that internal
services may be wrapped. since it is not currently so by default, perhaps
either the documentation or the Makefile should be modified?

aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: Changing Bootmgr display

1999-06-19 Thread Aaron Smith
On Sat, 19 Jun 1999 14:26:52 EDT, John Baldwin writes:
Then don't use BootEasy.  The OS-BS boot manager is quite nice, and the beta
version (which seems very stable in my experience) even provides a nice
colorful menu on boot up as well as a nice installation utility.

And with that you can name each partition whatever you want, put them in any
order, and optionally have a default partition to boot to. 

LILO's an option too, right? Is no one mentioning it for some
incompatibility I don't know about (I haven't used it with FreeBSD), or is
the reason political?

Aaron


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message



Re: High syscall overhead?

1999-06-12 Thread Aaron Smith
On 11 Jun 1999 23:15:15 PDT, Arun Sharma writes:
Can someone explain to me why is SYSCALL_LOCK necessary ? It certainly
seems to hurt system call performance on a MP machine.

Also, is there any data on lock contention in FreeBSD ? Is anyone
working on decomposing some of the giant locks ?

I have a follow-on question: is there any planned work to give FreeBSD some
of the basic synch primitives? I would love to help finer-grain the kernel,
(having just today built my first SMP FreeBSD system), but first I think
I'd need to implement mutexes and condition variables. It looks like there
may be spin/sleeplocks and rwlocks, but they're not called that.

Is there any work being done in this area? I think implementing the SVR4
synch primitives (mutex, condvars, maybe semas, rwlocks) would be great,
since that's what's taught, and they're intuitive. I'm still trying to
figure out the deal with lockmgr.

--
Aaron Smith VERITAS Software
File System EngineerI'll call him mini me.


To Unsubscribe: send mail to majord...@freebsd.org
with unsubscribe freebsd-hackers in the body of the message