Re: 6.1 stability (Re: 4.11 snapshots?)

2006-05-21 Thread Brett Glass

At 08:09 PM 5/21/2006, Kris Kennaway wrote:


We did ourselves a big disservice by not pointing out clearly in the
todo list that most of the listed problems are VERY RARE and are
unlikely to affect most/all users.  In future we're going to have to
be clearer about that, because you're not the only user who was scared
for no reason.

We really had to push FreeBSD hard to find those problems;


The servers I build are pushed really hard.


6.1 stands
up to enormous test loads that all previous tested releases could not
handle.  I wouldn't be surprised if 4.x cannot handle the same
workloads, simply because no-one may have ever attempted such loads on
a 4.x system.

Kris

P.S. If you're willing to put some effort into analyzing and profiling
it, I'd be willing to work with you on your performance problem.


You sound like one of those e-mails I keep getting offering to help
me with my, er, performance problems. ;-)

Seriously: The problem is that in my tests 6.x does not surpass Linux in
performance, while 4.11 does.

--Brett Glass


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Anish Mistry
On Monday 22 May 2006 01:44, Scott Long wrote:
> Brent Casavant wrote:
> > On Sun, 21 May 2006, Colin Percival wrote:
> >>In order to better understand
> >>which FreeBSD versions are in use, how people are (or aren't)
> >> keeping them updated, and why it seems so many systems are not
> >> being updated, I have put together a short survey of 12
> >> questions.
> >
> > I applaud this survey, however question 9 missed an important
> > point, at least to me.  I was torn between answering "less than
> > once a month" and "I never update".
> >
> > While I find ports to be the single most useful feature of the
> > FreeBSD experience, and can't thank contributors enough for the
> > efforts, I on the other hand find updating my installed ports
> > collection (for security reasons or otherwise) to be quite
> > painful.  I typically use portupgrade to perform this task.  On
> > several occasions I got "bit" by doing a portupgrade which wasn't
> > able to completely upgrade all dependencies (particularly when X,
> > GUI's, and desktops are in the mix -- though I always follow the
> > special Gnome upgrade methods when appropriate).
> >
> > I can't rule out some form of pilot error, but the end result was
> > pain.
> >
> > After several instances of unsatisfactory portupgrades (mostly in
> > the 5.2 through early 5.4 timeframe), I adopted the practice of
> > either not upgrading ports at all for the life of a particular
> > installation on a machine (typically about one year), or when
> > necessary by removing *all* ports from the machine, cvsup'ing,
> > and reinstalling.  This has served me quite well, particularly
> > considering the minimal threat profile these particularly systems
> > face.
> >
> > So, in short, that's why *I* rarely update ports for security
> > reasons.
> >
> > There are steps that could be taken at the port maintenance level
> > that would work well for my particular case, however that's
> > beyond the scope of the survey.  Thanks for taking the time put
> > the survey together, I certainly hope it proves useful.
> >
> > Thank you,
> > Brent Casavant
>
> I share this frustration with you.  I was once told that the pain
> in upgrading is due largely to a somewhat invisible difference
> between installing a pre-compiled package, and building+installing
> a port.  In theory, if you stick to one method or the other, things
> will stay mostly consistent.  But if you mix them, and particularly
> if you update the ports tree in the process, the end result is a
> bit more undefined.  One thing that I wish for is that the ports
> tree would branch for releases, and that those branches would get
> security updates.  I know that this would involve an exponentially
> larger amount of effort from the ports team, and I don't fault them
> for not doing it.  Still, it would be nice to have.
More ports seem to be separating out their different version into 
portname20, portname, portname21, etc.  This takes out quite a bit of 
the updating woes without causing too much overhead for the 
maintainers.  Since maintaining a security branch for releases would 
require too much overhead it might be nice to have mechanism to track 
the "release version" of the installed software.
eg.
For 6.0 release I installed lang/lua which is lua-5.0
Then when I cvsup next time the maintainer has created a lang/lua50 
port for the old version and lang/lua is now version 5.1.  It would 
be nice to have a mapping that I can say "Stay with version 5.0.x" 
and when I do a portupgrade it will see that lua-5.0 is installed so 
use lang/lua50 instead of lang/lua.
As a port maintainer, I could probably live with that extra mapping.

Though currently I try to keep a few jails configured on my desktop 
that match customer's configurations and perform updates in the jail 
first.  Just to see it there will be any hiccups before actually 
performing the updates on a customer's system.  I only have 3 basic 
configurations that I use so it's not that big of a deal for me.

My biggest grip about updating the base system is the mergemaster 
step, but once mergemaster -U is cut into a release it should fix 
that annoyance.

-- 
Anish Mistry


pgpSYqKguxyBf.pgp
Description: PGP signature


Re: FreeBSD Security Survey

2006-05-21 Thread Doug Hardie


On May 21, 2006, at 22:41, David Nugent wrote:


A good failover strategy comes into play here.

If you have one, then taking a single production machine off-line  
for a short period should be no big deal, even routine, and should  
not even be noticed by users if done correctly.  This should be  
planned for and part of the network/system design. Yes, it  
definitely requires more resources to support, but I'll rephrase  
the same problem: what happens when (and I mean *when* and not  
*if*) a motherboard or network card fries or you suffer a hard disk  
crash (even 2+ drives failing at the same time on a raid array is  
not particularly unusual considering that drives are quite often  
from the same manufactured batch)?


Lack of a failover on mission critical systems that *can't* be  
offline is like playing russian roulette.


Failover sounds good in theory but has significant issues in practice  
that make it sometimes worse than the alternative.  Take mail  
spools.  If you failover, mail the user saw before has disappeared.   
Then when you "fail back" it reappears and newer messages disappear.   
This is hardly unnoticable.  My users do not find that at all  
acceptable.  Putting the mail spools on a different machine just  
moves that problem to the different machine.  Trying to keep multiple  
spools consistent has problems also.  I have watched raid system lose  
their data too.  A nice power spike - 1.5Kv from a lightning strike  
in the local area will do it.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Robert Backhaus

On 5/22/06, Colin Percival <[EMAIL PROTECTED]> wrote:


If you administrate system(s) running FreeBSD (in the broad sense of "are
responsible for keeping system(s) secure and up to date"), please visit
 http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.



One of those "Missing Option" messages: Whether valid or not, the
reason that I would avoid a binary update system is that I customise
CPUTYPE, and believe, rightly or wrongly, that this would make binary
updating impossible.

Of course, the main reason I would not use binary updating you/they
have made source updating so easy!
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Paul Allen
>From Scott Long <[EMAIL PROTECTED]>, Sun, May 21, 2006 at 11:44:27PM -0600:
> I share this frustration with you.  I was once told that the pain in
> upgrading is due largely to a somewhat invisible difference between
> installing a pre-compiled package, and building+installing a port.  In
> theory, if you stick to one method or the other, things will stay mostly
> consistent.  But if you mix them, and particularly if you update the
> ports tree in the process, the end result is a bit more undefined.  One
> thing that I wish for is that the ports tree would branch for releases,
> and that those branches would get security updates.  I know that this
> would involve an exponentially larger amount of effort from the ports
> team, and I don't fault them for not doing it.  Still, it would be nice
> to have.

Huh? Really.  What you say makes a certain amount of sense when pkg_add 
is used, but I haven't seen much evidence for problems with mixing ports
and packages via portupgrade -P.

The trouble comes not with packages but in the conflicting information between
/var/db/pkg/ and the ports themselves.  The former does not merely contain a 
stale version of the port dependency and origin information; it contains
many snapshots of small slices of many different port dependency graphs (as the
port tree evolves).

Consistently using portupgade -rR, portinstall helps keep this under control
but each pkg_add or make install in a port directory causes drift.  Given
that portupgrade is an optional tool and the handbook suggests the other form...
well you see the trouble.

But the situation is worse than this because of the manual interventions 
necessary to fixup the portsdb.  These fixups easily create dependency graphs 
that never existed anywhere else before.  Most often this happens because of
ports being renamed, deleted, combined, etc--the trouble here is that the ports
tree reveals no history about these actions.

It is left to a program like portupgrade to heuristically guess!?! what has 
taken place.  Now if you go through this process every week (every day?) usually
the risk is small and it is obvious what to do, but this is not always so.

Some speculation:  I've always thought portupgrade did the Wrong Thing(tm) by
consulting the dependency graph in /var/db.   Better to merely learn which
packages were installed and then exclusively use the port information...
Maybe someone knows why that would be the wrong thing to do?

Paul
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Scott Long

Brent Casavant wrote:


On Sun, 21 May 2006, Colin Percival wrote:



In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being updated, I
have put together a short survey of 12 questions.



I applaud this survey, however question 9 missed an important point,
at least to me.  I was torn between answering "less than once a month"
and "I never update".

While I find ports to be the single most useful feature of the FreeBSD
experience, and can't thank contributors enough for the efforts, I on
the other hand find updating my installed ports collection (for security
reasons or otherwise) to be quite painful.  I typically use portupgrade
to perform this task.  On several occasions I got "bit" by doing a
portupgrade which wasn't able to completely upgrade all dependencies
(particularly when X, GUI's, and desktops are in the mix -- though I
always follow the special Gnome upgrade methods when appropriate).

I can't rule out some form of pilot error, but the end result was pain.

After several instances of unsatisfactory portupgrades (mostly in the
5.2 through early 5.4 timeframe), I adopted the practice of either not
upgrading ports at all for the life of a particular installation on a
machine (typically about one year), or when necessary by removing *all*
ports from the machine, cvsup'ing, and reinstalling.  This has served
me quite well, particularly considering the minimal threat profile these
particularly systems face.

So, in short, that's why *I* rarely update ports for security reasons.

There are steps that could be taken at the port maintenance level that
would work well for my particular case, however that's beyond the scope
of the survey.  Thanks for taking the time put the survey together, I
certainly hope it proves useful.

Thank you,
Brent Casavant


I share this frustration with you.  I was once told that the pain in
upgrading is due largely to a somewhat invisible difference between
installing a pre-compiled package, and building+installing a port.  In
theory, if you stick to one method or the other, things will stay mostly
consistent.  But if you mix them, and particularly if you update the
ports tree in the process, the end result is a bit more undefined.  One
thing that I wish for is that the ports tree would branch for releases,
and that those branches would get security updates.  I know that this
would involve an exponentially larger amount of effort from the ports
team, and I don't fault them for not doing it.  Still, it would be nice
to have.

Scott

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread David Nugent

Doug Hardie wrote:

On May 21, 2006, at 20:55, Colin Percival wrote:
If you administrate system(s) running FreeBSD (in the broad sense of 
"are

responsible for keeping system(s) secure and up to date"), please visit
  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.


What doesn't fit into the survey very well is that all my servers are 
production ones and it causes a lot of grief for users when I bring 
them down.  I try to hold updates to once per year because of that.  I 
am currently in the middle of upgrading from 5.3 to 6.0.  The easy 
machines are done but there are still a few that will take 
considerable on-site time which is not easy to come by.


A good failover strategy comes into play here.

If you have one, then taking a single production machine off-line for a 
short period should be no big deal, even routine, and should not even be 
noticed by users if done correctly.  This should be planned for and part 
of the network/system design. Yes, it definitely requires more resources 
to support, but I'll rephrase the same problem: what happens when (and I 
mean *when* and not *if*) a motherboard or network card fries or you 
suffer a hard disk crash (even 2+ drives failing at the same time on a 
raid array is not particularly unusual considering that drives are quite 
often from the same manufactured batch)?


Lack of a failover on mission critical systems that *can't* be offline 
is like playing russian roulette.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Brent Casavant
On Sun, 21 May 2006, Colin Percival wrote:

> In order to better understand
> which FreeBSD versions are in use, how people are (or aren't) keeping
> them updated, and why it seems so many systems are not being updated, I
> have put together a short survey of 12 questions.

I applaud this survey, however question 9 missed an important point,
at least to me.  I was torn between answering "less than once a month"
and "I never update".

While I find ports to be the single most useful feature of the FreeBSD
experience, and can't thank contributors enough for the efforts, I on
the other hand find updating my installed ports collection (for security
reasons or otherwise) to be quite painful.  I typically use portupgrade
to perform this task.  On several occasions I got "bit" by doing a
portupgrade which wasn't able to completely upgrade all dependencies
(particularly when X, GUI's, and desktops are in the mix -- though I
always follow the special Gnome upgrade methods when appropriate).

I can't rule out some form of pilot error, but the end result was pain.

After several instances of unsatisfactory portupgrades (mostly in the
5.2 through early 5.4 timeframe), I adopted the practice of either not
upgrading ports at all for the life of a particular installation on a
machine (typically about one year), or when necessary by removing *all*
ports from the machine, cvsup'ing, and reinstalling.  This has served
me quite well, particularly considering the minimal threat profile these
particularly systems face.

So, in short, that's why *I* rarely update ports for security reasons.

There are steps that could be taken at the port maintenance level that
would work well for my particular case, however that's beyond the scope
of the survey.  Thanks for taking the time put the survey together, I
certainly hope it proves useful.

Thank you,
Brent Casavant
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Doug Hardie


On May 21, 2006, at 20:55, Colin Percival wrote:

If you administrate system(s) running FreeBSD (in the broad sense  
of "are
responsible for keeping system(s) secure and up to date"), please  
visit

  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.



What doesn't fit into the survey very well is that all my servers are  
production ones and it causes a lot of grief for users when I bring  
them down.  I try to hold updates to once per year because of that.   
I am currently in the middle of upgrading from 5.3 to 6.0.  The easy  
machines are done but there are still a few that will take  
considerable on-site time which is not easy to come by.

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: FreeBSD Security Survey

2006-05-21 Thread Brandon S. Allbery KF8NH


On May 21, 2006, at 11:55 , Colin Percival wrote:

The Security Team has been concerned for some time by anecdotal  
reports

concerning the number of FreeBSD systems which are not being promptly
updated or are running FreeBSD releases which have passed their End of
Life dates and are no longer supported. In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being  
updated, I


I have a 6-STABLE box that is not going to be updated to 6.1 any time  
soon, because my personal mail will have to be offline while I do so  
--- including nuking and rebuilding all ports because the ports tree  
has been thrashed by multiple low level updates that affect a large  
percentage of the tree --- and it's only a 600MHz box so it will be  
offline for most of a week during that upgrade.  And I'm uncertain  
how downgrading it to 6.0-RELEASE+security patches will complicate  
things (downgrading via cvsup/buildworld is not a supported option,  
last I checked).  Granted, I probably should have stuck with 6.0-R  
--- but then, experience has shown me that the more reliable option  
is to wait a week or two after release and then install -STABLE.


In short:  keeping FreeBSD up to date tends to be painful at best.

--
brandon s. allbery [linux,solaris,freebsd,perl]   
[EMAIL PROTECTED]
system administrator  [openafs,heimdal,too many hats]   
[EMAIL PROTECTED]
electrical and computer engineering, carnegie mellon university   
KF8NH




___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


FreeBSD Security Survey

2006-05-21 Thread Colin Percival
Dear FreeBSD users and system administrators,

While the FreeBSD Security Team has traditionally been very good at
investigating and responding to security issues in FreeBSD, this only
solves half of the security problem: Unless users and administrators
of FreeBSD systems apply the security patches provided, the advisories
issued accomplish little beyond alerting potential attackers to the
presence of vulnerabilities.

The Security Team has been concerned for some time by anecdotal reports
concerning the number of FreeBSD systems which are not being promptly
updated or are running FreeBSD releases which have passed their End of
Life dates and are no longer supported. In order to better understand
which FreeBSD versions are in use, how people are (or aren't) keeping
them updated, and why it seems so many systems are not being updated, I
have put together a short survey of 12 questions. The information gathered
will inform the work done by the Security Team, as well as my own personal
work on FreeBSD this summer.

If you administrate system(s) running FreeBSD (in the broad sense of "are
responsible for keeping system(s) secure and up to date"), please visit
  http://people.freebsd.org/~cperciva/survey.html
and complete the survey below before May 31st, 2006.

Thanks,
Colin Percival
FreeBSD Security Officer
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: improper handling of dlpened's C++/atexit() code?

2006-05-21 Thread Konstantin Belousov
On Sun, May 21, 2006 at 06:22:34PM -0400, m m wrote:
> n 5/21/06, Konstantin Belousov <[EMAIL PROTECTED]> wrote:
> >> >Program received signal SIGSEGV, Segmentation fault.
> >> >0x in ?? ()
> >> >(gdb) bt
> >> >#0  0x in ?? ()
> >> >#1  0x294c0ad8 in __do_global_dtors_aux () from
> >> >/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> >> >#2  0x294c1d4c in _fini () from
> >> >/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> >> >#3  0x280b4c80 in ?? ()
> >> >#4  0x280aaab8 in ?? () from /libexec/ld-elf.so.1
> >> >#5  0xbfbfe6e8 in ?? ()
> >> >#6  0x2808dca6 in objlist_call_fini (list=0x280a96d8) at
> >> >/usr/src/libexec/rtld-elf/rtld.c:1336
> >> >#7  0x2808e1d4 in rtld_exit () at /usr/src/libexec/rtld-elf/rtld.c:1528
> >> >#8  0x281d58ea in __cxa_finalize (dso=0x0) at
> >> >/usr/src/lib/libc/stdlib/atexit.c:184
> >> >#9  0x281d55ba in exit (status=0) at /usr/src/lib/libc/stdlib/exit.c:69
> >> >#10 0x0805d0cb in clean_child_exit ()
> >> >#11 0x0805ea77 in just_die ()
> >> >#12 0x0805ea9a in usr1_handler ()
> >> >#13 0xbfbfffb4 in ?? ()
> >> >#14 0x001e in ?? ()
> >> >#15 0x in ?? ()
> >> >#16 0xbfbfe7c0 in ?? ()
> >> >#17 0x0002 in ?? ()
> >> >#18 0x0805ea80 in just_die ()
> >> >#19 0x0806011e in child_main ()
> >> >#20 0x080607de in make_child ()
> >> >#21 0x08060868 in startup_children ()
> >> >#22 0x08060e81 in standalone_main ()
> >> >#23 0x08061702 in main ()
> >
> >Could you, please, put somewhere:
> >1. /usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> >2. output of lsof -p  for apache running
> >in your usual configuration.
> >
> >Also, could you run the apache with LD_PRELOAD=/usr/lib/libstdc++.so.5
> >and report whether the problem persists ?
> 
> Konstantin,
>  Thank you for looking into this.
> 
> lsof: http://www.savefile.com/files/6494253
> Syslog.so: http://www.savefile.com/files/2163369
> 
>  Although it's not an indicator of certainty (I have had it exit
> cleanly in the past), it appears that running Apache with LD_PRELOAD
> of libstdc++ does allow it to exit cleanly.  Please let me know how I
> can further assist.  If it would make things easier - I can provide
> access to a jail on this machine which exhibits the same behavior.

Ok, I have a theory how it happens. Investigation of your instance
of Syslog.so shows that crash happens at the following code of
/usr/lib/crtbeginS.o:

282:  if (__deregister_frame_info)
283:  __deregister_frame_info (__EH_FRAME_BEGIN__);

(this comes in from contrib/gcc/crtstuff.c, lines 282-283).
Symbol __deregister_frame_info is weak and undefined in all your
DSOs except libstdc++.so.5. This symbol provides part of the C++
runtime support for exception handling, and reasonably included
from c++ runtime support library.

Both lines 282 and 283 produce dynamic relocations in final DSO,
but line 282 implies R_386_GLOB_DAT, and 283 - R386_JUMP_SLOT (for PLT).
First relocation is resolved immediately on DSO load, second one is
resolved on demand.

My theory is that, at the time of loading Syslog.so,  libstdc++.so.5
is loaded in the process, resulting in first relocation being satisfied
by rtld immediately.  But, at the time exit() processing comes
to _fini() function of Syslog.so, libstdc++.so.5 is unloaded. And
weak PLT relocation is resolved to 0. As result we got the
frame #0 from your trace.

This theory is confirmed by presence of libstdc++ in lsof output.
Please, check that it does not show up at the time of crash dump
by using "show shared" gdb command on crash dump.

Short-time fix is to use LD_PRELOAD hack. The real solution
would be to mark the libstdc++ DSO as unloadable and
implement support for unloadable DSO in rtld (BTW, I think
this is also needed for threading libraries libpthread and libthr
for the same reason). I know that glibc dynamic loader has support
for this feature.

P.S. Apache seems to call exit(3) from the signal handler. This is wrong.


pgpUopUulIugD.pgp
Description: PGP signature


Re: GEOM problems again...

2006-05-21 Thread Yoshiaki Kasahara
Hi,

Sorry this is only a 'me too' message...

On Sun, 21 May 2006 11:16:14 +0200,
Johan Ström <[EMAIL PROTECTED]> said:

> May 21 02:04:58 elfi kernel: ad6: FAILURE - device detached
> May 21 02:04:58 elfi kernel: subdisk6: detached
> May 21 02:04:58 elfi kernel: ad6: detached
> May 21 02:04:58 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
> ad6s1 disconnected.

I have a similar problem on a different M/B (Intel D925XECV2).  I'm
not sure if it is only a coincidence or somewhat related.

May 21 07:43:49 elvenbow kernel: ad4: FAILURE - device detached
May 21 07:43:49 elvenbow kernel: subdisk4: detached
May 21 07:43:49 elvenbow kernel: ad4: detached
May 21 07:43:49 elvenbow kernel: GEOM_MIRROR: Device gm0s1: provider ad4s1 
disconnected.

excerpts from dmesg:

atapci0:  port 
0x1f0-0x1f7,0x3f6,0x170-0x177,0x376,0xffa0-0xffaf at device 31.1 on pci0
ata0:  on atapci0
ata1:  on atapci0
atapci1:  port 
0xec00-0xec07,0xe800-0xe803,0xe400-0xe407,0xe000-0xe003,0xdc00-0xdc0f mem 
0xf3afbc00-0xf3afbfff irq 19 at device 31.2 on pci0
ata2:  on atapci1
ata3:  on atapci1
ata4:  on atapci1
ata5:  on atapci1

ad4: 239372MB  at ata2-master SATA150
ad6: 239372MB  at ata3-master SATA150

I purchased and started using this new PC last December, and the
problem occurred several times by now.  Both ad4 and ad6 have been
detached (not at a time).  'atacontrol reinit' paused the system for a
second, and returned without detecting the detached device.  I need a
complete power cycle or the device won't recognized by BIOS again.
There is no SMART error recorded on these drives.

I'm considering to change M/B, but it is difficult right now...

dmesg.boot is attached.

Ah, the system is running FreeBSD 6.1-STABLE amd64.

FreeBSD elvenbow.cc.kyushu-u.ac.jp 6.1-STABLE FreeBSD 6.1-STABLE #0: Mon May  8 
16:54:22 JST 2006 [EMAIL PROTECTED]:/usr/obj/usr/src/sys/ELVENBOW  amd64

-- 
Yoshiaki Kasahara
Computing and Communications Center, Kyushu University
[EMAIL PROTECTED]
Copyright (c) 1992-2006 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
The Regents of the University of California. All rights reserved.
FreeBSD 6.1-STABLE #0: Mon May  8 16:54:22 JST 2006
[EMAIL PROTECTED]:/usr/obj/usr/src/sys/ELVENBOW
Timecounter "i8254" frequency 1193182 Hz quality 0
CPU: Intel(R) Pentium(R) 4 CPU 3.00GHz (3000.10-MHz K8-class CPU)
  Origin = "GenuineIntel"  Id = 0xf43  Stepping = 3
  
Features=0xbfebfbff
  Features2=0x649d>
  AMD Features=0x20100800
  Logical CPUs per core: 2
real memory  = 2145579008 (2046 MB)
avail memory = 2060705792 (1965 MB)
ACPI APIC Table: 
ioapic0  irqs 0-23 on motherboard
kbd1 at kbdmux0
acpi0:  on motherboard
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
acpi0: Power Button (fixed)
acpi_bus_number: can't get _ADR
acpi_bus_number: can't get _ADR
Timecounter "ACPI-fast" frequency 3579545 Hz quality 1000
acpi_timer0: <24-bit timer at 3.579545MHz> port 0x408-0x40b on acpi0
cpu0:  on acpi0
est0:  on cpu0
est: CPU supports Enhanced Speedstep, but is not recognized.
est: Please update driver or contact the maintainer.
est: cpu_vendor GenuineIntel, msr f2d0f2d, bus_clk, 64
device_attach: est0 attach returned 6
p4tcc0:  on cpu0
pcib0:  port 0xcf8-0xcff on acpi0
pci0:  on pcib0
pcib1:  at device 1.0 on pci0
pci1:  on pcib1
pci1:  at device 0.0 (no driver attached)
pci0:  at device 27.0 (no driver attached)
pcib2:  at device 28.0 on pci0
pci5:  on pcib2
pcib3:  at device 28.1 on pci0
pci4:  on pcib3
pcib4:  at device 28.2 on pci0
pci3:  on pcib4
pcib5:  at device 28.3 on pci0
pci2:  on pcib5
uhci0:  port 0xcc00-0xcc1f 
irq 23 at device 29.0 on pci0
uhci0: [GIANT-LOCKED]
usb0:  on uhci0
usb0: USB revision 1.0
uhub0: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
uhci1:  port 0xd000-0xd01f 
irq 19 at device 29.1 on pci0
uhci1: [GIANT-LOCKED]
usb1:  on uhci1
usb1: USB revision 1.0
uhub1: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub1: 2 ports with 2 removable, self powered
uhci2:  port 0xd400-0xd41f 
irq 18 at device 29.2 on pci0
uhci2: [GIANT-LOCKED]
usb2:  on uhci2
usb2: USB revision 1.0
uhub2: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub2: 2 ports with 2 removable, self powered
uhci3:  port 0xd800-0xd81f 
irq 16 at device 29.3 on pci0
uhci3: [GIANT-LOCKED]
usb3:  on uhci3
usb3: USB revision 1.0
uhub3: Intel UHCI root hub, class 9/0, rev 1.00/1.00, addr 1
uhub3: 2 ports with 2 removable, self powered
ehci0:  mem 0xf3afb800-0xf3afbbff irq 
23 at device 29.7 on pci0
ehci0: [GIANT-LOCKED]
usb4: EHCI version 1.0
usb4: companion controllers, 2 ports each: usb0 usb1 usb2 usb3
usb4:  on ehci0
usb4: USB revision 2.0
uhub4: Intel EHCI root hub, class 9/0, rev 2.00/1.00, addr 1
uhub4: 

6.1 stability (Re: 4.11 snapshots?)

2006-05-21 Thread Kris Kennaway
On Mon, May 22, 2006 at 10:03:33AM +1200, Andrew Thompson wrote:
> On Sun, May 21, 2006 at 01:20:24PM -0600, Brett Glass wrote:
> > Well, y'know, if they could release a FreeBSD 2.2.9 (as was done last 
> > month), it
> > shouldn't be a problem to do a 4.12 release as a "last gasp" to tide us 
> > over 
> > until September. (Hopefully, Colin and the "summer of code" folks can
> > work on performance enhancements to the network stack, UFS2, and the hard
> > disk device drivers in time for the 6.2 release in September. I'm just a
> > little scared of 6.1, given the known problems that couldn't be fixed in
> > time and the slower performance we're seeing on databases, etc.)

We did ourselves a big disservice by not pointing out clearly in the
todo list that most of the listed problems are VERY RARE and are
unlikely to affect most/all users.  In future we're going to have to
be clearer about that, because you're not the only user who was scared
for no reason.

We really had to push FreeBSD hard to find those problems; 6.1 stands
up to enormous test loads that all previous tested releases could not
handle.  I wouldn't be surprised if 4.x cannot handle the same
workloads, simply because no-one may have ever attempted such loads on
a 4.x system.

Kris

P.S. If you're willing to put some effort into analyzing and profiling
it, I'd be willing to work with you on your performance problem.


pgp3834QpJGhf.pgp
Description: PGP signature


Re: improper handling of dlpened's C++/atexit() code?

2006-05-21 Thread Alexander Kabaev
On Sun, 21 May 2006 13:13:35 -0400
"m m" <[EMAIL PROTECTED]> wrote:

> Any hints on this available?  Suggestions, more info, anything else?
> 
> On 5/15/06, m m <[EMAIL PROTECTED]> wrote:
> > On 5/14/06, Alexander Kabaev <[EMAIL PROTECTED]> wrote:
> > > On Thu, 11 May 2006 20:57:20 -0400
> > > "m m" <[EMAIL PROTECTED]> wrote:
> > >
> > > >  I am writing in regard to PR at
> > > > http://www.freebsd.org/cgi/query-pr.cgi?pr=bin%2F59552 .  I am
> > > > experiencing behavior on 6.1-PRERELEASE FreeBSD 6.1-PRERELEASE
> > > > #11: Sun Mar 26 00:03:52 EST 2006 which looks a lot like
> > > > something that would be caused by this PR. This happens when
> > > > apache-1.3 processes that run with Mason code receive a SIGUSR1
> > > > (when newsyslog does log rotation) and apache gracefully kills
> > > > off all processes when restarting.  The following is the stack
> > > > trace that lead me to this PR:
> > > You'll need to build ld-elf.so.1 and libc.so.6 to get a sensible
> > > backtrace.
> >
> > Please find the new stack trace below.  If there is more
> > information I can provide, just ask.  (This is 6.1-STABLE, cvsup
> > very shortly before May 11 23:14 EDT)
> >
> > Program received signal SIGSEGV, Segmentation fault.
> > 0x in ?? ()
> > (gdb) bt
> > #0  0x in ?? ()
> > #1  0x294c0ad8 in __do_global_dtors_aux () from
> > /usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> > #2  0x294c1d4c in _fini () from
> > /usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> > #3  0x280b4c80 in ?? ()
> > #4  0x280aaab8 in ?? () from /libexec/ld-elf.so.1
> > #5  0xbfbfe6e8 in ?? ()
> > #6  0x2808dca6 in objlist_call_fini (list=0x280a96d8) at
> > /usr/src/libexec/rtld-elf/rtld.c:1336
> > #7  0x2808e1d4 in rtld_exit ()
> > at /usr/src/libexec/rtld-elf/rtld.c:1528 #8  0x281d58ea in
> > __cxa_finalize (dso=0x0) at /usr/src/lib/libc/stdlib/atexit.c:184
> > #9  0x281d55ba in exit (status=0)
> > at /usr/src/lib/libc/stdlib/exit.c:69 #10 0x0805d0cb in
> > clean_child_exit () #11 0x0805ea77 in just_die ()
> > #12 0x0805ea9a in usr1_handler ()
> > #13 0xbfbfffb4 in ?? ()
> > #14 0x001e in ?? ()
> > #15 0x in ?? ()
> > #16 0xbfbfe7c0 in ?? ()
> > #17 0x0002 in ?? ()
> > #18 0x0805ea80 in just_die ()
> > #19 0x0806011e in child_main ()
> > #20 0x080607de in make_child ()
> > #21 0x08060868 in startup_children ()
> > #22 0x08060e81 in standalone_main ()
> > #23 0x08061702 in main ()
> >
Looks like normal atexit path to me. At this point a close look at
Syslog.so is needed IMHO. I do not see anything criminal implicating
FreeBSD in this crash in any way.

-- 
Alexander Kabaev


signature.asc
Description: PGP signature


Re: 4.11 snapshots?

2006-05-21 Thread Andrew Thompson
On Sun, May 21, 2006 at 01:20:24PM -0600, Brett Glass wrote:
> Well, y'know, if they could release a FreeBSD 2.2.9 (as was done last month), 
> it
> shouldn't be a problem to do a 4.12 release as a "last gasp" to tide us over 
> until September. (Hopefully, Colin and the "summer of code" folks can
> work on performance enhancements to the network stack, UFS2, and the hard
> disk device drivers in time for the 6.2 release in September. I'm just a
> little scared of 6.1, given the known problems that couldn't be fixed in
> time and the slower performance we're seeing on databases, etc.)

release(7)

 "FreeBSD provides a complete build environment suitable for users to
 make full releases of the FreeBSD operating system."

In the week that this email thread has been kicking around you could
have made one yourself.


Andrew
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Re: improper handling of dlpened's C++/atexit() code?

2006-05-21 Thread Konstantin Belousov
On Sun, May 21, 2006 at 01:13:35PM -0400, m m wrote:
> Any hints on this available?  Suggestions, more info, anything else?
> 
> On 5/15/06, m m <[EMAIL PROTECTED]> wrote:
> >On 5/14/06, Alexander Kabaev <[EMAIL PROTECTED]> wrote:
> >> On Thu, 11 May 2006 20:57:20 -0400
> >> "m m" <[EMAIL PROTECTED]> wrote:
> >>
> >> >  I am writing in regard to PR at
> >> > http://www.freebsd.org/cgi/query-pr.cgi?pr=bin%2F59552 .  I am
> >> > experiencing behavior on 6.1-PRERELEASE FreeBSD 6.1-PRERELEASE #11:
> >> > Sun Mar 26 00:03:52 EST 2006 which looks a lot like something that
> >> > would be caused by this PR. This happens when apache-1.3 processes
> >> > that run with Mason code receive a SIGUSR1 (when newsyslog does log
> >> > rotation) and apache gracefully kills off all processes when
> >> > restarting.  The following is the stack trace that lead me to this PR:
> >> You'll need to build ld-elf.so.1 and libc.so.6 to get a sensible
> >> backtrace.
> >
> >Please find the new stack trace below.  If there is more information I
> >can provide, just ask.  (This is 6.1-STABLE, cvsup very shortly before
> >May 11 23:14 EDT)
> >
> >Program received signal SIGSEGV, Segmentation fault.
> >0x in ?? ()
> >(gdb) bt
> >#0  0x in ?? ()
> >#1  0x294c0ad8 in __do_global_dtors_aux () from
> >/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> >#2  0x294c1d4c in _fini () from
> >/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
> >#3  0x280b4c80 in ?? ()
> >#4  0x280aaab8 in ?? () from /libexec/ld-elf.so.1
> >#5  0xbfbfe6e8 in ?? ()
> >#6  0x2808dca6 in objlist_call_fini (list=0x280a96d8) at
> >/usr/src/libexec/rtld-elf/rtld.c:1336
> >#7  0x2808e1d4 in rtld_exit () at /usr/src/libexec/rtld-elf/rtld.c:1528
> >#8  0x281d58ea in __cxa_finalize (dso=0x0) at
> >/usr/src/lib/libc/stdlib/atexit.c:184
> >#9  0x281d55ba in exit (status=0) at /usr/src/lib/libc/stdlib/exit.c:69
> >#10 0x0805d0cb in clean_child_exit ()
> >#11 0x0805ea77 in just_die ()
> >#12 0x0805ea9a in usr1_handler ()
> >#13 0xbfbfffb4 in ?? ()
> >#14 0x001e in ?? ()
> >#15 0x in ?? ()
> >#16 0xbfbfe7c0 in ?? ()
> >#17 0x0002 in ?? ()
> >#18 0x0805ea80 in just_die ()
> >#19 0x0806011e in child_main ()
> >#20 0x080607de in make_child ()
> >#21 0x08060868 in startup_children ()
> >#22 0x08060e81 in standalone_main ()
> >#23 0x08061702 in main ()

Could you, please, put somewhere:
1. /usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
2. output of lsof -p  for apache running
in your usual configuration.

Also, could you run the apache with LD_PRELOAD=/usr/lib/libstdc++.so.5
and report whether the problem persists ?


pgpBQKJe6UYtu.pgp
Description: PGP signature


Re: 4.11 snapshots?

2006-05-21 Thread Peter Jeremy
On Sun, 2006-May-21 13:20:24 -0600, Brett Glass wrote:
>Well, y'know, if they could release a FreeBSD 2.2.9 (as was done last month), 
>it
>shouldn't be a problem to do a 4.12 release as a "last gasp" to tide us over 

Maybe for April 1st next year - though novel April Fools Day jokes are
always much better.

-- 
Peter Jeremy
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


generic_bcopy() corrupts backtrace?

2006-05-21 Thread Kris Kennaway
On Sun, May 21, 2006 at 09:04:05PM +0200, Christian Brueffer wrote:

> Core and debug kernel are available, but the trace appears to be
> corrupted.

Sorry to hijack your thread, but I'm also seeing corrupted backtraces
from kgdb involving generic_bcopy().

Is there something about its asm implementation that confuses kgdb?

> #10 0xc07854fe in generic_bcopy () at
> /data/build/STABLE/src/sys/i386/i386/support.s:489
> Previous frame inner to this frame (corrupt stack?)

Kris


pgpIwy0lqd8An.pgp
Description: PGP signature


Re: 4.11 snapshots?

2006-05-21 Thread Brett Glass
Well, y'know, if they could release a FreeBSD 2.2.9 (as was done last month), it
shouldn't be a problem to do a 4.12 release as a "last gasp" to tide us over 
until September. (Hopefully, Colin and the "summer of code" folks can
work on performance enhancements to the network stack, UFS2, and the hard
disk device drivers in time for the 6.2 release in September. I'm just a
little scared of 6.1, given the known problems that couldn't be fixed in
time and the slower performance we're seeing on databases, etc.)

--Brett

___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Fatal trap 12: page fault while in kernel mode

2006-05-21 Thread Christian Brueffer
Hi,

got the following trap on an i386 SMP system running with recent RELENG_6
sources.  The system was doing copies from/to geli encrypted disks,
using hifn(4) hardware crypto.

Core and debug kernel are available, but the trace appears to be
corrupted.

- Christian


Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 01
fault virtual address   = 0xc43cb554
fault code  = supervisor write, page not present
instruction pointer = 0x20:0xc07854fe
stack pointer   = 0x28:0xd44c1c34
frame pointer   = 0x28:0xd44c1c5c
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 32 (irq19: hifn0)
[thread pid 32 tid 100033 ]
Stopped at  generic_bcopy+0x1a: repe movsl
(%esi),%es:(%edi)
db> tr
generic_bcopy(c4ebe118,ff0,10,c43cb554,c4ebe0a0) at generic_bcopy+0x1a
hifn_callback(c351e800,c3d2e000,0,868,0) at hifn_callback+0x333
hifn_intr(c351e800,d44c1cd8,c05a0e8d,c084a8a0,1) at hifn_intr+0x2a7
ithread_execute_handlers(c33f1a3c,c3345400,c07d243c,30f,c3310780) at
ithread_execute_handlers+0x128
ithread_loop(c35260f0,d44c1d38,c07d220e,31d,dfff) at
ithread_loop+0x84
fork_exit(c0590a00,c35260f0,d44c1d38) at fork_exit+0xc1
fork_trampoline() at fork_trampoline+0x8
--- trap 0x1, eip = 0, esp = 0xd44c1d6c, ebp = 0 ---



Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 01
fault virtual address   = 0xc43cb554
fault code  = supervisor write, page not present
instruction pointer = 0x20:0xc07854fe
stack pointer   = 0x28:0xd44c1c34
frame pointer   = 0x28:0xd44c1c5c
code segment= base 0x0, limit 0xf, type 0x1b
= DPL 0, pres 1, def32 1, gran 1
processor eflags= interrupt enabled, resume, IOPL = 0
current process = 32 (irq19: hifn0)
Dumping 511 MB (2 chunks)
  chunk 0: 1MB (159 pages) ... ok
  chunk 1: 511MB (130796 pages) 495 479 463 447 431 415 399 383 367 351
335 319 303 287 271 255 239 223 207 191 175 159 143 127 111 95 79 63 47
31 15

#0  doadump () at pcpu.h:165
165 pcpu.h: No such file or directory.
in pcpu.h
(kgdb) bt
#0  doadump () at pcpu.h:165
#1  0xc048f326 in db_fncall (dummy1=0, dummy2=0, dummy3=1999, dummy4=0xd44c1a14 
"`\027\204À\f")
at /data/build/STABLE/src/sys/ddb/db_command.c:492
#2  0xc048f0a2 in db_command (last_cmdp=0xc0840e64, cmd_table=0x0, 
aux_cmd_tablep=0xc07fbbc0, 
aux_cmd_tablep_end=0xc07fbbc4) at 
/data/build/STABLE/src/sys/ddb/db_command.c:350
#3  0xc048f1b5 in db_command_loop () at 
/data/build/STABLE/src/sys/ddb/db_command.c:458
#4  0xc04913a5 in db_trap (type=12, code=0) at 
/data/build/STABLE/src/sys/ddb/db_main.c:221
#5  0xc05cb1be in kdb_trap (type=0, code=0, tf=0xd44c1bf4)
at /data/build/STABLE/src/sys/kern/subr_kdb.c:473
#6  0xc0787e1b in trap_fatal (frame=0xd44c1bf4, eva=0)
at /data/build/STABLE/src/sys/i386/i386/trap.c:827
#7  0xc0787ac2 in trap_pfault (frame=0xd44c1bf4, usermode=0, eva=3292312916)
at /data/build/STABLE/src/sys/i386/i386/trap.c:744
#8  0xc078766d in trap (frame=
  {tf_fs = 8, tf_es = 40, tf_ds = 40, tf_edi = -1002654380, tf_esi =
-991182864, tf_ebp = -733209508, tf_isp = -733209568, tf_ebx = 16,
tf_edx = 4080, tf_ecx = 4, tf_eax = -11471516, tf_trapno = 12, tf_err =
2, tf_eip = -1065855746, tf_cs = 32, tf_eflags = 66066, tf_esp = 16,
tf_ss = -991174344}) at /data/build/STABLE/src/sys/i386/i386/trap.c:434
#9  0xc07713da in calltrap () at
/data/build/STABLE/src/sys/i386/i386/exception.s:139
#10 0xc07854fe in generic_bcopy () at
/data/build/STABLE/src/sys/i386/i386/support.s:489
Previous frame inner to this frame (corrupt stack?)


-- 
Christian Brueffer  [EMAIL PROTECTED]   [EMAIL PROTECTED]
GPG Key: http://people.freebsd.org/~brueffer/brueffer.key.asc
GPG Fingerprint: A5C8 2099 19FF AACA F41B  B29B 6C76 178C A0ED 982D


pgp2UdzA7D9eX.pgp
Description: PGP signature


Re: 4.11 snapshots?

2006-05-21 Thread Kris Kennaway
On Mon, May 15, 2006 at 07:35:53PM -0600, Brett Glass wrote:
> Is there a server currently furnishing snapshots of the FreeBSD 4.11 security
> branch? We have some servers running various 4.x versions that might not be
> happy with 6.x due to memory requirements. They also might have slower file
> access (The file system in FreeBSD 6.x still isn't as snappy as the one
> in 4.x, though I hope this will change). So, we'd like to upgrade them to
> a patch level that includes all recent security fixes. Are ISOs available?

FYI, it is only soft updates (really bufdaemon, through which all the
I/O passes) that has performance problems under high load on 6.x
compared to 4.x.  Other mount modes perform quite a bit better
(e.g. 30% faster for async write performance) than 4.x on the hardware
I tested.

  http://people.freebsd.org/~kris/bsdcan/Filesystem%20Performance.pdf

Kris

P.S. Don't link to the above URL, I need to send it to Dan for
publication on the BSDCan site, to which you should link instead.



pgpG9rwhX0lLL.pgp
Description: PGP signature


Re: 4.11 snapshots?

2006-05-21 Thread Kris Kennaway
On Wed, May 17, 2006 at 01:22:59PM +0300, Dmitry Pryanishnikov wrote:
> 
> Hello!
> 
> On Tue, 16 May 2006, Colin Percival wrote:
> >Personally, since FreeBSD 4.11 will reach its EoL about 8 months
> >from now, and the 4.x->[56].x upgrade path is non-trivial, I
> >recommend installing FreeBSD 6.1 instead.
> 
>   Well, have you seen my simple performance benchmarking RELENG_4 vs 6?
> IMHO it mimics quote common usage pattern: it just downloads a large file
> with 10Mbps rate and stores it on UFS filesystem. On the same hardware
> (i386 uniprocessor Celeron-333 system with 128Mb RAM and fast SAMSUNG 
> SP0802N
> HDD using UDMA33) under the same conditions, using more optimal config 
> (INVARIANTS removed) RELENG_6 (and 5) _still_ uses >= 50% of CPU time
> for (Intr+Sys), while RELENG_4 doesn't use more than 28% for them. So
> (unless this performance difference will be minimized) I predict _a lot_
> of requests to extend RELENG_4 support further, because people just couldn't
> afford 4->6 upgrade due to a loss of performance.

This is a network+filesystem benchmark, and it's probably the
"network" part that is using extra CPU, not the "filesystem" part.
But until you run those profiling tests we can't be sure.

Kris


pgpLxj04Kg5CZ.pgp
Description: PGP signature


Re: improper handling of dlpened's C++/atexit() code?

2006-05-21 Thread m m

Any hints on this available?  Suggestions, more info, anything else?

On 5/15/06, m m <[EMAIL PROTECTED]> wrote:

On 5/14/06, Alexander Kabaev <[EMAIL PROTECTED]> wrote:
> On Thu, 11 May 2006 20:57:20 -0400
> "m m" <[EMAIL PROTECTED]> wrote:
>
> >  I am writing in regard to PR at
> > http://www.freebsd.org/cgi/query-pr.cgi?pr=bin%2F59552 .  I am
> > experiencing behavior on 6.1-PRERELEASE FreeBSD 6.1-PRERELEASE #11:
> > Sun Mar 26 00:03:52 EST 2006 which looks a lot like something that
> > would be caused by this PR. This happens when apache-1.3 processes
> > that run with Mason code receive a SIGUSR1 (when newsyslog does log
> > rotation) and apache gracefully kills off all processes when
> > restarting.  The following is the stack trace that lead me to this PR:
> You'll need to build ld-elf.so.1 and libc.so.6 to get a sensible
> backtrace.

Please find the new stack trace below.  If there is more information I
can provide, just ask.  (This is 6.1-STABLE, cvsup very shortly before
May 11 23:14 EDT)

Program received signal SIGSEGV, Segmentation fault.
0x in ?? ()
(gdb) bt
#0  0x in ?? ()
#1  0x294c0ad8 in __do_global_dtors_aux () from
/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
#2  0x294c1d4c in _fini () from
/usr/local/lib/perl5/5.8.8/mach/auto/Sys/Syslog/Syslog.so
#3  0x280b4c80 in ?? ()
#4  0x280aaab8 in ?? () from /libexec/ld-elf.so.1
#5  0xbfbfe6e8 in ?? ()
#6  0x2808dca6 in objlist_call_fini (list=0x280a96d8) at
/usr/src/libexec/rtld-elf/rtld.c:1336
#7  0x2808e1d4 in rtld_exit () at /usr/src/libexec/rtld-elf/rtld.c:1528
#8  0x281d58ea in __cxa_finalize (dso=0x0) at
/usr/src/lib/libc/stdlib/atexit.c:184
#9  0x281d55ba in exit (status=0) at /usr/src/lib/libc/stdlib/exit.c:69
#10 0x0805d0cb in clean_child_exit ()
#11 0x0805ea77 in just_die ()
#12 0x0805ea9a in usr1_handler ()
#13 0xbfbfffb4 in ?? ()
#14 0x001e in ?? ()
#15 0x in ?? ()
#16 0xbfbfe7c0 in ?? ()
#17 0x0002 in ?? ()
#18 0x0805ea80 in just_die ()
#19 0x0806011e in child_main ()
#20 0x080607de in make_child ()
#21 0x08060868 in startup_children ()
#22 0x08060e81 in standalone_main ()
#23 0x08061702 in main ()


___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


GEOM problems again...

2006-05-21 Thread Johan Ström

Hi

I've had problems before with GEOM mirror and my SATA drives, and  
i've posted about it here before too. The solution seemd to be a  
change of motherboard, this reduced the crash very much (and also the  
speeds archieved was greatly improved, from 10-15MB/s to 40-50MB/s..).
However after the change i had one or two crashes, but now it has  
been running for well over 50-60 days or so without any problems.
Then, 11 days ago I upgraded to 6.1... And now I got these "crashe"s  
again (the mirror is crashed that is, the system still runs fine):


May 21 02:04:58 elfi kernel: ad6: FAILURE - device detached
May 21 02:04:58 elfi kernel: subdisk6: detached
May 21 02:04:58 elfi kernel: ad6: detached
May 21 02:04:58 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
ad6s1 disconnected.
May 21 02:04:58 elfi kernel: g_vfs_done():mirror/gm0s1f[READ 
(offset=11006308352, length=2048)]error = 6
May 21 02:04:58 elfi kernel: g_vfs_done():mirror/gm0s1f[READ 
(offset=164847927296, length=131072)]error = 6
May 21 02:04:58 elfi kernel: g_vfs_done():mirror/gm0s1f[READ 
(offset=256680296448, length=32768)]error = 6



Some info about the controller and disks:

May  9 22:46:52 elfi kernel: ata1:  on atapci0
May  9 22:46:52 elfi kernel: atapci1: controller> port  
0xec00-0xec07,0xe880-0xe883,0xe800-0xe807,0xe480-0xe483,0x7f00-0x7f0f, 
0x7c0

0-0x7c7f irq 22 at device 11.0 on pci0

May  9 22:46:52 elfi kernel: ad4: 286188MB   
at ata2-master SATA150
May  9 22:46:52 elfi kernel: ad6: 286188MB   
at ata3-master SATA150
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1 created  
(id=4118114647).
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
ad4s1 detected.
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
ad6s1 detected.
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
ad6s1 activated.
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
ad4s1 activated.
May  9 22:46:52 elfi kernel: GEOM_MIRROR: Device gm0s1: provider  
mirror/gm0s1 launched.
May  9 22:46:52 elfi kernel: Trying to mount root from ufs:/dev/ 
mirror/gm0s1a


Anyone got any new clues? Afaik the disks should be working fine  
(they are 6 months old and this same problem has occured multiple  
times...)


Hope to solve this ;)

Thanks
Johan