Re: bin/162661: [patch] ftp(8) is giving up on IPv6
The following reply was made to PR bin/162661; it has been noted by GNATS. From: Maxim Konovalov To: bug-follo...@freebsd.org Cc: Subject: Re: bin/162661: [patch] ftp(8) is giving up on IPv6 Date: Mon, 28 Nov 2011 14:38:35 +0400 (MSK) This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. ---1934791479-1752824349-1322476627=:69998 Content-Type: TEXT/PLAIN; CHARSET=US-ASCII Content-ID: Hi, Please test an enclosed diff and report your results. The patch is produced by Luke Mewburn (with my minor addition), the author of our ftp(1) we imported from NetBSD. -- Maxim Konovalov ---1934791479-1752824349-1322476627=:69998 Content-Type: TEXT/X-DIFF; NAME=ftp-freebsd.diff Content-Transfer-Encoding: BASE64 Content-ID: Content-Description: ftp-freebsd.diff Content-Disposition: ATTACHMENT; FILENAME=ftp-freebsd.diff SW5kZXg6IHV0aWwuYw0KPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PQ0KLS0tIHV0 aWwuYwkocmV2aXNpb24gMjI4MDU3KQ0KKysrIHV0aWwuYwkod29ya2luZyBj b3B5KQ0KQEAgLTEwNjAsNyArMTA2MCwzMyBAQA0KIHZvaWQNCiBzZXR1cHNv Y2tidWZzaXplKGludCBzb2NrKQ0KIHsNCisJc29ja2xlbl90IHNsZW47DQog DQorCWlmICgwID09IHJjdmJ1Zl9zaXplKSB7DQorCQlzbGVuID0gc2l6ZW9m KHJjdmJ1Zl9zaXplKTsNCisJCWlmIChnZXRzb2Nrb3B0KHNvY2ssIFNPTF9T T0NLRVQsIFNPX1JDVkJVRiwNCisJCSAgICAodm9pZCAqKSZyY3ZidWZfc2l6 ZSwgJnNsZW4pID09IC0xKQ0KKwkJCWVycigxLCAiVW5hYmxlIHRvIGRldGVy bWluZSByY3ZidWYgc2l6ZSIpOw0KKwkJaWYgKHJjdmJ1Zl9zaXplIDw9IDAp DQorCQkJcmN2YnVmX3NpemUgPSA4ICogMTAyNDsNCisJCWlmIChyY3ZidWZf c2l6ZSA+IDggKiAxMDI0ICogMTAyNCkNCisJCQlyY3ZidWZfc2l6ZSA9IDgg KiAxMDI0ICogMTAyNDsNCisJCURQUklOVEYoInNldHVwc29ja2J1ZnNpemU6 IHJjdmJ1Zl9zaXplIGRldGVybWluZWQgYXMgJWRcbiIsDQorCQkgICAgcmN2 YnVmX3NpemUpOw0KKwl9DQorCWlmICgwID09IHNuZGJ1Zl9zaXplKSB7DQor CQlzbGVuID0gc2l6ZW9mKHNuZGJ1Zl9zaXplKTsNCisJCWlmIChnZXRzb2Nr b3B0KHNvY2ssIFNPTF9TT0NLRVQsIFNPX1NOREJVRiwNCisJCSAgICAodm9p ZCAqKSZzbmRidWZfc2l6ZSwgJnNsZW4pID09IC0xKQ0KKwkJCWVycigxLCAi VW5hYmxlIHRvIGRldGVybWluZSBzbmRidWYgc2l6ZSIpOw0KKwkJaWYgKHNu ZGJ1Zl9zaXplIDw9IDApDQorCQkJc25kYnVmX3NpemUgPSA4ICogMTAyNDsN CisJCWlmIChzbmRidWZfc2l6ZSA+IDggKiAxMDI0ICogMTAyNCkNCisJCQlz bmRidWZfc2l6ZSA9IDggKiAxMDI0ICogMTAyNDsNCisJCURQUklOVEYoInNl dHVwc29ja2J1ZnNpemU6IHNuZGJ1Zl9zaXplIGRldGVybWluZWQgYXMgJWRc biIsDQorCQkgICAgc25kYnVmX3NpemUpOw0KKwl9DQorDQogCWlmIChzZXRz b2Nrb3B0KHNvY2ssIFNPTF9TT0NLRVQsIFNPX1NOREJVRiwNCiAJICAgICh2 b2lkICopJnNuZGJ1Zl9zaXplLCBzaXplb2Yoc25kYnVmX3NpemUpKSA9PSAt MSkNCiAJCXdhcm4oIlVuYWJsZSB0byBzZXQgc25kYnVmIHNpemUgJWQiLCBz bmRidWZfc2l6ZSk7DQpJbmRleDogbWFpbi5jDQo9PT09PT09PT09PT09PT09 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09 PT09PT09DQotLS0gbWFpbi5jCShyZXZpc2lvbiAyMjgwNTcpDQorKysgbWFp bi5jCSh3b3JraW5nIGNvcHkpDQpAQCAtMTQ2LDkgKzE0Niw4IEBADQogCXN0 cnVjdCBwYXNzd2QgKnB3Ow0KIAljaGFyICpjcCwgKmVwLCAqYW5vbnBhc3Ms ICp1cGxvYWRfcGF0aCwgKnNyY19hZGRyOw0KIAljb25zdCBjaGFyICphbm9u dXNlcjsNCi0JaW50IGR1bWJ0ZXJtLCBzLCBpc3VwbG9hZDsNCisJaW50IGR1 bWJ0ZXJtLCBpc3VwbG9hZDsNCiAJc2l6ZV90IGxlbjsNCi0Jc29ja2xlbl90 IHNsZW47DQogDQogCXR6c2V0KCk7DQogI2lmIDAJLyogdG5mdHAgKi8JLyog WFhYICovDQpAQCAtMjAyLDkgKzIwMSwxMSBAQA0KIAl1cGxvYWRfcGF0aCA9 IE5VTEw7DQogCWlzdXBsb2FkID0gMDsNCiAJcmVwbHlfY2FsbGJhY2sgPSBO VUxMOw0KLSNpZmRlZiBJTkVUNg0KIAlmYW1pbHkgPSBBRl9VTlNQRUM7DQot I2Vsc2UNCisjaWZkZWYgSU5FVDYNCisJZmFtaWx5ID0gQUZfSU5FVDY7DQor I2VuZGlmDQorI2lmZGVmIElORVQNCiAJZmFtaWx5ID0gQUZfSU5FVDsJLyog Zm9yY2UgQUZfSU5FVCBpZiBubyBJTkVUNiBzdXBwb3J0ICovDQogI2VuZGlm DQogDQpAQCAtMjEzLDM1ICsyMTQsNiBAQA0KIAlpZiAoY3AgIT0gTlVMTCAm JiBzdHJsY3B5KG5ldHJjLCBjcCwgc2l6ZW9mKG5ldHJjKSkgPj0gc2l6ZW9m KG5ldHJjKSkNCiAJCWVycngoMSwgIiRORVRSQyBgJXMnOiAlcyIsIGNwLCBz dHJlcnJvcihFTkFNRVRPT0xPTkcpKTsNCiANCi0JLyoNCi0JICogR2V0IHRo ZSBkZWZhdWx0IHNvY2tldCBidWZmZXIgc2l6ZXMgaWYgd2UgZG9uJ3QgYWxy ZWFkeSBoYXZlIHRoZW0uDQotCSAqIEl0IGRvZXNuJ3QgbWF0dGVyIHdoaWNo IHNvY2tldCB3ZSBkbyB0aGlzIHRvLCBiZWNhdXNlIG9uIHRoZSBmaXJzdA0K LQkgKiBjYWxsIG5vIHNvY2tldCBidWZmZXIgc2l6ZXMgd2lsbCBoYXZlIGJl ZW4gbW9kaWZpZWQsIHNvIHdlIGFyZQ0KLQkgKiBndWFyYW50ZWVkIHRvIGdl dCB0aGUgc3lzdGVtIGRlZmF1bHRzLg0KLQkgKi8NCi0JcyA9IHNvY2tldChB Rl9JTkVULCBTT0NLX1NUUkVBTSwgMCk7DQotCWlmIChzID09IC0xKQ0KLQkJ ZXJyKDEsICJDYW4ndCBjcmVhdGUgc29ja2V0IHRvIGRldGVybWluZSBkZWZh dWx0IHNvY2tldCBzaXplcyIpOw0KLQlzbGVuID0gc2l6ZW9mKHJjdmJ1Zl9z aXplKTsNCi0JaWYgKGdldHNvY2tvcHQocywgU09MX1NPQ0tFVCwgU09fUkNW QlVGLA0KLQkgICAgKHZvaWQgKikmcmN2YnVmX3NpemUsICZzbGVuKSA9PSAt MSkNCi0JCWVycigxLCAiVW5hYmxlIHRvIGdldCBkZWZhdWx0IHJjdmJ1ZiBz aXplIik7DQotCXNsZW4gPSBzaXplb2Yoc25kYnVmX3NpemUpOw0KLQlpZiAo Z2V0c29ja29wdChzLCBTT0xfU09DS0VULCBTT19TTkRCVUYsDQotCSAgICAo dm9pZCAqKSZzbmRidWZfc2l6ZSwgJnNsZW4pID09IC0xKQ0KLQkJZXJyKDEs ICJVbmFibGUgdG8gZ2V0IGRlZmF1bHQgc25kYnVmIHNpemUiKTsNCi0JKHZv aWQpY2xvc2Uocyk7DQotCQkJCQkvKiBzYW5pdHkgY2hlY2sgcmV0dXJuZWQg YnVmZmVyIHNpemVzICovDQotCWlmIChyY3ZidWZfc2l6ZSA8PSAwKQ0KLQkJ cmN2YnVmX3NpemUgPSA4ICogMTAyNDsNCi0JaWYgKHNuZGJ1Zl9zaXplIDw9 IDApDQotCQlzbmRidWZfc
Re: gnu/161289: Please update contrib/gperf to 3.0.3 (last GPL2 version)
Synopsis: Please update contrib/gperf to 3.0.3 (last GPL2 version) State-Changed-From-To: open->closed State-Changed-By: bapt State-Changed-When: Mon Nov 28 12:33:58 UTC 2011 State-Changed-Why: gperf has been upgraded to 3.0.3 http://www.freebsd.org/cgi/query-pr.cgi?pr=161289 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/162789: [PATCH] if_clone may create multiple interfaces with the same name
Synopsis: [PATCH] if_clone may create multiple interfaces with the same name State-Changed-From-To: open->patched State-Changed-By: glebius State-Changed-When: Mon Nov 28 14:45:33 UTC 2011 State-Changed-Why: Partially fixed in head. A check in if_cloner against ifunit() added. Locking isn't added, since it isn't sufficient. Responsible-Changed-From-To: freebsd-bugs->glebius Responsible-Changed-By: glebius Responsible-Changed-When: Mon Nov 28 14:45:33 UTC 2011 Responsible-Changed-Why: Partially fixed in head. A check in if_cloner against ifunit() added. Locking isn't added, since it isn't sufficient. http://www.freebsd.org/cgi/query-pr.cgi?pr=162789 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/114995: [drm] acpi_video prevents savage drm from loading successfully
Synopsis: [drm] acpi_video prevents savage drm from loading successfully State-Changed-From-To: feedback->closed State-Changed-By: jh State-Changed-When: Mon Nov 28 15:21:40 UTC 2011 State-Changed-Why: Submitter agrees that this can be closed. http://www.freebsd.org/cgi/query-pr.cgi?pr=114995 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
kern/162926: Infinite loop in ipfilter with fragmented IPv6 traffic
>Number: 162926 >Category: kern >Synopsis: Infinite loop in ipfilter with fragmented IPv6 traffic >Confidential: no >Severity: serious >Priority: medium >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Nov 28 16:00:20 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Paul >Release:6.4 >Organization: >Environment: FreeBSD virtualbox0 6.4-RELEASE FreeBSD 6.4-RELEASE #0: Wed Nov 26 11:43:51 UTC 2008 r...@dessler.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC i386 >Description: When receiving the following packet, ipfilter enters a loop in the frpr_ipv6hdr function making the whole system unresponsive. More recent versions of FreeBSD (e.g. 8.x) seem to be affected as they are using the same version of ipfilter. # tcpdump -n -X -r AC_458632.pak reading from file AC_458632.pak, link-type EN10MB (Ethernet) 01:00:00.000453 IP6 truncated-ip6 - 32724 bytes missing!:: > 80::: frag (0|32760) AH(spi=0x,seq=0x3300): HBH AH(spi=0x,seq=0x0): HBH [|HBH] 0x: 6000 8000 2c00 `.,. 0x0010: 0080 0x0020: 3300 0004 3... 0x0030: 3300 3... 0x0040: 0x0050: The problem seems to have been corrected in ipfilter 4.1.31. >How-To-Repeat: enable ipfilter. enable ipv6 and ipv6 forwarding. send packet through filter. >Fix: Install ipfilter v4.1.31. >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: gnu/161289: Please update contrib/gperf to 3.0.3 (last GPL2 version)
Synopsis: Please update contrib/gperf to 3.0.3 (last GPL2 version) State-Changed-From-To: closed->patched State-Changed-By: eadler State-Changed-When: Mon Nov 28 19:35:53 UTC 2011 State-Changed-Why: bapt did the import to head only Responsible-Changed-From-To: freebsd-bugs->bapt Responsible-Changed-By: eadler Responsible-Changed-When: Mon Nov 28 19:35:53 UTC 2011 Responsible-Changed-Why: bapt did the import to head only http://www.freebsd.org/cgi/query-pr.cgi?pr=161289 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/162926: [ipfilter] Infinite loop in ipfilter with fragmented IPv6 traffic
Old Synopsis: Infinite loop in ipfilter with fragmented IPv6 traffic New Synopsis: [ipfilter] Infinite loop in ipfilter with fragmented IPv6 traffic Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When: Mon Nov 28 20:13:21 UTC 2011 Responsible-Changed-Why: Over to maintainer(s). http://www.freebsd.org/cgi/query-pr.cgi?pr=162926 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/159663: [socket] [nullfs] sockets don't work though nullfs mounts
The following reply was made to PR kern/159663; it has been noted by GNATS. From: Mikolaj Golub To: Robert Millan Cc: bug-follo...@freebsd.org Subject: Re: kern/159663: [socket] [nullfs] sockets don't work though nullfs mounts Date: Mon, 28 Nov 2011 22:49:02 +0200 On Sun, 27 Nov 2011 18:44:30 +0100 Robert Millan wrote: RM> Hi Mikolaj, Hi >> But actually it is possible to do without the additional flag, with the only >> hack in nullfs code: in lookup and create return lower vnode if it is a >> socket, like in the patch below. It works for me but I have not tested much >> and not checked yet if use cases are possible when this makes undesirable >> effect. RM> I've been using your patch (with 8.1 kernel on amd64) for two months RM> now, and didn't notice any ill effects. RM> Do you have plans on committing it? Thanks for testing! I wouldn't like to commit it without trying to find a better solution. After I got some suggestions from kib@ I hope will be able to come with something better than this patch. -- Mikolaj Golub ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
kern/162932: [ed][panic][patch] large traffic yields occasional panics
>Number: 162932 >Category: kern >Synopsis: [ed][panic][patch] large traffic yields occasional panics >Confidential: no >Severity: serious >Priority: medium >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Mon Nov 28 23:50:12 UTC 2011 >Closed-Date: >Last-Modified: >Originator: Peter Much >Release:FreeBSD 7.4-STABLE i386 >Organization: n/a >Environment: System: FreeBSD edge.oper.dinoex.org 7.4-STABLE FreeBSD 7.4-STABLE #1: Sun Nov 27 04:10:51 UTC 2011 r...@disp.oper.dinoex.org:/usr/src/sys/i386/compile/E1R74V1 i386 Interface card is WD8013 (ISA 16bit). I found (and fixed) this with RELEASE-7.2, but it seems I forgot to publish it. The patch does still apply cleanly, so the bug may still linger around, or it may not. Also, it may be applicaple to higher releases too, or it may not. >Description: Panic happens when sending large amounts of data. >From my understanding, that seems to happen when an mbuf content has uneven bytesize and ends at a page boundary. >How-To-Repeat: 1. have such nice old hardware, and 2. just send data over it. >Fix: *** sys/dev/ed/if_ed.c.orig Sat Nov 12 02:31:09 2011 --- sys/dev/ed/if_ed.c Sat Nov 12 02:56:03 2011 *** *** 1690,1700 } } for (len = 0; m != 0; m = m->m_next) { ! if (sc->isa16bit) ! bus_space_write_region_2(sc->mem_bst, ! sc->mem_bsh, dst, ! mtod(m, uint16_t *), (m->m_len + 1)/ 2); ! else bus_space_write_region_1(sc->mem_bst, sc->mem_bsh, dst, mtod(m, uint8_t *), m->m_len); --- 1690,1704 } } for (len = 0; m != 0; m = m->m_next) { ! if (sc->isa16bit) { ! if(m->m_len > 1) ! bus_space_write_region_2(sc->mem_bst, ! sc->mem_bsh, dst, mtod(m, uint16_t *), ! m->m_len / 2); ! bus_space_write_1(sc->mem_bst, sc->mem_bsh, ! dst + m->m_len - 1, ! *(mtod(m, uint8_t *) + m->m_len - 1)); ! } else bus_space_write_region_1(sc->mem_bst, sc->mem_bsh, dst, mtod(m, uint8_t *), m->m_len); >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: bin/122519: [patch] ppp(8): ppp provides deficient DNS info
The following reply was made to PR bin/122519; it has been noted by GNATS. From: Peter To: bug-follo...@freebsd.org Cc: Subject: Re: bin/122519: [patch] ppp(8): ppp provides deficient DNS info Date: Mon, 28 Nov 2011 23:37:17 +0100 Hi, today it's cleanup day here. Just wanted to have a look if somebody bothered to make this whole... ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/162932: [ed][panic][patch] large traffic yields occasional panics
Synopsis: [ed][panic][patch] large traffic yields occasional panics Responsible-Changed-From-To: freebsd-bugs->freebsd-net Responsible-Changed-By: linimon Responsible-Changed-When: Tue Nov 29 04:41:49 UTC 2011 Responsible-Changed-Why: Over to maintainer(s). http://www.freebsd.org/cgi/query-pr.cgi?pr=162932 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"