Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
On Sun, Dec 22, 2013 at 1:10 PM, wrote: > Thank you very much for your problem report. > It has the internal identification `misc/185092'. > The individual assigned to look at your > report is: freebsd-bugs. > > You can access the state of your problem report at any time > via this link: > > http://www.freebsd.org/cgi/query-pr.cgi?pr=185092 > > >Category: misc > >Responsible:freebsd-bugs > >Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) > >Arrival-Date: Sun Dec 22 13:10:00 UTC 2013 > I'm trying to understand exactly what is happening here, and examining a core dump with kgdb I'm getting some output that confuses me : (kgdb) bt #0 doadump (textdump=-1011569920) at pcpu.h:233 #1 0xc06069b2 in kern_reboot (howto=260) at /usr/src/sys/kern/kern_shutdown.c:447 #2 0xc0606d0e in panic (fmt=) at /usr/src/sys/kern/kern_shutdown.c:754 #3 0xc06de639 in rtfree (rt=) at /usr/src/sys/net/route.c:464 #4 0xc06e188d in route_output (m=) at /usr/src/sys/net/rtsock.c:951 #5 0xc06de18f in raw_usend (so=, flags=0, m=, nam=0x0, control=, td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 #6 0xc066eca9 in sosend_generic (so=0xc3e9c1a8, uio=, top=, control=0x0, flags=, td=) at /usr/src/sys/kern/uipc_socket.c:1271 #7 0xc066efc7 in sosend (so=0xc3e9c1a8, addr=0x0, uio=0xd9b9cc10, top=0x0, control=0x0, flags=0, td=0xc3bd2000) at /usr/src/sys/kern/uipc_socket.c:1315 #8 0xc0654af4 in soo_write (fp=0xc3c0c818, uio=0xd9b9cc10, active_cred=0xc3f1dd00, flags=0, td=0xc3bd2000) at /usr/src/sys/kern/sys_socket.c:103 #9 0xc064c866 in dofilewrite (td=0xc3bd2000, fd=3, fp=0xc3c0c818, auio=0xd9b9cc10, offset=-1, flags=0) at file.h:303 #10 0xc064c566 in kern_writev (td=0xc3bd2000, fd=3, auio=) at /usr/src/sys/kern/sys_generic.c:467 #11 0xc064c4bc in sys_write (td=, uap=) at /usr/src/sys/kern/sys_generic.c:382 #12 0xc08614d3 in syscall (frame=) at subr_syscall.c:134 #13 0xc084cca1 in Xint0x80_syscall () at /usr/src/sys/i386/i386/exception.s:270 #14 0x281975b7 in ?? () Previous frame inner to this frame (corrupt stack?) Current language: auto; currently minimal (kgdb) fr 3 #3 0xc06de639 in rtfree (rt=) at /usr/src/sys/net/route.c:464 464 panic("rtfree 2"); (kgdb) print *rt $1 = {rt_nodes = {{rn_mklist = 0xc3b4ab30, rn_parent = 0x1, rn_bit = 0, rn_bmask = 0 '\0', rn_flags = 0 '\0', rn_u = {rn_leaf = { rn_Key = 0xc0882687 "shutdown_post_sync", rn_Mask = 0x103 , rn_Dupedkey = 0x0}, rn_node = { rn_Off = -1064819065, rn_L = 0x103, rn_R = 0x0}}}, {rn_mklist = 0x0, rn_parent = 0x4, rn_bit = -18048, rn_bmask = -94 '?', rn_flags = 195 '?', rn_u = {rn_leaf = {rn_Key = 0xc3a545e0 "", rn_Mask = 0xc3a4e440 " ??(???\020'", rn_Dupedkey = 0xc3a4e880}, rn_node = {rn_Off = -1012578848, rn_L = 0xc3a4e440, rn_R = 0xc3a4e880, rt_gateway = 0x74756873, rt_flags = 1853321060, rt_refcnt = 1936683103, rt_ifp = 0x79735f74, rt_ifa = 0x636e, rt_rmx = {rmx_mtu = 0, rmx_expire = 0, rmx_pksent = 0, rmx_weight = 0}, rt_fibnum = 0, rt_mtx = {lock_object = {lo_name = 0x0, lo_flags = 0, lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}} rn_Key with value of “shutdown_post_sync” ? It’s visible also in the raw_usend() frame: (kgdb) fr 5 #5 0xc06de18f in raw_usend (so=, flags=0, m=, nam=0x0, control=, td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 238 return ((*so->so_proto->pr_output)(m, so)); (kgdb) print *m $2 = {m_hdr = {mh_next = 0xc3b4ab30, mh_nextpkt = 0x1, mh_data = 0x0, mh_len = -1064819065, mh_type = 0, mh_flags = 66304, mh_pad = 0}, M_dat = {MH = {MH_pkthdr = {rcvif = 0x0, tags = {slh_first = 0x4}, len = -1012745856, flowid = 3282388448, csum_flags = 14097648373312316480, fibnum = 26739, cosqos = 117 'u', rsstype = 116 't', l2hlen = 100 'd', l3hlen = 111 'o', l4hlen = 119 'w', l5hlen = 110 'n', PH_per = {eigth = "_post_sy", sixteen = {28767, 29551, 24436, 31091}, thirtytwo = {1936683103, 2037604212}, sixtyfour = {8751443454668533855}, unintptr = {1936683103}, ptr = 0x736f705f}, PH_loc = { eigth = "nc\000\000\000\000\000", sixteen = {25454, 0, 0, 0}, thirtytwo = {25454, 0}, sixtyfour = {25454}, unintptr = {25454}, ptr = 0x636e}}, MH_dat = {MH_ext = {ref_cnt = 0x0, ext_buf = 0x0, ext_size = 0, ext_type = 0, ext_flags = 0, ext_free = 0, ext_arg1 = 0x0, ext_arg2 = 0x0}, MH_databuf = '\0' , "file", '\0' , "\006\000\000\000\020\000\000\000??\215?\000\000C\001\000\000\000\000\000\000\000\000\004\000\000\000\000\000\000\0Y?", '\0' , "`2Y?\000\000\000\000\000\000\000\000T\211\223?\022\000\000\000\000\203??\000\000\000\000\000???", '\0' }}, M_databuf = "\000\000\000\000\004\000\000\000\200E??@??\200??shutdown_post_sync", '\0' , "file", '\0' , "\006\000\000\000\020\000\000\000??\215?\000\000C\001\000\000\000\000\000\000\000\000\004\000\000\000\000\000\000\0Y?", '\0' , "`2Y?\000\000\000\000\000\000\000\000T\211\223?\022\000\000\000\000\203??\000\000\000\000\000???", '\0' }} This i
Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
The following reply was made to PR misc/185092; it has been noted by GNATS. From: Nikolay Denev To: freebsd-gnats-sub...@freebsd.org, freebsd-bugs@freebsd.org, "freebsd-...@freebsd.org" Cc: Subject: Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) Date: Wed, 1 Jan 2014 13:10:57 + --001a11c3d860640c3f04eee868e9 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On Sun, Dec 22, 2013 at 1:10 PM, wrote: > Thank you very much for your problem report. > It has the internal identification `misc/185092'. > The individual assigned to look at your > report is: freebsd-bugs. > > You can access the state of your problem report at any time > via this link: > > http://www.freebsd.org/cgi/query-pr.cgi?pr=3D185092 > > >Category: misc > >Responsible:freebsd-bugs > >Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) > >Arrival-Date: Sun Dec 22 13:10:00 UTC 2013 > I'm trying to understand exactly what is happening here, and examining a core dump with kgdb I'm getting some output that confuses me : (kgdb) bt #0 doadump (textdump=3D-1011569920) at pcpu.h:233 #1 0xc06069b2 in kern_reboot (howto=3D260) at /usr/src/sys/kern/kern_shutdown.c:447 #2 0xc0606d0e in panic (fmt=3D) at /usr/src/sys/kern/kern_shutdown.c:754 #3 0xc06de639 in rtfree (rt=3D) at /usr/src/sys/net/route.c:464 #4 0xc06e188d in route_output (m=3D) at /usr/src/sys/net/rtsock.c:951 #5 0xc06de18f in raw_usend (so=3D, flags=3D0, m=3D, nam=3D0x0, control=3D, td=3D0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 #6 0xc066eca9 in sosend_generic (so=3D0xc3e9c1a8, uio=3D, top=3D, control=3D0x0, flags=3D, td=3D) at /usr/src/sys/kern/uipc_socket.c:1271 #7 0xc066efc7 in sosend (so=3D0xc3e9c1a8, addr=3D0x0, uio=3D0xd9b9cc10, to= p=3D0x0, control=3D0x0, flags=3D0, td=3D0xc3bd2000) at /usr/src/sys/kern/uipc_socket.c:1315 #8 0xc0654af4 in soo_write (fp=3D0xc3c0c818, uio=3D0xd9b9cc10, active_cred=3D0xc3f1dd00, flags=3D0, td=3D0xc3bd2000) at /usr/src/sys/kern/sys_socket.c:103 #9 0xc064c866 in dofilewrite (td=3D0xc3bd2000, fd=3D3, fp=3D0xc3c0c818, auio=3D0xd9b9cc10, offset=3D-1, flags=3D0) at file.h:303 #10 0xc064c566 in kern_writev (td=3D0xc3bd2000, fd=3D3, auio=3D) at /usr/src/sys/kern/sys_generic.c:467 #11 0xc064c4bc in sys_write (td=3D, uap=3D) at /usr/src/sys/kern/sys_generic.c:382 #12 0xc08614d3 in syscall (frame=3D) at subr_syscall.c:134 #13 0xc084cca1 in Xint0x80_syscall () at /usr/src/sys/i386/i386/exception.s:270 #14 0x281975b7 in ?? () Previous frame inner to this frame (corrupt stack?) Current language: auto; currently minimal (kgdb) fr 3 #3 0xc06de639 in rtfree (rt=3D) at /usr/src/sys/net/route.c:464 464 panic("rtfree 2"); (kgdb) print *rt $1 =3D {rt_nodes =3D {{rn_mklist =3D 0xc3b4ab30, rn_parent =3D 0x1, rn_bit = =3D 0, rn_bmask =3D 0 '\0', rn_flags =3D 0 '\0', rn_u =3D {rn_leaf =3D { rn_Key =3D 0xc0882687 "shutdown_post_sync", rn_Mask =3D 0x103 , rn_Dupedkey =3D 0x0}, rn_node =3D { rn_Off =3D -1064819065, rn_L =3D 0x103, rn_R =3D 0x0}}}, {rn_= mklist =3D 0x0, rn_parent =3D 0x4, rn_bit =3D -18048, rn_bmask =3D -94 '?', rn_flags =3D 195 '?', rn_u =3D {rn_leaf =3D {rn_Key =3D 0xc3a545e0 ""= , rn_Mask =3D 0xc3a4e440 " ??(???\020'", rn_Dupedkey =3D 0xc3a4e880}, rn_node =3D {rn_Off =3D -1012578848, rn_L =3D 0xc3a4e440, rn_R =3D 0xc3a4e880, rt_gateway =3D 0x74756873, rt_flags =3D 1853321060, rt_refcnt =3D 1936683103, rt_ifp =3D 0x79735f74, rt_ifa =3D 0x636e, rt_rm= x =3D {rmx_mtu =3D 0, rmx_expire =3D 0, rmx_pksent =3D 0, rmx_weight =3D 0}, rt_fibnum =3D 0, rt_mtx =3D {lock_object =3D {lo_name =3D 0x0, lo_flags = =3D 0, lo_data =3D 0, lo_witness =3D 0x0}, mtx_lock =3D 0}} rn_Key with value of =93shutdown_post_sync=94 ? It=92s visible also in the raw_usend() frame: (kgdb) fr 5 #5 0xc06de18f in raw_usend (so=3D, flags=3D0, m=3D, nam=3D0x0, control=3D, td=3D0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 238 return ((*so->so_proto->pr_output)(m, so)); (kgdb) print *m $2 =3D {m_hdr =3D {mh_next =3D 0xc3b4ab30, mh_nextpkt =3D 0x1, mh_data =3D = 0x0, mh_len =3D -1064819065, mh_type =3D 0, mh_flags =3D 66304, mh_pad =3D 0}, M_dat =3D {MH =3D {MH_pkthdr =3D {rcvif =3D 0x0, tags =3D {slh_first =3D = 0x4}, len =3D -1012745856, flowid =3D 3282388448, csum_flags =3D 14097648373312316480, fibnum =3D 26739, cosqos =3D 1= 17 'u', rsstype =3D 116 't', l2hlen =3D 100 'd', l3hlen =3D 111 'o', l4hlen =3D 119 'w', l5hlen =3D 110 'n', PH_per =3D {eigth =3D "_pos= t_sy", sixteen =3D {28767, 29551, 24436, 31091}, thirtytwo =3D {1936683103, 2037604212}, sixtyfour =3D {8751443454668533855}, unintptr =3D {1936683103}, ptr =3D 0x736f705f}, PH_loc =3D { eigth =3D "nc\000\000\000\000\000", sixteen =3D {25454, 0, 0, 0}, thirtytwo =3D {25454, 0}, sixtyfour =3
Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
On Wed, Jan 1, 2014 at 1:10 PM, Nikolay Denev wrote: > On Sun, Dec 22, 2013 at 1:10 PM, wrote: > >> Thank you very much for your problem report. >> It has the internal identification `misc/185092'. >> The individual assigned to look at your >> report is: freebsd-bugs. >> >> You can access the state of your problem report at any time >> via this link: >> >> http://www.freebsd.org/cgi/query-pr.cgi?pr=185092 >> >> >Category: misc >> >Responsible:freebsd-bugs >> >Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) >> >Arrival-Date: Sun Dec 22 13:10:00 UTC 2013 >> > > I'm trying to understand exactly what is happening here, and examining a > core dump with kgdb I'm getting some output that confuses me : > > (kgdb) bt > #0 doadump (textdump=-1011569920) at pcpu.h:233 > #1 0xc06069b2 in kern_reboot (howto=260) at > /usr/src/sys/kern/kern_shutdown.c:447 > #2 0xc0606d0e in panic (fmt=) at > /usr/src/sys/kern/kern_shutdown.c:754 > #3 0xc06de639 in rtfree (rt=) at > /usr/src/sys/net/route.c:464 > #4 0xc06e188d in route_output (m=) at > /usr/src/sys/net/rtsock.c:951 > #5 0xc06de18f in raw_usend (so=, flags=0, m= optimized out>, nam=0x0, control=, > td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 > #6 0xc066eca9 in sosend_generic (so=0xc3e9c1a8, uio= out>, top=, control=0x0, > flags=, td=) at > /usr/src/sys/kern/uipc_socket.c:1271 > #7 0xc066efc7 in sosend (so=0xc3e9c1a8, addr=0x0, uio=0xd9b9cc10, > top=0x0, control=0x0, flags=0, td=0xc3bd2000) > at /usr/src/sys/kern/uipc_socket.c:1315 > #8 0xc0654af4 in soo_write (fp=0xc3c0c818, uio=0xd9b9cc10, > active_cred=0xc3f1dd00, flags=0, td=0xc3bd2000) > at /usr/src/sys/kern/sys_socket.c:103 > #9 0xc064c866 in dofilewrite (td=0xc3bd2000, fd=3, fp=0xc3c0c818, > auio=0xd9b9cc10, offset=-1, flags=0) at file.h:303 > #10 0xc064c566 in kern_writev (td=0xc3bd2000, fd=3, auio= out>) at /usr/src/sys/kern/sys_generic.c:467 > #11 0xc064c4bc in sys_write (td=, uap= optimized out>) at /usr/src/sys/kern/sys_generic.c:382 > #12 0xc08614d3 in syscall (frame=) at > subr_syscall.c:134 > #13 0xc084cca1 in Xint0x80_syscall () at > /usr/src/sys/i386/i386/exception.s:270 > #14 0x281975b7 in ?? () > Previous frame inner to this frame (corrupt stack?) > Current language: auto; currently minimal > (kgdb) fr 3 > #3 0xc06de639 in rtfree (rt=) at > /usr/src/sys/net/route.c:464 > 464 panic("rtfree 2"); > (kgdb) print *rt > $1 = {rt_nodes = {{rn_mklist = 0xc3b4ab30, rn_parent = 0x1, rn_bit = 0, > rn_bmask = 0 '\0', rn_flags = 0 '\0', rn_u = {rn_leaf = { > rn_Key = 0xc0882687 "shutdown_post_sync", rn_Mask = 0x103 > , rn_Dupedkey = 0x0}, rn_node = { > rn_Off = -1064819065, rn_L = 0x103, rn_R = 0x0}}}, > {rn_mklist = 0x0, rn_parent = 0x4, rn_bit = -18048, rn_bmask = -94 '?', > rn_flags = 195 '?', rn_u = {rn_leaf = {rn_Key = 0xc3a545e0 "", > rn_Mask = 0xc3a4e440 " ??(???\020'", rn_Dupedkey = 0xc3a4e880}, > rn_node = {rn_Off = -1012578848, rn_L = 0xc3a4e440, rn_R = > 0xc3a4e880, rt_gateway = 0x74756873, rt_flags = 1853321060, > rt_refcnt = 1936683103, rt_ifp = 0x79735f74, rt_ifa = 0x636e, rt_rmx = > {rmx_mtu = 0, rmx_expire = 0, rmx_pksent = 0, rmx_weight = 0}, > rt_fibnum = 0, rt_mtx = {lock_object = {lo_name = 0x0, lo_flags = 0, > lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}} > > > > rn_Key with value of “shutdown_post_sync” ? > > It’s visible also in the raw_usend() frame: > > (kgdb) fr 5 > #5 0xc06de18f in raw_usend (so=, flags=0, m= optimized out>, nam=0x0, control=, > td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 > 238 return ((*so->so_proto->pr_output)(m, so)); > (kgdb) print *m > $2 = {m_hdr = {mh_next = 0xc3b4ab30, mh_nextpkt = 0x1, mh_data = 0x0, > mh_len = -1064819065, mh_type = 0, mh_flags = 66304, mh_pad = 0}, > M_dat = {MH = {MH_pkthdr = {rcvif = 0x0, tags = {slh_first = 0x4}, len = > -1012745856, flowid = 3282388448, > csum_flags = 14097648373312316480, fibnum = 26739, cosqos = 117 > 'u', rsstype = 116 't', l2hlen = 100 'd', l3hlen = 111 'o', > l4hlen = 119 'w', l5hlen = 110 'n', PH_per = {eigth = "_post_sy", > sixteen = {28767, 29551, 24436, 31091}, thirtytwo = {1936683103, > 2037604212}, sixtyfour = {8751443454668533855}, unintptr = > {1936683103}, ptr = 0x736f705f}, PH_loc = { > eigth = "nc\000\000\000\000\000", sixteen = {25454, 0, 0, 0}, > thirtytwo = {25454, 0}, sixtyfour = {25454}, unintptr = {25454}, > ptr = 0x636e}}, MH_dat = {MH_ext = {ref_cnt = 0x0, ext_buf = > 0x0, ext_size = 0, ext_type = 0, ext_flags = 0, ext_free = 0, > ext_arg1 = 0x0, ext_arg2 = 0x0}, > MH_databuf = '\0' , "file", '\0' times>, > "\006\000\000\000\020\000\000\000??\215?\000\000C\001\000\000\000\000\000\000\000\000\004\000\000\000\000\000\000\0Y?", > '\0' , > "`2Y?\000\000\000\000\000\000\000\000T\211\223?\022\000\000\000\000\203??\000\000\000\000\000???", > '\0' }}, > M_databuf = > "\000\000\000\000\004\000\000\000\20
kern/185387: if_axe usb ethernet interface no ssh, no http with 10.0-RC3
>Number: 185387 >Category: kern >Synopsis: if_axe usb ethernet interface no ssh, no http with 10.0-RC3 >Confidential: no >Severity: non-critical >Priority: low >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Jan 01 16:10:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Huub Schuurmans >Release:10.0-RC3 >Organization: Wireless Leiden >Environment: 10.0-RC3 FreeBSD 10.0-RC3 #0 r260039M: Sun Dec 29 22:04:42 CET 2013 ugen1.2: at usbus1, cfg=0 md=HOST spd=HIGH (480Mbps) pwr=ON (200mA) >Description: USB-LAN adapters with the ASIX AX88772 chip do not work properly on 10.0-RC3, whereas thera are no problems with 9.0-RELEASE. Ping and dhcp work, ssh and http do not. Test setup consists of two ALIX.2 boards (uses CPU: Geode(TM) Integrated Processor by AMD PCS 498.06-MHz 586-class CPU and an AMD CS5536 (Geode) USB 2.0 controller) Host9.0-RELEASE with httpd, sshd, dhcpd running, connected with utp-cable (tested) to host10.0-RC3 with usb-lan adapter connected: ue0: flags=8843 metric 0 mtu 1500 options=8000b ether 00:00:00:00:00:01 inet6 fe80::200:ff:fe00:1 %ue0 prefixlen 64 scopeid 0x8 inet 172.16.6.77 netmask 0xfff8 broadcast 172.16.6.79 nd6 options=29 media: Ethernet autoselect (100baseTX ) status: active Ping and dhcp from host10.0-RC3 to Host9.0-RELEASE is OK, but ssh and fetch (http) time out. Same setup with both hosts running 9.0-RELEASE functions without problems Same setup with hostRC10-RC3 and different usb-lan adapter works OK (I tested if_aue, if_udav and if_mos). >How-To-Repeat: setup a similar test with two hosts and this usb-lan adapter >Fix: >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
bin/185390: freebsd-update should work on installed version
>Number: 185390 >Category: bin >Synopsis: freebsd-update should work on installed version >Confidential: no >Severity: non-critical >Priority: low >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Jan 01 17:10:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Gary Aitken >Release:9.2-RELEASE >Organization: >Environment: 9.2-RELEASE FreeBSD 9.2-RELEASE #0 r255898: Thu Sep 26 22:50:31 UTC 2013 r...@bake.isc.freebsd.org:/usr/obj/usr/src/sys/GENERIC amd64 >Description: It should be possible to run freebsd-update on the installed version, to add components not previously included. For example, if "src" is not listed when the original update was done, it should be possible to add it to the "Components" argument and rerun. Or if it is desired to prune a portion of the system, it should be possible to change the "Components" argument to "src/sys src/base world kernel" to prune the installed src. Or if StrictComponents was set at the default and for some reason src was not updated, it should be possible to change it to "yes" and rerun to get src updated. >How-To-Repeat: >From a 9.2-RELEASE system, run # freebsd-update -r 9.2-RELEASE upgrade freebsd-update: Cannot upgrade from 9.2-RELEASE to itself >Fix: >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
Ok, killing openvpn with -9 leaves the routes around, and particularly interesting are the following routes : 78.90.222.xx 10.255.255.0 UGHS0 5841 epair0 => 78.90.222.xx/3210.255.255.0 UGS 00 epair0 Now, if I do : route delete 78.90.222.xx 10.255.255.0 The route, with the H flag is deleted. If I repeat the command the second route is deleted as well, even if the second command specifies a netmask no panic. However the first delete command specifies the /32 mask like this : route delete 78.90.222.xx 10.255.255.0 255.255.255.255 Then I get "rtfree 2" kernel panic immediately. This seems to be happening as I'm manually installing static routes in the vnet jail for the VPN remote endpoints , however OpenVPN adds such routes too however differently, which results in two routing entries. For example : route add $IP $GW and route add $IP $GW 255.255.255.255 add to different route entries, one is /32 network, the other is a host route. --Nikolay On Wed, Jan 1, 2014 at 1:21 PM, Nikolay Denev wrote: > On Wed, Jan 1, 2014 at 1:10 PM, Nikolay Denev wrote: >> >> On Sun, Dec 22, 2013 at 1:10 PM, wrote: >>> >>> Thank you very much for your problem report. >>> It has the internal identification `misc/185092'. >>> The individual assigned to look at your >>> report is: freebsd-bugs. >>> >>> You can access the state of your problem report at any time >>> via this link: >>> >>> http://www.freebsd.org/cgi/query-pr.cgi?pr=185092 >>> >>> >Category: misc >>> >Responsible:freebsd-bugs >>> >Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) >>> >Arrival-Date: Sun Dec 22 13:10:00 UTC 2013 >> >> >> I'm trying to understand exactly what is happening here, and examining a >> core dump with kgdb I'm getting some output that confuses me : >> >> (kgdb) bt >> #0 doadump (textdump=-1011569920) at pcpu.h:233 >> #1 0xc06069b2 in kern_reboot (howto=260) at >> /usr/src/sys/kern/kern_shutdown.c:447 >> #2 0xc0606d0e in panic (fmt=) at >> /usr/src/sys/kern/kern_shutdown.c:754 >> #3 0xc06de639 in rtfree (rt=) at >> /usr/src/sys/net/route.c:464 >> #4 0xc06e188d in route_output (m=) at >> /usr/src/sys/net/rtsock.c:951 >> #5 0xc06de18f in raw_usend (so=, flags=0, m=> optimized out>, nam=0x0, control=, >> td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 >> #6 0xc066eca9 in sosend_generic (so=0xc3e9c1a8, uio=> out>, top=, control=0x0, >> flags=, td=) at >> /usr/src/sys/kern/uipc_socket.c:1271 >> #7 0xc066efc7 in sosend (so=0xc3e9c1a8, addr=0x0, uio=0xd9b9cc10, >> top=0x0, control=0x0, flags=0, td=0xc3bd2000) >> at /usr/src/sys/kern/uipc_socket.c:1315 >> #8 0xc0654af4 in soo_write (fp=0xc3c0c818, uio=0xd9b9cc10, >> active_cred=0xc3f1dd00, flags=0, td=0xc3bd2000) >> at /usr/src/sys/kern/sys_socket.c:103 >> #9 0xc064c866 in dofilewrite (td=0xc3bd2000, fd=3, fp=0xc3c0c818, >> auio=0xd9b9cc10, offset=-1, flags=0) at file.h:303 >> #10 0xc064c566 in kern_writev (td=0xc3bd2000, fd=3, auio=> out>) at /usr/src/sys/kern/sys_generic.c:467 >> #11 0xc064c4bc in sys_write (td=, uap=> optimized out>) at /usr/src/sys/kern/sys_generic.c:382 >> #12 0xc08614d3 in syscall (frame=) at >> subr_syscall.c:134 >> #13 0xc084cca1 in Xint0x80_syscall () at >> /usr/src/sys/i386/i386/exception.s:270 >> #14 0x281975b7 in ?? () >> Previous frame inner to this frame (corrupt stack?) >> Current language: auto; currently minimal >> (kgdb) fr 3 >> #3 0xc06de639 in rtfree (rt=) at >> /usr/src/sys/net/route.c:464 >> 464 panic("rtfree 2"); >> (kgdb) print *rt >> $1 = {rt_nodes = {{rn_mklist = 0xc3b4ab30, rn_parent = 0x1, rn_bit = 0, >> rn_bmask = 0 '\0', rn_flags = 0 '\0', rn_u = {rn_leaf = { >> rn_Key = 0xc0882687 "shutdown_post_sync", rn_Mask = 0x103 >> , rn_Dupedkey = 0x0}, rn_node = { >> rn_Off = -1064819065, rn_L = 0x103, rn_R = 0x0}}}, >> {rn_mklist = 0x0, rn_parent = 0x4, rn_bit = -18048, rn_bmask = -94 '?', >> rn_flags = 195 '?', rn_u = {rn_leaf = {rn_Key = 0xc3a545e0 "", >> rn_Mask = 0xc3a4e440 " ??(???\020'", rn_Dupedkey = 0xc3a4e880}, >> rn_node = {rn_Off = -1012578848, rn_L = 0xc3a4e440, rn_R = >> 0xc3a4e880, rt_gateway = 0x74756873, rt_flags = 1853321060, >> rt_refcnt = 1936683103, rt_ifp = 0x79735f74, rt_ifa = 0x636e, rt_rmx = >> {rmx_mtu = 0, rmx_expire = 0, rmx_pksent = 0, rmx_weight = 0}, >> rt_fibnum = 0, rt_mtx = {lock_object = {lo_name = 0x0, lo_flags = 0, >> lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}} >> >> >> >> rn_Key with value of “shutdown_post_sync” ? >> >> It’s visible also in the raw_usend() frame: >> >> (kgdb) fr 5 >> #5 0xc06de18f in raw_usend (so=, flags=0, m=> optimized out>, nam=0x0, control=, >> td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 >> 238 return ((*so->so_proto->pr_output)(m, so)); >> (kgdb) print *m >> $2 = {m_hdr = {mh_next = 0xc3b4ab30, mh_nextpkt = 0x1, mh_data = 0x0, >> mh_len = -1064819065, mh_type = 0, mh_flags = 66304, mh_pad = 0}, >> M
Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
The following reply was made to PR misc/185092; it has been noted by GNATS. From: Nikolay Denev To: freebsd-gnats-sub...@freebsd.org, freebsd-bugs@freebsd.org, "freebsd-...@freebsd.org" Cc: Subject: Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) Date: Wed, 1 Jan 2014 17:39:42 + Ok, killing openvpn with -9 leaves the routes around, and particularly interesting are the following routes : 78.90.222.xx 10.255.255.0 UGHS0 5841 epair0 =3D= > 78.90.222.xx/3210.255.255.0 UGS 00 epair0 Now, if I do : route delete 78.90.222.xx 10.255.255.0 The route, with the H flag is deleted. If I repeat the command the second route is deleted as well, even if the second command specifies a netmask no panic. However the first delete command specifies the /32 mask like this : route delete 78.90.222.xx 10.255.255.0 255.255.255.255 Then I get "rtfree 2" kernel panic immediately. This seems to be happening as I'm manually installing static routes in the vnet jail for the VPN remote endpoints , however OpenVPN adds such routes too however differently, which results in two routing entries. For example : route add $IP $GW and route add $IP $GW 255.255.255.255 add to different route entries, one is /32 network, the other is a host rou= te. --Nikolay On Wed, Jan 1, 2014 at 1:21 PM, Nikolay Denev wrote: > On Wed, Jan 1, 2014 at 1:10 PM, Nikolay Denev wrote: >> >> On Sun, Dec 22, 2013 at 1:10 PM, wrot= e: >>> >>> Thank you very much for your problem report. >>> It has the internal identification `misc/185092'. >>> The individual assigned to look at your >>> report is: freebsd-bugs. >>> >>> You can access the state of your problem report at any time >>> via this link: >>> >>> http://www.freebsd.org/cgi/query-pr.cgi?pr=3D185092 >>> >>> >Category: misc >>> >Responsible:freebsd-bugs >>> >Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail) >>> >Arrival-Date: Sun Dec 22 13:10:00 UTC 2013 >> >> >> I'm trying to understand exactly what is happening here, and examining a >> core dump with kgdb I'm getting some output that confuses me : >> >> (kgdb) bt >> #0 doadump (textdump=3D-1011569920) at pcpu.h:233 >> #1 0xc06069b2 in kern_reboot (howto=3D260) at >> /usr/src/sys/kern/kern_shutdown.c:447 >> #2 0xc0606d0e in panic (fmt=3D) at >> /usr/src/sys/kern/kern_shutdown.c:754 >> #3 0xc06de639 in rtfree (rt=3D) at >> /usr/src/sys/net/route.c:464 >> #4 0xc06e188d in route_output (m=3D) at >> /usr/src/sys/net/rtsock.c:951 >> #5 0xc06de18f in raw_usend (so=3D, flags=3D0, m=3D= > optimized out>, nam=3D0x0, control=3D, >> td=3D0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238 >> #6 0xc066eca9 in sosend_generic (so=3D0xc3e9c1a8, uio=3D> out>, top=3D, control=3D0x0, >> flags=3D, td=3D) at >> /usr/src/sys/kern/uipc_socket.c:1271 >> #7 0xc066efc7 in sosend (so=3D0xc3e9c1a8, addr=3D0x0, uio=3D0xd9b9cc10, >> top=3D0x0, control=3D0x0, flags=3D0, td=3D0xc3bd2000) >> at /usr/src/sys/kern/uipc_socket.c:1315 >> #8 0xc0654af4 in soo_write (fp=3D0xc3c0c818, uio=3D0xd9b9cc10, >> active_cred=3D0xc3f1dd00, flags=3D0, td=3D0xc3bd2000) >> at /usr/src/sys/kern/sys_socket.c:103 >> #9 0xc064c866 in dofilewrite (td=3D0xc3bd2000, fd=3D3, fp=3D0xc3c0c818, >> auio=3D0xd9b9cc10, offset=3D-1, flags=3D0) at file.h:303 >> #10 0xc064c566 in kern_writev (td=3D0xc3bd2000, fd=3D3, auio=3D> out>) at /usr/src/sys/kern/sys_generic.c:467 >> #11 0xc064c4bc in sys_write (td=3D, uap=3D> optimized out>) at /usr/src/sys/kern/sys_generic.c:382 >> #12 0xc08614d3 in syscall (frame=3D) at >> subr_syscall.c:134 >> #13 0xc084cca1 in Xint0x80_syscall () at >> /usr/src/sys/i386/i386/exception.s:270 >> #14 0x281975b7 in ?? () >> Previous frame inner to this frame (corrupt stack?) >> Current language: auto; currently minimal >> (kgdb) fr 3 >> #3 0xc06de639 in rtfree (rt=3D) at >> /usr/src/sys/net/route.c:464 >> 464 panic("rtfree 2"); >> (kgdb) print *rt >> $1 =3D {rt_nodes =3D {{rn_mklist =3D 0xc3b4ab30, rn_parent =3D 0x1, rn_b= it =3D 0, >> rn_bmask =3D 0 '\0', rn_flags =3D 0 '\0', rn_u =3D {rn_leaf =3D { >> rn_Key =3D 0xc0882687 "shutdown_post_sync", rn_Mask =3D 0x1030= 000 >> , rn_Dupedkey =3D 0x0}, rn_node =3D { >> rn_Off =3D -1064819065, rn_L =3D 0x103, rn_R =3D 0x0}}}, >> {rn_mklist =3D 0x0, rn_parent =3D 0x4, rn_bit =3D -18048, rn_bmask =3D -= 94 '?', >> rn_flags =3D 195 '?', rn_u =3D {rn_leaf =3D {rn_Key =3D 0xc3a545e0= "", >> rn_Mask =3D 0xc3a4e440 " ??(???\020'", rn_Dupedkey =3D 0xc3a4e880}, >> rn_node =3D {rn_Off =3D -1012578848, rn_L =3D 0xc3a4e440, rn_R = =3D >> 0xc3a4e880, rt_gateway =3D 0x74756873, rt_flags =3D 1853321060, >> rt_refcnt =3D 1936683103, rt_ifp =3D 0x79735f74, rt_ifa =3D 0x636e, rt= _rmx =3D >> {rmx_mtu =3D 0, rmx_expire =3D 0, rmx_pksent =3D 0, rmx
bin/185393: find -lname buffer read overflow bug
>Number: 185393 >Category: bin >Synopsis: find -lname buffer read overflow bug >Confidential: no >Severity: non-critical >Priority: low >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Jan 01 19:40:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Ben Reser >Release:9.1 >Organization: >Environment: FreeBSD freebsd9.1 9.1-RELEASE FreeBSD 9.1-RELEASE #0 r243825: Tue Dec 4 09:23:10 UTC 2012 r...@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64 >Description: The implementation of -lname and -ilname improperly use readlink() by not setting a null character before using the string. readlink() is documented as not doing this for you and returns the length of the link string, requiring the caller to set the null character. In particular this is implemented in the usr.bin/find/function.c in the f_name() function. The function uses an automatic buffer which gets reused through multiple calls, resulting in link names that are shorter than the preceding values stored in the buffer to fail to match properly. This could cause the program to read past the end of the buffer. In practice this doesn't seem to happen because the buffer seems to always end up in zeroed memory the first time it is used (though there's no requirement for it to do so). This would result in a crash of the find command. You can force reading past the end of the buffer by creating a link that points at a path of PATH_MAX length on the path being searched. Presumably it's not possible to create a link that points at a path longer than that but if possible that would also allow reading past the end of the buffer. I haven't bothered to exercise this. It might be possible to view this as a minor security issue if someone is using find to try and find link with -lname for auditing purposes, since they might not reliably find what they are looking for. The read past the end of the buffer doesn't seem particularly useful. For one it'd only ever be a read, which isn't particularly useful and for another find doesn't run with escalated privileges. So all in all I think it'd be a stretch to call this anything other than an ordinary bug. This bug was introduced in r176497 (committed 5 years 10 months ago), so any releases of FreeBSD that contain this change would contain the same issue. I actually happened to find the issue in OS X's fork of your find command. But successfully duplicated the issue in a VM of 9.1 that I had laying around. >How-To-Repeat: The following shell script should demonstrate the issue: #!/usr/bin/env bash set -e # Demonstration of -lname bug with FreeBSD and OS X find. # find stops output matching links as soon as it passes a link # that points at a path that is longer than the path we are trying # to match. Note that file system ordering of results may change # when this happens. OS X seems to return readdir results in # alphabetical sorted order (HFS+) and FreeBSD (UFS) seems to return # them in creation order (though there does seem to be some variation # on this). So the below example has both the creation # order and the alphabetical sort order such that it should reliably # reproduce the issue. However, I've not tested this with other # supported file systems so they may have different behavior, possibly # even non-deterministic behavior that makes this harder to demonstrate. # Expected behavior will have no output and a zero exit value. test_dir=`mktemp -d find-test.XXX` cd "$test_dir" > /dev/null ln -s /usr/bin/gcc a ln -s /usr/bin/touch b ln -s /usr/bin/gcc c ln -s /usr/bin/gcc d ln -s /usr/bin/gcc e echo './a' > expected echo './c' >> expected echo './d' >> expected echo './e' >> expected "${FIND:-find}" . -lname /usr/bin/gcc | sort > received set +e diff -u expected received rv=$? set -e cd - > /dev/null rm -rf "$test_dir" exit $rv >Fix: Set a null character at fn[len] (where len is the return of the readlink() call) as implemented in the attached patch. Patch attached with submission follows: Index: usr.bin/find/function.c === --- usr.bin/find/function.c (revision 260159) +++ usr.bin/find/function.c (working copy) @@ -1124,9 +1124,11 @@ f_name(PLAN *plan, FTSENT *entry) const char *name; if (plan->flags & F_LINK) { + int len = readlink(entry->fts_path, fn, sizeof(fn)); + if (len == -1) + return 0; + fn[len] = '\0'; name = fn; - if (readlink(entry->fts_path, fn, sizeof(fn)) == -1) - return 0; } else name = entry->fts_name; return !fnmatch(plan->c_data, name, >Release-Note: >Audit-Trail: >Unformatted: ___
kern/185395: IPv4 Multicast broken in 10.x
>Number: 185395 >Category: kern >Synopsis: IPv4 Multicast broken in 10.x >Confidential: no >Severity: serious >Priority: high >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Jan 01 19:40:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Peter Jeremy >Release:FreeBSD 10.0-PRERELEASE amd64 >Organization: n/a >Environment: System: FreeBSD server.rulingia.com 10.0-PRERELEASE FreeBSD 10.0-PRERELEASE #22 r259613M: Sat Dec 21 09:49:27 EST 2013 r...@server.rulingia.com:/var/obj/usr/src/sys/server amd64 Also verified on 10.0-ALPHA1 r255569 arm and r259613M i386. >Description: IPv4 multicast ethernet frames use the IP address of the default route in the destination MAC address, instead of the IP address of the multicast destination. This breaks multicast filtering at the receiver. This is a regression from FreeBSD 9.2. >How-To-Repeat: Run (eg) 'tcpdump -e icmp' on one terminal and 'ping 224.18.52.86' in another window. The tcpdump should show ICMP packets with a destination MAC address of 01:00:5E:12:34:56 but, in my case, they have a destination MAC address of 01:00:5E:28:7B:7B - which matches the IP address of my router. >Fix: Unknown. The cause isn't obvious from a cursory look at the 9.x and 10.x code. >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: bin/185393: find -lname buffer read overflow bug
The following reply was made to PR bin/185393; it has been noted by GNATS. From: Ben Reser To: bug-follo...@freebsd.org Cc: Subject: Re: bin/185393: find -lname buffer read overflow bug Date: Wed, 01 Jan 2014 12:03:04 -0800 This is a multi-part message in MIME format. --080101030108030107080503 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Correction on the patch. Forgot to subtract one byte from the buffer to allow for the NULL character to be set. Updated patch attached. --080101030108030107080503 Content-Type: text/plain; charset=UTF-8; name="fbsd-find-lname.patch.txt" Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename="fbsd-find-lname.patch.txt" Index: usr.bin/find/function.c === --- usr.bin/find/function.c(revision 260159) +++ usr.bin/find/function.c(working copy) @@ -1124,9 +1124,11 @@ f_name(PLAN *plan, FTSENT *entry) const char *name; if (plan->flags & F_LINK) { + int len = readlink(entry->fts_path, fn, sizeof(fn) - 1); + if (len == -1) + return 0; + fn[len] = '\0'; name = fn; - if (readlink(entry->fts_path, fn, sizeof(fn)) == -1) - return 0; } else name = entry->fts_name; return !fnmatch(plan->c_data, name, --080101030108030107080503-- ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/185395: IPv4 Multicast broken in 10.x
The following reply was made to PR kern/185395; it has been noted by GNATS. From: =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= To: Peter Jeremy , Gleb Smirnoff Cc: freebsd-gnats-submit Subject: Re: kern/185395: IPv4 Multicast broken in 10.x Date: Wed, 1 Jan 2014 22:03:36 +0100 --047d7b86db46eafcdb04eeef03ad Content-Type: text/plain; charset=ISO-8859-1 On Wed, Jan 1, 2014 at 8:33 PM, Peter Jeremy wrote: > > >Description: > IPv4 multicast ethernet frames use the IP address of the default > route in the destination MAC address, instead of the IP address of > the multicast destination. This breaks multicast filtering at the > receiver. > > This is a regression from FreeBSD 9.2. > > >Fix: > Unknown. The cause isn't obvious from a cursory look at the 9.x > and 10.x code. > And what about the commit 249925 "Add const qualifier to the dst parameter of the ifnet if_output method" (Fri Apr 26 12:50:32 2013 UTC) ? This commit modify function arpresolve() in sys/netinet/if_ether.c by replacing: arpresolve(...,struct sockaddr *dst, ...) by arpresolve(...,const struct sockaddr *dst, ...). And inside this function there is a call to this macro: ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, desten); => If the 'structure dst' in now a 'const struct dst', can the struct 'dst' still be modified by the macro ?? (I'm learning C, and don't understand this complex code). Regards, Olivier --047d7b86db46eafcdb04eeef03ad Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable On W= ed, Jan 1, 2014 at 8:33 PM, Peter Jeremywrote: >Description: =A0 =A0 =A0 =A0 IPv4 multicast ethernet frames use the IP address of the de= fault =A0 =A0 =A0 =A0 route in the destination MAC address, instead of the IP add= ress of =A0 =A0 =A0 =A0 the multicast destination. =A0This breaks multicast filteri= ng at the =A0 =A0 =A0 =A0 receiver. =A0 =A0 =A0 =A0 This is a regression from FreeBSD 9.2. >Fix: =A0 =A0 =A0 =A0 Unknown. =A0The cause isn't obvious from a cursory look= at the 9.x =A0 =A0 =A0 =A0 and 10.x code.And what= about the commit 249925 "Add const qualifier to the dst parameter of = the ifnet if_output method" (Fri Apr 26 12:50:32 2013 UTC) ?= This commit modify function arpresolve() in sys/netinet/if_e= ther.c by replacing:arpresolve(...,struct sockaddr *dst, ...)byarpresolve(...,const struct sockaddr *dst, ...). And inside this function there is a call to this = macro:ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, des= ten);=3D> If the 'structure dst' i= n now a 'const struct dst', can the struct 'dst' still be m= odified by the macro ?? (I'm learning C, and don't understand this complex code).Regards,Olivier<= /div> --047d7b86db46eafcdb04eeef03ad-- ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/182557: Frequent reboots due to kernel trap happening in pf_test_rule
Synopsis: Frequent reboots due to kernel trap happening in pf_test_rule State-Changed-From-To: open->closed State-Changed-By: glebius State-Changed-When: Wed Jan 1 21:51:17 UTC 2014 State-Changed-Why: This is duplicate of 182141, and the latter has much more information in it, so preferred to be left open. http://www.freebsd.org/cgi/query-pr.cgi?pr=182557 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/182141: [pf] crash in pf_test_rule
Old Synopsis: Very frequent (at most 3 hours) kernel trap 12 New Synopsis: [pf] crash in pf_test_rule State-Changed-From-To: open->feedback State-Changed-By: glebius State-Changed-When: Wed Jan 1 21:53:02 UTC 2014 State-Changed-Why: Patch sent to submitter for testing. Responsible-Changed-From-To: freebsd-bugs->glebius Responsible-Changed-By: glebius Responsible-Changed-When: Wed Jan 1 21:53:02 UTC 2014 Responsible-Changed-Why: Patch sent to submitter for testing. http://www.freebsd.org/cgi/query-pr.cgi?pr=182141 ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
misc/185406: update py-django-simple-captcha from 0.4.0 to 0.4.1
>Number: 185406 >Category: misc >Synopsis: update py-django-simple-captcha from 0.4.0 to 0.4.1 >Confidential: no >Severity: non-critical >Priority: low >Responsible:freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Jan 02 03:20:00 UTC 2014 >Closed-Date: >Last-Modified: >Originator: John Hixson >Release:11.0-CURRENT >Organization: iXsystems, Inc. >Environment: FreeBSD thinkbsd 11.0-CURRENT FreeBSD 11.0-CURRENT #17 r259022M: Fri Dec 6 12:03:57 PST 2013 john@thinkbsd:/usr/obj/usr/src/sys/THINKBSD amd64 >Description: >How-To-Repeat: >Fix: Patch attached with submission follows: diff -urN py-django-simple-captcha.orig/Makefile py-django-simple-captcha/Makefile --- py-django-simple-captcha.orig/Makefile 2013-11-30 01:39:47.0 -0800 +++ py-django-simple-captcha/Makefile 2014-01-01 19:09:16.117372521 -0800 @@ -2,7 +2,7 @@ # $FreeBSD: www/py-django-simple-captcha/Makefile 335272 2013-11-30 09:39:47Z sunpoet $ PORTNAME= django-simple-captcha -PORTVERSION= 0.4.0 +PORTVERSION= 0.4.1 CATEGORIES=www python MASTER_SITES= CHEESESHOP PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} diff -urN py-django-simple-captcha.orig/distinfo py-django-simple-captcha/distinfo --- py-django-simple-captcha.orig/distinfo 2013-11-30 01:39:47.0 -0800 +++ py-django-simple-captcha/distinfo 2014-01-01 19:09:48.335013035 -0800 @@ -1,2 +1,2 @@ -SHA256 (django-simple-captcha-0.4.0.tar.gz) = 9a09294da01e9c3205f08604fc25fd54423b31b1b3c882427605d22e8d6ee291 -SIZE (django-simple-captcha-0.4.0.tar.gz) = 60285 +SHA256 (django-simple-captcha-0.4.1.tar.gz) = caa194d5b7ea0cbcb69a797daaebae72d34a9ca32bfafddd08ead8e87bd7ef46 +SIZE (django-simple-captcha-0.4.1.tar.gz) = 60775 >Release-Note: >Audit-Trail: >Unformatted: ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"
Re: kern/185395: IPv4 Multicast broken in 10.x
The following reply was made to PR kern/185395; it has been noted by GNATS. From: Peter Jeremy To: Olivier =?iso-8859-1?Q?Cochard-Labb=E9?= Cc: freebsd-gnats-submit Subject: Re: kern/185395: IPv4 Multicast broken in 10.x Date: Thu, 2 Jan 2014 17:47:56 +1100 --s9fJI615cBHmzTOP Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2014-Jan-01 22:03:36 +0100, Olivier Cochard-Labb=E9 = wrote: >And what about the commit 249925 "Add const qualifier to the dst parameter >of the ifnet if_output method" (Fri Apr 26 12:50:32 2013 UTC) ? > >This commit modify function arpresolve() in sys/netinet/if_ether.c by >replacing: >arpresolve(...,struct sockaddr *dst, ...) >by >arpresolve(...,const struct sockaddr *dst, ...). > >And inside this function there is a call to this macro: >ETHER_MAP_IP_MULTICAST(&SIN(dst)->sin_addr, desten); ETHER_MAP_IP_MULTICAST does left to right assignment - the first argument is only read so this change doesn't affect anything. >=3D> If the 'structure dst' in now a 'const struct dst', can the struct 'd= st' >still be modified by the macro ?? The macro never modified 'dst'. In any case, the compiler tracks 'const' and would raise a compile-time error if something tried to modify dst. --=20 Peter Jeremy --s9fJI615cBHmzTOP Content-Type: application/pgp-signature -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (FreeBSD) iKYEARECAGYFAlLFC5xfFIAALgAoaXNzdWVyLWZwckBub3RhdGlvbnMub3Bl bnBncC5maWZ0aGhvcnNlbWFuLm5ldDBCRjc3QTcyNTg5NEVCRTY0RjREN0VFRUZF OEE0N0JGRjAwRkI4ODcACgkQ/opHv/APuIeGJQCgrnnT3SfB+/6uk0lDzXhIBjfm jOEAoL9KLPmZUm3vuTu+V4oUEkMoBysl =vVA+ -END PGP SIGNATURE- --s9fJI615cBHmzTOP-- ___ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"