Re: kern/185395: IPv4 Multicast broken in 10.x

2014-01-02 Thread glebius
Synopsis: IPv4 Multicast broken in 10.x

State-Changed-From-To: open->patched
State-Changed-By: glebius
State-Changed-When: Thu Jan 2 10:18:56 UTC 2014
State-Changed-Why: 
Fixed in head.


Responsible-Changed-From-To: freebsd-bugs->glebius
Responsible-Changed-By: glebius
Responsible-Changed-When: Thu Jan 2 10:18:56 UTC 2014
Responsible-Changed-Why: 
Fixed in head.

http://www.freebsd.org/cgi/query-pr.cgi?pr=185395
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: ports/185406: update www/py-django-simple-captcha from 0.4.0 to 0.4.1

2014-01-02 Thread linimon
Old Synopsis: update py-django-simple-captcha from 0.4.0 to 0.4.1
New Synopsis: update www/py-django-simple-captcha from 0.4.0 to 0.4.1

Responsible-Changed-From-To: freebsd-bugs->freebsd-ports-bugs
Responsible-Changed-By: linimon
Responsible-Changed-When: Thu Jan 2 11:20:22 UTC 2014
Responsible-Changed-Why: 
make this a ports PR and fix Synopsis.

http://www.freebsd.org/cgi/query-pr.cgi?pr=185406
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)

2014-01-02 Thread melifaro
Synopsis: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)

Responsible-Changed-From-To: freebsd-bugs->melifaro
Responsible-Changed-By: melifaro
Responsible-Changed-When: Thu Jan 2 13:34:35 UTC 2014
Responsible-Changed-Why: 
Take.

http://www.freebsd.org/cgi/query-pr.cgi?pr=185092
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/185092: panic: rtfree 2 (using RADIX_MPATH in a VNET jail)

2014-01-02 Thread Nikolay Denev
On Wed, Jan 1, 2014 at 5:39 PM, Nikolay Denev  wrote:
> Ok, killing openvpn with -9 leaves the routes around, and particularly
> interesting are the following routes :
>
> 78.90.222.xx   10.255.255.0   UGHS0 5841 epair0 =>
> 78.90.222.xx/3210.255.255.0   UGS 00 epair0
>
> Now, if I do :
>
> route delete 78.90.222.xx 10.255.255.0
>
> The route, with the H flag is deleted. If I repeat the command the
> second route is deleted as well, even if the second command specifies
> a netmask no panic.
>
> However the first delete command specifies the /32 mask like this :
>
> route delete  78.90.222.xx 10.255.255.0 255.255.255.255
>
> Then I get "rtfree 2" kernel panic immediately.
>
> This seems to be happening as I'm manually installing static routes in
> the vnet jail for the VPN remote endpoints , however OpenVPN adds such
> routes too however differently, which results in two routing entries.
>
> For example :
>
> route add $IP $GW
> and
> route add $IP $GW 255.255.255.255
>
> add to different route entries, one is /32 network, the other is a host route.
>
>
>
> --Nikolay
>
> On Wed, Jan 1, 2014 at 1:21 PM, Nikolay Denev  wrote:
>> On Wed, Jan 1, 2014 at 1:10 PM, Nikolay Denev  wrote:
>>>
>>> On Sun, Dec 22, 2013 at 1:10 PM,  wrote:

 Thank you very much for your problem report.
 It has the internal identification `misc/185092'.
 The individual assigned to look at your
 report is: freebsd-bugs.

 You can access the state of your problem report at any time
 via this link:

 http://www.freebsd.org/cgi/query-pr.cgi?pr=185092

 >Category:   misc
 >Responsible:freebsd-bugs
 >Synopsis:   panic: rtfree 2 (using RADIX_MPATH in a VNET jail)
 >Arrival-Date:   Sun Dec 22 13:10:00 UTC 2013
>>>
>>>
>>> I'm trying to understand exactly what is happening here, and examining a
>>> core dump with kgdb I'm getting some output that confuses me :
>>>
>>> (kgdb) bt
>>> #0  doadump (textdump=-1011569920) at pcpu.h:233
>>> #1  0xc06069b2 in kern_reboot (howto=260) at
>>> /usr/src/sys/kern/kern_shutdown.c:447
>>> #2  0xc0606d0e in panic (fmt=) at
>>> /usr/src/sys/kern/kern_shutdown.c:754
>>> #3  0xc06de639 in rtfree (rt=) at
>>> /usr/src/sys/net/route.c:464
>>> #4  0xc06e188d in route_output (m=) at
>>> /usr/src/sys/net/rtsock.c:951
>>> #5  0xc06de18f in raw_usend (so=, flags=0, m=>> optimized out>, nam=0x0, control=,
>>> td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238
>>> #6  0xc066eca9 in sosend_generic (so=0xc3e9c1a8, uio=>> out>, top=, control=0x0,
>>> flags=, td=) at
>>> /usr/src/sys/kern/uipc_socket.c:1271
>>> #7  0xc066efc7 in sosend (so=0xc3e9c1a8, addr=0x0, uio=0xd9b9cc10,
>>> top=0x0, control=0x0, flags=0, td=0xc3bd2000)
>>> at /usr/src/sys/kern/uipc_socket.c:1315
>>> #8  0xc0654af4 in soo_write (fp=0xc3c0c818, uio=0xd9b9cc10,
>>> active_cred=0xc3f1dd00, flags=0, td=0xc3bd2000)
>>> at /usr/src/sys/kern/sys_socket.c:103
>>> #9  0xc064c866 in dofilewrite (td=0xc3bd2000, fd=3, fp=0xc3c0c818,
>>> auio=0xd9b9cc10, offset=-1, flags=0) at file.h:303
>>> #10 0xc064c566 in kern_writev (td=0xc3bd2000, fd=3, auio=>> out>) at /usr/src/sys/kern/sys_generic.c:467
>>> #11 0xc064c4bc in sys_write (td=, uap=>> optimized out>) at /usr/src/sys/kern/sys_generic.c:382
>>> #12 0xc08614d3 in syscall (frame=) at
>>> subr_syscall.c:134
>>> #13 0xc084cca1 in Xint0x80_syscall () at
>>> /usr/src/sys/i386/i386/exception.s:270
>>> #14 0x281975b7 in ?? ()
>>> Previous frame inner to this frame (corrupt stack?)
>>> Current language:  auto; currently minimal
>>> (kgdb) fr 3
>>> #3  0xc06de639 in rtfree (rt=) at
>>> /usr/src/sys/net/route.c:464
>>> 464 panic("rtfree 2");
>>> (kgdb) print *rt
>>> $1 = {rt_nodes = {{rn_mklist = 0xc3b4ab30, rn_parent = 0x1, rn_bit = 0,
>>> rn_bmask = 0 '\0', rn_flags = 0 '\0', rn_u = {rn_leaf = {
>>>   rn_Key = 0xc0882687 "shutdown_post_sync", rn_Mask = 0x103
>>> , rn_Dupedkey = 0x0}, rn_node = {
>>>   rn_Off = -1064819065, rn_L = 0x103, rn_R = 0x0}}},
>>> {rn_mklist = 0x0, rn_parent = 0x4, rn_bit = -18048, rn_bmask = -94 '?',
>>>   rn_flags = 195 '?', rn_u = {rn_leaf = {rn_Key = 0xc3a545e0 "",
>>> rn_Mask = 0xc3a4e440 " ??(???\020'", rn_Dupedkey = 0xc3a4e880},
>>> rn_node = {rn_Off = -1012578848, rn_L = 0xc3a4e440, rn_R =
>>> 0xc3a4e880, rt_gateway = 0x74756873, rt_flags = 1853321060,
>>>   rt_refcnt = 1936683103, rt_ifp = 0x79735f74, rt_ifa = 0x636e, rt_rmx =
>>> {rmx_mtu = 0, rmx_expire = 0, rmx_pksent = 0, rmx_weight = 0},
>>>   rt_fibnum = 0, rt_mtx = {lock_object = {lo_name = 0x0, lo_flags = 0,
>>> lo_data = 0, lo_witness = 0x0}, mtx_lock = 0}}
>>>
>>>
>>>
>>> rn_Key with value of “shutdown_post_sync” ?
>>>
>>> It’s visible also in the raw_usend() frame:
>>>
>>> (kgdb) fr 5
>>> #5  0xc06de18f in raw_usend (so=, flags=0, m=>> optimized out>, nam=0x0, control=,
>>> td=0xc3bd2000) at /usr/src/sys/net/raw_usrreq.c:238
>>> 238 return (

kern/185425: iwn difficulties in busy radio environments

2014-01-02 Thread Nathan Whitehorn

>Number: 185425
>Category:   kern
>Synopsis:   iwn difficulties in busy radio environments
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Jan 02 21:00:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Nathan Whitehorn
>Release:11-CURRENT
>Organization:
>Environment:
FreeBSD wanderer.tachypleus.net 11.0-CURRENT FreeBSD 11.0-CURRENT #41 r260039M: 
Sun Dec 29 13:22:33 EST 2013 
r...@wanderer.tachypleus.net:/usr/obj/usr/src/sys/WANDERER  amd64
>Description:
In busy radio environments (i.e. not at home), using wpa_supplicant reliably 
causes NIC crashes involving printing errors about "NMI_FIRMWARE_WATCHDOG" to 
the console. Resetting the interface (an up/down cycle) restores its operation 
for a time.

This problem seems specific to wpa_supplicant. If I am connected to an open 
network and wpa_supplicant is running, the NIC will crash. If I turn 
wpa_supplicant off and just connect with ifconfig ssid foo, it will not crash. 
I suspect it is a scanning-related race.

The card in question is:
iwn0@pci0:3:0:0:class=0x028000 card=0x11108086 chip=0x42308086 rev=0x61 
hdr=0x00
vendor = 'Intel Corporation'
device = 'PRO/Wireless 4965 AG or AGN [Kedron] Network Connection'
>How-To-Repeat:

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/185393: find(1): -lname buffer read overflow bug

2014-01-02 Thread jilles
Old Synopsis: find -lname buffer read overflow bug
New Synopsis: find(1): -lname buffer read overflow bug

Responsible-Changed-From-To: freebsd-bugs->jilles
Responsible-Changed-By: jilles
Responsible-Changed-When: Thu Jan 2 21:41:09 UTC 2014
Responsible-Changed-Why: 
I'm working on this.

http://www.freebsd.org/cgi/query-pr.cgi?pr=185393
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/185054: Cannot mount_udf dvd Invalid argument

2014-01-02 Thread Takashi Matsubara
The following reply was made to PR misc/185054; it has been noted by GNATS.

From: Takashi Matsubara 
To: freebsd-gnats-sub...@freebsd.org
Cc:  
Subject: Re: misc/185054: Cannot mount_udf dvd Invalid argument
Date: Thu, 2 Jan 2014 23:29:37 GMT

 >Submitter-Id: current-users
 >Originator:   Takashi Matsubara
 >Organization: 
 >Confidential: no
 >Synopsis: Re: misc/185054: Cannot mount_udf dvd Invalid argument
 >Severity: non-critical
 >Priority: low
 >Category: misc
 >Class:sw-bug
 >Release:  10-RC4
 >Environment:  FreeBSD tamago-two.tamago.local 10.0-PRERELEASE FreeBSD 
 >10.0-PRERELEASE #0 r260180: Thu Jan  2 13:22:02 JST 2014 
 >matubara@tamago-two.tamago.local:/usr/obj/usr/src/sys/TAMAGO-TWO  amd64
 >Description:
 Information is added.
 
 [camcontrol devlist]
   at scbus0 target 0 lun 0 (ada0,pass0)
  at scbus1 target 0 lun 0 (cd0,pass1)
at scbus4 target 0 lun 0 (ses0,pass2)
 
 [file -s /dev/cd0]
 /dev/cd0: # UDF filesystem data (version 1.5) 'SAMPLE  
'
 
 mount_-t udf:NG
 
 mount -t cd9660:OK
 
 Why can't it mount by mount_udf? 
 
 
 
 
 >How-To-Repeat:
 
 >Fix:
 
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/185429: rc.subr: ${name}_chroot does not work when there's a custom rc "start_cmd"

2014-01-02 Thread Dreamcat4

>Number: 185429
>Category:   misc
>Synopsis:   rc.subr: ${name}_chroot does not work when there's a custom rc 
>"start_cmd"
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Jan 02 23:30:01 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Dreamcat4
>Release:9.1-RELEASE-p5 and higher
>Organization:
-
>Environment:
This bug occurs for any / all recent FreeBSD versions since 9.1-RELEASE-p5
>Description:
There is a bug in /etc/rc.subr

the bug is:
if [ there's a custom ${XXX_cmd}, ]
  E.g. an rc "start_cmd", "stop_cmd".

then 
  "${name}_chroot" does not work.

Documentation:
man -Pcat rc.subr | grep -5 -i chroot

 ${name}_chroot
   Directory to chroot(8) to before running command.
   Only supported after /usr is mounted.


It happens at these begin/end points:

https://gitorious.org/freebsd/freebsd/source/1e0e806b8822c4570e09508df054f82f9a47ce0e:etc/rc.subr#L684-739

If you look in rc.subr at those lines ^^ control is obviously never getting to 
the part where it kicks of the chroot case... which only happens in case start).

There may be more bugs nearby, and for the same reason.
Will fix / wont fix ?

Many thanks.

>How-To-Repeat:
for any rc.d service that sets "start_cmd" at the top of its rc.d script

1) set "${name}_chroot=/path/to/chroot" in rc.conf
2) set "name_enable=YES" in rc.conf
3) start that rc.d service


>Fix:
need to edit the file "/etc/rc.subr" around these lines:

https://gitorious.org/freebsd/freebsd/source/1e0e806b8822c4570e09508df054f82f9a47ce0e:etc/rc.subr#L684-739

So that ${name}_chroot is checked for, even at the top where it says:

"# if there's a custom ${XXX_cmd},"
...

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


bin/185431: gcc bug with short int promotion

2014-01-02 Thread Stephen Hurd

>Number: 185431
>Category:   bin
>Synopsis:   gcc bug with short int promotion
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jan 03 01:50:00 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Stephen Hurd
>Release:9.1-RELEASE-p6
>Organization:
>Environment:
FreeBSD cracked.hurd.local 9.1-RELEASE-p6 FreeBSD 9.1-RELEASE-p6 #0: Wed Aug 21 
20:30:17 UTC 2013 
r...@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  i386

>Description:
Integer promotion of a short int and an unsigned short in the same expression 
seems broken in the system compiler.
>How-To-Repeat:
#include 

int main(int argc, char **argv)
{
short k = 251;
unsigned short l = 65535;

printf("%hd > %hu = %d\n", k, l, (k > l));
return 0;
}

> gcc test.c
> ./a.out
251 > 65535 = 1
>Fix:
Use a different compiler.

>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/185427: [igb] freebsd 8.4, 9.1 and 9.2 panic Double-Fault with intel 82576 igb driver

2014-01-02 Thread linimon
Old Synopsis: freebsd 8.4, 9.1 and 9.2 panic Double-Fault with intel 82576 igb 
driver
New Synopsis: [igb] freebsd 8.4, 9.1 and 9.2 panic Double-Fault with intel 
82576 igb driver

Responsible-Changed-From-To: freebsd-bugs->freebsd-net
Responsible-Changed-By: linimon
Responsible-Changed-When: Fri Jan 3 02:06:34 UTC 2014
Responsible-Changed-Why: 
Over to maintainer.

http://www.freebsd.org/cgi/query-pr.cgi?pr=185427
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"