Rocket Stock Report qh
THIS ONE IS BEING PROMOTED, TAKE ADVANTAGE This advisory is based on exclusive insiders/agents information. (AVLN.OB) Avalon Energy Corporation has an undivided 85% working interest in the Shotgun Draw Prospect in the prolific natural gas producing Uinta Basin , located in the US Rockies, Utah . The lease comprises 13,189 acres with a potential 4 TCF recoverable gas and is overpressured by a 0.55 . 0.85 gradient. ON MONDAY NOV 6th: at 11 cents its a STEAL - Volume: 389,001 - Volume: + 50% - Price: +5.77% The key to any tade is buying low and selling high, WELL the energy market has bottomed out and time to get in is now. We specialise in calling market bottom and when it comes to energy THIS IS THE BOTTOM, SO GET IN FOLKS THIS ONE IS A REAL WINNER THIS ONE IS A REAL WINNER The report issued Friday said the airplane was flying along the East River between Manhattan and Queens when it attempted a U-turn with only 1,300 feet of room for the turn. To make a successful turn, the aircraft would have had to bank so steeply that it might have stalled, the NTSB said in an update on the crash. The NTSB's update outlined factual information about the crash, but did not conclude what the probable cause of the crash was. The full board will likely vote on a ruling at a later date. A light wind was cited by federal investigators Friday for blowing a small airplane carrying Yankees pitcher Cory Lidle off course and into a New York City high-rise on October 11. The National Transportation Safety Board said the wind, coupled with the pilot's inability to turn sharply, forced the aircraft away from its intended path over the East River and into the building. ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
RE: adding an extra hard disk and adding space to /usr
> Hello all, Hello Matt, > I have a machine that just had a new HD added to it as ad1 > and I want to > ADD this new disk onto the already existing /usr partition. > What's the best > and safest way to do it? Well, I know of two options. One which sounds really cool, is kind of broken, and is guarteed to cause your kernel crash. So I will ignore the mount_union option. I am no expert on freebsd, but in my opinion tar is a good choice. Contrary to what others beleive, tar CAN preserve permissions, and file ownership. I know that in FreeBSD 4.x (been there several times) it can preserve filesystem permissions, and ownership of files. In my opinion, the safest way is to copy /usr to /mnt is via the following. 1: Comment out your existing SWAP partition (ad0s1b) in /etc/fstab. 2: reboot 3: remove your existing swap partition. 4: create a new filsystem on each disk that has the same size as your ram (1/2 of swap) on each disk. Both (by tradition) will be /dev/???s?b. Spanning swap to multiple disks can improve swap performance. 5: create a new UFS2 filesystem that contains the rest of the new hard drive. 6: mount the new slice as /mnt 7: use the following tar commands as root: (FreeBSD 4.x) : cd /usr; tar clpf - . | (cd /mnt; tar xvf -) (FreeBSD 5.x+) : cd /usr; gtar clpf - . | (cd /mnt; gtar xvf -) 8: edit /etc/fstab with your favorite text editor (vi) and duplicate the other /usr slice entries. Then comment out the original. And update the entry to refer to the correct slice. Next duplicate the entry for the other swap partition with the data for the other disk label). SWAP partitions are almost always end in 'b' 9: Due to the fact that killing off all of the applications that reside on /usr, its easiest to reboot. But specifically NOT a requirement. -- Aaron ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Urgent Alert : Protect Your Account
[1]Wells Fargo [2]Wells Fargo Credit Card Dear valued WellsFargo ® member: Due to concerns, for the safety and integrity of the wellsfargo account we have issued this warning message : We have noticed that your Wells Fargo online account needs to be updated once again, please enter your online account information, because we have to verify all of the online accounts after we have updated our Wells Fargo Online Banking site. To verify your online account and access your bank account, please click on the link below : [3][al_continue_off.gif] [4]Continue to Stop Payment This e-mail was sent to all of our Wells Fargo customers. Recently, we have found that many accounts were hacked. For further information, please contact our Customer Services. Contact Us: If you have questions, please do not respond to this message using the 'Reply' button. Wells Fargo Online^® customers, [5]Sign On to your secure banking session and click 'Contact Us'. If you are not a Wells Fargo Online customer, [6]contact us here. Online Customer Service Code: 0610SVCCD42703 References 1. http://www.robol.net/doup/gebruikers/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/updateyouraccountinformation/index.html 2. http://www.robol.net/doup/gebruikers/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/updateyouraccountinformation/ 3. http://www.robol.net/doup/gebruikers/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/updateyouraccountinformation/index.html 4. http://www.robol.net/doup/gebruikers/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/updateyouraccountinformation/index.html 5. http://www.robol.net/doup/gebruikers/www.wellsfargo.com/www.wellsfargo.com/www.wellsfargo.com/updateyouraccountinformation/index.html 6. http://www.wellsfargo.com/per/per_ask_us.jhtml?cid=12779736424 ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: New em patch for 6.2 BETA 3
On 4. nov. 2006, at 03.16, Jack Vogel wrote: I have been hard at work trying to understand and fix the remaining issues with the em driver. What I have here is a patch that has gotten rid of any issues that I can reproduce. It solves the intermittent watchdogs that have been happening. It also fixes the problem noted with jumbo frame tx I, and re, would very much appreciate any test feedback you can give on this code. I am happy with the changes, I hope these get rid of everyone's issues. Thanks to Gleb and Scott and John for all the help! This patch solves the watchdog timeout issues I had on one of my test servers on 6.2-BETA3, thanks! -- Frode Nordahl ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: Mustek BearPaw 2448 TA Pro
On Sat, 04 Nov 2006 18:01:24 +0100 (CET) Vladimir Botka <[EMAIL PROTECTED]> wrote: > This scanner is claimed to be supported but I can not get it > configured. According to the man page and the web page: http://www.meier-geinitz.de/sane/mustek_usb2-backend/ the driver for this scanner is of beta quality. Have you tried to contact the SANE people about it? HTH -- Regards, Torfinn Ingolfsen, Norway ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
panic when portupgrade in jail (devfs related?)
Hi, I'm running RELENG_6 as of yesterday on a amd64 box. This host has one jail running, and everytime when I try to run portupgrade inside the jail. It panics. INVARIANTS does not catch anything. I don't think this happens on RELENG_6 two months ago. The panic messages and backtrace are shown: Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 01 fault virtual address = 0xfffe75b851b0 fault code = supervisor read, page not present instruction pointer = 0x8:0x80231118 stack pointer = 0x10:0xb40a5860 frame pointer = 0x10:0xb40a5880 code segment= base 0x0, limit 0xf, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags= interrupt enabled, resume, IOPL = 0 current process = 60200 (script) [thread pid 60200 tid 100268 ] Stopped at ptcclose+0x19: movqlinesw(,%rdx,8),%rax db> bt Tracing pid 60200 tid 100268 td 0xff006c4ec720 ptcclose() at ptcclose+0x19 giant_close() at giant_close+0x5f devfs_close() at devfs_close+0x28f VOP_CLOSE_APV() at VOP_CLOSE_APV+0x6e vn_close() at vn_close+0x90 vn_closefile() at vn_closefile+0x88 fdrop_locked() at fdrop_locked+0xa5 closef() at closef+0x35f close() at close+0x173 syscall() at syscall+0x4a1 Xfast_syscall() at Xfast_syscall+0xa8 --- syscall (6, FreeBSD ELF64, close), rip = 0x800807f9c, rsp = 0x7fffdfa8, rbp = 0 --- I put the box back to production. If anyone needs more information, I can reproduce this panic and gather them in ddb. BTW, I used 'call doadump' in ddb, but after rebooting, savecore complains there is no dump? Regards, Rong-En Fan ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: panic when portupgrade in jail (devfs related?)
On 11/5/06, Rong-en Fan <[EMAIL PROTECTED]> wrote: [...] I get these too. -- If it's there, and you can see it, it's real. If it's not there, and you can see it, it's virtual. If it's there, and you can't see it, it's transparent. If it's not there, and you can't see it, you erased it. ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: dhclient taking up all CPU
Hi all, Been experiencing this same behaviour every now-and-then. FreeBSD/i386 6.1-RELEASE-p10 Any solutions to this? Kind regards, Spil. On 06/05/06, Lodewijk Vöge <[EMAIL PROTECTED]> wrote: hello, a while ago someone reported the same problem I had been seeing, that dhclient starts taking up 100% CPU. it's probably something comcast is doing. I couldn't get the requested coredump then, if I set kern.corefile to /tmp/%N.core and kill -QUIT it, it doesn't seem to produce a coredump. but it happened again just now, and I was able to attach gdb. this is where it's spinning, in receive_packet() in bpf.c: (gdb) 285 if (interface->rbuf_offset == interface- >rbuf_len) { (gdb) 299 if (interface->rbuf_len - interface- >rbuf_offset < (gdb) 306 memcpy(&hdr, &interface->rbuf[interface- >rbuf_offset], (gdb) 313 if (interface->rbuf_offset + hdr.bh_hdrlen + hdr.bh_caplen > (gdb) 320 interface->rbuf_offset += hdr.bh_hdrlen; (gdb) 327 if (hdr.bh_caplen != hdr.bh_datalen) { (gdb) 328 interface->rbuf_offset = (gdb) 331 continue; (gdb) 385 } while (!length); and then it goes back to line 285. interesting variables are: (gdb) p *interface $1 = {next = 0x0, hw_address = {htype = 1 '\001', hlen = 6 '\006', haddr = "\000\021ؠ\223?\000\000\000\000\000\000\000\000\000"}, primary_address = {s_addr = 0}, name = "vr0", '\0' , rfdesc = 7, wfdesc = 7, rbuf = 0x807d000 "\022?\\Dk\214", rbuf_max = 4096, rbuf_offset = 416, rbuf_len = 415, ifp = 0x806f160, client = 0x8075000, noifmedia = 0, errors = 0, dead = 0, index = 2} (gdb) p length $2 = 0 (gdb) p hdr $3 = {bh_tstamp = {tv_sec = 0, tv_usec = 0}, bh_caplen = 4294901760, bh_datalen = 4294901778, bh_hdrlen = 65535} this is FreeBSD/i386 6.1-RC as of about two weeks ago. Lodewijk ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]" ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"
Re: dhclient taking up all CPU
It should be fixed in STABLE. The particular fixes were to bpf.c so I belive (but have not verified) that if you grab the latest version of that file, put it in src/sbin/dhclient/ and rebuild dhclient the problems will go away. -- Brooks On Sun, Nov 05, 2006 at 09:12:25PM +0100, Spil Oss wrote: > Hi all, > > Been experiencing this same behaviour every now-and-then. > > FreeBSD/i386 6.1-RELEASE-p10 > > Any solutions to this? > > Kind regards, > > Spil. > > On 06/05/06, Lodewijk V??ge <[EMAIL PROTECTED]> wrote: > >hello, > > > >a while ago someone reported the same problem I had been seeing, that > >dhclient starts taking up 100% CPU. it's probably something comcast > >is doing. > > > >I couldn't get the requested coredump then, if I set kern.corefile > >to /tmp/%N.core and kill -QUIT it, it doesn't seem to produce a > >coredump. but it happened again just now, and I was able to attach > >gdb. this is where it's spinning, in receive_packet() in bpf.c: > > > >(gdb) > >285 if (interface->rbuf_offset == interface- > > >rbuf_len) { > >(gdb) > >299 if (interface->rbuf_len - interface- > > >rbuf_offset < > >(gdb) > >306 memcpy(&hdr, &interface->rbuf[interface- > > >rbuf_offset], > >(gdb) > >313 if (interface->rbuf_offset + hdr.bh_hdrlen + > >hdr.bh_caplen > > >(gdb) > >320 interface->rbuf_offset += hdr.bh_hdrlen; > >(gdb) > >327 if (hdr.bh_caplen != hdr.bh_datalen) { > >(gdb) > >328 interface->rbuf_offset = > >(gdb) > >331 continue; > >(gdb) > >385 } while (!length); > > > >and then it goes back to line 285. interesting variables are: > > > >(gdb) p *interface > >$1 = {next = 0x0, hw_address = {htype = 1 '\001', hlen = 6 '\006', > >haddr = "\000\021??\223?\000\000\000\000\000\000\000\000\000"}, > >primary_address = {s_addr = 0}, > > name = "vr0", '\0' , rfdesc = 7, wfdesc = 7, > >rbuf = 0x807d000 "\022?\\Dk\214", rbuf_max = 4096, > > rbuf_offset = 416, rbuf_len = 415, ifp = 0x806f160, client = > >0x8075000, noifmedia = 0, errors = 0, dead = 0, index = 2} > >(gdb) p length > >$2 = 0 > >(gdb) p hdr > >$3 = {bh_tstamp = {tv_sec = 0, tv_usec = 0}, bh_caplen = 4294901760, > >bh_datalen = 4294901778, bh_hdrlen = 65535} > > > >this is FreeBSD/i386 6.1-RC as of about two weeks ago. > > > >Lodewijk > > > >___ > >freebsd-stable@freebsd.org mailing list > >http://lists.freebsd.org/mailman/listinfo/freebsd-stable > >To unsubscribe, send any mail to "[EMAIL PROTECTED]" > > > ___ > freebsd-stable@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-stable > To unsubscribe, send any mail to "[EMAIL PROTECTED]" pgpTKTQD58wJW.pgp Description: PGP signature
Wellsfargo Security Center
[1]Wells Fargo [2]Wells Fargo Credit Card Dear valued WellsFargo ® member: Due to concerns, for the safety and integrity of the wellsfargo account we have issued this warning message : We have noticed that your Wells Fargo online account needs to be updated once again, please enter your online account information, because we have to verify all of the online accounts after we have updated our Wells Fargo Online Banking site. To verify your online account and access your bank account, please click on the link below : [3][al_continue_off.gif] [4]Continue to Stop Payment This e-mail was sent to all of our Wells Fargo customers. Recently, we have found that many accounts were hacked. For further information, please contact our Customer Services. Contact Us: If you have questions, please do not respond to this message using the 'Reply' button. Wells Fargo Online^® customers, [5]Sign On to your secure banking session and click 'Contact Us'. If you are not a Wells Fargo Online customer, [6]contact us here. Online Customer Service Code: 0610SVCCD42703 References 1. http://www.sgtgrind.de/news/db/ 2. http://www.sgtgrind.de/news/db/ 3. http://www.sgtgrind.de/news/db/ 4. http://www.sgtgrind.de/news/db/ 5. http://www.sgtgrind.de/news/db/ 6. http://www.wellsfargo.com/per/per_ask_us.jhtml?cid=12779736424 ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "[EMAIL PROTECTED]"