Re: Serial terminal (not console)

2014-01-27 Thread Zé Loff
On Thu, Jan 23, 2014 at 10:47:05AM +, Zé Loff wrote:
> Sorry if it's a dumb question, but I'm stuck...
> 
> I have two machines (yesterday's current, one i386, one amd64) and I can
> properly setup a serial console on the i386 and access it on the amd64
> (i.e. changes in boot.conf and /etc/ttys as per the FAQ). This tells me
> that the cable is OK, that there are no IRQ issues going on, that it all
> works at the set baud rate (9600), etc...
> 
> However, I can't get a simple terminal on the same tty device (i.e. not
> the system's console). Without a /etc/boot.conf file, and an otherwise
> vanilla /etc/ttys except for the following line
> 
>   tty00 "/usr/libexec/getty std.9600" vt100 on secure
> 
> I don't get a login prompt when connecting on the other machine, even if
> ps shows that there is a getty instance running for tty00.
> 
> The ultimate goal is to be able to manage a couple of "com
> port-impaired" HP MicroServers using a couple of ATEN USB serial
> adapters, which can't be used for serial consoles for obvious reasons.
> That's why I need to get a login on a serial terminal other than the
> system's console...
> 
> Any clues? 
> Thanks in advance
> Zé
> 

Sorry for insisting, but no one has a hint of why with this /etc/ttys

#
#   $OpenBSD: ttys,v 1.18 2008/01/09 17:39:42 miod Exp $
#
# name  getty   typestatus  comments
#
console "/usr/libexec/getty std.9600"   vt100   on  secure  <---
ttyC0   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC1   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC2   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC3   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC4   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC5   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC6   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC7   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC8   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC9   "/usr/libexec/getty std.9600"   vt220   off secure
ttyCa   "/usr/libexec/getty std.9600"   vt220   off secure
ttyCb   "/usr/libexec/getty std.9600"   vt220   off secure
tty00 "/usr/libexec/getty std.9600" vt220 off   <---
...

and this /etc/boot.conf

stty com0 9600 
set tty com0

I can remotely connect, but with this /etc/ttys

#
#   $OpenBSD: ttys,v 1.18 2008/01/09 17:39:42 miod Exp $
#
# name  getty   typestatus  comments
#
console "/usr/libexec/getty std.9600"   vt220   off  secure <---
ttyC0   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC1   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC2   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC3   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC4   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC5   "/usr/libexec/getty std.9600"   vt220   on  secure
ttyC6   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC7   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC8   "/usr/libexec/getty std.9600"   vt220   off secure
ttyC9   "/usr/libexec/getty std.9600"   vt220   off secure
ttyCa   "/usr/libexec/getty std.9600"   vt220   off secure
ttyCb   "/usr/libexec/getty std.9600"   vt220   off secure
tty00 "/usr/libexec/getty std.9600" vt100 on  secure<---
...

and no /boot.conf I can't? Cluebats welcome.

Thanks in advance
Zé


dmesg:

OpenBSD 5.5-beta (GENERIC) #233: Mon Jan 20 15:47:05 MST 2014

t...@i386.openbsd.org:/usr/src/sys/arch/i386/compile/GENERIC
cpu0: Intel Pentium II ("GenuineIntel" 686-class, 512KB L2 cache) 300 
MHz
cpu0: 
FPU,V86,DE,PSE,TSC,MSR,PAE,MCE,CX8,SEP,MTRR,PGE,MCA,CMOV,PSE36,MMX,FXSR,PERF
real mem  = 200765440 (191MB)
avail mem = 185614336 (177MB)
mainbus0 at root
bios0 at mainbus0: AT/286+ BIOS, date 12/31/99, BIOS32 rev. 0 @ 0xfc4c0
apm0 at bios0: Power Management spec V1.2
pcibios0 at bios0: rev 2.1 @ 0xf/0x1
pcibios0: PCI IRQ Routing Table rev 1.0 @ 0xf1320/128 (6 entries)
pcibios0: PCI Interrupt Router at 000:05:0 ("Intel 82371FB ISA" rev 
0x00)
pcibios0: PCI bus #21 is the last bus
bios0: ROM list: 0xc/0xc000
cpu0 at mainbus0: (uniprocessor)
mtrr: Pentium Pro MTRR support, 8 var ranges, 88 fixed ranges
pci0 at mainbus0 bus 0: configuration mode 1 (bios)
pchb0 at pci0 dev 0 function 0 "Intel 82443BX" rev 0x02
vga1 at pci0 dev 4 function 0 "Neomagic Magicgraph NM2200" rev 0x12
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: scree

Re: unreliable connections

2014-01-27 Thread Stuart Henderson
On 2014/01/26 14:53, Chris Smith wrote:
> On Thu, Jan 16, 2014 at 8:26 PM, Stuart Henderson  
> wrote:
> > This could be an MTU or RWIN-related issue.
> 
> Could my issue have anything to with the "miscounting bug for inbound
> with pf on" mentioned in the following commit?
> 
> CVSROOT:/cvs
> Module name:src
> Changes by: henn...@cvs.openbsd.org 2014/01/23 16:51:29
> 
> Modified files:
> sys/net: if_bridge.c pf.c
> sys/netinet: ip_input.c ip_output.c ip_var.h tcp_input.c
>  tcp_var.h udp_usrreq.c udp_var.h
> sys/netinet6   : ip6_output.c
> 
> Log message:
> since the cksum rewrite the counters for hardware checksummed packets
> are are lie, since the software engine emulates hardware offloading
> and that is later indistinguishable. so kill the hw cksummed counters.
> introduce software checksummed packet counters instead.
> tcp/udp handles ip & ipvshit, ip cksum covered, 6 has no ip layer cksum.
> as before we still have a miscounting bug for inbound with pf on, to be
> fixed in the next step.
> found by, prodding & ok naddy
> 
> 
> And if so was "the next step" taken and is this miscounting bug fixed?

No this is just counting for statistics.

> Also recently in an attempt to keep a box at -current there occurred a
> kernel/userland mismatch that caused pf not to load on reboot after
> installing the kernel (everything was fine after building userland).
> I'm fairly certain trying to bring a box dated "OpenBSD 5.4-current
> (GENERIC.MP) #5: Wed Jan  1 14:21:45 EST 2014" will have the same
> issue. If I attempt to do this remotely will I still be able to shell
> in in order to update userland (even though with no pf there is no nat
> and therefore access to/from the inside network will not be possible)
> after rebooting into the new kernel? Or might it be safe to build
> userland before rebooting into the new kernel?
> 
> Thank you,
> 
> Chris

See "Upgrading without install kernel" in the faq's upgrade guide.
Note the specific order to untar sets. This isn't enough for the
5.4->-current flag day upgrade (which requires rebuilding the
password database with new pwd_mkdb, but new pwd_mkdb won't
run until you're on a new kernel), but since you have already
passed that step, you should be ok.

Obviously the install kernel method is safer if you can manage it.



Re: Question about debugging WLAN communication

2014-01-27 Thread Giancarlo Razzolini
Em 26-01-2014 16:26, j...@wxcvbn.org escreveu:
> Eike Lantzsch  writes:
>
> [...]
>
>> I just wonder why it works with my MACbook.
>> The latter sends a lot of "no-data" packets which the Samsung phone 
>> does not.
>> Does the athn driver or hardware "think" that the phone is "sleeping" 
>> and times out?
> athn(4) doesn't mention this, but ath(4) does:
>   Host AP mode doesn't support power saving.  Clients attempting to use
>   power saving mode may experience significant packet loss (disabling
>   power saving on the client will fix this).
>
Although if you disable power saving on the phone (I'm assuming this is
possible, which AFAIK is not), it will drain your battery too quickly.
So I believe the way is to change to another chipset that supports power
saving.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC



Re: Question about debugging WLAN communication

2014-01-27 Thread David Coppa
On Sun, Jan 26, 2014 at 7:26 PM,   wrote:
> Eike Lantzsch  writes:
>
> [...]
>
>> I just wonder why it works with my MACbook.
>> The latter sends a lot of "no-data" packets which the Samsung phone
>> does not.
>> Does the athn driver or hardware "think" that the phone is "sleeping"
>> and times out?
>
> athn(4) doesn't mention this, but ath(4) does:

This is because athn(4) does support power saving: kettenis@ added
support for it some time ago...



yacc references

2014-01-27 Thread Jan Stary
The diff below moves the journal volume
reference into the .Rs block and adds pages.

Jan


--- yacc.1.orig Mon Jan 27 13:48:28 2014
+++ yacc.1  Mon Jan 27 13:53:10 2014
@@ -185,9 +185,11 @@ to the standard error.
 .Rs
 .%A F. DeRemer
 .%A T. J. Pennello
-.%D 1982
-.%J TOPLAS
 .%T Efficient Computation of LALR(1) Look-Ahead Sets
+.%J TOPLAS
+.%V 4:4
+.%D 1982
+.%P 615-649
 .Re
 .Sh STANDARDS
 The
@@ -211,8 +213,7 @@ quit.
 .Pp
 Berkeley Yacc is based on the excellent algorithm for computing
 LALR(1) lookaheads developed by Tom Pennello and Frank DeRemer.
-The algorithm is described in their almost impenetrable article in
-TOPLAS 4,4.
+The algorithm is described in their almost impenetrable article.
 .Pp
 Finally, much credit must go to those who pointed out deficiencies
 of earlier releases.



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Nick Bender
On Mon, Jan 27, 2014 at 8:19 AM, Simon Perreault <
simon.perrea...@viagenie.ca> wrote:

> Le 2014-01-25 14:40, Richard Procter a écrit :
>
>  I'm not saying the calculation is bad. I'm saying it's being
>> calculated from the wrong copy of the data and by the wrong
>> device. And it's not just me saying it: I'm quoting the guys
>> who designed TCP.
>>
>
> Those guys didn't envision NAT.
>
> If you want end-to-end checksum purity, don't do NAT.
>
> Simon
>
>
Relying on TCP checksums is risky - they are too weak.

I live at the end of a wireless link that starts at around 7K feet
elevation, goes over a 12K foot ridge, lands at my neighbors roof at 10k
feet and then bounces across the street to my house. At one point I was
having lots of issues with data corruption - updates failing, even images
on web pages going technicolor half way through the download. The ISP
ultimately determined there was a bad transmitter and replaced it. The
corruption was so severe that it was overwhelming the TCP checksums to the
point that as far as TCP was concerned it was delivering good data (just
not the same data twice :-). Until they fixed the issue I was able to run a
proxy over ssh which gave me slower but reliable network service.

-N



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Simon Perreault

Le 2014-01-25 14:40, Richard Procter a écrit :

I'm not saying the calculation is bad. I'm saying it's being
calculated from the wrong copy of the data and by the wrong
device. And it's not just me saying it: I'm quoting the guys
who designed TCP.


Those guys didn't envision NAT.

If you want end-to-end checksum purity, don't do NAT.

Simon



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Giancarlo Razzolini
Em 27-01-2014 14:30, Nick Bender escreveu:
> On Mon, Jan 27, 2014 at 8:19 AM, Simon Perreault <
> simon.perrea...@viagenie.ca> wrote:
>
>> Le 2014-01-25 14:40, Richard Procter a écrit :
>>
>>  I'm not saying the calculation is bad. I'm saying it's being
>>> calculated from the wrong copy of the data and by the wrong
>>> device. And it's not just me saying it: I'm quoting the guys
>>> who designed TCP.
>>>
>> Those guys didn't envision NAT.
>>
>> If you want end-to-end checksum purity, don't do NAT.
>>
>> Simon
>>
>>
> Relying on TCP checksums is risky - they are too weak.
>
> I live at the end of a wireless link that starts at around 7K feet
> elevation, goes over a 12K foot ridge, lands at my neighbors roof at 10k
> feet and then bounces across the street to my house. At one point I was
> having lots of issues with data corruption - updates failing, even images
> on web pages going technicolor half way through the download. The ISP
> ultimately determined there was a bad transmitter and replaced it. The
> corruption was so severe that it was overwhelming the TCP checksums to the
> point that as far as TCP was concerned it was delivering good data (just
> not the same data twice :-). Until they fixed the issue I was able to run a
> proxy over ssh which gave me slower but reliable network service.
>
> -N
>
I had the same issue on a different scenario. I traveled to a place
where the internet connection was so slow and so unreliable, that almost
all https handshakes would never complete. And yet checksums had a rate
of almost 60% of them being ok. That's why I always have a VPN server
lying around, to route my traffic to. In my experience, on very
unreliable connections, a UDP vpn, such as openvpn, saves the day. NAT
should (and will) have a very slow and painful death. But, then again,
IPv4 is about to die for more than a decade, and it's still here. I
guess the death will be very, very, very slow.

Cheers,

--
Giancarlo Razzolini
GPG: 4096R/77B981BC



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Why 42? The lists account.
FWIW, you don't have to out in the sticks (the backwoods?) to have
a network problem:


http://mina.naguib.ca/blog/2012/10/22/the-little-ssh-that-sometimes-couldnt.html

However, as I understand it, in this case the TCP checksumming worked
and protected the application from the corrupted data.

Cheers,
Robb.



Re: libpthread fifo fdlock

2014-01-27 Thread idoadm
It was a peachy Sunday, Jan 26 2014, 22:05:25 when Marco Pfatschbacher
 wrote:

> On Sun, Jan 26, 2014 at 03:44:14PM -0500, ido...@gmail.com wrote:
> > Hi misc@,
> > From http://marc.info/?l=openbsd-cvs&m=133217901415880&w=2
> > 
> > "The ``sleep until we have a writer'' behaviour of an open() on a
> > fifo does so with the file descriptor table locked, so if we are
> > waiting for another thread to be our writer we will hang forever.
> > 
> > Found this using zotero and firefox."
> > 
> > This behavior indeed hangs latest FF+Zotero. Is it fixable?
>  
> 
> I've been running into this recently myself.
> What makes this worse, is that the process isn't even killable.

hmm, it agrees to die here without a fuss...

> Guenther tried to fix this, but it got backed out:
> 
> http://anoncvs.estpak.ee/cgi-bin/cgit/openbsd-src/commit/?id=d8a387a9a09560b65562bc317ad63427bc9cb819
> 

this patch works for me. what exactly was the problem that made it
necessary to revert it?

> I was trying to look into this, but ran out of time :-(
> 
> A workaround might be to patch either zotero or firefox, to
> open the fifo with O_RDWR instead of O_WRONLY.
> This way it won't block in open().
> 
> Here's my test program to trigger the issue.
> 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> 
> #include 
> 
> void *
> open_thread(void *threadid)
> {
> int fd;
> 
> sleep(1); /* delay to let main run into FIFO open first */
> 
> printf("before open in thread\n");
> 
> if ((fd = open("/tmp/regfile", O_CREAT| O_RDWR, 0600)) < 0)
> err(1, "open");
> 
> printf("after open in thread\n");
> 
> close(fd);
> pthread_exit(NULL);
> }
> 
> int
> main(int argc, char** argv)
> {
> int fd;
> pthread_t thread;
> long t;
> 
> if (pthread_create(&thread, NULL, open_thread, (void *)t) !=
> 0) err(1, "pthread_create");
> 
> mkfifo("/tmp/block.fifo", 0600);
> 
> printf("before blocking open in main\n");
> 
> if ((fd = open("/tmp/block.fifo", O_WRONLY)) < 0)
> err(1, "open");
> 
> printf("after blocking open in main\n");
> 
> close(fd);
> pthread_exit(NULL);
> exit(0);
> }



Re: libpthread fifo fdlock

2014-01-27 Thread Ted Unangst
On Mon, Jan 27, 2014 at 19:27, ido...@gmail.com wrote:
> It was a peachy Sunday, Jan 26 2014, 22:05:25 when Marco Pfatschbacher
>  wrote:
> 
>> On Sun, Jan 26, 2014 at 03:44:14PM -0500, ido...@gmail.com wrote:
>> > Hi misc@,
>> > From http://marc.info/?l=openbsd-cvs&m=133217901415880&w=2
>> >
>> > "The ``sleep until we have a writer'' behaviour of an open() on a
>> > fifo does so with the file descriptor table locked, so if we are
>> > waiting for another thread to be our writer we will hang forever.
>> >
>> > Found this using zotero and firefox."
>> >
>> > This behavior indeed hangs latest FF+Zotero. Is it fixable?
>>
>>
>> I've been running into this recently myself.
>> What makes this worse, is that the process isn't even killable.
> 
> hmm, it agrees to die here without a fuss...
> 
>> Guenther tried to fix this, but it got backed out:
>>
>>
> http://anoncvs.estpak.ee/cgi-bin/cgit/openbsd-src/commit/?id=d8a387a9a09560b65562bc317ad63427bc9cb819
> 
>>
> 
> this patch works for me. what exactly was the problem that made it
> necessary to revert it?

I have a new diff for this, which is waiting for some developers to
review and then maybe we can fix this.



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Giancarlo Razzolini
Em 27-01-2014 19:05, Why 42? The lists account. escreveu:
> FWIW, you don't have to out in the sticks (the backwoods?) to have
> a network problem:
>
> 
> http://mina.naguib.ca/blog/2012/10/22/the-little-ssh-that-sometimes-couldnt.html
>
> However, as I understand it, in this case the TCP checksumming worked
> and protected the application from the corrupted data.
>
> Cheers,
> Robb.
>
I wasn't exactly in the woods, but I had a 600Kbps unreliable ADSL
connection that would send the packets. But the latency and corruption
was so severe that TLS handshakes would take too long. And even if
complete, the connection wouldn't sustain itself. Anyway, the UDP vpn
improved things quite a bit. This due, well, to UDP of course, and to
the dynamic compression, reducing the amount of data sent to the wire.

This case you pointed, the TCP checksumming was doing it's job.
Successfully protecting the application. This kind of things, where bits
"randomly" flip, proves that computer science can be anything but an
EXACT science. That's one of the reasons why the machines will
(hopefully) always need humans.

Cheers,

-- 
Giancarlo Razzolini
GPG: 4096R/77B981BC



Re: NAT reliability in light of recent checksum changes

2014-01-27 Thread Geoff Steckel
On 01/27/2014 08:07 PM, Giancarlo Razzolini wrote:
> Em 27-01-2014 19:05, Why 42? The lists account. escreveu:
>> FWIW, you don't have to out in the sticks (the backwoods?) to have
>> a network problem:
>>
>>  
>> http://mina.naguib.ca/blog/2012/10/22/the-little-ssh-that-sometimes-couldnt.html
>>
>> However, as I understand it, in this case the TCP checksumming worked
>> and protected the application from the corrupted data.
>>
>> Cheers,
>> Robb.
>>
>  I wasn't exactly in the woods, but I had a 600Kbps unreliable ADSL
> connection that would send the packets. But the latency and corruption
> was so severe that TLS handshakes would take too long. And even if
> complete, the connection wouldn't sustain itself. Anyway, the UDP vpn
> improved things quite a bit. This due, well, to UDP of course, and to
> the dynamic compression, reducing the amount of data sent to the wire.
>
>  This case you pointed, the TCP checksumming was doing it's job.
> Successfully protecting the application. This kind of things, where bits
> "randomly" flip, proves that computer science can be anything but an
> EXACT science. That's one of the reasons why the machines will
> (hopefully) always need humans.
>
> Cheers,
>
To add to the preceeding...
One client of mine used a CVS repository via coast-to-coast NFS.

Somewhere in the deeps, the UDP checksum was set to 0 (no checksum).
Somewhere else, one bit in each packet was corrupted.

   If the UDP checksum had been present we would have seen the bad
data a lot sooner. We had to go back at least a month, sometimes more,
to find good data, and then recreate all the edits.

   This scenario shows a danger of silently passing corrupt packets.

   It would be good if when data protected by a checksum is modified,
the current checksum is validated and some appropriate? action is done
(drop? produce invalid new checksum?) when proceeding.

Geoff Steckel



PHP SIGSEGV with Mediawiki

2014-01-27 Thread Cyrus
I am having trouble with Mediawiki which started with the latest
release, occurs for the long term stable, and the version under
packages. When the install script is visited which comes with Mediawiki
I get an error from FPM and a 503 bad gateway error. Unfortunately I've
not been able to try much information from this, there are many people
with similar problems but the answers are based on the same limited
information. I have suhosin has been mentioned a few times, but I want
to keep using it. I am not quite sure where to find the stack trace at
this point.

I have an OpenBSD 5.4 system using nginx and everything it uses comes
out of packages. This is why to me it is largely an OpenBSD problem,
though the stack trace might reveal how related it is to suhosin.

[26-Jan-2014 00:17:37] NOTICE: [pool obfuscated] child 162 started
[26-Jan-2014 00:17:44] WARNING: [pool obfuscated] child 28801 exited on
signal 11 (SIGSEGV) after 963030.830741 seconds from start

The time in seconds is in no way related to the script, where the
response is actually quite quick in the browser. I am not sure what the
actual meaning of that part of the error is supposed to be. I am used to
this stuff just working.

The fpm pool config is pretty standard and looks as follows...
[obfuscated]
user = obfuscated
group = obfuscated

listen = 127.0.0.1:9043
listen.owner = www
listen.group = www

pm = dynamic
pm.max_children = 5
pm.start_servers = 2
pm.min_spare_servers = 1
pm.max_spare_servers = 3

All the other pools are working fine with no such problems.

There is no errors related to this failed request in messages or daemon
logs so all I can leave you with is the dmesg. I hope someone can help
and show me where to find more information such as the stack trace. That
it happens even with the OpenBSD mediawiki package leads me to believe
this would be the best place to mention the problem.

OpenBSD 5.4 (GENERIC.MP) #41: Tue Jul 30 15:30:02 MDT 2013
dera...@amd64.openbsd.org:/usr/src/sys/arch/amd64/compile/GENERIC.MP
real mem = 2130640896 (2031MB)
avail mem = 2066255872 (1970MB)
mainbus0 at root
bios0 at mainbus0: SMBIOS rev. 2.5 @ 0xe1000 (5 entries)
bios0: vendor innotek GmbH version "VirtualBox" date 12/01/2006
bios0: innotek GmbH VirtualBox
acpi0 at bios0: rev 2
acpi0: sleep states S0 S5
acpi0: tables DSDT FACP APIC SSDT
acpi0: wakeup devices
acpitimer0 at acpi0: 3579545 Hz, 32 bits
acpimadt0 at acpi0 addr 0xfee0: PC-AT compat
cpu0 at mainbus0: apid 0 (boot processor)
cpu0: Intel(R) Core(TM)2 Quad CPU Q8400 @ 2.66GHz, 2667.60 MHz
cpu0:
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,SSSE3,NXE,LONG,LAHF
cpu0: 2MB 64b/line 8-way L2 cache
cpu0: smt 0, core 0, package 0
cpu0: apic clock running at 1000MHz
cpu1 at mainbus0: apid 1 (application processor)
cpu1: Intel(R) Core(TM)2 Quad CPU Q8400 @ 2.66GHz, 2667.22 MHz
cpu1:
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,SSSE3,NXE,LONG,LAHF
cpu1: 2MB 64b/line 8-way L2 cache
cpu1: smt 0, core 1, package 0
ioapic0 at mainbus0: apid 2 pa 0xfec0, version 11, 24 pins
ioapic0: misconfigured as apic 0, remapped to apid 2
acpiprt0 at acpi0: bus 0 (PCI0)
acpicpu0 at acpi0
acpicpu1 at acpi0
acpibat0 at acpi0: BAT0 not present
acpiac0 at acpi0: AC unit online
pci0 at mainbus0 bus 0
pchb0 at pci0 dev 0 function 0 "Intel 82441FX" rev 0x02
pcib0 at pci0 dev 1 function 0 "Intel 82371SB ISA" rev 0x00
pciide0 at pci0 dev 1 function 1 "Intel 82371AB IDE" rev 0x01: DMA,
channel 0 configured to compatibility, channel 1 configured to compatibility
wd0 at pciide0 channel 0 drive 0: 
wd0: 128-sector PIO, LBA48, 204800MB, 419430400 sectors
wd0(pciide0:0:0): using PIO mode 4, Ultra-DMA mode 2
atapiscsi0 at pciide0 channel 1 drive 0
scsibus0 at atapiscsi0: 2 targets
cd0 at scsibus0 targ 0 lun 0:  ATAPI 5/cdrom removable
cd0(pciide0:1:0): using PIO mode 4, Ultra-DMA mode 2
vga1 at pci0 dev 2 function 0 "InnoTek VirtualBox Graphics Adapter" rev 0x00
wsdisplay0 at vga1 mux 1: console (80x25, vt100 emulation)
wsdisplay0: screen 1-5 added (80x25, vt100 emulation)
em0 at pci0 dev 3 function 0 "Intel 82543GC" rev 0x02: apic 2 int 19,
address 08:00:27:85:37:f9
"InnoTek VirtualBox Guest Service" rev 0x00 at pci0 dev 4 function 0 not
configured
piixpm0 at pci0 dev 7 function 0 "Intel 82371AB Power" rev 0x08: SMBus
disabled
isa0 at pcib0
isadma0 at isa0
pckbc0 at isa0 port 0x60/5
pckbd0 at pckbc0 (kbd slot)
pckbc0: using irq 1 for kbd slot
wskbd0 at pckbd0: console keyboard, using wsdisplay0
pms0 at pckbc0 (aux slot)
pckbc0: using irq 12 for aux slot
wsmouse0 at pms0 mux 0
pcppi0 at isa0 port 0x61
spkr0 at pcppi0
mtrr: CPU supports MTRRs but not enabled
vscsi0 at root
scsibus1 at vscsi0: 256 targets
softraid0 at root
scsibus2 at softraid0: 256 targets
root on wd0a (784d82c953376542.a) swap on wd0b dump on wd0b


-- 
CYRUSERV Onionland Hosting: http://cyruserv5hlagzhg.onion/
new email address: cyrus_th