Displaying 20 results from an estimated 1000 matches similar to: "crash dumps to ar not supported ?"
2003 Aug 07
0
understanding a panic / crash dump
Just trying to understand if anything might be going on with this crash
dump or just faulty hardware ? dmesg at the end
---Mike
# gdb -k /kernel.debug vmcore.0
GNU gdb 4.18 (FreeBSD)
Copyright 1998 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type
2003 Jun 06
0
crash in networking code (with bt and debug kernel)
While I was tying down a supernet to the discard interface, the box crashed
on me. Its a STABLE box from June 4th. I was in zebra at the time and
thought I would route a /24 to ds0 instead of to the IP on ds0 (which I had
done for a number of other aggregate routes). The only other "strange"
thing about the box is that ds0 is loaded via kld. I will see if I can
reproduce it on a
2003 Aug 30
4
Heads up: panics should be fixed!
As others have noted, Tor's patch appears to be a total solution to the
recent instability the PAE patch introduced. So, if you're experiencing
panics with a recent kernel, or are in a position to stress a machine,
please cvsup and give it a test!
Thanks,
Mike "Silby" Silbersack
---------- Forwarded message ----------
Date: Sat, 30 Aug 2003 08:39:08 -0700 (PDT)
From: Tor Egge
2017 Sep 26
2
tweaking max sessions / scaling
Other than cranking up logging to debug2, is there a way to better tune
logging on a server to see if I am running into max sessions ? On
FreeBSD RELENG11 I am periodically seeing connections being refused-
3way handshake not completing or completing and then FINs.
Typically, I have a hundred or so connections at one time, but they can
bounce up to a few hundred on occasion. Without leaving the
2009 Apr 21
4
RELENG_7 crash
The box has a fairly heavy UDP load. Its RELENG_7 as of today and
took 3hrs for it to dump core.
Fatal trap 12: page fault while in kernel mode
cpuid = 1; apic id = 01
fault virtual address = 0x68
fault code = supervisor read, page not present
instruction pointer = 0x20:0xc0637146
stack pointer = 0x28:0xe766eaac
frame pointer = 0x28:0xe766eb54
code segment
2017 Jul 25
3
syslog from chrooted environment
On 7/24/2017 8:39 PM, Nico Kadel-Garcia wrote:
>
> Why are the targets of the hardlinks evaporating on rebooting? Is that
> a FreeBSD'ism?
Its when syslogd stops/starts. The hardlinks need to be recreated for
some reason.
---Mike
--
-------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike at sentex.net
Providing Internet services since 1994
2017 Jul 24
8
syslog from chrooted environment
I have a somewhat busy sftp server where the users are all chrooted into
their home directory. In order to log all the commands they enter, I
have to create a /dev/log entry and hard link in their home directory so
that syslog works for their commands
Match user *
ForceCommand internal-sftp -f local1 -l verbose
Everything works, but its a bit of a pain if someone restarts syslogd
and forgets
2006 Sep 05
2
http://www.openssl.org/news/secadv_20060905.txt
Does anyone know the practicality of this attack ? i.e. is this trivial to do ?
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada
2004 Jan 16
1
HiFn / FAST_IPSEC question
Hi,
Just got some of the new Soekris 1401 VPN cards based on the hifn 7955 chip.
hifn0 mem 0xe8510000-0xe8517fff,0xe8518000-0xe8519fff,0xe851a000-0xe851afff
irq 5 at device 0.0 on pci1
hifn0: Hifn 7955, rev 0, 32KB dram, 64 sessions
vs
hifn0 mem 0xeb902000-0xeb902fff,0xeb901000-0xeb901fff irq 10 at device 8.0
on pci0
hifn0: Hifn 7951, rev 0, 128KB sram, 193 sessions
When it says "n
2003 Aug 28
1
new DoS technique (exploiting TCP retransmission timeouts)
An interesting paper
http://www.acm.org/sigcomm/sigcomm2003/papers/p75-kuzmanovic.pdf
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
2013 Jan 06
2
audit events confusion
On a rather full customer web server, I am trying to track down whose
web site script is trying to make outbound network connections when they
should not be. In /etc/security/audit_control, I added to the flags line
dir:/var/audit
flags:lo,aa,-nt
minfree:5
to log failed network connection. When I try an make an outbound
connection to something that is blocked in pf, it seems to sometimes
work.
2013 Sep 26
0
nanobsd on RELENG9
I am getting an odd error on a recent i386 releng9 while trying to build
a nanobsd image.
It dies during installworld in
cd /usr/src/etc/../share/man;
/usr/obj/nanobsd.full//usr/src/make.i386/make makedb
makewhatis /usr/obj/nanobsd.full//_.w/usr/share/man
makewhatis /usr/obj/nanobsd.full//_.w/usr/share/openssl/man
rm: /tmp/install.bqKyLzJg: Directory not empty
*** [installworld] Error code 1
1
2003 Jul 01
2
4.9R bug fix ?
Any chance someone can look at / commit the fix in PR 52349 before 4.9R ?
Its a simple fix. As it is to netstat, I dont know of anyone who 'owns'
that program to bug other than to make a general plea :-)
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications,
2003 Sep 15
1
Fwd: Re: [Full-Disclosure] new ssh exploit?
Has anyone around here heard of this ?
---Mike
>Subject: Re: [Full-Disclosure] new ssh exploit?
>From: christopher neitzert <chris@neitzert.com>
>Reply-To: chris@neitzert.com
>To: full-disclosure@lists.netsys.com
>X-Mailer: Ximian Evolution 1.4.3.99
>Sender: full-disclosure-admin@lists.netsys.com
>X-BeenThere: full-disclosure@lists.netsys.com
2006 Sep 28
1
OpenSSH DoS issue ?
Is the version in FreeBSD vulnerable ?
http://www.openssh.com/txt/release-4.4
I know version 1 is disabled by default, but if its not, does it
impact the daemon ?
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing
2003 Sep 23
1
NTP common code base ?
Cisco released an advisory about their ntp client and server having a bug
http://www.cisco.com/warp/public/707/NTP-pub.shtml
Is there a common code base at all that would have relevance to the code in
FreeBSD ? I noticed in the COPYRIGHT file cisco has made some contributions.
---Mike
--------------------------------------------------------------------
Mike Tancsa,
2003 Jul 29
1
kern/53717: 4.8-RELEASE kernel panic (page fault)
Some more crashes of 4.8-RELEASE.
Lets see what do I have today:
# ls -l /var/crash
total 1576676
-rw-r--r-- 1 root wheel 2 Jul 30 13:31 bounds
-rw-r--r-- 1 root wheel 2193252 Jun 25 17:30 kernel.0
-rw-r--r-- 1 root wheel 2193252 Jul 4 00:08 kernel.1
-rw-r--r-- 1 root wheel 2193252 Jul 15 19:28 kernel.2
-rw-r--r-- 1 root wheel 2193252 Jul 16 17:50 kernel.3
2008 Feb 13
3
AMD64 vs i386, ifstat and bsnmp
Couple of little things I noticed with a new RELENG_7 AMD64 box (as
of yesterday)
ifstat from the ports cannot seem to find interfaces for some reason
? It works fine on i386
[ns8]# ifstat -b
ifstat: no interfaces to monitor!
[ns8]#
[ns8]# ifconfig
em0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> metric 0 mtu 1500
2003 Jun 02
0
sbsize and local DoS issue via kernel panic
I noticed with active ftp clients (specifically IMP's .forward modification
plugin), an sbsize of something under 32M in /etc/login.conf on the target
server now gives
Can't create data socket (M-^A> (^A,_<F5>^R(^C): No buffer space available.
in the ftp logs. What is a safe value to prevent users from abusing the
system by eating up all mbufs ? There is a local DoS if
2008 Aug 21
0
working around TOE bug
I dont have too many production RELENG_7 boxes post TOE MFC, but on
the ones I do, apart from applying
# diff -u src/sys/netinet/tcp_offload.c src/sys/netinet/tcp_offload.c.disable
--- src/sys/netinet/tcp_offload.c 2008-07-31 18:25:51.000000000 -0400
+++ src/sys/netinet/tcp_offload.c.disable 2008-08-21
09:39:07.000000000 -0400
@@ -58,6 +58,8 @@
struct rtentry *rt;