From owner-freebsd-emulation Sun Aug 19 10:23:51 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id 122C837B413 for ; Sun, 19 Aug 2001 10:23:48 -0700 (PDT) (envelope-from des@ofug.org) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id TAA90193; Sun, 19 Aug 2001 19:23:43 +0200 (CEST) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: "PsyeX" Cc: Subject: Re: DOS Emulation without X? References: <008b01c12875$c359a000$0201a8c0@liquidforce.org> From: Dag-Erling Smorgrav Date: 19 Aug 2001 19:23:43 +0200 In-Reply-To: <008b01c12875$c359a000$0201a8c0@liquidforce.org> Message-ID: Lines: 12 User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/20.7 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org "PsyeX" writes: > Maybe it wouldnt be too difficult modifying doscmd to use plain old console. > > Thoughts? # cd /usr/src/usr.bin/doscmd # make cleandir # make -DNO_X all install DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Mon Aug 20 12:10:36 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from mailhub.unibe.ch (mailhub.unibe.ch [130.92.9.52]) by hub.freebsd.org (Postfix) with ESMTP id D4CFD37B415 for ; Mon, 20 Aug 2001 12:10:28 -0700 (PDT) (envelope-from roth@iamexwi.unibe.ch) Received: from CONVERSION-DAEMON by mailhub.unibe.ch (PMDF V5.2-32 #42480) id <0GID00F01RWK5N@mailhub.unibe.ch> for freebsd-emulation@freebsd.org; Mon, 20 Aug 2001 21:09:56 +0200 (MEST) Received: from iamexwi.unibe.ch (haegar.unibe.ch [130.92.71.10]) by mailhub.unibe.ch (PMDF V5.2-32 #42480) with ESMTP id <0GID00E1MRWJW1@mailhub.unibe.ch> for freebsd-emulation@freebsd.org; Mon, 20 Aug 2001 21:09:55 +0200 (MEST) Received: from arp.unibe.ch (arp [130.92.62.25]) by iamexwi.unibe.ch (8.9.3+Sun/8.8.8) with ESMTP id VAA26379 for ; Mon, 20 Aug 2001 21:13:07 +0200 (MET DST) Received: (from roth@localhost) by arp.unibe.ch (8.9.3+Sun/8.9.1) id VAA29424 for freebsd-emulation@freebsd.org; Mon, 20 Aug 2001 21:13:04 +0200 (MET DST) Date: Mon, 20 Aug 2001 21:13:04 +0200 From: Tobias Roth Subject: VMware2 gethostbyname() failed To: freebsd-emulation@freebsd.org Message-id: <20010820211304.A29391@arp.unibe.ch> MIME-version: 1.0 Content-type: text/plain; charset=us-ascii Content-disposition: inline Content-transfer-encoding: 7BIT User-Agent: Mutt/1.2.5i Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hello I installed the vmware2 port on a very recent FreeBSD stable. Here's the error I get: [roth@fatbitch ~] vmware -h Setting TMPDIR=/var/tmp. /usr/local/lib/vmware/bin/vmware: invalid option -- h Usage: /usr/local/lib/vmware/bin/vmware [-s name=value] [-qxX] [X toolkit options] [configfile] ----------- Error: This computer doesn't have a valid host name (gethostbyname() failed) yet it tries to lock remote file /home/roth/.vmware/preferences. Cannot lock the preferences file. Module 10 initialization failed. ----------- If I omit -h I get the same error, but vmware starts. I navigate through the configuration wizard, choose host-only networking, everything seems fine. I power on the virtual machine and get more errors: An error occurred while attempting to lock disk /opt/vmware/win2000.dsk. VMware Workstation cannot detect if other processes are using this disk at this time. If your disk is on a FAT filesystem, this message is harmless. You can press OK safely if you are certain that no other application is currently accessing the disk. The virtual disk is located on the same disk as the guest operating system, an UFS partition. I hit OK, and here's the next error: Your virtual machine is running with a disk "/opt/vmware/win2000.dsk" on a remote file system. Consequently, disk writes may be much slower compared to a disk stored on a local file system. You can improve performance by copying your disk file to a local file system. I hit OK again, and the system starts booting. Wasn't able to install an OS yet, but that might be a different problem. Oh, and the preferences file will not be saved. Anyone knows what's wrong? I have run vmware.sh and rtc.sh from /usr/local/etc/rc.d and linproc is mounted. cheers, Tobe To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Wed Aug 22 12:29:23 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from duke.cs.duke.edu (duke.cs.duke.edu [152.3.140.1]) by hub.freebsd.org (Postfix) with ESMTP id 3FA3437B434; Wed, 22 Aug 2001 12:23:53 -0700 (PDT) (envelope-from gallatin@cs.duke.edu) Received: from grasshopper.cs.duke.edu (grasshopper.cs.duke.edu [152.3.145.30]) by duke.cs.duke.edu (8.9.3/8.9.3) with ESMTP id PAA04778; Wed, 22 Aug 2001 15:23:51 -0400 (EDT) Received: (from gallatin@localhost) by grasshopper.cs.duke.edu (8.11.3/8.9.1) id f7MJNMa57668; Wed, 22 Aug 2001 15:23:22 -0400 (EDT) (envelope-from gallatin@cs.duke.edu) From: Andrew Gallatin MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15236.1706.531042.974240@grasshopper.cs.duke.edu> Date: Wed, 22 Aug 2001 15:23:22 -0400 (EDT) To: marcel@freebsd.org Cc: freebsd-emulation@freebsd.org Subject: please review- linulator getcwd bugfix X-Mailer: VM 6.75 under 21.1 (patch 12) "Channel Islands" XEmacs Lucid Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Currently, linux_getcwd() is broken. It calls __getcwd(). __getcwd() is essentially an optimiziation on FreeBSD. If the cwd is in the namei cache, then it returns it & saves libc a lot of trouble. However, linux expects it to always succeed. When it fails, linux apps end up with an error condition they don't expect, and strange and bizzare things can happen (like trying to open files in / rather than in /some/path/name). This happens often when running programs compiled by the compaq linux/alpha Fortran compiler. See kern/24315 for a concise description of the problem. I've appended a fix using an in-kernel getcwd obtained from NetBSD by way of OpenBSD. I try the old __getdents() way first, and then try the more heavy-handed approach. Please review. Thanks, Drew Index: modules/linux/Makefile =================================================================== RCS file: /home/ncvs/src/sys/modules/linux/Makefile,v retrieving revision 1.51 diff -u -r1.51 Makefile --- modules/linux/Makefile 2001/02/04 10:52:24 1.51 +++ modules/linux/Makefile 2001/08/22 17:25:49 @@ -5,8 +5,8 @@ .PATH: ${.CURDIR}/../../compat/linux ${.CURDIR}/../../${MACHINE_ARCH}/linux KMOD= linux -SRCS= linux_file.c linux_ioctl.c linux_ipc.c linux_machdep.c linux_misc.c \ - linux_signal.c linux_socket.c linux_stats.c linux_mib.c \ +SRCS= linux_file.c linux_getcwd.c linux_ioctl.c linux_ipc.c linux_machdep.c \ + linux_misc.c linux_signal.c linux_socket.c linux_stats.c linux_mib.c \ linux_dummy.c linux_sysent.c linux_sysvec.c linux_util.c \ opt_compat.h opt_linux.h opt_vmpage.h vnode_if.h OBJS= linux_locore.o Index: conf/files.alpha =================================================================== RCS file: /home/ncvs/src/sys/conf/files.alpha,v retrieving revision 1.69 diff -u -r1.69 files.alpha --- conf/files.alpha 2001/08/02 13:22:28 1.69 +++ conf/files.alpha 2001/08/22 19:10:06 @@ -170,6 +170,7 @@ alpha/tlsb/tlsbmem.c optional dec_kn8ae alpha/tlsb/zs_tlsb.c optional dec_kn8ae compat/linux/linux_file.c optional compat_linux +compat/linux/linux_getcwd.c optional compat_linux compat/linux/linux_ioctl.c optional compat_linux compat/linux/linux_ipc.c optional compat_linux compat/linux/linux_mib.c optional compat_linux Index: conf/files.i386 =================================================================== RCS file: /home/ncvs/src/sys/conf/files.i386,v retrieving revision 1.369 diff -u -r1.369 files.i386 --- conf/files.i386 2001/08/09 00:02:30 1.369 +++ conf/files.i386 2001/08/22 19:10:34 @@ -57,6 +57,7 @@ no-implicit-rule # compat/linux/linux_file.c optional compat_linux +compat/linux/linux_getcwd.c optional compat_linux compat/linux/linux_ioctl.c optional compat_linux compat/linux/linux_ipc.c optional compat_linux compat/linux/linux_mib.c optional compat_linux Index: compat/linux/linux_file.c =================================================================== RCS file: /home/ncvs/src/sys/compat/linux/linux_file.c,v retrieving revision 1.53 diff -u -r1.53 linux_file.c --- compat/linux/linux_file.c 2001/05/01 08:11:51 1.53 +++ compat/linux/linux_file.c 2001/08/22 17:04:10 @@ -830,34 +830,6 @@ return link(p, &bsd); } -int -linux_getcwd(struct proc *p, struct linux_getcwd_args *args) -{ - struct __getcwd_args bsd; - caddr_t sg; - int error, len; - -#ifdef DEBUG - if (ldebug(getcwd)) - printf(ARGS(getcwd, "%p, %ld"), args->buf, args->bufsize); -#endif - - sg = stackgap_init(); - bsd.buf = stackgap_alloc(&sg, SPARE_USRSPACE); - bsd.buflen = SPARE_USRSPACE; - error = __getcwd(p, &bsd); - if (!error) { - len = strlen(bsd.buf) + 1; - if (len <= args->bufsize) { - p->p_retval[0] = len; - error = copyout(bsd.buf, args->buf, len); - } - else - error = ERANGE; - } - return (error); -} - #ifndef __alpha__ int linux_fdatasync(p, uap) --- /dev/null Wed Aug 22 15:03:56 2001 +++ compat/linux/linux_getcwd.c Wed Aug 22 13:07:21 2001 @@ -0,0 +1,466 @@ +/* $FreeBSD$ */ +/* $OpenBSD: linux_getcwd.c,v 1.2 2001/05/16 12:50:21 ho Exp $ */ +/* $NetBSD: vfs_getcwd.c,v 1.3.2.3 1999/07/11 10:24:09 sommerfeld Exp $ */ + +/*- + * Copyright (c) 1999 The NetBSD Foundation, Inc. + * All rights reserved. + * + * This code is derived from software contributed to The NetBSD Foundation + * by Bill Sommerfeld. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. All advertising materials mentioning features or use of this software + * must display the following acknowledgement: + * This product includes software developed by the NetBSD + * Foundation, Inc. and its contributors. + * 4. Neither the name of The NetBSD Foundation nor the names of its + * contributors may be used to endorse or promote products derived + * from this software without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS + * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED + * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR + * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS + * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR + * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF + * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS + * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN + * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE + * POSSIBILITY OF SUCH DAMAGE. + */ +#include "opt_compat.h" + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include /* XXX only for DIRBLKSIZ */ + +#include +#include +#include + +static int +linux_getcwd_scandir __P((struct vnode **, struct vnode **, + char **, char *, struct proc *)); +static int +linux_getcwd_common __P((struct vnode *, struct vnode *, + char **, char *, int, int, struct proc *)); + +#define DIRENT_MINSIZE (sizeof(struct dirent) - (MAXNAMLEN+1) + 4) + +/* + * Vnode variable naming conventions in this file: + * + * rvp: the current root we're aiming towards. + * lvp, *lvpp: the "lower" vnode + * uvp, *uvpp: the "upper" vnode. + * + * Since all the vnodes we're dealing with are directories, and the + * lookups are going *up* in the filesystem rather than *down*, the + * usual "pvp" (parent) or "dvp" (directory) naming conventions are + * too confusing. + */ + +/* + * XXX Will infinite loop in certain cases if a directory read reliably + * returns EINVAL on last block. + * XXX is EINVAL the right thing to return if a directory is malformed? + */ + +/* + * XXX Untested vs. mount -o union; probably does the wrong thing. + */ + +/* + * Find parent vnode of *lvpp, return in *uvpp + * + * If we care about the name, scan it looking for name of directory + * entry pointing at lvp. + * + * Place the name in the buffer which starts at bufp, immediately + * before *bpp, and move bpp backwards to point at the start of it. + * + * On entry, *lvpp is a locked vnode reference; on exit, it is vput and NULL'ed + * On exit, *uvpp is either NULL or is a locked vnode reference. + */ +static int +linux_getcwd_scandir(lvpp, uvpp, bpp, bufp, p) + struct vnode **lvpp; + struct vnode **uvpp; + char **bpp; + char *bufp; + struct proc *p; +{ + int error = 0; + int eofflag; + off_t off; + int tries; + struct uio uio; + struct iovec iov; + char *dirbuf = NULL; + int dirbuflen; + ino_t fileno; + struct vattr va; + struct vnode *uvp = NULL; + struct vnode *lvp = *lvpp; + struct componentname cn; + int len, reclen; + tries = 0; + + /* + * If we want the filename, get some info we need while the + * current directory is still locked. + */ + if (bufp != NULL) { + error = VOP_GETATTR(lvp, &va, p->p_ucred, p); + if (error) { + vput(lvp); + *lvpp = NULL; + *uvpp = NULL; + return error; + } + } + + /* + * Ok, we have to do it the hard way.. + * Next, get parent vnode using lookup of .. + */ + cn.cn_nameiop = LOOKUP; + cn.cn_flags = ISLASTCN | ISDOTDOT | RDONLY; + cn.cn_proc = p; + cn.cn_cred = p->p_ucred; + cn.cn_pnbuf = NULL; + cn.cn_nameptr = ".."; + cn.cn_namelen = 2; + cn.cn_consume = 0; + + /* + * At this point, lvp is locked and will be unlocked by the lookup. + * On successful return, *uvpp will be locked + */ + error = VOP_LOOKUP(lvp, uvpp, &cn); + if (error) { + vput(lvp); + *lvpp = NULL; + *uvpp = NULL; + return error; + } + uvp = *uvpp; + + /* If we don't care about the pathname, we're done */ + if (bufp == NULL) { + vrele(lvp); + *lvpp = NULL; + return 0; + } + + fileno = va.va_fileid; + + dirbuflen = DIRBLKSIZ; + if (dirbuflen < va.va_blocksize) + dirbuflen = va.va_blocksize; + dirbuf = (char *)malloc(dirbuflen, M_TEMP, M_WAITOK); + +#if 0 +unionread: +#endif + off = 0; + do { + /* call VOP_READDIR of parent */ + iov.iov_base = dirbuf; + iov.iov_len = dirbuflen; + + uio.uio_iov = &iov; + uio.uio_iovcnt = 1; + uio.uio_offset = off; + uio.uio_resid = dirbuflen; + uio.uio_segflg = UIO_SYSSPACE; + uio.uio_rw = UIO_READ; + uio.uio_procp = p; + + eofflag = 0; + + error = VOP_READDIR(uvp, &uio, p->p_ucred, &eofflag, 0, 0); + + off = uio.uio_offset; + + /* + * Try again if NFS tosses its cookies. + * XXX this can still loop forever if the directory is busted + * such that the second or subsequent page of it always + * returns EINVAL + */ + if ((error == EINVAL) && (tries < 3)) { + off = 0; + tries++; + continue; /* once more, with feeling */ + } + + if (!error) { + char *cpos; + struct dirent *dp; + + cpos = dirbuf; + tries = 0; + + /* scan directory page looking for matching vnode */ + for (len = (dirbuflen - uio.uio_resid); len > 0; len -= reclen) { + dp = (struct dirent *) cpos; + reclen = dp->d_reclen; + + /* check for malformed directory.. */ + if (reclen < DIRENT_MINSIZE) { + error = EINVAL; + goto out; + } + /* + * XXX should perhaps do VOP_LOOKUP to + * check that we got back to the right place, + * but getting the locking games for that + * right would be heinous. + */ + if ((dp->d_type != DT_WHT) && + (dp->d_fileno == fileno)) { + char *bp = *bpp; + bp -= dp->d_namlen; + + if (bp <= bufp) { + error = ERANGE; + goto out; + } + bcopy(dp->d_name, bp, dp->d_namlen); + error = 0; + *bpp = bp; + goto out; + } + cpos += reclen; + } + } + } while (!eofflag); + error = ENOENT; + +out: + vrele(lvp); + *lvpp = NULL; + free(dirbuf, M_TEMP); + return error; +} + + +/* + * common routine shared by sys___getcwd() and linux_vn_isunder() + */ + +#define GETCWD_CHECK_ACCESS 0x0001 + +static int +linux_getcwd_common (lvp, rvp, bpp, bufp, limit, flags, p) + struct vnode *lvp; + struct vnode *rvp; + char **bpp; + char *bufp; + int limit; + int flags; + struct proc *p; +{ + struct filedesc *fdp = p->p_fd; + struct vnode *uvp = NULL; + char *bp = NULL; + int error; + int perms = VEXEC; + + if (rvp == NULL) { + rvp = fdp->fd_rdir; + if (rvp == NULL) + rvp = rootvnode; + } + + VREF(rvp); + VREF(lvp); + + /* + * Error handling invariant: + * Before a `goto out': + * lvp is either NULL, or locked and held. + * uvp is either NULL, or locked and held. + */ + + error = vn_lock(lvp, LK_EXCLUSIVE | LK_RETRY, p); + if (error) { + vrele(lvp); + lvp = NULL; + goto out; + } + if (bufp) + bp = *bpp; + /* + * this loop will terminate when one of the following happens: + * - we hit the root + * - getdirentries or lookup fails + * - we run out of space in the buffer. + */ + if (lvp == rvp) { + if (bp) + *(--bp) = '/'; + goto out; + } + do { + if (lvp->v_type != VDIR) { + error = ENOTDIR; + goto out; + } + + /* + * access check here is optional, depending on + * whether or not caller cares. + */ + if (flags & GETCWD_CHECK_ACCESS) { + error = VOP_ACCESS(lvp, perms, p->p_ucred, p); + if (error) + goto out; + perms = VEXEC|VREAD; + } + + /* + * step up if we're a covered vnode.. + */ + while (lvp->v_flag & VROOT) { + struct vnode *tvp; + + if (lvp == rvp) + goto out; + + tvp = lvp; + lvp = lvp->v_mount->mnt_vnodecovered; + vput(tvp); + /* + * hodie natus est radici frater + */ + if (lvp == NULL) { + error = ENOENT; + goto out; + } + VREF(lvp); + error = vn_lock(lvp, LK_EXCLUSIVE | LK_RETRY, p); + if (error != 0) { + vrele(lvp); + lvp = NULL; + goto out; + } + } + error = linux_getcwd_scandir(&lvp, &uvp, &bp, bufp, p); + if (error) + goto out; +#if DIAGNOSTIC + if (lvp != NULL) + panic("getcwd: oops, forgot to null lvp"); + if (bufp && (bp <= bufp)) { + panic("getcwd: oops, went back too far"); + } +#endif + if (bp) + *(--bp) = '/'; + lvp = uvp; + uvp = NULL; + limit--; + } while ((lvp != rvp) && (limit > 0)); + +out: + if (bpp) + *bpp = bp; + if (uvp) + vput(uvp); + if (lvp) + vput(lvp); + vrele(rvp); + return error; +} + + +/* + * Find pathname of process's current directory. + * + * Use vfs vnode-to-name reverse cache; if that fails, fall back + * to reading directory contents. + */ + +int +linux_getcwd(struct proc *p, struct linux_getcwd_args *args) +{ + struct __getcwd_args bsd; + caddr_t sg, bp, bend, path; + int error, len, lenused; + +#ifdef DEBUG + printf("Linux-emul(%ld): getcwd(%p, %ld)\n", (long)p->p_pid, + args->buf, args->bufsize); +#endif + + sg = stackgap_init(); + bsd.buf = stackgap_alloc(&sg, SPARE_USRSPACE); + bsd.buflen = SPARE_USRSPACE; + error = __getcwd(p, &bsd); + if (!error) { + lenused = strlen(bsd.buf) + 1; + if (lenused <= args->bufsize) { + p->p_retval[0] = lenused; + error = copyout(bsd.buf, args->buf, lenused); + } + else + error = ERANGE; + } else { + len = args->bufsize; + + if (len > MAXPATHLEN*4) + len = MAXPATHLEN*4; + else if (len < 2) + return ERANGE; + + path = (char *)malloc(len, M_TEMP, M_WAITOK); + + bp = &path[len]; + bend = bp; + *(--bp) = '\0'; + + /* + * 5th argument here is "max number of vnodes to traverse". + * Since each entry takes up at least 2 bytes in the output buffer, + * limit it to N/2 vnodes for an N byte buffer. + */ + + error = linux_getcwd_common (p->p_fd->fd_cdir, NULL, + &bp, path, len/2, GETCWD_CHECK_ACCESS, p); + + if (error) + goto out; + lenused = bend - bp; + p->p_retval[0] = lenused; + /* put the result into user buffer */ + error = copyout(bp, args->buf, lenused); + +out: + free(path, M_TEMP); + } + return (error); +} + To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Wed Aug 22 12:33:10 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from ns.yogotech.com (ns.yogotech.com [206.127.123.66]) by hub.freebsd.org (Postfix) with ESMTP id B9F2C37B412; Wed, 22 Aug 2001 12:33:02 -0700 (PDT) (envelope-from nate@yogotech.com) Received: from nomad.yogotech.com (nomad.yogotech.com [206.127.123.131]) by ns.yogotech.com (8.9.3/8.9.3) with ESMTP id NAA12863; Wed, 22 Aug 2001 13:32:56 -0600 (MDT) (envelope-from nate@nomad.yogotech.com) Received: (from nate@localhost) by nomad.yogotech.com (8.8.8/8.8.8) id NAA11260; Wed, 22 Aug 2001 13:32:56 -0600 (MDT) (envelope-from nate) From: Nate Williams MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15236.2279.652526.100091@nomad.yogotech.com> Date: Wed, 22 Aug 2001 13:32:55 -0600 To: Andrew Gallatin Cc: marcel@FreeBSD.ORG, freebsd-emulation@FreeBSD.ORG Subject: Re: please review- linulator getcwd bugfix In-Reply-To: <15236.1706.531042.974240@grasshopper.cs.duke.edu> References: <15236.1706.531042.974240@grasshopper.cs.duke.edu> X-Mailer: VM 6.95 under 21.1 (patch 12) "Channel Islands" XEmacs Lucid Reply-To: nate@yogotech.com (Nate Williams) Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org > Currently, linux_getcwd() is broken. It calls __getcwd(). __getcwd() > is essentially an optimiziation on FreeBSD. If the cwd is in the > namei cache, then it returns it & saves libc a lot of trouble. > However, linux expects it to always succeed. When it fails, linux > apps end up with an error condition they don't expect, and strange and > bizzare things can happen (like trying to open files in / rather than > in /some/path/name). This happens often when running programs > compiled by the compaq linux/alpha Fortran compiler. I think this also bites the Linux-Java binaries as well, especially during bootstrapping issues compiling the native version. Thanks for fixing this Drew!!! Nate To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Wed Aug 22 12:40:55 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from duke.cs.duke.edu (duke.cs.duke.edu [152.3.140.1]) by hub.freebsd.org (Postfix) with ESMTP id AC1B937B412; Wed, 22 Aug 2001 12:40:49 -0700 (PDT) (envelope-from gallatin@cs.duke.edu) Received: from grasshopper.cs.duke.edu (grasshopper.cs.duke.edu [152.3.145.30]) by duke.cs.duke.edu (8.9.3/8.9.3) with ESMTP id PAA05345; Wed, 22 Aug 2001 15:40:47 -0400 (EDT) Received: (from gallatin@localhost) by grasshopper.cs.duke.edu (8.11.3/8.9.1) id f7MJeJc57807; Wed, 22 Aug 2001 15:40:19 -0400 (EDT) (envelope-from gallatin@cs.duke.edu) From: Andrew Gallatin MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15236.2723.81080.759599@grasshopper.cs.duke.edu> Date: Wed, 22 Aug 2001 15:40:19 -0400 (EDT) To: nate@yogotech.com (Nate Williams) Cc: marcel@FreeBSD.ORG, freebsd-emulation@FreeBSD.ORG Subject: Re: please review- linulator getcwd bugfix In-Reply-To: <15236.2279.652526.100091@nomad.yogotech.com> References: <15236.1706.531042.974240@grasshopper.cs.duke.edu> <15236.2279.652526.100091@nomad.yogotech.com> X-Mailer: VM 6.75 under 21.1 (patch 12) "Channel Islands" XEmacs Lucid Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Nate Williams writes: > > I think this also bites the Linux-Java binaries as well, especially > during bootstrapping issues compiling the native version. > > Thanks for fixing this Drew!!! Excellent! You've tested it, I assume? What I really want is a VFS guru to look it over. I figure since it came from Open/NetBSD it can't be bad, but I'm not familiar enough with the VFS layer to commit it yet. Which sucks, because I'd really like to see it in 4.4-R. Drew To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Wed Aug 22 12:44:37 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from ns.yogotech.com (ns.yogotech.com [206.127.123.66]) by hub.freebsd.org (Postfix) with ESMTP id 5BCE337B41F; Wed, 22 Aug 2001 12:44:02 -0700 (PDT) (envelope-from nate@yogotech.com) Received: from nomad.yogotech.com (nomad.yogotech.com [206.127.123.131]) by ns.yogotech.com (8.9.3/8.9.3) with ESMTP id NAA13104; Wed, 22 Aug 2001 13:43:58 -0600 (MDT) (envelope-from nate@nomad.yogotech.com) Received: (from nate@localhost) by nomad.yogotech.com (8.8.8/8.8.8) id NAA11338; Wed, 22 Aug 2001 13:43:58 -0600 (MDT) (envelope-from nate) From: Nate Williams MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15236.2941.926321.873693@nomad.yogotech.com> Date: Wed, 22 Aug 2001 13:43:57 -0600 To: Andrew Gallatin Cc: nate@yogotech.com (Nate Williams), marcel@FreeBSD.ORG, freebsd-emulation@FreeBSD.ORG Subject: Re: please review- linulator getcwd bugfix In-Reply-To: <15236.2723.81080.759599@grasshopper.cs.duke.edu> References: <15236.1706.531042.974240@grasshopper.cs.duke.edu> <15236.2279.652526.100091@nomad.yogotech.com> <15236.2723.81080.759599@grasshopper.cs.duke.edu> X-Mailer: VM 6.95 under 21.1 (patch 12) "Channel Islands" XEmacs Lucid Reply-To: nate@yogotech.com (Nate Williams) Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org > > I think this also bites the Linux-Java binaries as well, especially > > during bootstrapping issues compiling the native version. > > > > Thanks for fixing this Drew!!! > > Excellent! You've tested it, I assume? Not yet, I'm not *quite* that speedy. However, I'm patching my kernel as we speak. :) [ I've not personally run into this problem, but I did forward it to the java mailing list in hopes of getting those folks to test it out. ] > What I really want is a VFS guru to look it over. I figure since it > came from Open/NetBSD it can't be bad, but I'm not familiar enough > with the VFS layer to commit it yet. Which sucks, because I'd really > like to see it in 4.4-R. I'm not that person. :( Nate To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Wed Aug 22 15:48:35 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from hornet.daps.dla.mil (hornet.daps.dla.mil [214.3.146.97]) by hub.freebsd.org (Postfix) with SMTP id DD4AA37B443 for ; Wed, 22 Aug 2001 15:48:32 -0700 (PDT) (envelope-from domains-sales@usa.net) Received: FROM plain BY hornet.daps.dla.mil ; Wed Aug 22 18:43:49 2001 -0400 From: domainsdept@usa.net To: emulation@freebsd.org Subject: Sex Domains. Register .Sex today! Date: Wed, 22 Aug 2001 23:44:23 Mime-Version: 1.0 Content-Type: text/plain; charset="DEFAULT_CHARSET" X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2919.6700 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Message-Id: <20010822224832.DD4AA37B443@hub.freebsd.org> Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org The latest domain name extension has arrived .SEX!!! It's the fresh ,new, exciting web address that is taking the world by storm. Who wants to be .com when you can now be .SEX Register your .SEX domain name today exclusively at: http://www.dotsex.com ------------------------------------------------------------------------- To be taken off the mailing list please click below: http://www.dotsex.com/unsubscribe.phtml To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message From owner-freebsd-emulation Thu Aug 23 2:37:16 2001 Delivered-To: freebsd-emulation@freebsd.org Received: from teeny.ispadmin.com (teeny.ispadmin.com [216.98.128.68]) by hub.freebsd.org (Postfix) with ESMTP id 15FAA37B407 for ; Thu, 23 Aug 2001 02:37:13 -0700 (PDT) (envelope-from webmaster@deskwise.com) Received: from good-1i7arap91v (la-151-118.dialup.cari.net [216.98.151.118]) by teeny.ispadmin.com (8.9.0/8.9.0) with SMTP id CAA17298 for ; Thu, 23 Aug 2001 02:37:11 -0700 (PDT) Message-Id: <200108230937.CAA17298@teeny.ispadmin.com> From: "DeskWise.com Auction" To: Subject: Free Auction Site Date: Thu, 23 Aug 2001 02:40:18 -0700 X-Mailer: Nico's Mailer MIME-Version: 1.0 Content-type: text/plain; charset=US-ASCII Sender: owner-freebsd-emulation@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org DeskWise.com Proudly Presents Free Auction Site http://www.DeskWise.com/Auction Thank you. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-emulation" in the body of the message