From admin@courtney.linkline.com  Wed Dec 26 10:49:45 2001
Return-Path: <admin@courtney.linkline.com>
Received: from courtney.linkline.com (courtney.linkline.com [64.30.215.33])
	by hub.freebsd.org (Postfix) with SMTP id E1D7537B405
	for <FreeBSD-gnats-submit@freebsd.org>; Wed, 26 Dec 2001 10:49:44 -0800 (PST)
Received: (qmail 98318 invoked by uid 0); 26 Dec 2001 18:49:44 -0000
Message-Id: <20011226184944.98317.qmail@courtney.linkline.com>
Date: 26 Dec 2001 18:49:44 -0000
From: Doug Clements <doug@linkline.com>
Reply-To: Doug@courtney.linkline.com, Clements <doug@linkline.com
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: "got bad cookie" errors on NFS client
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         33203
>Category:       kern
>Synopsis:       [nfs] "got bad cookie" errors on NFS client
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Dec 26 10:50:00 PST 2001
>Closed-Date:    Sat Apr 23 07:02:59 UTC 2011
>Last-Modified:  Sat Apr 23 07:02:59 UTC 2011
>Originator:     Doug Clements
>Release:        FreeBSD 4.4-RELEASE i386
>Organization:
LinkLine Communications
>Environment:
System: FreeBSD courtney.linkline.com 4.4-RELEASE FreeBSD 4.4-RELEASE #1: Mon Nov 26 19:36:25 PST 2001 admin@courtney.linkline.com:/usr/src/sys/compile/COURTNEY i386

	
>Description:
I have a FreeBSD 4.4 NFS server with FreeBSD 4.4 clients. There are 3 clients, interconnected with a Intel Gigibit fiber cards and Intel Gigabit copper cards.

Under medium to heavy load, all clients will get the following messages in the messages log:
Dec 25 18:39:31 courtney /kernel: got bad cookie vp 0xcee5b200 bp 0xc64fdc88

The vp and bp change, and it appears to be causing corruption in a text user file (only a single machine is updating the file, the rest are reading)

>How-To-Repeat:
Install FreeBSD 4.4-RELEASE on 3 machines. Have one act as an NFS server, the other 2 clients. Connect the clients directly to the server with crossover cables. Set up a qmail+vpopmail setup with cdb files, having the user database on the NFS server, along with the mail.

Create a bunch of domains (100+) with a bunch of users (5000+) in each domain, and start devliering mail with one NFS client, while the other is in charge of webmail, pop, and imap (checking mail). While under load, attempt to update the user file with vi, or the included vpopmail programs.

The flat-text user files will get corrupted, and the above error messages will show up on the client machines.

>Fix:

None known. considering moving to SQL authentication instead of cdb.
>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: freebsd-bugs->dillon 
Responsible-Changed-By: silby 
Responsible-Changed-When: Tue Jan 8 18:05:25 PST 2002 
Responsible-Changed-Why:  
Over to Mr. NFS, Dillon 

http://www.FreeBSD.org/cgi/query-pr.cgi?pr=33203 

From: "Doug Clements" <doug@linkline.com>
To: <FreeBSD-gnats-submit@freebsd.org>
Cc:  
Subject: Re: kern/33203: "got bad cookie" errors on NFS client
Date: Thu, 27 Jun 2002 15:24:45 -0700

 Well, I finally seemed to have gotton rid of the errors by installing the
 intel drivers for the gigabit nics, using jumbo frames (mtu 9000), setting
 an 8k read and write size for the NFS mount, and using TCP instead of UDP.
 
 This probably won't help much for the problem, but might help someone in the
 same situation.
 
 --Doug
 
 ----- Original Message -----
 From: "Doug Clements" <doug@linkline.com>
 To: <FreeBSD-gnats-submit@freebsd.org>
 Sent: Wednesday, December 26, 2001 11:49 AM
 Subject: kern/33203: "got bad cookie" errors on NFS client
 
 
 >
 > >Number:         33203
 > >Category:       kern
 > >Synopsis:       "got bad cookie" errors on NFS client
 > >Confidential:   no
 > >Severity:       non-critical
 > >Priority:       medium
 > >Responsible:    freebsd-bugs
 > >State:          open
 > >Quarter:
 > >Keywords:
 > >Date-Required:
 > >Class:          sw-bug
 > >Submitter-Id:   current-users
 > >Arrival-Date:   Wed Dec 26 10:50:00 PST 2001
 > >Closed-Date:
 > >Last-Modified:
 > >Originator:     Doug Clements
 > >Release:        FreeBSD 4.4-RELEASE i386
 > >Organization:
 > LinkLine Communications
 > >Environment:
 > System: FreeBSD courtney.linkline.com 4.4-RELEASE FreeBSD 4.4-RELEASE #1:
 Mon Nov 26 19:36:25 PST 2001
 admin@courtney.linkline.com:/usr/src/sys/compile/COURTNEY i386
 >
 >
 > >Description:
 > I have a FreeBSD 4.4 NFS server with FreeBSD 4.4 clients. There are 3
 clients, interconnected with a Intel Gigibit fiber cards and Intel Gigabit
 copper cards.
 >
 > Under medium to heavy load, all clients will get the following messages in
 the messages log:
 > Dec 25 18:39:31 courtney /kernel: got bad cookie vp 0xcee5b200 bp
 0xc64fdc88
 >
 > The vp and bp change, and it appears to be causing corruption in a text
 user file (only a single machine is updating the file, the rest are reading)
 >
 > >How-To-Repeat:
 > Install FreeBSD 4.4-RELEASE on 3 machines. Have one act as an NFS server,
 the other 2 clients. Connect the clients directly to the server with
 crossover cables. Set up a qmail+vpopmail setup with cdb files, having the
 user database on the NFS server, along with the mail.
 >
 > Create a bunch of domains (100+) with a bunch of users (5000+) in each
 domain, and start devliering mail with one NFS client, while the other is in
 charge of webmail, pop, and imap (checking mail). While under load, attempt
 to update the user file with vi, or the included vpopmail programs.
 >
 > The flat-text user files will get corrupted, and the above error messages
 will show up on the client machines.
 >
 > >Fix:
 >
 > None known. considering moving to SQL authentication instead of cdb.
 > >Release-Note:
 > >Audit-Trail:
 > >Unformatted:
 >
 > To Unsubscribe: send mail to majordomo@FreeBSD.org
 > with "unsubscribe freebsd-bugs" in the body of the message
 >
 

From: Lars Eggert <larse@ISI.EDU>
To: freebsd-gnats-submit@FreeBSD.org, Doug@courtney.linkline.com,
	dillon@freebsd.org
Cc:  
Subject: Re: kern/33203: "got bad cookie" errors on NFS client
Date: Thu, 19 Sep 2002 10:19:17 -0700

 This is a cryptographically signed message in MIME format.
 
 --------------ms010602050309050705060903
 Content-Type: text/plain; charset=us-ascii; format=flowed
 Content-Transfer-Encoding: 7bit
 
 Hi,
 
 I can readily reproduce this with two 4.6-RELEASE machines (one client, 
 one server), and have the client run bonnie++ from ports:
 
 [larse@nik: ~] bonnie++ -d/mnt -s 10
 Writing with putc()...done
 Writing intelligently...done
 Rewriting...done
 Reading with getc()...done
 Reading intelligently...done
 start 'em...done...done...done...
 Create files in sequential order...done.
 Stat files in sequential order...done.
 Delete files in sequential order...Bonnie: drastic I/O error (rmdir): 
 Directory not empty
 Cleaning up test directory after error.
 Bonnie: drastic I/O error (rmdir): No such file or directory
 
 During the "Delete files in sequential order"-phase, I get tons of "got 
 bad cookie vp" messages on the client:
 
 Sep 19 10:12:43 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfdf0bac
 Sep 19 10:12:43 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfcd7e00
 Sep 19 10:12:44 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfe00360
 Sep 19 10:12:44 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfea5a4c
 Sep 19 10:12:44 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfe40680
 Sep 19 10:12:44 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfce7998
 Sep 19 10:12:45 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfe6b870
 Sep 19 10:12:45 nik /kernel: got bad cookie vp 0xeab2e5c0 bp 0xcfd46074
 ...
 
 Lars
 -- 
 Lars Eggert <larse@isi.edu>           USC Information Sciences Institute
 
 --------------ms010602050309050705060903
 Content-Type: application/x-pkcs7-signature; name="smime.p7s"
 Content-Transfer-Encoding: base64
 Content-Disposition: attachment; filename="smime.p7s"
 Content-Description: S/MIME Cryptographic Signature
 
 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJtjCC
 AzgwggKhoAMCAQICEGZFcrfMdPXPY3ZFhNAukQEwDQYJKoZIhvcNAQEEBQAwgdExCzAJBgNV
 BAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEaMBgG
 A1UEChMRVGhhd3RlIENvbnN1bHRpbmcxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vydmlj
 ZXMgRGl2aXNpb24xJDAiBgNVBAMTG1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFpbCBDQTErMCkG
 CSqGSIb3DQEJARYccGVyc29uYWwtZnJlZW1haWxAdGhhd3RlLmNvbTAeFw0wMDA4MzAwMDAw
 MDBaFw0wNDA4MjcyMzU5NTlaMIGSMQswCQYDVQQGEwJaQTEVMBMGA1UECBMMV2VzdGVybiBD
 YXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xDzANBgNVBAoTBlRoYXd0ZTEdMBsGA1UECxMUQ2Vy
 dGlmaWNhdGUgU2VydmljZXMxKDAmBgNVBAMTH1BlcnNvbmFsIEZyZWVtYWlsIFJTQSAyMDAw
 LjguMzAwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAN4zMqZjxwklRT7SbngnZ4HF2ogZ
 gpcO40QpimM1Km1wPPrcrvfudG8wvDOQf/k0caCjbZjxw0+iZdsN+kvx1t1hpfmFzVWaNRqd
 knWoJ67Ycvm6AvbXsJHeHOmr4BgDqHxDQlBRh4M88Dm0m1SKE4f/s5udSWYALQmJ7JRr6aFp
 AgMBAAGjTjBMMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFQcml2YXRlTGFiZWwxLTI5NzAS
 BgNVHRMBAf8ECDAGAQH/AgEAMAsGA1UdDwQEAwIBBjANBgkqhkiG9w0BAQQFAAOBgQAxsUtH
 XfkBceX1U2xdedY9mMAmE2KBIqcS+CKV6BtJtyd7BDm6/ObyJOuR+r3sDSo491BVqGz3Da1M
 G7wD9LXrokefbKIMWI0xQgkRbLAaadErErJAXWr5edDqLiXdiuT82w0fnQLzWtvKPPZE6iZp
 h39Ins6ln+eE2MliYq0FxjCCAzkwggKioAMCAQICAwglQTANBgkqhkiG9w0BAQQFADCBkjEL
 MAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3du
 MQ8wDQYDVQQKEwZUaGF3dGUxHTAbBgNVBAsTFENlcnRpZmljYXRlIFNlcnZpY2VzMSgwJgYD
 VQQDEx9QZXJzb25hbCBGcmVlbWFpbCBSU0EgMjAwMC44LjMwMB4XDTAyMDgyNDE4NTMzOVoX
 DTAzMDgyNDE4NTMzOVowVDEPMA0GA1UEBBMGRWdnZXJ0MQ0wCwYDVQQqEwRMYXJzMRQwEgYD
 VQQDEwtMYXJzIEVnZ2VydDEcMBoGCSqGSIb3DQEJARYNbGFyc2VAaXNpLmVkdTCCASIwDQYJ
 KoZIhvcNAQEBBQADggEPADCCAQoCggEBANI2Rrt4ggaQ/IrOsDeOm2H4/R5FRIL6JjDY3StE
 aogp1r23WKniQ1Vj98Nu5WxlaZ3Iam3Jen5T66H8u7rtMNpK4qAeAGoBsVeyVr1+CTFeuv+m
 xCh7BvBJwhLdm0zDaoDT05YKYZaqtsT+F286FWJQg31Xtf+vTKLVVrHcsafnteyal2NEt7Ac
 yZZfjsVLwxp2Lq3cwYfRQRoo7/yCVzS7HsgM6jmbO4taEMo4yC2rpnUbWEUCDTaCYgpAXzAl
 oiNk7GDh0wz2s5ZSnHRvNSBMAjCmpNtSYHfXFI1ANwrrrHIJ7Ei83+XN32PWY4OPzO3iown9
 VR+vM+8lNx9OX28CAwEAAaNWMFQwKgYFK2UBBAEEITAfAgEAMBowGAIBBAQTTDJ1TXlmZkJO
 VWJOSkpjZFoyczAYBgNVHREEETAPgQ1sYXJzZUBpc2kuZWR1MAwGA1UdEwEB/wQCMAAwDQYJ
 KoZIhvcNAQEEBQADgYEAXcrIlKmPLM/r8r3oz2ZLPLaT1AyMjYTZY2qq/R7SUtFa9BNlTIFh
 DG78QKfJ9lo2LMzTPQqMZgNLmj95GbNPI8P8OIq2K6MeCZWz08ROackqTFP6xWbIFIfXcBVR
 1dZnDDyDKBBh05KkvyTPawSQyOBUeNBfQUyO4TE+3o58U8UwggM5MIICoqADAgECAgMIJUEw
 DQYJKoZIhvcNAQEEBQAwgZIxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUx
 EjAQBgNVBAcTCUNhcGUgVG93bjEPMA0GA1UEChMGVGhhd3RlMR0wGwYDVQQLExRDZXJ0aWZp
 Y2F0ZSBTZXJ2aWNlczEoMCYGA1UEAxMfUGVyc29uYWwgRnJlZW1haWwgUlNBIDIwMDAuOC4z
 MDAeFw0wMjA4MjQxODUzMzlaFw0wMzA4MjQxODUzMzlaMFQxDzANBgNVBAQTBkVnZ2VydDEN
 MAsGA1UEKhMETGFyczEUMBIGA1UEAxMLTGFycyBFZ2dlcnQxHDAaBgkqhkiG9w0BCQEWDWxh
 cnNlQGlzaS5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSNka7eIIGkPyK
 zrA3jpth+P0eRUSC+iYw2N0rRGqIKda9t1ip4kNVY/fDbuVsZWmdyGptyXp+U+uh/Lu67TDa
 SuKgHgBqAbFXsla9fgkxXrr/psQoewbwScIS3ZtMw2qA09OWCmGWqrbE/hdvOhViUIN9V7X/
 r0yi1Vax3LGn57XsmpdjRLewHMmWX47FS8Madi6t3MGH0UEaKO/8glc0ux7IDOo5mzuLWhDK
 OMgtq6Z1G1hFAg02gmIKQF8wJaIjZOxg4dMM9rOWUpx0bzUgTAIwpqTbUmB31xSNQDcK66xy
 CexIvN/lzd9j1mODj8zt4qMJ/VUfrzPvJTcfTl9vAgMBAAGjVjBUMCoGBStlAQQBBCEwHwIB
 ADAaMBgCAQQEE0wydU15ZmZCTlViTkpKY2RaMnMwGAYDVR0RBBEwD4ENbGFyc2VAaXNpLmVk
 dTAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBAUAA4GBAF3KyJSpjyzP6/K96M9mSzy2k9QM
 jI2E2WNqqv0e0lLRWvQTZUyBYQxu/ECnyfZaNizM0z0KjGYDS5o/eRmzTyPD/DiKtiujHgmV
 s9PETmnJKkxT+sVmyBSH13AVUdXWZww8gygQYdOSpL8kz2sEkMjgVHjQX0FMjuExPt6OfFPF
 MYIDJzCCAyMCAQEwgZowgZIxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUx
 EjAQBgNVBAcTCUNhcGUgVG93bjEPMA0GA1UEChMGVGhhd3RlMR0wGwYDVQQLExRDZXJ0aWZp
 Y2F0ZSBTZXJ2aWNlczEoMCYGA1UEAxMfUGVyc29uYWwgRnJlZW1haWwgUlNBIDIwMDAuOC4z
 MAIDCCVBMAkGBSsOAwIaBQCgggFhMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI
 hvcNAQkFMQ8XDTAyMDkxOTE3MTkxN1owIwYJKoZIhvcNAQkEMRYEFD9M1q+MkNfYsrATUxWC
 HRRB+rm7MFIGCSqGSIb3DQEJDzFFMEMwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0G
 CCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMIGtBgsqhkiG9w0BCRACCzGB
 naCBmjCBkjELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJ
 Q2FwZSBUb3duMQ8wDQYDVQQKEwZUaGF3dGUxHTAbBgNVBAsTFENlcnRpZmljYXRlIFNlcnZp
 Y2VzMSgwJgYDVQQDEx9QZXJzb25hbCBGcmVlbWFpbCBSU0EgMjAwMC44LjMwAgMIJUEwDQYJ
 KoZIhvcNAQEBBQAEggEAYPo8xNKoKWsO6XbXySLDaFqCSKXcU7EuQOmbzDtbXISeCZmoievl
 oA0LR80PQ82D4kFxJjZ4Ul//mfr8fYCTPkB+gRLgagocnIaj0P8bkUNrJIlsh9VHxmSgtH+T
 Yh/cYfJ7krOILy7HZJ7lVn0RjqQ80c8XeOdVu2300u/QowVv6XF/2oBgwB7pNpDBKOG6kr8f
 AmGiEfe0NC1LDrSLFraj/R/pHTJuqZnWouy7WPAl79o+MZNEI0OAgmurVGJFi0wOARFhntHn
 bdGqsJoRnQY9IhK6Jz1iDSS1tzZ0TCRkT5Eq13D6opppHn3OjwstBmcWbjL6gT+GGah67J4S
 lAAAAAAAAA==
 --------------ms010602050309050705060903--
 

From: Matthew Dillon <dillon@apollo.backplane.com>
To: Lars Eggert <larse@ISI.EDU>
Cc: freebsd-gnats-submit@FreeBSD.ORG, Doug@courtney.linkline.com
Subject: Re: kern/33203: "got bad cookie" errors on NFS client
Date: Thu, 19 Sep 2002 10:42:30 -0700 (PDT)

 :Content-Type: text/plain; charset=us-ascii; format=flowed
 :Content-Transfer-Encoding: 7bit
 :
 :Hi,
 :
 :I can readily reproduce this with two 4.6-RELEASE machines (one client, 
 :one server), and have the client run bonnie++ from ports:
 :
 :[larse@nik: ~] bonnie++ -d/mnt -s 10
 :Writing with putc()...done
 :Writing intelligently...done
 :Rewriting...done
 :Reading with getc()...done
 :Reading intelligently...done
 :start 'em...done...done...done...
 :Create files in sequential order...done.
 :Stat files in sequential order...done.
 :Delete files in sequential order...Bonnie: drastic I/O error (rmdir): 
 :Directory not empty
 :Cleaning up test directory after error.
 :Bonnie: drastic I/O error (rmdir): No such file or directory
 :
 :During the "Delete files in sequential order"-phase, I get tons of "got 
 :bad cookie vp" messages on the client:
 :
 :Lars
 :-- 
 :Lars Eggert <larse@isi.edu>           USC Information Sciences Institute
 
     Hi Lars.  This is to be expected.  This message is really just
     informational, it occurs when an NFS client is forced to clear out its 
     directory block cache for a directory due to other clients or the server
     making changes (create, delete, rename) to the directory.
 
     The real question is whether we should remove the message or limit
     how often the kernel can gennerate it.  In anycase, I would like
     to close the PR since it isn't really a bug.
 
     This particular message has nothing to do with any text file you
     are seeing get corrupted.  NFS is not fully coherent so if you have
     one machine updating a text file (for example, writing over it with
     a new copy), the other machines may see the text file in varying
     states of disrepair until the writer is done writing.
 
     Flocks do not work over NFS, at least not in -stable.  In -current a
     great deal of progress has been made on the locking daemon.  You
     cannot use vi to edit a file that other clients may be accessing at
     the same time.  Only the use of an NFS-compatible lockfile (using
     O_CREAT|O_EXCL to create a unique lockfile) is supported under NFSv2
     and NFSv3, and both the writer and all the readers must use the lock
     file in order to avoid corrupting the files.
 
     Generally speaking you cannot mount mailboxes over NFS unless both
     the mail writer on the server and the mail readers on the clients use
     an NFS compatible lock file to govern access.
 
 					-Matt
 

From: Lars Eggert <larse@ISI.EDU>
To: Matthew Dillon <dillon@apollo.backplane.com>
Cc: freebsd-gnats-submit@FreeBSD.ORG, Doug@courtney.linkline.com
Subject: Re: kern/33203: "got bad cookie" errors on NFS client
Date: Thu, 19 Sep 2002 10:49:25 -0700

 This is a cryptographically signed message in MIME format.
 
 --------------ms050909070101040907080609
 Content-Type: text/plain; charset=us-ascii; format=flowed
 Content-Transfer-Encoding: 7bit
 
 Matt,
 
 Matthew Dillon wrote:
 > 
 >     Hi Lars.  This is to be expected.  This message is really just
 >     informational, it occurs when an NFS client is forced to clear out its 
 >     directory block cache for a directory due to other clients or the server
 >     making changes (create, delete, rename) to the directory.
 > 
 >     The real question is whether we should remove the message or limit
 >     how often the kernel can gennerate it.  In anycase, I would like
 >     to close the PR since it isn't really a bug.
 
 I'm not sure this is purely informational. Note how bonnie++ fails (the 
 rmdir errors.)
 
 Lars
 -- 
 Lars Eggert <larse@isi.edu>           USC Information Sciences Institute
 
 --------------ms050909070101040907080609
 Content-Type: application/x-pkcs7-signature; name="smime.p7s"
 Content-Transfer-Encoding: base64
 Content-Disposition: attachment; filename="smime.p7s"
 Content-Description: S/MIME Cryptographic Signature
 
 MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIJtjCC
 AzgwggKhoAMCAQICEGZFcrfMdPXPY3ZFhNAukQEwDQYJKoZIhvcNAQEEBQAwgdExCzAJBgNV
 BAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUxEjAQBgNVBAcTCUNhcGUgVG93bjEaMBgG
 A1UEChMRVGhhd3RlIENvbnN1bHRpbmcxKDAmBgNVBAsTH0NlcnRpZmljYXRpb24gU2Vydmlj
 ZXMgRGl2aXNpb24xJDAiBgNVBAMTG1RoYXd0ZSBQZXJzb25hbCBGcmVlbWFpbCBDQTErMCkG
 CSqGSIb3DQEJARYccGVyc29uYWwtZnJlZW1haWxAdGhhd3RlLmNvbTAeFw0wMDA4MzAwMDAw
 MDBaFw0wNDA4MjcyMzU5NTlaMIGSMQswCQYDVQQGEwJaQTEVMBMGA1UECBMMV2VzdGVybiBD
 YXBlMRIwEAYDVQQHEwlDYXBlIFRvd24xDzANBgNVBAoTBlRoYXd0ZTEdMBsGA1UECxMUQ2Vy
 dGlmaWNhdGUgU2VydmljZXMxKDAmBgNVBAMTH1BlcnNvbmFsIEZyZWVtYWlsIFJTQSAyMDAw
 LjguMzAwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAN4zMqZjxwklRT7SbngnZ4HF2ogZ
 gpcO40QpimM1Km1wPPrcrvfudG8wvDOQf/k0caCjbZjxw0+iZdsN+kvx1t1hpfmFzVWaNRqd
 knWoJ67Ycvm6AvbXsJHeHOmr4BgDqHxDQlBRh4M88Dm0m1SKE4f/s5udSWYALQmJ7JRr6aFp
 AgMBAAGjTjBMMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFQcml2YXRlTGFiZWwxLTI5NzAS
 BgNVHRMBAf8ECDAGAQH/AgEAMAsGA1UdDwQEAwIBBjANBgkqhkiG9w0BAQQFAAOBgQAxsUtH
 XfkBceX1U2xdedY9mMAmE2KBIqcS+CKV6BtJtyd7BDm6/ObyJOuR+r3sDSo491BVqGz3Da1M
 G7wD9LXrokefbKIMWI0xQgkRbLAaadErErJAXWr5edDqLiXdiuT82w0fnQLzWtvKPPZE6iZp
 h39Ins6ln+eE2MliYq0FxjCCAzkwggKioAMCAQICAwglQTANBgkqhkiG9w0BAQQFADCBkjEL
 MAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJQ2FwZSBUb3du
 MQ8wDQYDVQQKEwZUaGF3dGUxHTAbBgNVBAsTFENlcnRpZmljYXRlIFNlcnZpY2VzMSgwJgYD
 VQQDEx9QZXJzb25hbCBGcmVlbWFpbCBSU0EgMjAwMC44LjMwMB4XDTAyMDgyNDE4NTMzOVoX
 DTAzMDgyNDE4NTMzOVowVDEPMA0GA1UEBBMGRWdnZXJ0MQ0wCwYDVQQqEwRMYXJzMRQwEgYD
 VQQDEwtMYXJzIEVnZ2VydDEcMBoGCSqGSIb3DQEJARYNbGFyc2VAaXNpLmVkdTCCASIwDQYJ
 KoZIhvcNAQEBBQADggEPADCCAQoCggEBANI2Rrt4ggaQ/IrOsDeOm2H4/R5FRIL6JjDY3StE
 aogp1r23WKniQ1Vj98Nu5WxlaZ3Iam3Jen5T66H8u7rtMNpK4qAeAGoBsVeyVr1+CTFeuv+m
 xCh7BvBJwhLdm0zDaoDT05YKYZaqtsT+F286FWJQg31Xtf+vTKLVVrHcsafnteyal2NEt7Ac
 yZZfjsVLwxp2Lq3cwYfRQRoo7/yCVzS7HsgM6jmbO4taEMo4yC2rpnUbWEUCDTaCYgpAXzAl
 oiNk7GDh0wz2s5ZSnHRvNSBMAjCmpNtSYHfXFI1ANwrrrHIJ7Ei83+XN32PWY4OPzO3iown9
 VR+vM+8lNx9OX28CAwEAAaNWMFQwKgYFK2UBBAEEITAfAgEAMBowGAIBBAQTTDJ1TXlmZkJO
 VWJOSkpjZFoyczAYBgNVHREEETAPgQ1sYXJzZUBpc2kuZWR1MAwGA1UdEwEB/wQCMAAwDQYJ
 KoZIhvcNAQEEBQADgYEAXcrIlKmPLM/r8r3oz2ZLPLaT1AyMjYTZY2qq/R7SUtFa9BNlTIFh
 DG78QKfJ9lo2LMzTPQqMZgNLmj95GbNPI8P8OIq2K6MeCZWz08ROackqTFP6xWbIFIfXcBVR
 1dZnDDyDKBBh05KkvyTPawSQyOBUeNBfQUyO4TE+3o58U8UwggM5MIICoqADAgECAgMIJUEw
 DQYJKoZIhvcNAQEEBQAwgZIxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUx
 EjAQBgNVBAcTCUNhcGUgVG93bjEPMA0GA1UEChMGVGhhd3RlMR0wGwYDVQQLExRDZXJ0aWZp
 Y2F0ZSBTZXJ2aWNlczEoMCYGA1UEAxMfUGVyc29uYWwgRnJlZW1haWwgUlNBIDIwMDAuOC4z
 MDAeFw0wMjA4MjQxODUzMzlaFw0wMzA4MjQxODUzMzlaMFQxDzANBgNVBAQTBkVnZ2VydDEN
 MAsGA1UEKhMETGFyczEUMBIGA1UEAxMLTGFycyBFZ2dlcnQxHDAaBgkqhkiG9w0BCQEWDWxh
 cnNlQGlzaS5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDSNka7eIIGkPyK
 zrA3jpth+P0eRUSC+iYw2N0rRGqIKda9t1ip4kNVY/fDbuVsZWmdyGptyXp+U+uh/Lu67TDa
 SuKgHgBqAbFXsla9fgkxXrr/psQoewbwScIS3ZtMw2qA09OWCmGWqrbE/hdvOhViUIN9V7X/
 r0yi1Vax3LGn57XsmpdjRLewHMmWX47FS8Madi6t3MGH0UEaKO/8glc0ux7IDOo5mzuLWhDK
 OMgtq6Z1G1hFAg02gmIKQF8wJaIjZOxg4dMM9rOWUpx0bzUgTAIwpqTbUmB31xSNQDcK66xy
 CexIvN/lzd9j1mODj8zt4qMJ/VUfrzPvJTcfTl9vAgMBAAGjVjBUMCoGBStlAQQBBCEwHwIB
 ADAaMBgCAQQEE0wydU15ZmZCTlViTkpKY2RaMnMwGAYDVR0RBBEwD4ENbGFyc2VAaXNpLmVk
 dTAMBgNVHRMBAf8EAjAAMA0GCSqGSIb3DQEBBAUAA4GBAF3KyJSpjyzP6/K96M9mSzy2k9QM
 jI2E2WNqqv0e0lLRWvQTZUyBYQxu/ECnyfZaNizM0z0KjGYDS5o/eRmzTyPD/DiKtiujHgmV
 s9PETmnJKkxT+sVmyBSH13AVUdXWZww8gygQYdOSpL8kz2sEkMjgVHjQX0FMjuExPt6OfFPF
 MYIDJzCCAyMCAQEwgZowgZIxCzAJBgNVBAYTAlpBMRUwEwYDVQQIEwxXZXN0ZXJuIENhcGUx
 EjAQBgNVBAcTCUNhcGUgVG93bjEPMA0GA1UEChMGVGhhd3RlMR0wGwYDVQQLExRDZXJ0aWZp
 Y2F0ZSBTZXJ2aWNlczEoMCYGA1UEAxMfUGVyc29uYWwgRnJlZW1haWwgUlNBIDIwMDAuOC4z
 MAIDCCVBMAkGBSsOAwIaBQCgggFhMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZI
 hvcNAQkFMQ8XDTAyMDkxOTE3NDkyNlowIwYJKoZIhvcNAQkEMRYEFGp5EbiN89YVP/gGamO8
 Ub9/QbCEMFIGCSqGSIb3DQEJDzFFMEMwCgYIKoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0G
 CCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMIGtBgsqhkiG9w0BCRACCzGB
 naCBmjCBkjELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJ
 Q2FwZSBUb3duMQ8wDQYDVQQKEwZUaGF3dGUxHTAbBgNVBAsTFENlcnRpZmljYXRlIFNlcnZp
 Y2VzMSgwJgYDVQQDEx9QZXJzb25hbCBGcmVlbWFpbCBSU0EgMjAwMC44LjMwAgMIJUEwDQYJ
 KoZIhvcNAQEBBQAEggEAeScHZohiIuZplkylt84Nj8untw1tZoAVjzRnCeyN5QjtrMlLwx0Q
 3UxIl1XfCUfKkgE2QDrTipl0zZU3ZPK8CKVqRC8nckGXP3CIrm4NYgYgh1dzN/7pSDjp9CGQ
 uKN6p0eDxJzY4JUG9Xk7ny2Q3hXMwWW1wdvP+SkjbhT+0yJyOdTZUDIIqhZB9H09KDXn9hv+
 a8EGJF98JeEedD9SGML+JQJ94JZd2UGQhDwa997op9KNZy5hsGGUsM7m6GbXXiE2itQ5as89
 XpIc1bwZV7WrNQUBEb95IeCSKxfY/p4vjKNvqIgtHSUmXEN/1JhhaBAxzYFWpPRCq+jEnF3f
 XQAAAAAAAA==
 --------------ms050909070101040907080609--
 
Responsible-Changed-From-To: dillon->freebsd-bugs 
Responsible-Changed-By: keramida 
Responsible-Changed-When: Sat Feb 22 18:16:22 PST 2003 
Responsible-Changed-Why:  
Back to the free pool. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=33203 
State-Changed-From-To: open->closed 
State-Changed-By: jh 
State-Changed-When: Sat Apr 23 06:56:56 UTC 2011 
State-Changed-Why:  
Not a bug according to audit-trail. "got bad cookie" printf was removed 
in r130619. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=33203 
>Unformatted:
