10:44 PM - New Magus run
Here's the latest run from magus. Package count was just shy of 1800. Many of these failures are related to Java ports. I've made a change tonight to fix most of these.
238 | 0.4 | amd64 | active | 2013-02-19 16:13:36 |
Here's the latest run from magus. Package count was just shy of 1800. Many of these failures are related to Java ports. I've made a change tonight to fix most of these.
238 | 0.4 | amd64 | active | 2013-02-19 16:13:36 |
We started up our package build cluster again. A run was queued up on the 10th and run over the weekend on the new server hardware. The results are much better than I expected after such a long time without magus.
ID | OSVersion | Arch | Status | Created | |
---|---|---|---|---|---|
237 | 0.4 | amd64 | active | 2013-02-10 16:49:31 | |
There have been many updates in current lately. BIND 9.8 is in progress.
Here's a brief changelog.
20130125: MKSH R41 imported 20130122: OpenSSH 5.8p2 imported SQLite 3.7.15.2 imported Fixed a longstanding bug in libmport extrating new index files.
Fix a longstanding bug with libmport's return status. As this affects installation of ports, an update was applied to this branch. This is not a security update and not needed for pkg_tools.
MidnightBSD 0.3-RELEASE-p9
Bind vulnerability related to resource records. See CVE-2012-1667.
MidnightBSD 0.3-RELEASE-p8
Fix a problem with cyrpt's DES
implementation when used with non 7-bit ascii passwords.
MidnightBSD 0.3-RELEASE-p7 fixes a new security issue found in OpenSSL. It is recommended for all users.
0.4-CURRENT has also been updated.
Several security issues have been addressed in OpenSSL in the latest security update for MidnightBSD. 0.3-RELEASE-p6 and 0.4-CURRENT have been patched to work around these issues.
OpenSSL
failes to clear the bytes used as block cipher padding in SSL
3.0
records when
operating as a client or a server that accept SSL 3.0
handshakes.
As a result, in each record, up to 15 bytes of
uninitialized
memory may be
sent, encrypted, to the SSL peer. This could include
sensitive
contents of previously freed memory. [CVE-2011-4576]
OpenSSL
support for handshake restarts for server gated cryptograpy
(SGC)
can be used
in a denial-of-service attack. [CVE-2011-4619]
If an
application uses OpenSSL's certificate policy checking
when
verifying
X509 certificates, by enabling the
X509_V_FLAG_POLICY_CHECK
flag, a
policy check failure can lead to a double-free.
[CVE-2011-4109]
A weakness in
the OpenSSL PKCS #7 code can be exploited using
Bleichenbacher's
attack on PKCS #1 v1.5 RSA padding also known as the
million
message attack (MMA). [CVE-2012-0884]
The
asn1_d2i_read_bio() function, used by the d2i_*_bio and
d2i_*_fp
functions, in
OpenSSL contains multiple integer errors that can cause
memory
corruption when parsing encoded ASN.1 data. This error can
occur
on systems
that parse untrusted ASN.1 data, such as X.509
certificates
or RSA public keys. [CVE-2012-2110]
I've created some basic ZFS documentation on the website. This is in addition to some content on the wiki. Anyone interested in using ZFS on MidnightBSD may wish to look at it as a starting point. It doesn't replace the man pages though.
rtld-elf modified to support preinit, init and fini arrays. Obtained from: DragonFly. This makes us BSD #2 with this feature.
This was a run queued up in November, so it's not that current. As you can see from the results, we had a very poor run. Some of the packages are no longer fetchable, and some of this is problems that were created in the mports environment but have since been fixed. I plan to do a current run soon on the same hardware. Still having problems with the amd64 runs and I'm looking into it.
233 | 0.4 | i386 | active | 2011-11-10 15:21:10 |
Here's some sample output from the previous program:
MBR
3333812352d ad2
provider: 3333787264 ad2s1
r0w0e0
3330560128d ad8
provider: 3334536832 ad8s1
r0w0e0
3334457344d ad10
provider: 3334457088
ad10s1 r0w0e0
provider: 3334456832
ad10s2 r0w0e0
3334600960d ad14
provider: 3334600704
ad14s1 r5w5e5
provider: 3334600448
ad14s2 r0w0e0
provider: 3334600192
ad14s3 r0w0e0
3334599680d ar0
provider: 3334536064 ar0s1
r2w2e3
VFS
3335112064d
ffs.ad14s1a
3337421568d
ffs.ad14s1e
3334689408d
ffs.ad14s1f
3334689024d
ffs.ar0s1d
3337421184d
ffs.ad14s1d
3334688128d
ffs.ar0s1e
LABEL
3334596480d ad10s1
provider: 3334596352
ntfs/System Reserved r0w0e0
3334636288d ad14s3
provider: 3334636160
ntfs/BackupSegat r0w0e0
3334820992d ad8s1d
provider: 3334820864
ufsid/4b96b6328b08d595 r0w0e0
3334817280d ad14s2a
provider: 3334817152
ufsid/498431b32a15c897 r0w0e0
3334816000d ad14s2d
provider: 3334815872
ufsid/498431b7f20edba4 r0w0e0
3334691200d ad14s2e
provider: 3334691072
ufsid/498431b339c56ba6 r0w0e0
3334462208d ad14s2f
provider: 3334462080
ufsid/498431b3649da79d r0w0e0
BSD
3334599168d ad8s1
provider: 3334599040
ad8s1c r0w0e0
provider: 3334598784
ad8s1d r0w0e0
provider: 3334598272
ad8s1e r0w0e0
3334595328d ad14s1
provider: 3334595200
ad14s1a r1w1e1
provider: 3334594944
ad14s1b r1w1e0
provider: 3334594688
ad14s1c r0w0e0
provider: 3334456704
ad14s1d r1w1e1
provider: 3334456960
ad14s1e r1w1e1
provider: 3334596992
ad14s1f r1w1e1
3334691584d ad14s2
provider: 3334637696
ad14s2a r0w0e0
provider: 3334637440
ad14s2c r0w0e0
provider: 3334637184
ad14s2d r0w0e0
provider: 3334636928
ad14s2e r0w0e0
provider: 3334636672
ad14s2f r0w0e0
3334534912d ar0s1
provider: 3334635776
ar0s1c r0w0e0
provider: 3334822656
ar0s1d r1w1e1
provider: 3334822400
ar0s1e r1w1e1
PART
3334536192d ad10
provider: 3334601856
ad10p1 r0w0e0
provider: 3334601600
ad10p2 r0w0e0
3358966272d da0
provider: 3440290816 da0p1
r0w0e0
provider: 3350360320 da0p2
r0w0e0
provider: 3359112064 da0p3
r0w0e0
DEV
3333812992d ad2
3333786368d ad2s1
3331329152d acd0
3334457600d ad8
3334536576d ad9
3334536320d ad10
3334456576d ad14
3334599936d ar0
3334599424d ad8s1
3334597888d ad10p1
3334597376d ad10p2
3334638208d ad10s1
3334637952d ad10s2
3334535168d ad14s1
3334598016d ad14s2
3334638592d ad14s3
3334600576d ar0s1
3334822016d ad8s1c
3334821376d ad8s1d
3334820352d ad8s1e
3334819328d ntfs/System
Reserved
3334818560d ad14s1a
3334534144d ad14s1b
3334533632d ad14s1c
3334937088d ad14s1d
3334817920d ad14s1e
3334634112d ad14s1f
3334633600d ad14s2a
3334816640d ad14s2c
3334462848d ad14s2d
3334692224d ad14s2e
3334637056d ad14s2f
3334633344d
ntfs/BackupSegat
3334595712d ar0s1c
3334598144d ar0s1d
3334534656d ar0s1e
3334822784d
ufsid/4b96b6328b08d595
3334822272d
ufsid/498431b32a15c897
3334462464d
ufsid/498431b7f20edba4
3334936192d
ufsid/498431b339c56ba6
3335072256d
ufsid/498431b3649da79d
3440312704d da0
3440383360d da0p1
3372503936d da0p2
3440380288d da0p3
DISK
3333813376d ad2
provider: 3333813248 ad2
r0w0e0
3334459776d ad8
provider: 3334459648 ad8
r0w0e0
3334459392d ad9
provider: 3334459008 ad9
r0w0e0
3334458752d ad10
provider: 3334458624 ad10
r0w0e0
3334458368d ad14
provider: 3334458240 ad14
r5w5e6
3334457984d ar0
provider: 3334457856 ar0
r2w2e4
3440305536d da0
provider: 3372510464 da0
r0w0e0
MD
SWAP
3334536448d swap
MBREXT
ACD
3333787008d acd0
provider: 3333786880 acd0
r0w0e0
FD
While debugging a GEOM related problem with a program, I ended up needing a way to print out data from what libgeom gets from the kernel. Below is a quick and dirty dump program for just such a situation. Compile it with
gcc -std=c99 -lgeom prog.c -o prog
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <libgeom.h>
#include <stdint.h>
void read_geom_mesh(struct gmesh *mesh);
void
read_geom_mesh(struct gmesh *mesh)
{
struct gclass *classp;
struct ggeom *gp;
struct gprovider *provider;
/*
* Build the device table. First add all disks (and CDs).
*/
LIST_FOREACH(classp, &mesh->lg_class, lg_class) {
puts(classp->lg_name);
LIST_FOREACH(gp, &classp->lg_geom, lg_geom) {
printf(" %ud %s ", gp->lg_id, gp->lg_name);
LIST_FOREACH(provider, &gp->lg_provider, lg_provider) {
printf(" provider: %u %s %s ", provider->lg_id, provider->lg_name, provider->lg_mode);
}
}
}
}
int main(int argc, char *argv[]) {
int error;
struct gmesh mesh;
error = geom_gettree(&mesh);
if (error == 0)
read_geom_mesh(&mesh);
return 0;
}
Work is processing on the MidnightBSD installer for 0.4-CURRENT. As soon as it's working, I'll post a new snap. It's been awhile.
2011 was a good year for the MidnightBSD project. We released MidnightBSD 0.3 in January, and began work on 0.4. The mport(1) tool was written to allow users to manipulate ports using the new package management system. Work finally began on replacing sysinstall(8), the MidnightBSD installer with a new replacement.
MidnightBSD gained the ability to boot from GPT partitions. We've created our own partition types: midnightbsd, midnightbsd-ufs, midnightbsd-vinum, midnightbsd-zfs, etc. for GPT.
Several critical flaws with CAM were addressed from the 0.3 release.
MidnightBSD can now read ELF notes and understands both FreeBSD and MidnightBSD notes. Legacy FreeBSD 7.0 and lower binaries will continue to run, but also MidnightBSD binaries can be distinguished by the kernel. Eventually, we'll create a compatibility option as things diverge further. An effort to update binutils has started. The freebsd vector hack will be removed, and we'll go standard like DragonFly. This was a kludge to get Linux binaries working, but elf notes should solve that problem for us. This means we may see the end of brandelf for Linux executables.
GIANT lock has been removed from many sysctls. A few locking problems are still getting sorted out, but the kernel is running fine on most systems.
MidnightBSD gained a new search tool, msearch(1), that uses a sqlite3 database with a full text index of text files on the system. The indexer is off by default due to the space requirements. It supports some globbing for queries.
For a complete list of improvements, read UPDATING in CURRENT (0.4).
MidnightBSD now has pages on Google + and a twitter account. Expect a new release this year.
alc(4) is now working properly. cable detection, dhcp, etc. are working. bge(4) has support for several new chips. mii(4) supports new PHYs
make universe target runs again with the new build infrastructure. perl's still being difficult.
MidnightBSD gains the wake(8) utility. You can use it to wake up machines supporting WoL on the network.
If you're running BIND on MidnightBSD 0.3 or lower, I strongly recommend switching to the mports version. There are a few security issues with the base system bind.
I've patched it tonight in 0.4-CURRENT, but it's not fun to backport.
Also, our resolver has been patched to allow underscores in names.
I just patched CVE-2011-3336
This could be used as a denial of service attack against FTP servers or anything else that uses regular expressions from libc. A "bad" regex can consume massive amounts of memory.
The fix has been committed to CURRENT. I want to test this further before applying it to 0.3, but if you have a public facing system, you may wish to grab the following file and rebuild libc:
http://www.midnightbsd.org/cgi-bin/cvsweb.cgi/src/lib/libc/regex/regcomp.c?rev=1.3;content-type=text%2Fplain
The patch does pass the regression tests, but I'm not certain the memory limit calculation is correct. Our implementation is a bit different than NetBSD's as it supports wide characters.