Re: bin/109334: pkg_add(1) using chroot exits with error if wrong directory

2010-03-24 Thread Garrett Cooper
The following reply was made to PR bin/109334; it has been noted by GNATS.

From: Garrett Cooper 
To: bug-follo...@freebsd.org, n...@anywi.com
Cc: ra...@freebsd.org
Subject: Re: bin/109334: pkg_add(1) using chroot exits with error if wrong 
directory
Date: Tue, 23 Mar 2010 23:52:42 -0700

 The original comment states that sysinstall was the primary
 consumer of the -C option, and while that may have been the case (once
 upon a time), it isn't today according to the code I see in
 usr.sbin/sysinstall/package.c .
 So what I'm going to propose is the following: change the chroot,
 s.t. it only affects the install, operation, which means that instead
 of chroot'ing immediately, it'll first try to open the packages, then
 prior to executing the install instructions will do the chroot and
 will `chdir' to the default prefix (user specified); the default value
 will be '/'. That way the chdir back to the starting point will be
 sane.
 Another less invasive solution would be to merely pop '/' on to
 the playpen `stack' for the master in make_playpen, i.e.:
 
 if (!getcwd(cwd, FILENAME_MAX)) {
 upchuck("getcwd");
 return NULL;
 }
 
 if (chdir(pen) == FAIL) { /* <-- 2. source of confusion */
 cleanup(0);
 errx(2, "%s: can't chdir to '%s'", __func__, pen);
 }
 
 strcpy(PenLocation, pen);
 return pushPen(cwd); /* <-- 2. source of confusion */
 
 The pseudo code being:
 
 if chroot'ed then push '/' on the stack
 else push the current working directory on the stack
 
 The only potential issue I could see is when installing multiple
 packages, but that use is tainted anyhow because we chrooted early on,
 so the assumption is that the packages have been properly mirrored in
 the target environment like they are in the host non-chrooted
 environment.
 It's up to you guys -- it's a toss-up either way as there will be
 some level of confusion, but given that pkg_install is a mess and I
 hope to refactor it over the course of the next couple of years, this
 will be a minor mess that will need to be cleaned up later.
 Thanks,
 -Garrett
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/121165: pkg_add(1) prints a weird message: PKG_TMPDIR environment variable to a location with at least 0 bytes

2010-03-24 Thread Garrett Cooper
The following reply was made to PR bin/121165; it has been noted by GNATS.

From: Garrett Cooper 
To: bug-follo...@freebsd.org, y...@tsoft.com
Cc:  
Subject: Re: bin/121165: pkg_add(1) prints a weird message: PKG_TMPDIR 
environment variable to a location with at least 0 bytes
Date: Wed, 24 Mar 2010 00:06:09 -0700

 --001485e8edde93919604828690c9
 Content-Type: text/plain; charset=ISO-8859-1
 
 Apparently the compiler missed the missing format qualifier after
 the `stack overflow' format string modification because
 -Wno-format-strings is specified in the default system CFLAGS (not
 sure where but it's being set in /usr/share/mk...). Sorry for the
 noise -- here's a correct patch -- I also removed an unneeded newline
 in an err(3) call.
 Thanks,
 -Garrett
 
 --001485e8edde93919604828690c9
 Content-Type: application/octet-stream; name="bin.121165.diff"
 Content-Disposition: attachment; filename="bin.121165.diff"
 Content-Transfer-Encoding: base64
 X-Attachment-Id: f_g75shkgx0
 
 SW5kZXg6IGRlbGV0ZS9tYWluLmMKPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PQotLS0gZGVsZXRlL21haW4uYwkocmV2aXNp
 b24gMjA1MTU5KQorKysgZGVsZXRlL21haW4uYwkod29ya2luZyBjb3B5KQpAQCAtMzcsNiArMzcs
 OCBAQAogQm9vbGVhbglSZWN1cnNpdmUJPSBGQUxTRTsKIG1hdGNoX3QJTWF0Y2hUeXBlCT0gTUFU
 Q0hfR0xPQjsKIAorY2hhcgkqcHJvZ25hbWUJPSBOVUxMOworCiBzdGF0aWMgdm9pZCB1c2FnZSh2
 b2lkKTsKIAogc3RhdGljIGNoYXIgb3B0c1tdID0gImFkRGZHaGlucDpydnhYIjsKQEAgLTY3LDYg
 KzY5LDggQEAKICAgICBjb25zdCBjaGFyICp0bXA7CiAgICAgc3RydWN0IHN0YXQgc3RhdF9zOwog
 CisgICAgaWYgKChwcm9nbmFtZSA9IGJhc2VuYW1lKGFyZ3ZbMF0pKSA9PSBOVUxMKQorCWVycihF
 WElUX0ZBSUxVUkUsICJiYXNlbmFtZSIpOwogICAgIHBrZ3MgPSBzdGFydCA9IGFyZ3Y7CiAgICAg
 d2hpbGUgKChjaCA9IGdldG9wdF9sb25nKGFyZ2MsIGFyZ3YsIG9wdHMsIGxvbmdvcHRzLCBOVUxM
 KSkgIT0gLTEpCiAJc3dpdGNoKGNoKSB7CkluZGV4OiBjcmVhdGUvbWFpbi5jCj09PT09PT09PT09
 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT0K
 LS0tIGNyZWF0ZS9tYWluLmMJKHJldmlzaW9uIDIwNTE1OSkKKysrIGNyZWF0ZS9tYWluLmMJKHdv
 cmtpbmcgY29weSkKQEAgLTQ1LDYgKzQ1LDcgQEAKIGludAlIZWxwCQk9IEZBTFNFOwogZW51bSB6
 aXBwZXIJWmlwcGVyICA9IEJaSVAyOwogCitjaGFyCSpwcm9nbmFtZQk9IE5VTEw7CiAKIHN0YXRp
 YyB2b2lkIHVzYWdlKHZvaWQpOwogCkBAIC03Miw2ICs3Myw4IEBACiAgICAgaW50IGNoOwogICAg
 IGNoYXIgKipwa2dzLCAqKnN0YXJ0LCAqdG1wOwogCisgICAgaWYgKChwcm9nbmFtZSA9IGJhc2Vu
 YW1lKGFyZ3ZbMF0pKSA9PSBOVUxMKQorCWVycihFWElUX0ZBSUxVUkUsICJiYXNlbmFtZSIpOwog
 ICAgIHBrZ3MgPSBzdGFydCA9IGFyZ3Y7CiAgICAgd2hpbGUgKChjaCA9IGdldG9wdF9sb25nKGFy
 Z2MsIGFyZ3YsIG9wdHMsIGxvbmdvcHRzLCBOVUxMKSkgIT0gLTEpCiAJc3dpdGNoKGNoKSB7Cklu
 ZGV4OiB2ZXJzaW9uL21haW4uYwo9PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
 PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09Ci0tLSB2ZXJzaW9uL21haW4uYwkocmV2aXNp
 b24gMjA1MTU5KQorKysgdmVyc2lvbi9tYWluLmMJKHdvcmtpbmcgY29weSkKQEAgLTM2LDYgKzM2
 LDggQEAKIEJvb2xlYW4gVXNlSU5ERVhPbmx5ID0gRkFMU0U7CiBCb29sZWFuIFNob3dPcmlnaW4g
 PSBGQUxTRTsKIAorY2hhcgkqcHJvZ25hbWUJPSBOVUxMOworCiBzdGF0aWMgdm9pZCB1c2FnZSh2
 b2lkKTsKIAogc3RhdGljIGNoYXIgb3B0c1tdID0gImRJaGw6TDpxczpYdFRPOm92IjsKQEAgLTY3
 LDYgKzY5LDggQEAKIAljbXAgPSB2ZXJzaW9uX21hdGNoKGFyZ3ZbM10sIGFyZ3ZbMl0pOwogCWV4
 aXQoY21wID09IDEgPyAwIDogMSk7CiAgICAgfQorICAgIGlmICgocHJvZ25hbWUgPSBiYXNlbmFt
 ZShhcmd2WzBdKSkgPT0gTlVMTCkKKwllcnIoRVhJVF9GQUlMVVJFLCAiYmFzZW5hbWUiKTsKICAg
 ICBlbHNlIHdoaWxlICgoY2ggPSBnZXRvcHRfbG9uZyhhcmdjLCBhcmd2LCBvcHRzLCBsb25nb3B0
 cywgTlVMTCkpICE9IC0xKSB7CiAJc3dpdGNoKGNoKSB7CiAJY2FzZSAndic6CkluZGV4OiBsaWIv
 cGVuLmMKPT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09PT09
 PT09PT09PT09PT09PT09PQotLS0gbGliL3Blbi5jCShyZXZpc2lvbiAyMDUxNTkpCisrKyBsaWIv
 cGVuLmMJKHdvcmtpbmcgY29weSkKQEAgLTYyLDEwICs2MiwxMSBAQAogCWNsZWFudXAoMCk7CiAJ
 aHVtYW5pemVfbnVtYmVyKGh1bWJ1Ziwgc2l6ZW9mIGh1bWJ1Ziwgc3osICIiLCBITl9BVVRPU0NB
 TEUsCiAJICAgIEhOX05PU1BBQ0UpOwotCWVycngoMiwKLSIlczogY2FuJ3QgZmluZCBlbm91Z2gg
 dGVtcG9yYXJ5IHNwYWNlIHRvIGV4dHJhY3QgdGhlIGZpbGVzLCBwbGVhc2Ugc2V0IHlvdXJcbiIK
 LSJQS0dfVE1QRElSIGVudmlyb25tZW50IHZhcmlhYmxlIHRvIGEgbG9jYXRpb24gd2l0aCBhdCBs
 ZWFzdCAlcyBieXRlc1xuIgotImZyZWUiLCBfX2Z1bmNfXywgaHVtYnVmKTsKKwkvKiBYWFg6IE1h
 aW50YWluIDgwIGNvbHVtbiB3aWR0aCBpbiB0aGUgZXJyb3IgbWVzc2FnZS4gKi8KKwllcnJ4KEVY
 SVRfRkFJTFVSRSwKKwkgICAgIiVzLiVzOiBub3QgZW5vdWdoIHRlbXBvcmFyeSBzcGFjZSB0byBl
 eHRyYWN0IHRoZSBmaWxlczsgc2V0IFBLR19UTVBESVIgaW5cbiIKKwkgICAgInlvdXIgZW52aXJv
 bm1lbnQgdG8gYSBsb2NhdGlvbiB3aXRoIGF0IGxlYXN0ICVzIGJ5dGVzIGZyZWUiLAorCSAgICBw
 cm9nbmFtZSwgX19mdW5jX18sIGh1bWJ1Zik7CiAJcmV0dXJuIE5VTEw7CiAgICAgfQogICAgIHJl
 dHVybiBwZW47CkBAIC03OSw3ICs4MCw3IEBACiBwdXNoUGVuKGNvbnN0IGNoYXIgKnBlbikKIHsK
 ICAgICBpZiAoKytwZGVwdGggPT0gTUFYX1NUQUNLKQotCWVycngoMiwgIiVzOiBzdGFjayBvdmVy
 Zmxvdy5cbiIsIF9fZnVuY19fKTsKKwllcnJ4KDIsICIlcy4lczogc3RhY2sgb3ZlcmZsb3cuIiwg
 cHJvZ25hbWUsIF9fZnVuY19fKTsKICAgICBwc3RhY2tbcGRlcHRoXSA9IHN0cmR1cChwZW4pOwog
 CiAgICAgcmV0dXJuIHBzdGFja1twZGVwdGhdOwpAQCAtMTMxLDkgKzEzMiwxMCBAQAogICAgIGlm
 IChtaW5fZnJlZShwZW4pIDwgc3opIHsKIAlybWRpcihwZW4pOwogCWNsZWFudXAoMCk7Ci0JZXJy
 eCgyLCAiJXM6IG5vdCBlbm91Z2ggZnJlZSBzcGFjZSB0byBjcmVhdGUgJyVzJy5cbiIKKwllcnJ4
 KDIsICIlcy4lczog

bin/145000: [patch] pkg_create(1) needs realpath(3) on -p argument

2010-03-24 Thread Garrett Cooper

>Number: 145000
>Category:   bin
>Synopsis:   [patch] pkg_create(1) needs realpath(3) on -p argument
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 09:10:00 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Garrett Cooper
>Release:9-CURRENT
>Organization:
Cisco Systems, Inc.
>Environment:
FreeBSD bayonetta.local 9.0-CURRENT FreeBSD 9.0-CURRENT #5 r205310: Sat Mar 20 
01:32:51 PDT 2010 gcoo...@bayonetta.local:/usr/obj/usr/src/sys/BAYONETTA  
amd64
>Description:
When using -p with pkg_create(1) one must specify the full path to the prefix 
one is installing in. Example:

$ > desc; > comment; echo "bar" | pkg_create -f - -c comment -d desc -p $PWD 
../foo.tbz
$

This doesn't work when using relative paths because it's looking for the files 
in the `playpen':

$ > desc; > comment; echo "bar" | pkg_create -f - -c comment -d desc -p . 
../foo.tbz
tar: bar: Cannot stat: No such file or directory
tar: Error exit delayed from previous errors.
pkg_create: make_dist: tar command failed with code 256
$

So my proposal is to change the argument so that it does a realpath on the path 
segment, s.t. the prefix is explicitly the path set (which makes sense, as a 
relative path would be nothing more than installing into the playpen, which 
makes absolutely no sense at all). I verified that this is the behavior that 
ports are currently using.

Positive test:
> desc; > comment; echo "bar" | 
> /scratch/freebsd/perforce/pkg_install-enhancements/usr.sbin/pkg_install/create/pkg_create
>  -f - -c comment -d desc -p . ../foo.tbz
$ bzcat ../foo.tbz 
+CONTENTS000644 001750 00 472 11352352166 013107 
0ustar00gcooperwheel00 00 @comment PKG_FORMAT_REVISION:1.1
@name foo
@cwd 
/scratch/freebsd/perforce/pkg_install-enhancements/tools/regression/usr.sbin/pkg_install/foo
bar
@comment MD5:d41d8cd98f00b204e9800998ecf8427e
@ignore
+COMMENT
@comment MD5:d41d8cd98f00b204e9800998ecf8427e
@ignore
+DESC
@comment MD5:d41d8cd98f00b204e9800998ecf8427e
+COMMENT000644 001750 00 000 11352352166 012737 
0ustar00gcooperwheel00 00 +DESC000644 001750 00 000 
11352352166 012353 0ustar00gcooperwheel00 00 bar000644 001750 00 
000 11352345452 012326 0ustar00gcooperwheel00 00

Negative test:
$ > desc; > comment; echo "bar" | 
/scratch/freebsd/perforce/pkg_install-enhancements/usr.sbin/pkg_install/create/pkg_create
 -f - -c comment -d desc -p /somewhere/that/does/not/exist ../foo.tbz
pkg_create: couldn't resolve path for prefix: /somewhere/that/does/not/exist: 
No such file or directory

The proposed patch also removes an unnecessary `...@cwd .' from created plists 
added whenever -p is specified, as I noticed that @cwd was being added twice 
when I specified -p (even though I expected it to only be once).
>How-To-Repeat:
Provide a relative path to -p, i.e.:

. , ./ , usr/local, etc
>Fix:
See patch.

Patch attached with submission follows:

 
//depot/projects/soc2007/gcooper-pkg_install-enhancements-simplified/usr.sbin/pkg_install/create/perform.c#1
 - 
/scratch/freebsd/perforce/pkg_install-enhancements/usr.sbin/pkg_install/create/perform.c
 
@@ -208,8 +208,12 @@
 read_plist(&plist, pkg_in);
 
 /* Prefix should add an @cwd to the packing list */
-if (Prefix)
-   add_plist_top(&plist, PLIST_CWD, Prefix);
+if (Prefix) {
+char resolved_prefix[PATH_MAX];
+if (realpath(Prefix, resolved_prefix) == NULL)
+   err(EXIT_FAILURE, "couldn't resolve path for prefix: %s", Prefix);
+   add_plist_top(&plist, PLIST_CWD, resolved_prefix);
+}
 
 /* Add the origin if asked, at the top */
 if (Origin)
@@ -254,7 +258,9 @@
 /* mark_plist(&plist); */
 
 /* Now put the release specific items in */
-add_plist(&plist, PLIST_CWD, ".");
+if (!Prefix) {
+   add_plist(&plist, PLIST_CWD, ".");
+}
 write_file(COMMENT_FNAME, Comment);
 add_plist(&plist, PLIST_IGNORE, NULL);
 add_plist(&plist, PLIST_FILE, COMMENT_FNAME);


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


kern/145001: jailed interface lost the ip settings

2010-03-24 Thread Robert Kapitany

>Number: 145001
>Category:   kern
>Synopsis:   jailed interface lost the ip settings
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 09:30:05 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Robert Kapitany
>Release:FreeBSD 8.0-STABLE (VIMAGE) #0 r204860M
>Organization:
Hungarian Telekom
>Environment:
FreeBSD virt.lab.t-online.private 8.0-STABLE FreeBSD 8.0-STABLE #0 r204860M: 
Tue Mar 23 17:14:39 CET 2010 
r...@bootm.lab.t-online.private:/usr/obj/usr/src/sys/VIMAGE  amd64

>Description:
When I add an previously configured network interface to a jail with vnet.
It lose the ip settings.
Is it the good and expected behavior?
>How-To-Repeat:
ifconfig pub0
pub0: flags=8843 metric 0 mtu 1500
options=1bb   
ether 00:18:fe:7a:02:98
inet 10.0.1.1 netmask 0xff00 broadcast 10.0.1.255
media: Ethernet autoselect (1000baseT )
status: active

jail -c vnet path=/ jid=666 name=test host.hostname=test.virtlab persist

ifconfig pub0 vnet 666

jexec 666 ifconfig
lo0: flags=8008 metric 0 mtu 16384
options=3
pub0: flags=8842 metric 0 mtu 1500

options=1bb   
ether 00:18:fe:7a:02:98
media: Ethernet autoselect (1000baseT )
status: active

>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/145001: jailed interface lost the ip settings

2010-03-24 Thread Bjoern A. Zeeb
The following reply was made to PR kern/145001; it has been noted by GNATS.

From: "Bjoern A. Zeeb" 
To: Robert Kapitany 
Cc: bug-follo...@freebsd.org
Subject: Re: kern/145001: jailed interface lost the ip settings
Date: Wed, 24 Mar 2010 09:50:22 + (UTC)

 On Wed, 24 Mar 2010, Robert Kapitany wrote:
 
 > When I add an previously configured network interface to a jail with vnet.
 > It lose the ip settings.
 > Is it the good and expected behavior?
 
 This is the expected behaviour.
 
 /bz
 -- 
 Bjoern A. Zeeb It will not break if you know what you are doing.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/145004: 8.0-STABLE net.inet.ip.fw.one_pass: 1 not work

2010-03-24 Thread Vitaly Moiseev

>Number: 145004
>Category:   misc
>Synopsis:   8.0-STABLE net.inet.ip.fw.one_pass: 1 not work
>Confidential:   no
>Severity:   serious
>Priority:   medium
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 10:20:02 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Vitaly Moiseev
>Release:8.0-STABLE amd64
>Organization:
ISP Express LTD
>Environment:
FreeBSD pppoe-server.expressnikopol.net.ua 8.0-STABLE FreeBSD 8.0-STABLE #6: 
Wed Mar 24 02:00:10 EET
 2010 r...@pppoe-server.expressnikopol.net.ua:/usr/obj/usr/src/sys/PPPOE  
amd64
>Description:
after update to 8.0-STABLE when use ipfw pipe dummynet and variable 
net.inet.ip.fw.one_pass set to 1, the packet is passed again to the firewall 
code starting from the next rule.
>How-To-Repeat:
use ipfw pipe and default to deny ipfw and set net.inet.ip.fw.one_pass=1 - the 
packets after exit from pipe rules go to next rules.
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/140361: [cpufreq] speed-stepping broken on PhenomII (acpi?)

2010-03-24 Thread Hannes
The following reply was made to PR kern/140361; it has been noted by GNATS.

From: Hannes 
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: kern/140361: [cpufreq] speed-stepping broken on PhenomII (acpi?)
Date: Wed, 24 Mar 2010 10:27:34 +

 *ping*
 
 Is there anything I can do to help solve this issue?
 (still there on a current RELENG_8)
 
 Thank you very much,
 Regards,
 Hannes
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/145004: commit references a PR

2010-03-24 Thread dfilter service
The following reply was made to PR misc/145004; it has been noted by GNATS.

From: dfil...@freebsd.org (dfilter service)
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: misc/145004: commit references a PR
Date: Wed, 24 Mar 2010 15:17:08 + (UTC)

 Author: luigi
 Date: Wed Mar 24 15:16:59 2010
 New Revision: 205602
 URL: http://svn.freebsd.org/changeset/base/205602
 
 Log:
   Honor ip.fw.one_pass when a packet comes out of a pipe without being delayed.
   I forgot to handle this case when i did the mtag cleanup three months ago.
   
   PR:  145004
 
 Modified:
   head/sys/netinet/ipfw/ip_dn_io.c
 
 Modified: head/sys/netinet/ipfw/ip_dn_io.c
 ==
 --- head/sys/netinet/ipfw/ip_dn_io.c   Wed Mar 24 15:16:05 2010
(r205601)
 +++ head/sys/netinet/ipfw/ip_dn_io.c   Wed Mar 24 15:16:59 2010
(r205602)
 @@ -762,7 +762,11 @@ dummynet_io(struct mbuf **m0, int dir, s
 * 
 */
if (/*dn_cfg.io_fast &&*/ m == *m0 && (dir & PROTO_LAYER2) == 0 ) {
 -  /* fast io */
 +  /* fast io, rename the tag * to carry reinject info. */
 +  struct m_tag *tag = m_tag_first(m);
 +
 +  tag->m_tag_cookie = MTAG_IPFW_RULE;
 +  tag->m_tag_id = 0;
io_pkt_fast++;
if (m->m_nextpkt != NULL) {
printf("dummynet: fast io: pkt chain detected!\n");
 ___
 svn-src-...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/svn-src-all
 To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/145004: 8.0-STABLE net.inet.ip.fw.one_pass: 1 not work

2010-03-24 Thread luigi
Synopsis: 8.0-STABLE net.inet.ip.fw.one_pass: 1 not work

State-Changed-From-To: open->closed
State-Changed-By: luigi
State-Changed-When: Wed Mar 24 15:20:12 UTC 2010
State-Changed-Why: 
fixed in r205601(HEAD) and r205602(RELENG_8)


http://www.freebsd.org/cgi/query-pr.cgi?pr=145004
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/145004: commit references a PR

2010-03-24 Thread dfilter service
The following reply was made to PR misc/145004; it has been noted by GNATS.

From: dfil...@freebsd.org (dfilter service)
To: bug-follo...@freebsd.org
Cc:  
Subject: Re: misc/145004: commit references a PR
Date: Wed, 24 Mar 2010 15:20:04 + (UTC)

 Author: luigi
 Date: Wed Mar 24 15:19:47 2010
 New Revision: 205603
 URL: http://svn.freebsd.org/changeset/base/205603
 
 Log:
   MFC 205602:
   Honor ip.fw.one_pass when a packet comes out of a pipe without being delayed.
   I forgot to handle this case when i did the mtag cleanup three months ago.
   
   I am merging immediately because this bugfix is important for
   people using RELENG_8.
   
   PR:   145004
 
 Modified:
   stable/8/sys/netinet/ipfw/ip_dn_io.c
 
 Modified: stable/8/sys/netinet/ipfw/ip_dn_io.c
 ==
 --- stable/8/sys/netinet/ipfw/ip_dn_io.c   Wed Mar 24 15:16:59 2010
(r205602)
 +++ stable/8/sys/netinet/ipfw/ip_dn_io.c   Wed Mar 24 15:19:47 2010
(r205603)
 @@ -762,7 +762,11 @@ dummynet_io(struct mbuf **m0, int dir, s
 * 
 */
if (/*dn_cfg.io_fast &&*/ m == *m0 && (dir & PROTO_LAYER2) == 0 ) {
 -  /* fast io */
 +  /* fast io, rename the tag * to carry reinject info. */
 +  struct m_tag *tag = m_tag_first(m);
 +
 +  tag->m_tag_cookie = MTAG_IPFW_RULE;
 +  tag->m_tag_id = 0;
io_pkt_fast++;
if (m->m_nextpkt != NULL) {
printf("dummynet: fast io: pkt chain detected!\n");
 ___
 svn-src-...@freebsd.org mailing list
 http://lists.freebsd.org/mailman/listinfo/svn-src-all
 To unsubscribe, send any mail to "svn-src-all-unsubscr...@freebsd.org"
 
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: kern/145001: jailed interface lost the ip settings

2010-03-24 Thread remko
Synopsis: jailed interface lost the ip settings

State-Changed-From-To: open->closed
State-Changed-By: remko
State-Changed-When: Wed Mar 24 15:51:59 UTC 2010
State-Changed-Why: 
This is intended behaviour as Bjoern mentioned, in any case questions
are not PR tickets.. Thanks for trying to make FreeBSD Better!

http://www.freebsd.org/cgi/query-pr.cgi?pr=145001
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/74387: mount(8) linprocfs can be mounted on top of itself many times

2010-03-24 Thread Alexander Best
The following reply was made to PR bin/74387; it has been noted by GNATS.

From: Alexander Best 
To: 
Cc:  
Subject: Re: bin/74387: mount(8) linprocfs can be mounted on top of itself
 many times
Date: Wed, 24 Mar 2010 18:09:59 +0100 (CET)

 this pr is no longer reproducible under HEAD (r205561).
 
 `cat /etc/fstab|grep linprocfs`:
 linprocfs   /compat/linux/proc  linprocfs   rw  0
 0
 linprocfs   /usr/local/gentoo-stage3/proc   linprocfs   rw
 0   0
 
 `mount|wc`:
   11  55 491
 
 `for i in `jot - 1 10`; do mount -a; done`
 
 `mount|wc`:
   11  55 491
 
 sbin/mount/mount.c:466 has a comment saying:
 
 /* The user may have specified a symlink in fstab, resolve the path */
 
 so ismounted() takes care of this now.
 
 the commit that fixed this was r154512 (HEAD, stable8 and stable7). it's been
 mfc'ed to stable6 in r154774.
 
 so this pr can be closed.
 
 -- 
 Alexander Best
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/74387: mount(8) linprocfs can be mounted on top of itself many times

2010-03-24 Thread gavin
Synopsis: mount(8) linprocfs can be mounted on top of itself many times

State-Changed-From-To: analyzed->closed
State-Changed-By: gavin
State-Changed-When: Wed Mar 24 17:21:06 UTC 2010
State-Changed-Why: 
Alexander Best reports that this was fixed some time ago and can no
longer be reproduced.

http://www.freebsd.org/cgi/query-pr.cgi?pr=74387
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: bin/121165: pkg_add(1) prints a weird message: PKG_TMPDIR environment variable to a location with at least 0 bytes

2010-03-24 Thread Bruce Evans

On Tue, 23 Mar 2010, Garrett Cooper wrote:


On Tue, Mar 23, 2010 at 12:26 PM, Bruce Evans  wrote:

On Mon, 22 Mar 2010, Garrett Cooper wrote:


? ?Functions as expected provided test added in
http://p4web.freebsd.org/chv.cgi?CH=175930 ; I'm just making one minor
style change from the previous patch so that errx(3) in find_play_pen
exits with EXIT_FAILURE instead of 2 (I agree that EXIT_FAILURE is
synonymous to 2, but for it's more readable and consistent as
EXIT_FAILURE).


EXIT_FAILURE is 1.


Excellent point -_-... should I just revert this then or leave it as-is?


Depends on whether distinguishing the exit code 2 from the exit code 1 is
important.  Normally it isn't, but sometimes 2 is documented and then at
least the documentation should be changed too.

BTW, I glanced at this because it looked a bit like use of sysexits and
I don't like sysexits.  But sysexits exit codes start at 64 and are
almost perfectly undocumented in utilities that use sysexits.  I don't
mind using the Standard C EXIT_SUCCESS and EXIT_FAILURE although these
are just aliases for 0 and 1 and these aliases are also almost perfectly
undocumented (most man pages use the mdoc macro ".Ex -std" which expands
to "The  utility exits 0 on success, and >0 if an error occurs."
POSIX also mostly says 0/>0.  Thus the values in sysexits are allowed,
but know one knows what they mean.

Bruce___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"

conf/145009: rc.conf should allow mac label configuration

2010-03-24 Thread Michael Reynolds

>Number: 145009
>Category:   conf
>Synopsis:   rc.conf should allow mac label configuration
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 18:50:01 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Michael Reynolds
>Release:8.0-STABLE
>Organization:
>Environment:
n/a
>Description:
rc.conf, via rc.subr, should allow service specific labels to be set, so as to 
efficiently handle security, and ensure a working machine after enabling MAC.
>How-To-Repeat:

>Fix:
Apply the affixed patch, add this (as an example) to your rc.conf:

auditd_label="biba/high,lomac/high,mls/high,partition/equal"


Patch attached with submission follows:

--- etc/rc.subr 2009-12-30 14:25:40.0 -0500
+++ /etc/rc.subr2010-03-18 11:39:16.0 -0400
@@ -646,7 +646,8 @@
fi
eval _chdir=\$${name}_chdir _chroot=\$${name}_chroot \
_nice=\$${name}_nice_user=\$${name}_user \
-   _group=\$${name}_group  _groups=\$${name}_groups
+   _group=\$${name}_group  _groups=\$${name}_groups \
+   _label=\$${name}_label
 
if [ -n "$_user" ]; then# unset $_user if running as that user
if [ "$_user" = "$(eval $IDCMD)" ]; then
@@ -726,10 +727,12 @@
if [ -n "$_chroot" ]; then
_doit="\
 ${_nice:+nice -n $_nice }\
+${_label:+setpmac $_label }\
 chroot ${_user:+-u $_user }${_group:+-g $_group }${_groups:+-G $_groups }\
 $_chroot $command $rc_flags $command_args"
else
_doit="\
+${_label:+setpmac $_label }\
 ${_chdir:+cd $_chdir && }\
 $command $rc_flags $command_args"
if [ -n "$_user" ]; then


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


gnu/145010: cpio: buffer overflow in rmt client

2010-03-24 Thread Christian Weisgerber

>Number: 145010
>Category:   gnu
>Synopsis:   cpio: buffer overflow in rmt client
>Confidential:   no
>Severity:   serious
>Priority:   high
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 19:00:11 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: Christian Weisgerber
>Release:FreeBSD 7.3-PRERELEASE amd64
>Organization:
>Environment:
System: FreeBSD lorvorc.mips.inka.de 7.3-PRERELEASE FreeBSD 7.3-PRERELEASE #0: 
Sat Mar 20 13:36:54 CET 2010 
na...@lorvorc.mips.inka.de:/usr/obj/usr/src/sys/GENERIC amd64

This applies to all branches of FreeBSD.

>Description:

CVE-2010-0624
  Heap-based buffer overflow in the rmt_read__ function in
  lib/rtapelib.c in the rmt client functionality in GNU tar before
  1.23 and GNU cpio before 2.11 allows remote rmt servers to cause
  a denial of service (memory corruption) or possibly execute
  arbitrary code by sending more data than was requested, related
  to archive filenames that contain a : (colon) character.

Also see the original report:
http://www.agrs.tu-berlin.de/index.php?id=78327

>How-To-Repeat:

>Fix:

Index: contrib/cpio/lib/rtapelib.c
===
RCS file: /home/ncvs/src/contrib/cpio/lib/rtapelib.c,v
retrieving revision 1.1.1.1
diff -u -r1.1.1.1 rtapelib.c
--- contrib/cpio/lib/rtapelib.c 1 Oct 2005 04:37:06 -   1.1.1.1
+++ contrib/cpio/lib/rtapelib.c 24 Mar 2010 18:55:27 -
@@ -570,7 +570,8 @@
 
   sprintf (command_buffer, "R%lu\n", (unsigned long) length);
   if (do_command (handle, command_buffer) == -1
-  || (status = get_status (handle)) == SAFE_READ_ERROR)
+  || (status = get_status (handle)) == SAFE_READ_ERROR
+  || status > length)
 return SAFE_READ_ERROR;
 
   for (counter = 0; counter < status; counter += rlen, buffer += rlen)
@@ -706,6 +707,12 @@
|| (status = get_status (handle), status == -1))
  return -1;
 
+   if (status > sizeof (struct mtop))
+ {
+   errno = EOVERFLOW;
+   return -1;
+ }
+   
for (; status > 0; status -= counter, argument += counter)
  {
counter = safe_read (READ_SIDE (handle), argument, status);
>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: gnu/145010: cpio: buffer overflow in rmt client

2010-03-24 Thread delphij
Synopsis: cpio: buffer overflow in rmt client

Responsible-Changed-From-To: freebsd-bugs->secteam
Responsible-Changed-By: delphij
Responsible-Changed-When: Wed Mar 24 19:23:25 UTC 2010
Responsible-Changed-Why: 
Take.

http://www.freebsd.org/cgi/query-pr.cgi?pr=145010
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


misc/145013: [patch] ru/security/security.sgml: MFen 1.209 -> 1.211

2010-03-24 Thread pluknet

>Number: 145013
>Category:   misc
>Synopsis:   [patch] ru/security/security.sgml: MFen 1.209 -> 1.211
>Confidential:   no
>Severity:   non-critical
>Priority:   medium
>Responsible:freebsd-bugs
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Mar 24 20:50:01 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator: pluknet
>Release:
>Organization:
>Environment:
>Description:
The attached patch brings the Russian Security page up to date.
>How-To-Repeat:

>Fix:


Patch attached with submission follows:

--- www.orig/ru/security/security.sgml  2010-03-24 21:55:08.0 +0300
+++ www/ru/security/security.sgml   2010-03-24 22:07:47.0 +0300
@@ -4,7 +4,7 @@
  $FreeBSD: www/ru/security/security.sgml,v 1.20 2010/02/20 23:37:15 gabor 
Exp $
  $FreeBSDru: frdp/www/ru/security/security.sgml,v 1.33 2004/09/21 07:31:12 
den Exp $
 
- Original revision: 1.209
+ Original revision: 1.211
 -->
 
 7.2-RELEASE
   ïÂÙÞÎÙÊ
   4 ÍÁÑ 2009
-  31 ÍÁÑ 2010
+  30 ÉÀÎÑ 2010
+
+
+  RELENG_7_3
+  7.3-RELEASE
+  òÁÓÛÉÒÅÎÎÙÊ
+  23 ÍÁÒÔÁ 2010
+  31 ÍÁÒÔÁ 2012
 
 
   RELENG_8
@@ -298,6 +305,13 @@
   25 ÎÏÑÂÒÑ 2009
   30 ÎÏÑÂÒÑ 2010
 
+
+  RELENG_8_1
+  8.1-RELEASE
+  òÁÓÛÉÒÅÎÎÙÊ
+  ÐÏËÁ ÎÅÔ
+  ÒÅÌÉÚ + 2 ÇÏÄÁ
+
   
 
   âÏÌÅÅ ÓÔÁÒÙÅ ÒÅÌÉÚÙ ÎÅ ÐÏÄÄÅÒÖÉ×ÁÀÔÓÑ, Á ÉÈ ÐÏÌØÚÏ×ÁÔÅÌÑÍ ÎÁÓÔÏÑÔÅÌØÎÏ


>Release-Note:
>Audit-Trail:
>Unformatted:
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: misc/145013: [patch] ru/security/security.sgml: MFen 1.209 -> 1.211

2010-03-24 Thread pluknet
The following reply was made to PR misc/145013; it has been noted by GNATS.

From: pluknet 
To: bug-follo...@freebsd.org, pluk...@gmail.com
Cc:  
Subject: Re: misc/145013: [patch] ru/security/security.sgml: MFen 1.209 -> 
1.211
Date: Wed, 24 Mar 2010 23:58:22 +0300

 I'm sorry. Change to `doc' category requested.
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: docs/145013: [patch] ru/security/security.sgml: MFen 1.209 -> 1.211

2010-03-24 Thread remko
Synopsis: [patch] ru/security/security.sgml: MFen 1.209 -> 1.211

Responsible-Changed-From-To: freebsd-bugs->freebsd-doc
Responsible-Changed-By: remko
Responsible-Changed-When: Wed Mar 24 21:08:32 UTC 2010
Responsible-Changed-Why: 
reassign to docteam

http://www.freebsd.org/cgi/query-pr.cgi?pr=145013
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"


Re: conf/145009: [patch] rc.subr(8): rc.conf should allow mac label configuration

2010-03-24 Thread linimon
Old Synopsis: rc.conf should allow mac label configuration
New Synopsis: [patch] rc.subr(8): rc.conf should allow mac label configuration

Responsible-Changed-From-To: freebsd-bugs->freebsd-rc
Responsible-Changed-By: linimon
Responsible-Changed-When: Wed Mar 24 23:21:15 UTC 2010
Responsible-Changed-Why: 
Over to maintainer(s).

http://www.freebsd.org/cgi/query-pr.cgi?pr=145009
___
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"