ViewVC Help
View File | Revision Log | Show Annotations | Download File | View Changeset | Root Listing
root/src/trunk/UPDATING
Revision: 12288
Committed: Wed Nov 13 03:43:00 2019 UTC (4 years, 5 months ago) by laffer1
File size: 66715 byte(s)
Log Message:
fixed a bug with mport clean

File Contents

# Content
1 Updating Information for MidnightBSD users.
2
3
4 20191112:
5 Fixed a bug where packages wouldn't get removed on mport clean. While there
6 added ability to detect files that don't match the checksum of the packages.
7 This will cleanup failed downloads as well as packages from older releases.
8
9 20191031:
10 MidnightBSD 1.2 release, continuing development on 1.3
11
12 20190822:
13 The kernel driver for /dev/midistat implements a handler for read(2).
14 This handler is not thread-safe, and a multi-threaded program can
15 exploit races in the handler to cause it to copy out kernel memory
16 outside the boundaries of midistat's data buffer.
17
18 System calls operating on file descriptors obtain a reference to
19 relevant struct file which due to a programming error was not always put
20 back, which in turn could be used to overflow the counter of affected
21 struct file.
22
23 20190821:
24 Security patch for CVE-2019-5611.
25
26 Due do a missing check in the code of m_pulldown(9) data returned may not be
27 contiguous as requested by the caller.
28
29 20190808:
30 OpenSSH 7.9p1
31
32 bzip2 1.0.7
33
34 bsnmp
35 A function extracting the length from type-length-value encoding is not
36 ` properly validating the submitted length.
37
38 jedec_dimm - some modules falsely report supporting temp sensors. Handle this
39 better.
40
41 20190724:
42 Fix some buffer overflows in telnet client
43
44 The code which handles a close(2) of a descriptor created by
45 posix_openpt(2) fails to undo the configuration which causes SIGIO to be
46 raised. This bug can lead to a write-after-free of kernel memory.
47
48 Due to insufficient initialization of memory copied to userland in the
49 components listed above small amounts of kernel memory may be disclosed
50 to userland processes.
51
52 20190417:
53 bring back deroff(1) to fix spell(1)
54
55 20190209:
56 MidnightBSD 1.2-CURRENT development starts.
57
58 20190118:
59 OpenSSH 7.5p1
60
61 mksh R56c
62
63 OpenSSL 1.0.2p
64
65 20181223:
66 Import Perl 5.28.0
67
68 20181130:
69 ICMP Buffer underwrite fix
70
71 20181109:
72 Add the ability to disable TRIM on specific controllers or drives
73 that have bugs.
74
75 20181021:
76 Update ACPICA to 20161117
77
78 Update ACPICA to 20160930
79
80 20181002:
81 Stable 1.0 branch created. Continuing development on 1.1
82
83 Reintroduce groff and reconnect to build. Removal causes issue with perl ports
84 and we don't quite have things aligned to get rid of this yet.
85
86 20180912:
87 ELF header security issue
88
89 Insufficient validation was performed in the ELF header parser, and malformed
90 or otherwise invalid ELF binaries were not rejected as they should be.
91
92 20180911:
93 Add support for Corsair K70 LUX keyboard.
94
95 20180815:
96 When using WPA2, EAPOL-Key frames with the Encrypted flag and without the MIC
97 flag set, the data field was decrypted first without verifying the MIC. When
98 the dta field was encrypted using RC4, for example, when negotiating TKIP as
99 a pairwise cipher, the unauthenticated but decrypted data was subsequently
100 processed. This opened wpa_supplicant(8) to abuse by decryption and recovery
101 of sensitive information contained in EAPOL-Key messages.
102
103 See https://w1.fi/security/2018-1/unauthenticated-eapol-key-decryption.txt
104 for a detailed description of the bug.
105
106 20180720:
107 Pull in r211155 from upstream llvm trunk (by Tim Northover):
108
109 DAG: move sret demotion into most basic LowerCallTo implementation.
110
111 It looks like there are two versions of LowerCallTo here: the
112 SelectionDAGBuilder one is designed to operate on LLVM IR, and the
113 TargetLowering one in the case where everything is at DAG level.
114
115 Previously, only the SelectionDAGBuilder variant could handle
116 demoting an impossible return to sret semantics (before delegating to
117 the TargetLowering version), but this functionality is also useful
118 for certain libcalls (e.g. 128-bit operations on 32-bit x86). So
119 this commit moves the sret handling down a level.
120
121 This should fix "Call result #3 has unhandled type i32" errors when
122 building devel/libslang2 for i386.
123
124 Add support for AMD X370 and X399 chipsets.
125
126 Add support for Intel 8th gen chipsets.
127
128 20180719:
129 Add the AMD B350 Ryzen (300 series) AHCI and XHCI controllers
130
131 20180715:
132 Support wake on lan for Intel gigabit nics in Ice Lake and Cannon Lake devices.
133
134 Fix some man page issues
135
136 Fix some compatibility and locking issues with NFS client/srver
137
138 Loosely eqiuvalent to FreeBSD 10 stable 334699 (june 6)
139
140 20180708:
141 Expat 2.2.0
142
143 20180704:
144 Import FreeBSD 10 stable features from SVN revision 334154
145
146 less 530
147
148 tcsh 6.20
149
150 libc-vis 2017/4/30 (netbsd)
151
152 20180120:
153 gperf 3.0.3
154
155 20180119:
156 mandoc 1.14.3
157
158 20171222:
159 zlib 1.2.11
160
161 LLVM / Clang 3.4.1
162
163 20171123:
164 mport now supports installing multiple packages with one command.
165
166 binutils updated/synced with FreeBSD 11-stable (today)
167
168 20171022:
169 wpa_supplicant & hostapd 2.0. This also includes patches for the
170 recent KRACK vulnerability.
171
172 20171003:
173 SQLite 3.20.1
174
175 20171001:
176 Subversion 1.8.17
177
178 Perl 5.26.0
179
180 Change 0.10 version to 1.0. There are several compatibility issues
181 with using 0.10 as the trailing zero is dropped in several utilities
182 making it look like 0.1.
183
184 20170918:
185 Introduce nvme(4) and nvd(4) from FreeBSD.
186
187 Fix build of boot code and rescue.
188
189 20170819:
190 Heimdal KDC-REP service name validation vulerability patched.
191
192 Introduce a partial fix for AMD Ryzen issues. On Ryzen, move
193 the lower shared page by one.
194
195 20170326:
196 sudo removed from base. Use doas(1) or install sudo from mports
197
198 Stable 0.9 created, continue development on 0.10
199
200 20170305:
201 Add hast module to bsnmpd
202
203 20170302:
204 add a callback to the ada(4) driver so that it knows when
205 GEOM has released references to it.
206
207 20170219:
208 Add /dev/full device.
209
210 The lindev device has been removed since /dev/full has been made a
211 standard device.
212
213 Serf 1.3.9
214 Subversion 1.8.10
215 apr 1.5.2
216 apr-util 1.5.4
217
218 20170129:
219 add doas utility from OpenBSD.
220
221 20161105:
222 BIND 9.9.9-p4
223
224 OpenSSH 7.3p1
225
226 20161103:
227 OpenSSL security patch
228
229 Due to improper handling of alert packets, OpenSSL would consume an excessive
230 amount of CPU time processing undefined alert messages.
231
232 20161015:
233 libarchive 3.2.1
234
235 xz 5.2.2
236
237 20161013:
238 Sync ZFS code with Illuminos/FreeBSD 9.2. Added support for
239 feature flags, pool version 5000. This also includes some
240 bug fixes and performance optimizations.
241
242 20160925:
243 Import NetBSD vis(3) and unvis(3) as well as mtree.
244
245 one-true-awk 20121220
246
247 inetd now honors kern.ipc.somaxconn value.
248
249 netmap synced with FreeBSD 9.2
250
251 linuxolator now has dtrace probes.
252
253 bsdgrep now correctly handles -m to exclude only one file.
254
255 UFS file systems can now be resized in read-write mode due to the new
256 write suspension feature.
257
258 Basic support added for Intel Raid Recover Technology.
259
260 GMIRROR & GRAID3 now mark volumes clean on shutdown earlier to help with ZFS issues.
261
262 Highpoint hpt27xx now in GENERIC kernel.
263
264 20160923:
265 Security update for OpenSSL
266
267 A malicious client can send an excessively large OCSP Status Request extension.
268 If that client continually requests renegotiation, sending a large OCSP Status
269 Request extension each time, then there will be unbounded memory growth on the
270 server. [CVE-2016-6304]
271
272 An overflow can occur in MDC2_Update() either if called directly or through
273 the EVP_DigestUpdate() function using MDC2. If an attacker is able to supply
274 very large amounts of input data after a previous call to EVP_EncryptUpdate()
275 with a partial block then a length check can overflow resulting in a heap
276 corruption. [CVE-2016-6303]
277
278 If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a
279 DoS attack where a malformed ticket will result in an OOB read which will
280 ultimately crash. [CVE-2016-6302]
281
282 The function BN_bn2dec() does not check the return value of BN_div_word().
283 This can cause an OOB write if an application uses this function with an
284 overly large BIGNUM. This could be a problem if an overly large certificate
285 or CRL is printed out from an untrusted source. TLS is not affected because
286 record limits will reject an oversized certificate before it is parsed.
287 [CVE-2016-2182]
288
289 The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is
290 the total length the OID text representation would use and not the amount
291 of data written. This will result in OOB reads when large OIDs are presented.
292 [CVE-2016-2180]
293
294 Some calculations of limits in OpenSSL have used undefined pointer arithmetic.
295 This could cause problems with some malloc implementations. [CVE-2016-2177]
296
297 Operations in the DSA signing algorithm should run in constant time in order to
298 avoid side channel attacks. A flaw in the OpenSSL DSA implementation means that
299 a non-constant time codepath is followed for certain operations. [CVE-2016-2178]
300
301 In a DTLS connection where handshake messages are delivered out-of-order those
302 messages that OpenSSL is not yet ready to process will be buffered for later
303 use. Under certain circumstances, a flaw in the logic means that those messages
304 do not get removed from the buffer even though the handshake has been completed.
305 An attacker could force up to approx. 15 messages to remain in the buffer when
306 they are no longer required. These messages will be cleared when the DTLS
307 connection is closed. The default maximum size for a message is 100k. Therefore
308 the attacker could force an additional 1500k to be consumed per connection.
309 [CVE-2016-2179]
310
311 A flaw in the DTLS replay attack protection mechanism means that records that
312 arrive for future epochs update the replay protection "window" before the MAC
313 for the record has been validated. This could be exploited by an attacker by
314 sending a record for the next epoch (which does not have to decrypt or have a
315 valid MAC), with a very large sequence number. This means that all subsequent
316 legitimate packets are dropped causing a denial of service for a specific
317 DTLS connection. [CVE-2016-2181]
318
319 In OpenSSL 1.0.2 and earlier some missing message length checks can result in
320 OOB reads of up to 2 bytes beyond an allocated buffer. There is a theoretical
321 DoS risk but this has not been observed in practice on common platforms.
322 [CVE-2016-6306]
323
324 20160918:
325 With the addition of auditdistd(8), a new auditdistd user is now
326 depended on during installworld. "mergemaster -p" can be used to add
327 the user prior to installworld.
328
329 The VFS KBI was changed with the merge of several nullfs
330 optimizations and fixes. All filesystem modules must be
331 recompiled.
332
333 20160916:
334 The random(4) support for the VIA hardware random number
335 generator (`PADLOCK') is no longer enabled unconditionally.
336 Add the PADLOCK_RNG option in the custom kernel config if
337 needed. The GENERIC kernels on i386 and amd64 do include the
338 option, so the change only affects the custom kernel
339 configurations.
340
341 A new version of ZFS (pool version 5000) has been merged.
342 Starting with this version the old system of ZFS pool versioning
343 is superseded by "feature flags". This concept enables forward
344 compatibility against certain future changes in functionality of ZFS
345 pools. The first two read-only compatible "feature flags" for ZFS
346 pools are "com.delphix:async_destroy" and "com.delphix:empty_bpobj".
347 For more information read the new zpool-features(7) manual page.
348 Please refer to the "ZFS notes" section of this file for information
349 on upgrading boot ZFS pools.
350
351 20160906:
352 Add support for the MosChip MCS9904 four serial ports
353 controller.
354
355 Add support for walltimestamp in DTrace.
356
357 Various gdb improvments.
358
359 ZFS
360 Import the zio nop-write improvement from Illumos. To reduce I/O,
361 nop-write omits overwriting data if the checksum (cryptographically
362 secure) of new data matches the checksum of existing data.
363 It also saves space if snapshots are in use.
364
365 It currently works only on datasets with enabled compression, disabled
366 deduplication and sha256 checksums.
367
368 Add loader(8) tunable to enable/disable nopwrite functionality:
369 vfs.zfs.nopwrite_enabled
370
371 Introduce a new dataset aclmode setting "restricted" to protect ACL's
372 being destroyed or corrupted by a drive-by chmod.
373
374 New loader-only tunables:
375 vfs.zfs.sync_pass_deferred_free
376 vfs.zfs.sync_pass_dont_compress
377 vfs.zfs.sync_pass_rewrite
378
379 chkgrp(8) add support for q flag
380
381 Fix problem with the Samsung 840 PRO series SSD detection.
382 The device reports support for SATA Asynchronous Notification in its
383 IDENTIFY data, but returns error on attempt to enable that feature.
384 Make SATA XPT of CAM only report these errors, but not fail the device.
385
386 20160905:
387 Add a resource limit for the total number of kqueues
388 available to the user. Kqueue now saves the ucred of the
389 allocating thread, to correctly decrement the counter on close.
390 Based on FreeBSD SVN 256849
391
392 Import netcat from OpenBSD 5.2
393
394 20160904:
395 Introduced experimental TCP sysctls starting with
396 net.inet.tcp.experimental.initcwnd10
397
398 20160814:
399 switched default desktop port to midnightbsd-desktop. This gives us flexibility to change it
400 in the release after the fact.
401
402 tzdata 2016a
403
404 20160811:
405 libdispatch 210
406
407 Added quirks for several models of SSDs to enable advanced format/4k mode. List includes
408 Samsung 830, 840, 850 and 750 series, Intel x25 and a few Toshiba models. Also
409 added WD Red drives.
410
411 Updated list of pci device vendors.
412
413 Updated list of usb devices.
414
415 20160807:
416 Implement several changes to libmport to fix some memory corruption issues.
417
418 20160806:
419 sqlite3 3.13.0
420
421 20160805:
422 Merged fixes for libmport that improve error handling when installing packages. Also
423 support mkdir -p like behavior for plist entries.
424
425 20160531:
426 Fix four security issues with MidnightBSD.
427
428 The implementation of TIOCGSERIAL ioctl(2) does not clear the output
429 struct before sending to userland in the linux emulation layer.
430
431 The compat 43 stat(2) system call exposes kernel stack to userland.
432
433 libarchive - CVE-2015-2304 and CVE-2013-0211 fix issues with
434 cpio directory traversal and an integer signedness error in the archive
435 write zip data routine.
436
437
438 20160528:
439 Fixed minor issues with mined(1) and msearch(1).
440
441 20160526:
442 Add support for Ivybridge and Haswell Intel CPUs to hwpmc(4).
443
444 Fix libpmc(3) build with clang compiler.
445
446 20160519:
447 Kernel Security updates
448
449 atkbd(4) - Incorrect signedness comparison in the ioctl(2) handler allows a malicious
450 local user to overwrite a portion of the kernel memory.
451
452 Incorrect argument handling in sendmsg(2)
453
454 Incorrect argument handling in the socket code allows malicious local
455 user to overwrite large portion of the kernel memory.
456
457 20160505:
458 OpenSSL security patch
459
460 The padding check in AES-NI CBC MAC was rewritten to be in constant time
461 by making sure that always the same bytes are read and compared against
462 either the MAC or padding bytes. But it no longer checked that there was
463 enough data to have both the MAC and padding bytes. [CVE-2016-2107]
464
465 An overflow can occur in the EVP_EncodeUpdate() function which is used for
466 Base64 encoding of binary data. [CVE-2016-2105]
467
468 An overflow can occur in the EVP_EncryptUpdate() function, however it is
469 believed that there can be no overflows in internal code due to this problem.
470 [CVE-2016-2106]
471
472 When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio()
473 a short invalid encoding can casuse allocation of large amounts of memory
474 potentially consuming excessive resources or exhausting memory.
475 [CVE-2016-2109]
476
477 20160412:
478 0.8 stable branch created. Continue development as 0.9.
479
480 Fix several issues with wait6 system call addition.
481
482 20160409:
483 libmport now supports two new plist formats:
484 @(root,wheel,4775) myfile
485 @dir(root,wheel,775) mydir
486
487 On delete, absoluate paths are now handled properly.
488
489 20160317:
490 OpenSSH doesn't have the luck of the Irish.
491
492 Fix a security issue with OpenSSH X11 forwarding that can allow an attacker
493 run shell commands on the call to xauth.
494
495 Incorrect argument validation in sysarch(2)
496
497 A special combination of sysarch(2) arguments, specify a request to
498 uninstall a set of descriptors from the LDT. The start descriptor
499 is cleared and the number of descriptors are provided. Due to invalid
500 use of a signed intermediate value in the bounds checking during argument
501 validity verification, unbound zero'ing of the process LDT and adjacent
502 memory can be initiated from usermode.
503
504 Patch obtained from FreeBSD.
505
506 20160229:
507 top now displays information on ZFS arc cache.
508
509 20160228:
510 llvm + clang 3.3 is now the default compiler in MidnightBSD.
511
512 20160222:
513 Introduce pipe2 to linux emulation layer.
514
515 20160114:
516 OpenSSL
517
518 The signature verification routines will crash with a NULL pointer dereference
519 if presented with an ASN.1 signature using the RSA PSS algorithm and absent
520 mask generation function parameter. [CVE-2015-3194]
521
522 When presented with a malformed X509_ATTRIBUTE structure, OpenSSL will leak
523 memory. [CVE-2015-3195]
524
525 If PSK identity hints are received by a multi-threaded client then the values
526 are incorrectly updated in the parent SSL_CTX structure. [CVE-2015-3196]
527
528 Fix security on bsnmpd configuration file during installation.
529
530 TCP MD5 signature denial of service
531
532 A programming error in processing a TCP connection with both TCP_MD5SIG
533 and TCP_NOOPT socket options may lead to kernel crash.
534
535 SCTP
536
537 A lack of proper input checks in the ICMPv6 processing in the SCTP stack
538 can lead to either a failed kernel assertion or to a NULL pointer
539 dereference. In either case, a kernel panic will follow.
540
541 20160102:
542 Happy New Year
543
544 20151101:
545 Increase kern.ipc.somaxconn default to 256.
546
547 20151017:
548 Add initial statistics api to libmport and a driver to print
549 it in mport(1).
550
551 20151002:
552 Revised rpcbind(8) patch to fix issues with NIS
553
554 20150930:
555 In rpcbind(8), netbuf structures are copied directly, which would result in
556 two netbuf structures that reference to one shared address buffer. When one
557 of the two netbuf structures is freed, access to the other netbuf structure
558 would result in an undefined result that may crash the rpcbind(8) daemon.
559
560 20150926:
561 libmport now supports @preexec, @postexec, @preunexec and @postunexec
562 to replace @exec and @unexec.
563
564 pre exec runs afer pre-install scripts but before actual installation
565
566 post exec runs after install but before post install scripts and
567 pkg message.
568
569 pre unexec runs before pre uninstall scripts
570
571 post unexec runs before de-install scripts and after file removal.
572
573 20150917:
574 Fix kqueue write events for files > 2GB
575
576 20150825:
577 kernel:
578 fix a security issue on amd64 where the GS segment CPU register can be changed via
579 userland value in kernel mode by using an IRET with #SS or #NP exceptions.
580
581 openssh:
582 A programming error in the privileged monitor process of the sshd(8)
583 service may allow the username of an already-authenticated user to be
584 overwritten by the unprivileged child process.
585
586 A use-after-free error in the privileged monitor process of he sshd(8)
587 service may be deterministically triggered by the actions of a
588 compromised unprivileged child process.
589
590 A use-after-free error in the session multiplexing code in the sshd(8)
591 service may result in unintended termination of the connection.
592
593 20150818:
594 expat security fix
595
596 20150815:
597 libc changes:
598 setmode(3) now returns errno consistently on error.
599 libc will compile without error using clang
600
601 20150814:
602 wait6 system call added.
603
604 date(1) now handles non numeric numbers passed to -r
605 like GNU coreutils for improved compatibility.
606
607 20150811:
608 ata(4) AMD Hudson2 SATA controller support.
609 Intel lynxpoint SATA.
610
611 Fix some const warnings when building several device drivers
612 with llvm/clang.
613
614 Sync cas(4) with FreeBSD 9-stable.
615
616 Fix some minor issues with ath(4).
617
618 20150809:
619 xz 5.0.8
620
621 20150808:
622 libmport now logs installation and removal of packages to syslog.
623
624 20150805:
625 routed - fix a potential security issue where traffic from outside
626 the network can disrupt routing.
627
628 bsd patch - fix a bug with ed(1) scripts allowing unsanitized input
629 to run.
630
631 20150802:
632 jansson 2.7 library added. (libjansson is a JSON library in C)
633
634 20150728:
635 Heimdal 1.5.2 (kerberos implementation)
636
637 OpenSSL 1.0.1o
638
639 cpucontrol(8) now supports VIA CPUs. Synced with FreeBSD 9.2.
640
641 TCP Resassemly resource exhaustion bug:
642 There is a mistake with the introduction of VNET, which converted the
643 global limit on the number of segments that could belong to reassembly
644 queues into a per-VNET limit. Because mbufs are allocated from a
645 global pool, in the presence of a sufficient number of VNETs, the
646 total number of mbufs attached to reassembly queues can grow to the
647 total number of mbufs in the system, at which point all network
648 traffic would cease.
649 Obtained from: FreeBSD 8
650
651 OpenSSH
652
653 Fix two security vulnerabilities:
654 OpenSSH clients does not correctly verify DNS SSHFP records when a server
655 offers a certificate. [CVE-2014-2653]
656
657 OpenSSH servers which are configured to allow password authentication
658 using PAM (default) would allow many password attempts. A bug allows
659 MaxAuthTries to be bypassed. [CVE-2015-5600]
660
661
662 Switch to bsdpatch (from FreeBSD & OpenBSD)
663
664 20150726:
665 BSD Sort updated
666
667 sqlite 3.8.10.2
668
669 20150725:
670 Import reallocarray from OpenBSD's libc.
671
672 The reallocarray() function is similar to realloc() except it operates on
673 nmemb members of size size and checks for integer overflow in the
674 calculation nmemb * size.
675
676 20150722:
677 Fix a bug where TCP connections transitioning to LAST_ACK
678 state can get stuck. This can result in a denial of service.
679
680 20150715:
681 libmport now supports @shell and @sample in plists. This means that
682 a shell port can automatically add an entry to /etc/shells and remove
683 it upon uninstallation. For sample files, a copy is made without the
684 .sample extension if one does not exist and it is removed automatically
685 only if the md5 hash of the two files is the same.
686
687 20150709:
688 flex 2.5.39
689
690 20150702:
691 ZFS in MidnightBSD now supports lz4 compression. You can enable it
692 with zfs set compression=lz4 pool/path.
693
694 Verify it's working with
695 zfs get compressratio pool/path
696 du -h -s *
697
698 Note you must write new data when turning on compression to see
699 changes. Existing files are not compressed.
700
701 Note: While we used the same basic implementation of lz4 that
702 FreeBSD and OpenZFS uses, we did not yet implement features support
703 and the zfs version still reports 28. This may come in a future update
704 to ZFS.
705
706 20150621:
707 libmport now automatically stops services when deleting packages.
708
709 The package must have installed an rc.d script in /usr/local/etc
710 for this to work. This is equivalent to running service <name> onestop
711
712 20150618:
713 Sendmail
714
715 With the recent changes to OpenSSL to block 512 bit certificates,
716 sendmail can't connect with TLS to some servers.
717
718 Increase the default size to 1024 bit for client connections to
719 match the server configuration.
720
721 ZFS
722
723 Added ZFS TRIM support which is enabled by default. To disable
724 ZFS TRIM support set vfs.zfs.trim.enabled=0 in loader.conf.
725
726 Creating new ZFS pools and adding new devices to existing pools
727 first performs a full device level TRIM which can take a significant
728 amount of time. The sysctl vfs.zfs.vdev.trim_on_init can be set to 0
729 to disable this behaviour.
730
731 ZFS TRIM requires the underlying device support BIO_DELETE which
732 is currently provided by methods such as ATA TRIM and SCSI UNMAP
733 via CAM, which are typically supported by SSD's.
734
735 Stats for ZFS TRIM can be monitored by looking at the sysctl's
736 under kstat.zfs.misc.zio_trim.
737
738 rc.d
739
740 Reworked handling of cleanvar and FILESYSTEMS so that FILESYSTEMS
741 implies everything is mounted and ready to go.
742
743 Changed how ip6addressctl maps IPv6 on startup.
744
745 20150613:
746 tzdata 2015d
747
748 20150612:
749 OpenSSL 0.9.8zg
750
751 20150419:
752 MidnightBSD 0.6 stable branch created. Continue 0.7
753 development.
754
755 20150418:
756 sqlite 3.8.9
757
758 20150407:
759 Fix two security vulnerabilities:
760
761 The previous fix for IGMP had an overflow issue. This has been corrected.
762
763 ipv6: The Neighbor Discover Protocol allows a local router to advertise a
764 suggested Current Hop Limit value of a link, which will replace
765 Current Hop Limit on an interface connected to the link on the MidnightBSD
766 system.
767
768 20150319:
769 OpenSSL 0.9.8.zf
770
771 mksh R50e
772
773 Apple mDNSResponder 561.1.1
774
775 20150306:
776 Upgrade OpenSSL to 0.9.8ze
777
778 20150225:
779 Fix two security vulnerabilities.
780
781 1. BIND servers which are configured to perform DNSSEC validation and which
782 are using managed keys (which occurs implicitly when using
783 "dnssec-validation auto;" or "dnssec-lookaside auto;") may exhibit
784 unpredictable behavior due to the use of an improperly initialized
785 variable.
786
787 CVE-2015-1349
788
789 2. An integer overflow in computing the size of IGMPv3 data buffer can result
790 in a buffer which is too small for the requested operation.
791
792 This can result in a DOS attack.
793
794 20141211:
795 Fix a security issue with file and libmagic that can allow
796 an attacker to create a denial of service attack on any
797 program that uses libmagic.
798
799 20141109:
800 Fix building perl during buildworld when the GDBM port is installed.
801
802 20141106:
803 tzdata 2014i
804
805 20141102:
806 serf 1.3.8
807
808 20141031:
809 tnftp 20141031 fixes a security vulnerability with tnftp,
810 CVE-2014-8517.
811
812 20141028:
813 OpenSSL 0.9.8zc
814
815 20141021:
816 Fix several security vulnerabilities in routed, rtsold,
817 and namei with respect to Capsicum sandboxes looking up
818 nonexistent path names and leaking memory.
819
820 The input path in routed(8) will accept queries from any source and
821 attempt to answer them. However, the output path assumes that the
822 destination address for the response is on a directly connected
823 network.
824
825 Due to a missing length check in the code that handles DNS parameters,
826 a malformed router advertisement message can result in a stack buffer
827 overflow in rtsold(8).
828
829 20141011:
830 mksh R50d - fix field splitting regression and null
831 pointer dereference
832
833 xz 5.0.7
834
835 OpenSSH 6.6p1
836
837 20141004:
838 mksh R50c - security update for environment var bug with
839 foo vs foo+
840
841 20141002:
842 sqlite 3.8.6
843
844 sudo 1.7.8 - some issues with the current version, but we're slowly
845 getting up to date.
846
847 20141001:
848 mksh R50b
849
850 libmport now supports plist commands @dir, @owner, @group, @mode.
851
852 sudo 1.7.6p2
853
854 20140916:
855 Fix a security issue with TCP SYN.
856
857 When a segment with the SYN flag for an already existing connection arrives,
858 the TCP stack tears down the connection, bypassing a check that the
859 sequence number in the segment is in the expected window.
860
861 20140909:
862 Fixed a bug with our clearenv(3) implementation that caused segfaults
863 with some programs including Dovecot.
864
865 OpenSSL security patch:
866
867 The receipt of a specifically crafted DTLS handshake message may cause OpenSSL
868 to consume large amounts of memory. [CVE-2014-3506]
869
870 The receipt of a specifically crafted DTLS packet could cause OpenSSL to leak
871 memory. [CVE-2014-3507]
872
873 A flaw in OBJ_obj2txt may cause pretty printing functions such as
874 X509_name_oneline, X509_name_print_ex et al. to leak some information from
875 the stack. [CVE-2014-3508]
876
877 OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject to
878 a denial of service attack. [CVE-2014-3510]
879
880 20140902:
881 We're now 0.6-CURRENT
882
883 Update USB quirks to support K70 Corsair keyboard, and several
884 other devices.
885
886 20140827:
887 Perl 5.18.2
888
889 20140728:
890 Jails now run shutdown scripts.
891
892 20140710:
893 Fix a vulnerability in the control message API. A buffer is not properly cleared
894 before sharing with userland.
895
896 20140701:
897 MKSH R50
898
899 20140630:
900 File 5.19
901
902 20140605:
903 Fix four security issues with OpenSSL
904
905 20140604:
906 Sendmail failed to properly set close-on-exec for open file descriptors.
907
908 ktrace page fault kernel trace entries were set to an incorrect size which resulted
909 in a leak of information.
910
911 20140430:
912 Fix a TCP reassembly bug that could result in a DOS attack
913 of the system. It may be possible to obtain portions
914 of kernel memory as well.
915
916 20140411:
917 Update zlib to 1.2.7
918
919 20140122:
920 Support for username with length 32. Previous limit was 16
921
922 20140114:
923 Fix two security vulnerabilities.
924
925 bsnmpd contains a stack overflow when sent certain queries.
926
927 bind 9.8 when using NSEC3-signed zones zones, will crash with special
928 crafted packets.
929
930 20131228:
931 Imported FreeBSD 9.2 usb stack (plus z87 patches from stable)
932
933 Updated em(4), igb(4) and ixgbe(4)
934
935 MidnightBSD now works with Z87 Intel chipsets.
936
937 20131207:
938 Remove sparc64 architecture. It hasn't been working for awhile
939 and it's not useful for desktops anymore.
940
941 20131205:
942 OpenSSH 6.4p1
943
944 20131203:
945 Perl 5.18.1 imported.
946
947 Update less to v458
948
949 20131130:
950 Remove named from base. We still include the client utilities for
951 now until replacements can be found.
952
953 20131004:
954 rarpd supports vlan(4) and has a pid flag. (from FreeBSD)
955
956 20130917:
957 Support for 65,536 routing tables was added. A new fib specific
958 field has been added to mbuf. This is an increase from 16.
959
960 20130910:
961 Security updates: (kern.osreldate 5001)
962
963 nullfs(5)
964
965 The nullfs(5) implementation of the VOP_LINK(9) VFS operation does not
966 check whether the source and target of the link are both in the same
967 nullfs instance. It is therefore possible to create a hardlink from a
968 location in one nullfs instance to a file in another, as long as the
969 underlying (source) filesystem is the same.
970
971 ifioctl
972
973 As is commonly the case, the IPv6 and ATM network layer ioctl request
974 handlers are written in such a way that an unrecognized request is
975 passed on unmodified to the link layer, which will either handle it or
976 return an error code.
977
978 Network interface drivers, however, assume that the SIOCSIFADDR,
979 SIOCSIFBRDADDR, SIOCSIFDSTADDR and SIOCSIFNETMASK requests have been
980 handled at the network layer, and therefore do not perform input
981 validation or verify the caller's credentials. Typical link-layer
982 actions for these requests may include marking the interface as "up"
983 and resetting the underlying hardware.
984
985 20130824:
986 Fix a bug in sendmail 8.14.7 that interferes with how it
987 handles AAAA records interoperating with Microsoft DNS servers.
988 FreeBSD has already reported this to Sendmail and a fix
989 will be included in the next release.
990
991 Subversion 1.8.1 is now in the base system as a static
992 binary. It has limited functionality, but can be used to
993 checkout/commit code. It is named svnlite.
994
995 20130822:
996 Fix two security vulnerabilities.
997
998 Fix an integer overflow in IP_MSFILTER (IP MULTICAST).
999 This could be exploited to read memory by a user process.
1000
1001 When initializing the SCTP state cookie being sent in INIT-ACK chunks,
1002 a buffer allocated from the kernel stack is not completely initialized.
1003
1004 Import xz 5.0.4
1005
1006 Import sqlite 3.7.17
1007
1008 Import BIND 9.8.5-P2
1009
1010 20130814:
1011 mksh R48 imported.
1012
1013 Sendmail 8.14.7 imported.
1014
1015 20130717:
1016 libmport bug was fixed causing hash verification to fail.
1017
1018 virtio(4) imported from FreeBSD 9-stable. SCSI support not
1019 included.
1020
1021 20130612:
1022 RELENG_0_4 created for 0.4. Development continues on 0.5.
1023
1024 20130402:
1025 Update BIND and OpenSSL to resolve security advisories.
1026
1027 20130305:
1028 MKSH R44 imported.
1029
1030 20130213:
1031 MKSH R42b imported
1032
1033 20130211:
1034 MKSH R42 imported
1035
1036 20130125:
1037 MKSH R41 imported
1038
1039 20130122:
1040 OpenSSH 5.8p2 imported
1041
1042 SQLite 3.7.15.2 imported
1043
1044 Fixed a longstanding bug in libmport extrating new index files.
1045
1046 20120710:
1047 BSD licensed sort imported from FreeBSD-CURRENT
1048
1049 For now, GNU sort is installed as gnusort, but it will
1050 go away in time.
1051
1052 20120708:
1053 tcsh 6.18.01 imported.
1054
1055 NetBSD's iconv imported.
1056
1057 libc gains strnlen(3), memrchr(3), stpncpy(3).
1058
1059 20120612:
1060 BIND security update related to CVE-2012-1667.
1061
1062 Zero length resource records can cause BIND to crash resulting
1063 in a DOS attack or information disclosure.
1064
1065 20120407:
1066 mksh R40f (fixes regression)
1067
1068 20120328:
1069 mksh R40e
1070
1071 Perl 5.14.2
1072
1073 20120229:
1074 cpucontrol(8) and cpuctl(4) added from FreeBSD 7-stable.
1075
1076 20120209:
1077 mDNSResponder 333.10 imported
1078
1079 20111227:
1080 import raid5 module for GEOM, graid5(8)
1081
1082 This is experimental and known to use a lot of kernel
1083 memory.
1084
1085 20111223:
1086 telnetd: fix a root exploit from a fixed buffer that was not checked
1087
1088 pam: don't allow escape from policy path. Exploitable in KDE, etc.
1089
1090 Fix pam_ssh module:
1091
1092 If the pam_ssh module is enabled, attackers may be able to gain access
1093 to user accounts which have unencrypted SSH private keys.
1094
1095 This has to due with the way that openssl works. It ignores unencrpted data.
1096
1097 Fix security issue with chroot and ftpd.
1098
1099 nsdispatch(3) doesn't know it's working in a chroot and some
1100 operations can cause files to get reloaded causing a security
1101 hole in things like ftpd.
1102
1103 20111217:
1104 libdialog/dialog upgraded to an lgpl version. As it's not
1105 backwardly compatable, include the old libdialog as libodialog
1106
1107 20111212:
1108 mksh r40d imported
1109
1110 20111210:
1111 re(4) and rl(4) updated to support new chips.
1112
1113 GEOM synced with FreeBSD 7-stable.
1114
1115 MidnightBSD GPT partition types created in sys/gpt.h and
1116 setup in boot loader and GEOM.
1117
1118 amdsbwd(4) (amd watchdog for south bridge) updated to support
1119 8xx series chipset.
1120
1121 20111207:
1122 import bsd grep from FreeBSD/OpenBSD.
1123
1124 MK_BSD_GREP controls which grep is installed
1125 as grep with the other as bsdgrep or gnugrep.
1126
1127 20111122:
1128 mksh vR40c imported.
1129
1130 20111117:
1131 BIND 9.6 ESV R5 P1
1132
1133 20111107:
1134 tzdata 2011n
1135
1136 20111026:
1137 mDNSResponder v320
1138
1139 BIND 9.6 ESV R5
1140
1141 20111022:
1142 cflow 0.0.6 imported
1143
1144 20111020:
1145 less v436 imported
1146
1147 amdsbwd(4) AMD southbridge watchdog
1148
1149 20111019:
1150 awk 20110810 imported
1151
1152 et(4) Agere Gigabit Ethernet/Fast Ethernet driver added, but
1153 not included in GENERIC kernel. The kernel module needs
1154 testing before we can include it in GENERIC.
1155
1156 intr_bind code ported to allow an IRQ to be bound to one
1157 specific CPU core.
1158
1159 20111017:
1160 Time Zone Data v. 2011l (Released 10 October 2011)
1161
1162 Updated list of countries (iso3166) to work with new timezone data.
1163
1164 20111015:
1165 Introduce CPU Affinity in MidnightBSD. cpuset(1) can be used
1166 to control which core or group of cores can be used for a given
1167 process. Several new system calls were added to support this
1168 functionality in the running kernel and for 32bit binary
1169 compatibility on amd64.
1170
1171 The scheduler default has been changed to ULE in i386 and
1172 amd64. Changes were made to both schedulers (4BSD AND ULE)
1173 for this feature.
1174
1175 This work is based on Jeff Roberson's FreeBSD 7.1 patches.
1176
1177 20111004:
1178 Fix a problem with unix socket handling caused by the recent
1179 patch to unix socket path handling. This allows network
1180 apps to work under the linuxolator again.
1181
1182 20111001:
1183 Import libfetch & fetch(1) from FreeBSD 9. Passive FTP is
1184 now default and an environment variable must be set to use
1185 active.
1186
1187 20110930:
1188 Introduce quirks handling for several umass devices including
1189 USB cameras. Add workaround for Cyberpower UPS devices.
1190
1191 Bring in further bug fixes from FreeBSD and NetBSD for alc(4).
1192 Stale ip/tcp header pointers are no longer used, lockups fixed
1193 when network cable is unplugged on bootup, enable TX checksum
1194 offloading.
1195
1196 Add a new man page for gcache(8), a useful geom class when
1197 working with large raid3 sets.
1198
1199 Restore previous workaround for Cypress pata storage controller.
1200
1201 20110929:
1202 Sync ath(4) with FreeBSD 7.3.
1203
1204 The following modules are no longer available, and should be
1205 removed from loader.conf:
1206 ath_hal ath_rate_amrr ath_rate_onoe ath_rate_sample
1207
1208 alc(4) would hibernate when a cable was unplugged and often
1209 required bring the interface down and up to "wake up" so that
1210 a connection could be established. Disable hibernation.
1211
1212 20110928:
1213 Fix security issues with gzip and compress related to .Z
1214 files that are corrupted.
1215
1216 Fix path validation with unix domain sockets.
1217
1218 20110917:
1219 Remove dependance on mports perl for generating releases as
1220 it's in the base system.
1221
1222 20110914:
1223 Import xz 5.0.3 with liblzma 5.0.3
1224
1225 20110813:
1226 synced the sparc64 GENERIC kernel configuration with amd64.
1227
1228 20110806:
1229 sqlite 3.7.7.1 imported
1230
1231 msearch(1), libmsearch and msearch.import added. msearch(1) provides
1232 a full text search command line tool. libmsearch can also be used
1233 to build a graphical based search in the future. You can enable
1234 index building for msearch in periodic.conf or manually run the
1235 /usr/libexec/msearch.index tool. Full text indexes take considerable
1236 space in /var. I'm using approximately 500MB currently.
1237
1238 Fix a long standing bug with the periodic script to check package
1239 versions. This will be obsolete with mport though.
1240
1241 20110710:
1242 kdb_enter_why added to MidnightBSD to allow the kernel debugger to
1243 know why it's in use and thus script can be run.
1244
1245 Yet another problem with the perl manifest was fixed
1246
1247 20110709:
1248 cpufreq(1) is a new utility to monitor CPU frequency which may change
1249 with use of powerd(8) and cpufreq(4).
1250
1251 20110612:
1252 Update mksh to R40
1253
1254 Catch up ObsoleteFiles.inc to remove Perl 5.10.x. Good to run when
1255 updating current (cd /usr/src && make check-old)
1256
1257 20110528:
1258 Fix CVE-2011-1910 in BIND 9.6.x. This affects caching resolvers.
1259
1260 20110526:
1261 newfs:
1262 Raised the default blocksize for UFS/FFS filesystems from
1263 16K to 32K and the default fragment size from 2K to 4K.
1264
1265 This should slightly imporve performance on "advanced format"
1266 hard drives such as the WD EARS drives. Drives of this type
1267 have emulation modes that slow down with lower sizes. Of course
1268 the drive must still be aligned properly when using fdisk.
1269
1270 20110521:
1271 mport tool now has a deleteall command. This can be used to remove
1272 all packages from a system.
1273
1274 A few bugs with the perl 5.14 import have been fixed.
1275
1276 20110518:
1277 Perl 5.14.0
1278
1279 20110517:
1280 Sendmail 8.14.5
1281
1282 20110314:
1283 DRM/DRI code updated to support newer video cards. (FreeBSD 7.1)
1284
1285 cdevpriv wrappers added
1286
1287 nss_mdns hack introduced to work around linking problem.
1288
1289 dnsextd fixed after update to mDNSResponder code.
1290
1291 20110308:
1292 Introduce liblzma & xz 5.0.1 to the base system
1293
1294 Patch for OpenSSL security issue CVE-2011-0014.
1295
1296 "OSREVISION 4004"
1297
1298 nsswitch module for multicast dns (nss_mdns) added.
1299
1300 tzdata2011c
1301
1302 20110220:
1303 cam(4) syncronized with FreeBSD 7.3.
1304
1305 20110219:
1306 amdtemp(4) updated to support sensors framework.
1307
1308 20110217:
1309 Perl 5.10.1 imported
1310
1311 20110216:
1312 Introduce igb(4) and split Intel Gigabit Ethernet adapters between
1313 igb(4) and em(4). Newer devices use igb(4). The code has moved
1314 to sys/dev/e1000 for both devices in the kernel. igb(4) has
1315 been placed in GENERIC on i386 and amd64.
1316
1317 Update bfe(4) to support newer devices and WOL.
1318
1319 20110215:
1320 age(4) added.
1321
1322 20110208:
1323 BIND 9.6.3 which fixes a bug with DNSSEC records getting added.
1324
1325 20110206:
1326 eeemon(4) added to monitor Asus Eee PC.
1327
1328 20110205:
1329 OpenSSH 5.7p1
1330
1331 GNU sort 6.9 (coreutils)
1332
1333 20110203:
1334 one true awk 20100523 imported
1335
1336 sqlite 3.7.5
1337
1338 OpenSSL 0.9.8q
1339
1340 20110202:
1341 tcsh 6.17.00
1342
1343 file 5.05
1344
1345 20110122:
1346 Import it(4) and lm(4), with support for Super I/O hardware monitors. This
1347 uses the sensors framework ported by Constantine A. Murenin (GSOC2007)
1348
1349 20110120:
1350 BIND 9.6.2-P3
1351
1352 sudo 1.7.4-p6
1353
1354 20110115:
1355 Add experimental jme(4) for Jmicron ethernet devices.
1356
1357 20101130:
1358 A double free exists in the SSL client ECDH handling code, when
1359 processing specially crafted public keys with invalid prime
1360 numbers. [CVE-2010-2939]
1361
1362 20101120:
1363 Several portions of the kernel and userland code related to UFS file
1364 systems (and UFS2) cannot properly handle inode counts above 2^31 due
1365 to use of int types. Based on a patch from FreeBSD, I've modified
1366 our UFS2 implementation to handle unsigned values for inode counts
1367 which should allow for file systems greater than 16TB.
1368
1369 newfs and growfs was also modified.
1370
1371 20101110:
1372 Fix a security issue with pseudofs which could result in running code in kernel
1373 context or a kernel panic depending on system configuration. This affects file
1374 systems such as procfs for instance.
1375
1376 20101021:
1377 sysrc is a utility to print and modify name/value pairs in /etc/rc.conf easily.
1378 This is similar to functions present in many linux distros. The utility was
1379 written by Devin Teske for FreeBSD.
1380
1381 20100920:
1382 bzip2 security patch for integer overflow.
1383
1384 20100905:
1385 MidnightBSD RELENG_0_3 branch created. Aggressive development continues here
1386 for 0.4.
1387
1388 20100902:
1389 Fix a security issue with libutil that allows users to bypass cpu limits in
1390 login.conf in some cases. This combined with OpenSSH for example can allow
1391 the user to get more resources than they're allowed.
1392
1393 20100822:
1394 Import Apple's mDNSResponder (mdnsd).
1395
1396 20100814:
1397 libdispatch added to MidnightBSD. This provides functionality found in
1398 Mac OS X's GCD. We do not have blocks support yet. As this code is
1399 licensed under Apache 2, we create a new MK_APACHE option so that
1400 it's not required for all users to run code under a license they
1401 may not like.
1402
1403 20100713:
1404 mbuf readonly fix related to sendfile(2) data corruption.
1405
1406 20100704:
1407 brainfuck(1) imported from MirBSD.
1408
1409 20100505:
1410 zlib 1.2.5
1411
1412 20100430:
1413 Sudo 1.7.2p6 imported
1414
1415 20100321:
1416 Update zlib to 1.2.4
1417
1418 20100319:
1419 Removed i586 from default i386 generic kernel.
1420
1421 20100317:
1422 Update to tzdata2010e (time zones). This includes changes in
1423 Mexico.
1424
1425 Add support for several newer sound cards via hda including
1426 ATI and Realtek chipsets.
1427
1428 20100313:
1429 CPU detection has been changed. VIA Padlock detection added.
1430
1431 20100312:
1432 Fix a number of bugs and compiler warnings in libmport. Handle
1433 plus signs in paths for mport.check-fake
1434
1435 20100311:
1436 mksh R39c
1437
1438 20100309:
1439 Sudo 1.7.2p5
1440
1441 sqlite3 3.6.23
1442
1443 mksh R39b
1444
1445 libffi (ffi) 3.0.9
1446
1447 20100206:
1448 WITHOUT_LIB32 is no longer needed on AMD64. GCC was fixed to
1449 properly pass arguments to ld.
1450
1451 re(4) and rl(4) have been updated to support several new
1452 realtek chipsets. Performance has been improved on re(4).
1453
1454 20100204:
1455 Fix a bug cropping up on AMD64 MidnightBSD with sftp
1456 segfaulting.
1457
1458 20100116:
1459 Import ash changes from FreeBSD (bin/sh) 8-Stable.
1460
1461 BIND 9.6.1-P2
1462
1463 20100110:
1464 Import Sendmail 8.14.4. Fix for SSL vulnerability.
1465
1466 posix_spawn(3) added to MidnightBSD libc. Users may need to build and
1467 install libc before doing a full buildworld when upating from 0.2 or
1468 older current systems.
1469
1470 kqueue(2) was modified to support portions of libdispatch functionality.
1471
1472 20100106:
1473 Bind security update. Fix a bug with DNSSEC that causes negative
1474 cache entries and thus a possible DNS cache poisoning attack.
1475
1476 Fix a bug in ZFS that can reset permissions on system crashes.
1477
1478 20091228:
1479 amdtemp(4) was added. It allows one to monitor to the temperature
1480 of an AMD CPU such as a Phenom.
1481
1482 20091205:
1483 OpenSSL security fix
1484
1485 The SSL version 3 and TLS protocols support session renegotiation without
1486 cryptographically tying the new session parameters to the old parameters.
1487
1488 20091128:
1489 OpenBSD sensors framework imported including sensorsd(8)
1490
1491 20091126:
1492 OpenNTPD 4.4 import
1493
1494 Update OpenSSH to 5.3p1
1495
1496 mksh R39
1497
1498 20091124:
1499 cpdup updated from DragonFly to 1.15
1500
1501 tzdata2009s updated with latest timezone data for November 2009.
1502
1503 20091010:
1504 amd64 users should use WITHOUT_LIB32=yes in /etc/make.conf for now
1505 to test current.
1506
1507 Revert unicode filename fixes from ntfs code. This was causing chaos
1508 on amd64 systems.
1509
1510 20091006:
1511 Update timezone data with tzdata2009n with the Pakistan and
1512 Argentina changes.
1513
1514 Sync several userland utilities with versions from FreeBSD 7.0 in
1515 sbin and usr.sbin.
1516
1517 20090919:
1518 Update timezone data with tzdate2009m from September 2009.
1519
1520 20090729:
1521 Patch for Bind 9 security vulnerability. a dynmaic update packet
1522 can trigger an assertion and cause named to exit
1523
1524 20090606:
1525 Remove PCC from the base system. This compiler will not work
1526 as a system compiler for us as we've got some userland investment
1527 in C++ code and may have Objective-C in the future. We're stuck
1528 with a solution that supports these three languages at a minimum.
1529
1530 I had wanted to keep it as an optional compiler because it is
1531 fast, however too many users want to try to use it for the base
1532 system which makes no sense.
1533
1534 A hack was added for Cypress based usb hard drive enclosures to
1535 the kernel. This should cut down on commands it claims to support
1536 but does not (at the cam layer). Found while testing ZFS on
1537 an external device.
1538
1539 20090520:
1540 The powerd daemon no longer starts automatically to improve
1541 compatibility with many systems. However, there is a new
1542 installer option in the startup section to enable it. This
1543 makes it easier to enable for users that have working systems. I thought it was only a problem on older hardware, but it freaks
1544 out my new Phenom too.
1545
1546 20090502:
1547 OpenSSH 5.2p1 import
1548
1549 ale(4) connected to the build. (kernel module only)
1550
1551 20090501:
1552 Imported makefs utility from NetBSD/FreeBSD
1553
1554 20090422:
1555 OpenSSL security update
1556
1557 The function ASN1_STRING_print_ex does not properly validate the lengths
1558 of BMPString or UniversalString objects before attempting to print them.
1559
1560 20090415:
1561 Created a Symbol.map for libc/ohash symbols
1562
1563 Updated several usr/bin usr/sbin utilities.
1564
1565 Corrected a bug with Makefile.inc1 causing the bootstrap
1566 tools to fail.
1567
1568 20090405:
1569 xorg 7.4 wants to configure its input devices via hald which does not
1570 yet work with USB. If the keyboard/mouse does not work in xorg then
1571 add
1572 Option "AllowEmptyInput" "off"
1573 to your ServerLayout section. This will cause X to use the configured
1574 kbd and mouse sections from your xorg.conf
1575
1576 20090403:
1577 mksh was disconnected a few day ago do to bugs with
1578 buildworld and mports. Now, connect it back
1579 for use as /bin/sh with a conditional called
1580 MK_ASH. By default, ash is the standard /bin/sh
1581 but we may change this later. This will allow further
1582 testing by users and developers of mksh without
1583 causing an unpleasant default experience. In the
1584 long run, we need to fix mksh compatibility.
1585
1586 20090328:
1587 Bring in mksh R37 from CVS. The dot.mkshrc files for root
1588 and skel were changed. mksh(1) now replaces ash aka sh(1)
1589 as the default /bin/sh. Please report bugs with
1590 ports, etc. The ash code will remain in the repo for awhile
1591 as I decide if we'll add something like MK_SHELL_ASH as
1592 an optional build parameter.
1593
1594 ahd was disconnected from the lint environment until
1595 the compiler bug is sorted (by updating gcc?)
1596
1597 Remove freebsd-tips from fortune files and change the
1598 default for login and profile.
1599
1600 20090327:
1601 Update libarchive to 2.5.5, tar, and add bsdcpio.
1602
1603 Also previously, ctriv has been connecting Perl 5.10
1604 to the build (part of os). This will have an impact
1605 on mports.
1606
1607 20090325:
1608 Update Bind to 9.4.3-P1
1609
1610 Update mksh to R36b
1611
1612 Update tcpdump to 3.9.8, fix libpcap to work with current.
1613
1614 Update pnpinfo, sync with FreeBSD.
1615
1616 20090115:
1617 Fix a problem with DNSSEC and BIND.
1618
1619 20090110:
1620 For applications using OpenSSL for SSL connections, an invalid SSL
1621 certificate may be interpreted as valid. This could for example be
1622 used by an attacker to perform a man-in-the-middle attack.
1623
1624 Other applications which use the OpenSSL EVP API may similarly be
1625 affected.
1626
1627 Stop cross site request forgery attacks in lukemftpd
1628
1629 20090104:
1630 Import GNU libreadline 5.2
1631
1632 20090101:
1633 Update time zone data to 2008i.
1634
1635 20081231:
1636 Correct a problem where bluetooth and netgraph sockets are not
1637 properly initialized.
1638
1639 Happy 2009.
1640
1641 20081206:
1642 Due to the massive change in the underlying system under way,
1643 we're naming the next release 1.0. The sys/sys/param.h was
1644 changed accordingly. ipfilter and ncurses were corrected
1645 using __MidnightBSD__ tests in the code.
1646
1647 The GENERIC kernel config was caught up on i386 today. Consider
1648 i386 still broken, but amd64 is running again.
1649
1650 mdoc.local was updated with the new MidnightBSD version info.
1651
1652 batt(1) was rewritten in C. It now supports several flags and
1653 runs about 8 times faster on my laptop. The default output
1654 shows the number of minutes of battery life remaining and the
1655 percentage. You can use -u to display the number of batteries or
1656 -c to get script friendly output. Consult the man page for more.
1657
1658 20081204:
1659 Work has completed on importing ZFS, jemalloc, several
1660 new devices, SCTP, updated pf, a new tempfs, linuxolator 2.6 kernel
1661 support, improved locking for file desc., audit (openbsm),
1662 openssl .98e, nfe, imporved intel high def audio, midi, updated
1663 intel gigabit (em), support for several wifi cards (intel), ...
1664
1665 Renamed 0.3-CURRENT officially. Switched to using MidnightBSD version
1666 data from param.h instead of the FreeBSD version. This means
1667 testing is now possible in the ports tree for the version
1668 and that any ports or code relying on the FreeBSD version from
1669 sys/sys/param.h will need to be fixed.
1670
1671 20080905:
1672 update nve(4) to support new hardware.
1673
1674 20080801:
1675 Import OpenBSM 1.0
1676
1677 Modify src/release to create 3 isos instead of 2 for packages.
1678
1679 etc/rc.d/firstboot now enables kdm, gnustep + slim and bsdstats.
1680
1681 Many ia64, alpha, powerpc items were removed.
1682
1683 The recent diffutils 2.8.7 import was fixed.
1684
1685 20080703:
1686 pcc was not installed properly when setting DESTDIR for live cds,
1687 or posibly jails.
1688
1689 20080627:
1690 Add firmware(9), WEP, CCMP, TKIP to GENERIC.
1691
1692 Add glabel to GENERIC.
1693
1694 Intel ICH8 mobile chipset used on some iMacs included with ata.
1695
1696 pcc connected to the build on i386. (alternative compiler)
1697
1698 ath added to GENERIC. (Atheros wireless NICs) on amd64/i386
1699
1700 20080528:
1701 Sendmail 8.14.3
1702
1703 20080516:
1704 ssh-vulnkey allows you to look for vulnerable ssh keys that
1705 were generated on Debian and Ubuntu hosts over the last
1706 few years. sshd can block offending keys with a configuration
1707 option.
1708
1709 The elf note on binaries is now set to MidnightBSD.
1710
1711 20080514:
1712 Fixed a number of problems with pcc. It is not yet connected
1713 to the build, but usable on i386 hosts. You may use it
1714 by make; make install in /usr/src/usr.bin/pcc. It will
1715 install in /usr/local as some of the files conflict with
1716 GCC versions. __MidnightBSD__ is defined in PCC as well.
1717
1718 System headers were fixed to allow pcc to compile many binaries
1719 on MidnightBSD. bin/cp will work now for instance.
1720
1721 20080430:
1722 __MidnightBSD__ is now defined via gcc. This can be tested
1723 to determine we're running on MidnightBSD in the preprocessor.
1724
1725 20080429:
1726 Import bind 9.4.2 with threading
1727
1728 libpthread (KSE) and libthr are built earlier
1729
1730 pcvt(4) removed!
1731
1732 Alias added for core2 cpus.
1733
1734 Alpha and PC98 only utilities removed from usr/sbin
1735
1736 syslogd, adduser, rmuser, mergemaster and mailwrapper have been
1737 improved. See the man pages for info.
1738
1739 periodic scripts will not send emails with empty message bodies.
1740 See mailwrapper fix.
1741
1742 20080410:
1743 Sync cpdup with DragonFly. Add parallel transaction support and
1744 -l flag to line-buffer stdout and stderr.
1745
1746 20080406:
1747 Import bzip2 1.05
1748 Import OpenSSH 4.9p1
1749
1750 20080322:
1751 The default umask was changed to 022.
1752
1753 /usr/X11R6 paths were removed from several config files.
1754
1755 .mkshrc files are now installed for root.
1756
1757 20080316:
1758 FIx a problem with gif0 tunnels and neighbors with IPV6.
1759
1760 20080312:
1761 Add lndir from X.org. This aides in the porting of MirPorts.
1762
1763 New OS versions were added to the mapage code (groff)
1764
1765 20080310:
1766 Correct a buffer overflow in ppp.
1767
1768 20080308:
1769 Remove /usr/X11R6 from manpath config.
1770
1771 20080307:
1772 Atheros driver no longer has several options set
1773 which corrects building in tinderbox on all three platforms.
1774
1775 Added a new macro to sx.h which returns true if the current
1776 thread holds an exclusive lock on a specifix sx.
1777
1778 Removed OS/2's HPFS file system. It's not maintained and
1779 I don't know anyone using OS/2 or ecomstation these days.
1780 My copy is in the closet collecting dust.
1781
1782 20080306:
1783 Synced tinderbox with FreeBSD. Modified it for MidnightBSD.
1784 Developers can now use it to check src builds.
1785
1786 20080303:
1787 Add mksh to /etc/shells, made some adjustments to options
1788 for mksh builds per suggestion upstream.
1789
1790 USB HID table updated with modern hardware list.
1791
1792 Updated BSD family true (we're not in there yet)
1793
1794 iso3166 file updated and import of tzdata2007k for
1795 new time zones.
1796
1797 Updated mksh to latest version R33.
1798
1799 20080228:
1800 Remplaced the random IP id generation code with a new
1801 version by Amit Klein.
1802
1803 20080221:
1804 Sendfile write only permissions fix.
1805
1806 Removed some HPFS and PC98 code.
1807
1808 iso639 file sycned with DragonFly.
1809
1810 20080128:
1811 Changed NTP configuration so that ips aren't cached
1812 so multiple servers are used.
1813
1814 Fix an issue with fork() in libpthread.
1815
1816 20080121:
1817 Add virtualization detection to set the HZ rate
1818 according to a VM present. VMWare and Parallels
1819 should work better like this.
1820
1821 Change to full x11 install in sysinstall. Add
1822 xorg 7 support.
1823
1824 20080115:
1825 Fix the handling of PTY's. CVE-2008-0216
1826
1827 20080105:
1828 mport delete code added, USE_MPORT_TOOLS knob aded.
1829
1830 20080101:
1831 Happy New Year
1832
1833 20071123:
1834 Update sendmail to 8.14.2
1835
1836 20071120:
1837 Update system compiler to gcc 3.4.6.
1838
1839 20071023:
1840 Updated mksh to R31d.
1841
1842 20070911:
1843 Updated mksh to version R31b.
1844
1845 Fixed stderr output in libpthread. Previously it was
1846 written to stdout.
1847
1848 20070831:
1849 Added dot.mkshrc file to support the recent change to
1850 mksh from OpenBSD's ksh derived from pdksh.
1851
1852 Added new firewall configuration. ipfw is enabled by default
1853 with a "desktop" configuration. Consult /etc/rc.firewall
1854 or ipfw show to see the ruleset used. You can disable
1855 ipfw by setting firewall_enable="NO" in /etc/rc.conf This
1856 change only effects IPv4. IPv6 does not have a firewall
1857 enabled by default.
1858
1859 20070814:
1860 Removed GNU tar source. We've been using BSD tar
1861 for awhile.
1862
1863 20070806:
1864 Finished removing umapfs and autofs from the tree.
1865
1866 20070804:
1867 BIND and Tcpdump have been patched for recent vulnerabilities.
1868
1869 We switched to BSD cpio (pax).
1870
1871 20070719:
1872 Imported cpdup from DragonFly as /bin/cpdup
1873
1874 20070716:
1875 Update GNU cpio to 2.8.
1876
1877 20070410:
1878 cvs was updated to 1.12.13. cvsbug was removed.
1879 cvs now behaves similarly to DragonFly's cvs with
1880 most of their local changes.
1881
1882 20070409:
1883 RELENG_0_1 was created. More aggresive changes will
1884 continue here.
1885
1886 20070406:
1887 Back out propolice. propolice caused several problems
1888 with our threading libraries libthr and libpthread.
1889 curthread was often NULL after the patch and many
1890 multithreaded applications would crash. We plan to
1891 work on either bringing in gcc 4.1 or developing a new
1892 patch which also corrects our threading issues later.
1893
1894 It is more important to have a stable system for our
1895 mport work and other projects at this time.
1896
1897 This is not a clean removal. It is recommended that you
1898 have a recently SNAP CD handy. You can either reinstall
1899 or perform a make buildworld and make buildkernel and
1900 make installkernel. Reboot on the cd and copy the contents
1901 of /bin, /sbin, /lib, /libexec, and /usr/bin, /usr/sbin,
1902 /usr/lib, and /usr/libexec to the respective directories on
1903 your disk. Then you should be able to boot into single user
1904 mode and run make installworld. You will need to run
1905 chflags noschg on some of the files if you can't overwrite
1906 them.
1907
1908 You will get __guard missing errors since we had to remove
1909 this from libc.
1910
1911 You will need to rebuild any ports built while propolice was
1912 installed.
1913
1914 20070401:
1915 Importing propolice into MidnightBSD. Propolice is going to
1916 provide us with much greater security and stability in the
1917 long run. If upgrading from a pre-propolice system, please
1918 follow the these instructions:
1919
1920 cd /usr/src/lib/libc && make obj && make && make install
1921 cd /usr/src/gnu/usr.bin/cc && make obj && make && make install
1922 cd /usr/src/lib/libpthread && make obj && make && make install
1923 cd /usr/src/lib/libthr && make obj && make && make install
1924 buildworld and kernel
1925
1926 It is adviced that any mports which were installed and/or built
1927 prior to the propolice update also be updated. If any errors
1928 or issue are encounted, please contact security@midnightbsd.org
1929 and we will be sure to investigate and come up with an expeditious
1930 fix.
1931
1932 20070314:
1933 Remove send-pr from src.
1934
1935 Switch to NetBSD's gzip.
1936
1937 Bump MBSD minor revision.
1938
1939 20070313:
1940 Imported OpenSSH 4.6p1.
1941
1942 Imported FreeBSD's libarchive and updated tar to work with it.
1943
1944 Disabled debug statements cluttering up /var/log/messages for
1945 the tcp autobuf patch applied previously.
1946
1947 20070312:
1948 Synced several audio changes from FreeBSD 6.1. Removed the
1949 BSD Daemon files from src/share.
1950
1951 20070308:
1952 Added mfi which supports LSI Logic MegaRAID SAS devices including
1953 the Dell perc5i.
1954
1955 20070206:
1956 Imported OpenBSD's sudo into source. Please install
1957 /usr/src/usr.bin/sudo/lib first before building.
1958
1959 Those who install from a snapshot after this date
1960 will not be effected.
1961
1962 20070119:
1963 Added audit group. Be sure to add audit to your /etc/group file
1964 before installing world.
1965
1966 hostapd was updated to 0.4.8.
1967
1968 An accidental commit in usr.sbin/bluetooth/hccontrol was fixed to
1969 unbreak world.
1970
1971 wpa_supplicant was updated.
1972
1973 For stability and compatibility reasons, it was decided that MidnightBSD
1974 sync with FreeBSD 6.1 Release. Nearly every change between the original
1975 fork date of February 24, 2006 and the release of FreeBSD 6.1 in May
1976 2006 will be merged. Beyond this, MidnightBSD will be a "real" fork and
1977 will not sync every little change with FreeBSD.
1978
1979 20061231:
1980 Updated COPYRIGHT for 2007.
1981
1982 Updated and bumped libutil after importing NetBSD efun(3) functions.
1983
1984 Added MidnightBSD_version and bumped the FreeBSD version as we've
1985 synced all commits between the fork and that version. It is now safe
1986 to assume MidnightBSD is compatible with FreeBSD RELENG_6 from
1987 Feb 26, 2006.
1988
1989 Added spell(1) and deroff(1) from NetBSD. Also added additional
1990 dict files to work with it. /usr/share/dict/american,
1991 /usr/share/dict/british and /usr/share/dict/special/math
1992
1993 Numerous man page and bug fixes.
1994
1995 20061226:
1996 Setup /usr/share/examples/cvsup SUPfiles for the new
1997 MidnightBSD CVSup server.
1998
1999 Fix a bug in burncd where it would continue forever while
2000 erasing CDRW media.
2001
2002 Add csup to /usr/bin. csup is a CVSup replacement written
2003 in C.
2004
2005 Fixed a bug with bsnmpd build from Oct 30.
2006
2007 Corrected some race conditions and fixed a few bugs in
2008 geom. Imported changes from FreeBSD RELENG_6.
2009
2010 20061225:
2011 Fixed a typo in src/lib/libc/sparc64/fpu/fpu_implode.c
2012 that caused long double to long and long long
2013 conversion of negative numbers to always result in -1.
2014
2015 20061221:
2016 Fixed acpi_battery.c to not report an ERROR if no
2017 batteries are present.
2018
2019 Performed some minor updates on the RL and RE NIC drivers.
2020 RL should no longer panic when trying to print errors.
2021
2022 Corrected a bug with TTY.
2023
2024 20061218:
2025 Corrected a bug with libpthread where newly created suspended
2026 threads don't get scheduled.
2027
2028 20061206:
2029 Fixed a typo with the firewire security patch.
2030
2031 20061129:
2032 Minor cleanups to utilities in bin.
2033
2034 Fixed msdos file system short file name behavior to match
2035 FreeBSD.
2036
2037 20061031:
2038 Updated man pages in section 7.
2039
2040 20061030:
2041 Updated sys/dev/drm to support intel 915 and radeon
2042 r300 cards properly.
2043
2044 Synced snmpd with FreeBSD-stable.
2045
2046 Fixed a bug in rm which could cause data loss.
2047
2048 20061027:
2049 Added Intel ICH8 and nForce 5 support to ATA. cam, mpt,
2050 random, kbdmux, atkbd, and usb were updated. Changes
2051 to clearing registers on SSE enabled processors (i386)
2052 commited.
2053
2054 lukemftpd updated.
2055
2056 openssh rc script was altered which effects initial
2057 seeding.
2058
2059 20061014:
2060 Workaround for em driver problem on shared IRQ.
2061
2062 Started removal of alpha support.
2063
2064 20061013:
2065 ATA driver was updated. USB/USB1/USB2 types added.
2066
2067 20061010:
2068 OpenSSH was updated to 4.4p1.
2069
2070 20060909:
2071 OpenNTPD was added to MidnightBSD. Run make delete-old to remove
2072 the old ntpd daemon.
2073
2074 cat has a new option -D which allows you to timestamp output
2075 on a per line basis.
2076
2077 The kernel has a keyboard mux which allows you to have multiple
2078 keyboard connected simultaneously. USB keyboard support was also
2079 improved with this patch.
2080
2081 The Intel em driver was updated. Network performance was greatly
2082 increased on many systems. Additional models are supported.
2083
2084 The ATA driver was patched to fix a potential deadlock.
2085
2086 Bind was patched to fix a potential denial of service condition.
2087
2088 20060817:
2089 ksh has been added to the base system. If you previously had
2090 the port installed, it will be overwritten on the next buildworld.
2091
2092
2093
2094 To build a kernel
2095 -----------------
2096 If you are updating from a prior version of MidnightBSD (even one just
2097 a few days old), you should follow this procedure. With a
2098 /usr/obj tree with a fresh buildworld,
2099 make -DALWAYS_CHECK_MAKE buildkernel KERNCONF=YOUR_KERNEL_HERE
2100 make -DALWAYS_CHECK_MAKE installkernel KERNCONF=YOUR_KERNEL_HERE
2101
2102 To test a kernel once
2103 ---------------------
2104 If you just want to boot a kernel once (because you are not sure
2105 if it works, or if you want to boot a known bad kernel to provide
2106 debugging information) run
2107 make installkernel KERNCONF=YOUR_KERNEL_HERE KODIR=/boot/testkernel
2108 nextboot -k testkernel
2109
2110 To just build a kernel when you know that it won't mess you up
2111 --------------------------------------------------------------
2112 This assumes you are already running a 6.X system. Replace
2113 ${arch} with the architecture of your machine (e.g. "i386",
2114 "amd64", "ia64", "pc98", "sparc64", etc).
2115
2116 cd src/sys/${arch}/conf
2117 config KERNEL_NAME_HERE
2118 cd ../compile/KERNEL_NAME_HERE
2119 make depend
2120 make
2121 make install
2122
2123 If this fails, go to the "To build a kernel" section.
2124
2125 To rebuild everything and install it on the current system.
2126 -----------------------------------------------------------
2127 # Note: sometimes if you are running current you gotta do more than
2128 # is listed here if you are upgrading from a really old current.
2129
2130 <make sure you have good level 0 dumps>
2131 make buildworld
2132 make kernel KERNCONF=YOUR_KERNEL_HERE
2133 [1]
2134 <reboot in single user> [3]
2135 mergemaster -p [5]
2136 make installworld
2137 make delete-old
2138 mergemaster [4]
2139 <reboot>
2140
2141
2142 To cross-install current onto a separate partition
2143 --------------------------------------------------
2144 # In this approach we use a separate partition to hold
2145 # current's root, 'usr', and 'var' directories. A partition
2146 # holding "/", "/usr" and "/var" should be about 2GB in
2147 # size.
2148
2149 <make sure you have good level 0 dumps>
2150 <boot into -stable>
2151 make buildworld
2152 make buildkernel KERNCONF=YOUR_KERNEL_HERE
2153 <maybe newfs current's root partition>
2154 <mount current's root partition on directory ${CURRENT_ROOT}>
2155 make installworld DESTDIR=${CURRENT_ROOT}
2156 cd src/etc; make distribution DESTDIR=${CURRENT_ROOT} # if newfs'd
2157 make installkernel KERNCONF=YOUR_KERNEL_HERE DESTDIR=${CURRENT_ROOT}
2158 cp /etc/fstab ${CURRENT_ROOT}/etc/fstab # if newfs'd
2159 <edit ${CURRENT_ROOT}/etc/fstab to mount "/" from the correct partition>
2160 <reboot into current>
2161 <do a "native" rebuild/install as described in the previous section>
2162 <maybe install compatibility libraries from src/lib/compat>
2163 <reboot>
2164
2165
2166 To upgrade in-place from 5.x-stable or higher to 6.x-stable
2167 -----------------------------------------------------------
2168 <make sure you have good level 0 dumps>
2169 make buildworld [9]
2170 make kernel KERNCONF=YOUR_KERNEL_HERE [8]
2171 [1]
2172 <reboot in single user> [3]
2173 mergemaster -p [5]
2174 make installworld
2175 make delete-old
2176 mergemaster -i [4]
2177 <reboot>
2178
2179 Make sure that you've read the UPDATING file to understand the
2180 tweaks to various things you need. At this point in the life
2181 cycle of current, things change often and you are on your own
2182 to cope. The defaults can also change, so please read ALL of
2183 the UPDATING entries.
2184
2185 Also, if you are tracking -current, you must be subscribed to
2186 freebsd-current@freebsd.org. Make sure that before you update
2187 your sources that you have read and understood all the recent
2188 messages there. If in doubt, please track -stable which has
2189 much fewer pitfalls.
2190
2191 [1] If you have third party modules, such as vmware, you
2192 should disable them at this point so they don't crash your
2193 system on reboot.
2194
2195 [3] From the bootblocks, boot -s, and then do
2196 fsck -p
2197 mount -u /
2198 mount -a
2199 cd src
2200 adjkerntz -i # if CMOS is wall time
2201 Also, when doing a major release upgrade, it is required that
2202 you boot into single user mode to do the installworld.
2203
2204 [4] Note: This step is non-optional. Failure to do this step
2205 can result in a significant reduction in the functionality of the
2206 system. Attempting to do it by hand is not recommended and those
2207 that pursue this avenue should read this file carefully, as well
2208 as the archives of freebsd-current and freebsd-hackers mailing lists
2209 for potential gotchas.
2210
2211 [5] Usually this step is a noop. However, from time to time
2212 you may need to do this if you get unknown user in the following
2213 step. It never hurts to do it all the time.
2214
2215 [8] In order to have a kernel that can run the 5.x binaries
2216 needed to do an installworld, you must include the COMPAT_FREEBSD5
2217 option in your kernel. Failure to do so may leave you with a system
2218 that is hard to boot to recover. A similar kernel option COMPAT_FREEBSD5
2219 is required to run the 5.x binaries on more recent kernels.
2220
2221 Make sure that you merge any new devices from GENERIC since the
2222 last time you updated your kernel config file.
2223
2224 [9] When checking out sources, you must include the -P flag to have
2225 cvs prune empty directories.
2226
2227 If CPUTYPE is defined in your /etc/make.conf, make sure to use the
2228 "?=" instead of the "=" assignment operator, so that buildworld can
2229 override the CPUTYPE if it needs to.
2230
2231 MAKEOBJDIRPREFIX must be defined in an environment variable, and
2232 not on the command line, or in /etc/make.conf. buildworld will
2233 warn if it is improperly defined.
2234
2235 Copyright information:
2236
2237 Copyright 1998-2005 M. Warner Losh. All Rights Reserved.
2238
2239 Redistribution, publication, translation and use, with or without
2240 modification, in full or in part, in any form or format of this
2241 document are permitted without further permission from the author.
2242
2243 THIS DOCUMENT IS PROVIDED BY WARNER LOSH ``AS IS'' AND ANY EXPRESS OR
2244 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
2245 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
2246 DISCLAIMED. IN NO EVENT SHALL WARNER LOSH BE LIABLE FOR ANY DIRECT,
2247 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
2248 (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
2249 SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2250 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
2251 STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
2252 IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2253 POSSIBILITY OF SUCH DAMAGE.
2254
2255 If you find this document useful, and you want to, you may buy the
2256 author a beer.
2257
2258 Contact Warner Losh if you have any questions about your use of
2259 this document.
2260
2261 $FreeBSD: src/UPDATING,v 1.416.2.18 2006/02/22 11:51:57 yar Exp $
2262 $MidnightBSD$

Properties

Name Value
svn:keywords MidnightBSD=%H