Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Jan 2023 12:54:11 -0500
From:      "David E. Cross" <david@crossfamilyweb.com>
To:        FreeBSD Hackers <freebsd-hackers@freebsd.org>
Subject:   ...tales of lost ENs.
Message-ID:  <c8bf660c-e121-6abf-8057-bc28e7482348@crossfamilyweb.com>

next in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
So, many (many) months ago I complained about 'missing' ENs.


I was then told that no EN had ever been filed (which since I was asking 
about bug reports I had seen listed by other people never occurred to me 
that it hadn't been done).


I then submitted 3 ENs (date on the files is Aug 30, 2022)


Then yet another person commented about one of those bugs in a new 
release (12.x) that never got fixed.


I then posted all 3 ENs, this time publically.


I have not seen any mention of these; how do I nudge these along?  
(re-attached for visibility, they are out of date since at least one now 
affects 12.x because it sat so long)

[-- Attachment #2 --]
=============================================================================
FreeBSD-EN-ERRATA_TEMPLATE                                      Errata Notice
                                                          The FreeBSD Project

Topic:

Category:       core
Module:         loader
Announced:      2022-XX-XX
Credits:
Affects:        FreeBSD 13.1
Corrected:      ????

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.

I.   Background

geli is an encrpytion component of the GEOM subsystem of FreeBSD that
allows partitions or disks to be encrypted.  Both the kernel and loader(8)
have support to allow booting from encrypted disks and prompting for a
password at boot time.

II.  Problem Description

A change to libstand(3) sometime between 13.0 and 13.1 prevents loader from
recognizing the partition after the built in geli driver has attached the
partition , preventing auto booting of encrypted root partitions.

This bug was tracked at:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264282


III. Impact

Systems running 13.1 with encrypted root disks will not autoboot.

IV.  Workaround

Systems affected may revert to loader(8) from 13.0.  Additionally
setting currdev and rootdev to the correct partition manually will
allow booting of the system.

Systems without geli root disk encryption are unaffected.

V.   Solution

PATCH

Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.
[XX Needs reboot? Mention please]

Perform one of the following:

1) To update your system via a binary patch:

Systems running a RELEASE version of FreeBSD on the amd64, i386, or
(on FreeBSD 13 and later) arm64 platforms can be updated via the
freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install

*** Reboot needed to validate fix ***

2) To update your system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 13.1]
# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch
# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch.asc
# gpg --verify XXXX.patch.asc

b) Apply the patch.  Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

<for a userland utility:>

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

VI.  Correction details

This issue is corrected by the corresponding Git commit hash or Subversion
revision number in the following stable and release branches:

Branch/path                             Hash                     Revision
-------------------------------------------------------------------------
stable/13/                              XXXXXXXXXXXX    stable/13-nXXXXXX
releng/13.1/                            XXXXXXXXXXXX  releng/13.1-nXXXXXX
-------------------------------------------------------------------------

For FreeBSD 13 and later:

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>;

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

VII. References

<other info on the problem>

<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=XXXXXX>;

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-XX:XX.XXXXX.asc>;

[-- Attachment #3 --]
=============================================================================
FreeBSD-EN-ERRATA_TEMPLATE                                      Errata Notice
                                                          The FreeBSD Project

Topic:

Category:       core
Module:         LLVM
Announced:      2022-XX-XX
Credits:
Affects:        Unsure?  13.1 definitely, bug report references 12.x
		but unsure if that made it to a -RELEASE
Corrected:      2022-XX-XX XX:XX:XX UTC (stable/13, 13.1-STABLE)
                2022-XX-XX XX:XX:XX UTC (releng/13.1, 13.1-RELEASE-pXX)
                2022-XX-XX XX:XX:XX UTC (releng/13.0, 13.0-RELEASE-pXX)
                2022-XX-XX XX:XX:XX UTC (stable/12, 12.3-STABLE)
                2022-XX-XX XX:XX:XX UTC (releng/12.3, 12.3-RELEASE)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.

I.   Background

LLVM is a third party compiler that is distributed as part of base.
FreeBSD uses this compiler to convert source code to system object code 
for the kernel, libraries, system utilities, and ports.

AVX is a set of instructions on Intel processors that speed certain
vector computing operations.  AVX-512 is a specific version of these
instructions available on specific CPUs.

II.  Problem Description

FreeBSD and LLVM allow various options to be set to tailor the system 
to specific environments by setting build parameters that affect linking,
optimization, and target CPU.  The version of LLVM included with 
FreeBSD 13.1 (and maybe 12.x?) includes a bug with certain target CPUs
using AVX-512 instructions that causes the compiler to enter an infinite
loop, eventually terminating when it has used all available memory.

III. Impact

When compiling certain libraries or applications with the system LLVM 
in 13.1 (and maybe 12.x?) the compiler will hang.

IV.  Workaround

Removing the CPUTYPE option from /etc/make.conf, or by setting it to a
CPUTYPE that does not have AVX512 will prevent the infinite loop.

Settin the CPUTYPE is a non-default setting, systems using default
configurations are unaffected.

V.   Solution

Patch from : https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264394

Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.
[XX Needs reboot? Mention please]

Perform one of the following:

1) To update your system via a binary patch:

Systems running a RELEASE version of FreeBSD on the amd64, i386, or
(on FreeBSD 13 and later) arm64 platforms can be updated via the
freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
[XX Needs reboot? Mention please]

2) To update your system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 13.1]

b) Apply the patch.  Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

<for a userland utility:>

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

VI.  Correction details

This issue is corrected by the corresponding Git commit hash or Subversion
revision number in the following stable and release branches:

Branch/path                             Hash                     Revision
-------------------------------------------------------------------------
stable/13/                              XXXXXXXXXXXX    stable/13-nXXXXXX
releng/13.1/                            XXXXXXXXXXXX  releng/13.1-nXXXXXX
releng/13.0/                            XXXXXXXXXXXX  releng/13.0-nXXXXXX
stable/12/                                                        rXXXXXX
releng/12.3/                                                      rXXXXXX
-------------------------------------------------------------------------

For FreeBSD 13 and later:

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>;

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

For FreeBSD 12 and earlier:

Run the following command to see which files were modified by a particular
revision, replacing NNNNNN with the revision number:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;

VII. References

<other info on the problem>

<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=XXXXXX>;

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-XX:XX.XXXXX.asc>;

[-- Attachment #4 --]
=============================================================================
FreeBSD-EN-ERRATA_TEMPLATE                                      Errata Notice
                                                          The FreeBSD Project

Topic:

Category:       core
Module:         bhyve
Announced:      2022-XX-XX
Credits:
Affects:        13.1
Corrected:      2022-XX-XX XX:XX:XX UTC (stable/13, 13.1-STABLE)
                2022-XX-XX XX:XX:XX UTC (releng/13.1, 13.1-RELEASE-pXX)

For general information regarding FreeBSD Errata Notices and Security
Advisories, including descriptions of the fields above, security
branches, and the following sections, please visit
<URL:https://security.FreeBSD.org/>.

I.   Background

bhyve is the FreeBSD hypervisor, loader is the FreeBSD boot loader,
userboot.so is a version of loader that runs in userland as part of the 
bhyveload process to setup the bhyve environemnt for executing a FreeBSD
guest operating system under bhyve.

BIND_NOW is a system hardening setting that makes certain types of
memory corruption more difficult.

II.  Problem Description

Compiling the world with BIND_NOW (a non-default option) results in a
version of userboot.so that will not link with bhyveload, preventing
setup and execution of FreeBSD based guest operating systems with the
bhyve VM.

III. Impact

Systems that choose this hardening option are unable to run the default
type of FreeBSD VM under bhyve.

IV.  Workaround

Multiple workarounds exist.
 a) Removing BIND_NOW from system build options in src.conf and rebuilding
 b) using UEFI based bhyve VMs (not available on all hardware)
 c) using a different version of userboot.so via the -l option to
    bhyveload.  For example one saved in an alternate location after a build
    without BIND_NOW

V.   Solution

Apply patch from:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=262920

Upgrade your system to a supported FreeBSD stable or release / security
branch (releng) dated after the correction date.

Does not need reboot.

Perform one of the following:

1) To update your system via a binary patch:

Systems running a RELEASE version of FreeBSD on the amd64, i386, or
(on FreeBSD 13 and later) arm64 platforms can be updated via the
freebsd-update(8) utility:

# freebsd-update fetch
# freebsd-update install
[XX Needs reboot? Mention please]

2) To update your system via a source code patch:

The following patches have been verified to apply to the applicable
FreeBSD release branches.

a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.

[FreeBSD 13.1]
# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch
# fetch https://security.FreeBSD.org/patches/EN-XX:XX/XXXX.patch.asc
# gpg --verify XXXX.patch.asc

b) Apply the patch.  Execute the following commands as root:

# cd /usr/src
# patch < /path/to/patch

<for a userland utility:>

c) Recompile the operating system using buildworld and installworld as
described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>.

VI.  Correction details

This issue is corrected by the corresponding Git commit hash or Subversion
revision number in the following stable and release branches:

Branch/path                             Hash                     Revision
-------------------------------------------------------------------------
stable/13/                              XXXXXXXXXXXX    stable/13-nXXXXXX
releng/13.1/                            XXXXXXXXXXXX  releng/13.1-nXXXXXX
releng/13.0/                            XXXXXXXXXXXX  releng/13.0-nXXXXXX
stable/12/                                                        rXXXXXX
releng/12.3/                                                      rXXXXXX
-------------------------------------------------------------------------

For FreeBSD 13 and later:

Run the following command to see which files were modified by a
particular commit:

# git show --stat <commit hash>

Or visit the following URL, replacing NNNNNN with the hash:

<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>;

To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:

# git rev-list --count --first-parent HEAD

For FreeBSD 12 and earlier:

Run the following command to see which files were modified by a particular
revision, replacing NNNNNN with the revision number:

# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base

Or visit the following URL, replacing NNNNNN with the revision number:

<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN>;

VII. References

<other info on the problem>

<URL:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=XXXXXX>;

The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-EN-XX:XX.XXXXX.asc>;

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?c8bf660c-e121-6abf-8057-bc28e7482348>