sparc64 bulk build report
Bulk build on sparc64-0a.ports.openbsd.org Started : Mon Sep 27 09:39:57 MDT 2021 Finished: Wed Sep 29 20:36:36 MDT 2021 Duration: 2 Days 10 hours 57 minutes Built using OpenBSD 7.0 (GENERIC.MP) #985: Sun Sep 26 13:07:59 MDT 2021 Built 9712 packages Number of packages built each day: Sep 27: 7390 Sep 28: 1824 Sep 29: 498 Critical path missing pkgs: http://build-failures.rhaalovely.net/sparc64/2021-09-27/summary.log Build failures: 26 http://build-failures.rhaalovely.net/sparc64/2021-09-27/audio/ncmpcpp.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/cad/dxf2gcode.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/devel/avr/gcc.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/emulators/openmsx.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/games/colobot/colobot.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/games/egoboo.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/games/godot.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/games/stepmania.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/birdfont.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/enblend-enfuse.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/gmic.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/inkscape.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/makehuman.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/graphics/openexr.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/lang/clazy.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/math/veusz.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/multimedia/mkvtoolnix.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/net/barrier.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/net/ntopng.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/net/pmacct,postgresql.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/productivity/gnucash.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/textproc/docbook-utils.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/www/nextcloud_notify_push.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/x11/gnome/gjs.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/x11/kde-applications/akonadi.log http://build-failures.rhaalovely.net/sparc64/2021-09-27/x11/kde-applications/kmix.log Recurrent failures: failures/audio/ncmpcpp.log failures/cad/dxf2gcode.log failures/devel/avr/gcc.log failures/emulators/openmsx.log failures/games/colobot/colobot.log failures/graphics/birdfont.log failures/graphics/enblend-enfuse.log failures/graphics/gmic.log failures/graphics/makehuman.log failures/graphics/openexr.log failures/lang/clazy.log failures/net/barrier.log failures/net/ntopng.log failures/net/pmacct,postgresql.log failures/productivity/gnucash.log failures/textproc/docbook-utils.log failures/www/nextcloud_notify_push.log failures/x11/gnome/gjs.log failures/x11/kde-applications/kmix.log New failures: +failures/graphics/inkscape.log +failures/x11/kde-applications/akonadi.log Resolved failures: -failures/databases/xapian-bindings,-main.log -failures/graphics/krita.log -failures/net/weechat,-lua.log -failures/security/arirang.log -failures/textproc/redland-bindings,-main.log -failures/x11/kde-applications/kig.log -failures/x11/kde-applications/kross-interpreters.log -failures/x11/kde-applications/okular.log -failures/x11/mate/calc.log -failures/x11/mate/panel.log -failures/x11/mate/settings-daemon.log -failures/x11/qt5/docs,-html.log Packages newly built: +databases/xapian-bindings +databases/xapian-bindings,-main +databases/xapian-bindings,-python +databases/xapian-bindings,-ruby +editors/calligra +editors/kile +graphics/krita +meta/mate +meta/mate,-main +net/weechat +net/weechat,-lua +net/weechat,-main +net/weechat,-python +net/weechat,-ruby +net/weechat,-tcl +security/arirang +textproc/redland-bindings +textproc/redland-bindings,-main +textproc/redland-bindings,-python +textproc/redland-bindings,-ruby +x11/kde-applications/kig +x11/kde-applications/kross-interpreters +x11/kde-applications/okular +x11/mate/calc +x11/mate/control-center +x11/mate/media +x11/mate/menu-advanced +x11/mate/notification-daemon +x11/mate/panel +x11/mate/power-manager +x11/mate/screensaver +x11/mate/session-manager +x11/mate/settings-daemon +x11/qt5/docs +x11/qt5/docs,-html +x11/qt5/docs,-qch Packages not built this time: -graphics/inkscape -meta/kde,,-utils -meta/kde,-utils -productivity/kmymoney -x11/kde-applications/akonadi -x11/kde-applications/akonadi-contacts -x11/kde-applications/akonadi-mime -x11/kde-applications/akonadi-search -x11/kde-applications/kalarmcal -x11/kde-applications/kgpg -x11/kde-applications/libgravatar -x11/kde-applications/mailimporter -x11/kde-applications/pimcommon
nmap segfault fix
Hi! While testing 7.0 packages I got an nmap segfault. It has been fixed upstream in their github, but I don't know if it's part of any release yet. However their fix may be incomplete as there are other opportunities for a negative buffer overflow in nmap_dns.cc, at least without knowing all callers of the ptrToIp method. I attach a patch that works for me (tm) as well as a patch to add a debug package for nmap, which was needed for me to debug this issue. Even if its too late for 7.0, at least the segfault fix might make 7.0-stable package, I reckon. The fault is indeterministic, and triggered by a PTR name being aligned at the beginning of a page immediately preceded by an unmapped page. The case which triggers it fairly often for me was just a nmap of a single TCP port over some seven or so /24-networks. /Niklas commit 550c8a099e5eb1189e26f8868927c7b5cba950f2 Author: niklas Date: Tue Sep 28 14:49:55 2021 +0200 Avoid careless dereferences outside the domain name buffer diff --git a/net/nmap/patches/patch-nmap_dns_cc b/net/nmap/patches/patch-nmap_dns_cc new file mode 100644 index 000..45e74a3e735 --- /dev/null +++ b/net/nmap/patches/patch-nmap_dns_cc @@ -0,0 +1,42 @@ +$OpenBSD$ + +Avoid careless dereferences outside the domain name buffer. + +Index: nmap_dns.cc +--- nmap_dns.cc.orig nmap_dns.cc +@@ -1352,7 +1352,7 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + memset(&ip, 0, sizeof(sockaddr_storage)); + + // Check whether the name ends with the IPv4 PTR domain +- if (NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV4_PTR_DOMAIN), C_IPV4_PTR_DOMAIN))) ++ if (ptr.length() >= sizeof(C_IPV4_PTR_DOMAIN) - 1 && NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV4_PTR_DOMAIN), C_IPV4_PTR_DOMAIN))) + { + struct sockaddr_in *ip4 = (struct sockaddr_in *)&ip; + u8 place_value[] = {1, 10, 100}; +@@ -1361,7 +1361,7 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + size_t i = 0; + + p--; +-while (i < sizeof(ip4->sin_addr.s_addr)) ++while (p >= cptr && i < sizeof(ip4->sin_addr.s_addr)) + { + if (*p == '.') + { +@@ -1387,14 +1387,14 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + ip.ss_family = AF_INET; + } + // If not, check IPv6 +- else if (NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV6_PTR_DOMAIN), C_IPV6_PTR_DOMAIN))) ++ else if (ptr.length() >= sizeof(C_IPV6_PTR_DOMAIN) - 1 && NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV6_PTR_DOMAIN), C_IPV6_PTR_DOMAIN))) + { + struct sockaddr_in6 *ip6 = (struct sockaddr_in6 *)&ip; + u8 alt = 0; + size_t i=0; + + p--; +-while (i < sizeof(ip6->sin6_addr.s6_addr)) ++while (p >= cptr && i < sizeof(ip6->sin6_addr.s6_addr)) + { + if (*p == '.') + { commit f2aafb4430c0150d70926e3277d0d816805111cb Author: niklas Date: Tue Sep 28 14:49:06 2021 +0200 Make debug packages diff --git a/net/nmap/Makefile b/net/nmap/Makefile index ff8db3d7594..c1752ffef46 100644 --- a/net/nmap/Makefile +++ b/net/nmap/Makefile @@ -33,6 +33,7 @@ MODULES= lang/python \ lang/lua MODPY_VERSION= ${MODPY_DEFAULT_VERSION_2} +DEBUG_PACKAGES= ${BUILD_PACKAGES} CONFIGURE_STYLE=autoconf AUTOCONF_VERSION=2.69
Re: nmap segfault fix
On Wed, Sep 29, 2021 at 05:45:06PM +0100, Stuart Henderson wrote: > The version of nmap in ports is the last one under the old licence. I'd like > if someone who knows about such things could review the new nmap licence > before we start taking diffs from anything newer (we might want to stop > distributing packages). After some Linux distributions pushed back and even rolled back to 7.80, the 7.92 release (which includes this fix) is also released under the nmap-v7.80 license. https://nmap.org/npsl/ states To ease the transition to the NPSL, the first three Nmap releases made under that license (Nmap 7.90, 7.91, and 7.92) may also be used under the previous Nmap license terms by anyone who prefers those. I'll bump the comment in the Makefile to 7.92 See also https://github.com/nmap/nmap/issues/2199#issuecomment-894812634
Re: nmap segfault fix
The version of nmap in ports is the last one under the old licence. I'd like if someone who knows about such things could review the new nmap licence before we start taking diffs from anything newer (we might want to stop distributing packages). -- Sent from a phone, apologies for poor formatting. On 29 September 2021 16:50:22 JR Aquino wrote: Thanks Niklas! The patches apply, build, and run cleanly. The fix makes sense to incorporate in our OpenBSD port for nmap 7.91, but we should revisit it in the future with any new upstream releases in case there are subtle changes from what is in their github repo today. Unless anyone else has strong opinions, I'm good with the patches and would like to ask another port maintainer with CVS privileges to review and commit. -JR On Wed, Sep 29, 2021 at 8:37 AM Niklas Hallqvist wrote: Hi! While testing 7.0 packages I got an nmap segfault. It has been fixed upstream in their github, but I don't know if it's part of any release yet. However their fix may be incomplete as there are other opportunities for a negative buffer overflow in nmap_dns.cc, at least without knowing all callers of the ptrToIp method. I attach a patch that works for me (tm) as well as a patch to add a debug package for nmap, which was needed for me to debug this issue. Even if its too late for 7.0, at least the segfault fix might make 7.0-stable package, I reckon. The fault is indeterministic, and triggered by a PTR name being aligned at the beginning of a page immediately preceded by an unmapped page. The case which triggers it fairly often for me was just a nmap of a single TCP port over some seven or so /24-networks. /Niklas
Re: nmap segfault fix
On Wed, Sep 29, 2021 at 09:10:14AM -0700, JR Aquino wrote: > How about now? Thanks, that's better. I think the part of the diff which is the upstream fix is simple enough that we do not need to worry about the license. I'll land this in -current once the tree unlocks and will also land it in 7.0-stable. Index: Makefile === RCS file: /cvs/ports/net/nmap/Makefile,v retrieving revision 1.140 diff -u -p -r1.140 Makefile --- Makefile20 Jul 2021 22:28:24 - 1.140 +++ Makefile29 Sep 2021 16:36:20 - @@ -7,6 +7,7 @@ MODPY_EGG_VERSION= 7.91 DISTNAME= nmap-${MODPY_EGG_VERSION} PKGNAME-main= ${DISTNAME} PKGNAME-zenmap=nmap-zenmap-${MODPY_EGG_VERSION} +REVISION= 0 CATEGORIES=net security MASTER_SITES= ${HOMEPAGE}/dist/ @@ -33,6 +34,7 @@ MODULES= lang/python \ lang/lua MODPY_VERSION= ${MODPY_DEFAULT_VERSION_2} +DEBUG_PACKAGES=${BUILD_PACKAGES} CONFIGURE_STYLE=autoconf AUTOCONF_VERSION=2.69 Index: patches/patch-nmap_dns_cc === RCS file: patches/patch-nmap_dns_cc diff -N patches/patch-nmap_dns_cc --- /dev/null 1 Jan 1970 00:00:00 - +++ patches/patch-nmap_dns_cc 29 Sep 2021 16:35:25 - @@ -0,0 +1,44 @@ +$OpenBSD$ + +Avoid careless dereferences outside the domain name buffer. +Part of this is +https://github.com/nmap/nmap/commit/3adaa69cb211b00f9bfc66263a56cbd87cc9e521 + +Index: nmap_dns.cc +--- nmap_dns.cc.orig nmap_dns.cc +@@ -1352,7 +1352,7 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + memset(&ip, 0, sizeof(sockaddr_storage)); + + // Check whether the name ends with the IPv4 PTR domain +- if (NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV4_PTR_DOMAIN), C_IPV4_PTR_DOMAIN))) ++ if (ptr.length() >= sizeof(C_IPV4_PTR_DOMAIN) - 1 && NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV4_PTR_DOMAIN), C_IPV4_PTR_DOMAIN))) + { + struct sockaddr_in *ip4 = (struct sockaddr_in *)&ip; + u8 place_value[] = {1, 10, 100}; +@@ -1361,7 +1361,7 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + size_t i = 0; + + p--; +-while (i < sizeof(ip4->sin_addr.s_addr)) ++while (p >= cptr && i < sizeof(ip4->sin_addr.s_addr)) + { + if (*p == '.') + { +@@ -1387,14 +1387,14 @@ bool DNS::Factory::ptrToIp(const std::string &ptr, soc + ip.ss_family = AF_INET; + } + // If not, check IPv6 +- else if (NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV6_PTR_DOMAIN), C_IPV6_PTR_DOMAIN))) ++ else if (ptr.length() >= sizeof(C_IPV6_PTR_DOMAIN) - 1 && NULL != (p = strcasestr(cptr + ptr.length() + 1 - sizeof(C_IPV6_PTR_DOMAIN), C_IPV6_PTR_DOMAIN))) + { + struct sockaddr_in6 *ip6 = (struct sockaddr_in6 *)&ip; + u8 alt = 0; + size_t i=0; + + p--; +-while (i < sizeof(ip6->sin6_addr.s6_addr)) ++while (p >= cptr && i < sizeof(ip6->sin6_addr.s6_addr)) + { + if (*p == '.') + {
Re: nmap segfault fix
How about now? -JR On Wed, Sep 29, 2021 at 8:59 AM Theo Buehler wrote: > On Wed, Sep 29, 2021 at 08:49:06AM -0700, JR Aquino wrote: > > Thanks Niklas! > > > > The patches apply, build, and run cleanly. > > The patches did not make it to the list. > > > > > The fix makes sense to incorporate in our OpenBSD port for nmap 7.91, but > > we should revisit it in the future with any new upstream releases in case > > there are subtle changes from what is in their github repo today. > > > > Unless anyone else has strong opinions, I'm good with the patches and > would > > like to ask another port maintainer with CVS privileges to review and > > commit. > > > > -JR > > > > On Wed, Sep 29, 2021 at 8:37 AM Niklas Hallqvist > wrote: > > > > > Hi! > > > > > > While testing 7.0 packages I got an nmap segfault. It has been fixed > > > upstream in their github, but I don't know if it's part of any release > yet. > > > > > > However their fix may be incomplete as there are other opportunities > for > > > a negative buffer overflow in nmap_dns.cc, at least without knowing all > > > callers of the ptrToIp method. > > > > > > I attach a patch that works for me (tm) as well as a patch to add a > > > debug package for nmap, which was needed for me to debug this issue. > > > > > > Even if its too late for 7.0, at least the segfault fix might make > > > 7.0-stable package, I reckon. > > > > > > The fault is indeterministic, and triggered by a PTR name being aligned > > > at the beginning of a page immediately preceded by an unmapped page. > > > The case which triggers it fairly often for me was just a nmap of a > > > single TCP port over some seven or so /24-networks. > > > > > > /Niklas > > > > buf-oflow-fix.patch Description: Binary data nmap-debug.patch Description: Binary data
Re: nmap segfault fix
On Wed, Sep 29, 2021 at 08:49:06AM -0700, JR Aquino wrote: > Thanks Niklas! > > The patches apply, build, and run cleanly. The patches did not make it to the list. > > The fix makes sense to incorporate in our OpenBSD port for nmap 7.91, but > we should revisit it in the future with any new upstream releases in case > there are subtle changes from what is in their github repo today. > > Unless anyone else has strong opinions, I'm good with the patches and would > like to ask another port maintainer with CVS privileges to review and > commit. > > -JR > > On Wed, Sep 29, 2021 at 8:37 AM Niklas Hallqvist wrote: > > > Hi! > > > > While testing 7.0 packages I got an nmap segfault. It has been fixed > > upstream in their github, but I don't know if it's part of any release yet. > > > > However their fix may be incomplete as there are other opportunities for > > a negative buffer overflow in nmap_dns.cc, at least without knowing all > > callers of the ptrToIp method. > > > > I attach a patch that works for me (tm) as well as a patch to add a > > debug package for nmap, which was needed for me to debug this issue. > > > > Even if its too late for 7.0, at least the segfault fix might make > > 7.0-stable package, I reckon. > > > > The fault is indeterministic, and triggered by a PTR name being aligned > > at the beginning of a page immediately preceded by an unmapped page. > > The case which triggers it fairly often for me was just a nmap of a > > single TCP port over some seven or so /24-networks. > > > > /Niklas > >
Re: nmap segfault fix
Thanks Niklas! The patches apply, build, and run cleanly. The fix makes sense to incorporate in our OpenBSD port for nmap 7.91, but we should revisit it in the future with any new upstream releases in case there are subtle changes from what is in their github repo today. Unless anyone else has strong opinions, I'm good with the patches and would like to ask another port maintainer with CVS privileges to review and commit. -JR On Wed, Sep 29, 2021 at 8:37 AM Niklas Hallqvist wrote: > Hi! > > While testing 7.0 packages I got an nmap segfault. It has been fixed > upstream in their github, but I don't know if it's part of any release yet. > > However their fix may be incomplete as there are other opportunities for > a negative buffer overflow in nmap_dns.cc, at least without knowing all > callers of the ptrToIp method. > > I attach a patch that works for me (tm) as well as a patch to add a > debug package for nmap, which was needed for me to debug this issue. > > Even if its too late for 7.0, at least the segfault fix might make > 7.0-stable package, I reckon. > > The fault is indeterministic, and triggered by a PTR name being aligned > at the beginning of a page immediately preceded by an unmapped page. > The case which triggers it fairly often for me was just a nmap of a > single TCP port over some seven or so /24-networks. > > /Niklas >
[update] mail/exim -> 4.95
Hi, This is an update for mail/exim to version 4.95. It includes the patch from sthen@ to disable the printf %n checks (by default in 4.95 source). It also includes a patch to be able to compile properly with libressl 3.4.0, therefore removing the hack in the Makefile The specific OpenBSD os.h patch can also be removed as this has been included in exim by default too. Best Regards Index: Makefile === RCS file: /cvs/ports/mail/exim/Makefile,v retrieving revision 1.136 diff -u -p -r1.136 Makefile --- Makefile 5 May 2021 15:08:15 - 1.136 +++ Makefile 29 Sep 2021 06:19:48 - @@ -3,12 +3,11 @@ COMMENT-main = flexible mail transfer agent COMMENT-eximon = X11 monitor tool for Exim MTA -VERSION = 4.94.2 +VERSION = 4.95 DISTNAME = exim-${VERSION} PKGNAME-main = exim-${VERSION} FULLPKGNAME-eximon = exim-eximon-${VERSION} FULLPKGPATH-eximon = ${PKGPATH},-eximon -REVISION-main = 1 CATEGORIES = mail @@ -90,8 +89,6 @@ EXIM_EXTRA_LIBS += -L${LOCALBASE}/lib -l LIB_DEPENDS-main += security/cyrus-sasl2 WANTLIB-main += sasl2 .endif - -CFLAGS += -DEXIM_HAVE_OPENSSL_CIPHER_GET_ID # Needed to build with base-gcc .if !${PROPERTIES:Mclang} Index: distinfo === RCS file: /cvs/ports/mail/exim/distinfo,v retrieving revision 1.42 diff -u -p -r1.42 distinfo --- distinfo 4 May 2021 13:49:04 - 1.42 +++ distinfo 29 Sep 2021 06:19:48 - @@ -1,2 +1,2 @@ -SHA256 (exim-4.94.2.tar.gz) = OpHNalQTyICEKlhIOW00wu5/l+XDONmOXV+xO2r/KjA= -SIZE (exim-4.94.2.tar.gz) = 2528512 +SHA256 (exim-4.95.tar.gz) = b92D7de/U73AoggYdkOqDEGGGrqaCaAm94NRrI52i5w= +SIZE (exim-4.95.tar.gz) = 2566707 Index: patches/patch-Local_Makefile === RCS file: /cvs/ports/mail/exim/patches/patch-Local_Makefile,v retrieving revision 1.5 diff -u -p -r1.5 patch-Local_Makefile --- patches/patch-Local_Makefile 19 Mar 2021 15:59:50 - 1.5 +++ patches/patch-Local_Makefile 29 Sep 2021 06:19:48 - @@ -31,7 +31,7 @@ Index: Local/Makefile # If you specify EXIM_USER as a name, this is looked up at build time, and the # uid number is built into the binary. However, you can specify that this @@ -210,11 +210,11 @@ SPOOL_DIRECTORY=/var/spool/exim - # If you are buliding with TLS, the library configuration must be done: + # If you are building with TLS, the library configuration must be done: # Uncomment this if you are using OpenSSL -# USE_OPENSSL=yes @@ -44,7 +44,7 @@ Index: Local/Makefile # TLS_LIBS=-L/usr/local/openssl/lib -lssl -lcrypto # Uncomment this if you are using GnuTLS -@@ -337,7 +337,7 @@ TRANSPORT_SMTP=yes +@@ -340,7 +340,7 @@ TRANSPORT_SMTP=yes # This one is special-purpose, and commonly not required, so it is not # included by default. @@ -53,7 +53,7 @@ Index: Local/Makefile #-- -@@ -346,9 +346,9 @@ TRANSPORT_SMTP=yes +@@ -349,9 +349,9 @@ TRANSPORT_SMTP=yes # MBX, is included only when requested. If you do not know what this is about, # leave these settings commented out. @@ -66,7 +66,7 @@ Index: Local/Makefile #-- -@@ -406,17 +406,17 @@ LOOKUP_DBM=yes +@@ -409,8 +409,8 @@ LOOKUP_DBM=yes LOOKUP_LSEARCH=yes LOOKUP_DNSDB=yes @@ -77,6 +77,8 @@ Index: Local/Makefile # LOOKUP_IBASE=yes # LOOKUP_JSON=yes # LOOKUP_LDAP=yes +@@ -418,10 +418,10 @@ LOOKUP_DNSDB=yes + # LOOKUP_MYSQL=yes # LOOKUP_MYSQL_PC=mariadb -# LOOKUP_NIS=yes @@ -88,7 +90,7 @@ Index: Local/Makefile # LOOKUP_PGSQL=yes # LOOKUP_REDIS=yes # LOOKUP_SQLITE=yes -@@ -508,7 +508,7 @@ SUPPORT_DANE=yes +@@ -514,7 +514,7 @@ SUPPORT_DANE=yes # and the MIME ACL. Please read the documentation to learn more about these # features. @@ -97,19 +99,20 @@ Index: Local/Makefile # If you have content scanning you may wish to only include some of the scanner # interfaces. Uncomment any of these lines to remove that code. -@@ -595,9 +595,9 @@ DISABLE_MAL_MKS=yes - - # Uncomment the following line to add DMARC checking capability, implemented +@@ -607,9 +607,9 @@ DISABLE_MAL_MKS=yes # using libopendmarc libraries. You must have SPF and DKIM support enabled also. + # Library version libopendmarc-1.4.1-1.fc33.x86_64 (on Fedora 33) is known broken; + # 1.3.2-3 works. I seems that the OpenDMARC project broke their API. -# SUPPORT_DMARC=yes -+SUPPORT_DMARC=yes - # CFLAGS += -I/usr/local/include +-# CFLAGS += -I/usr/local/include -# LDFLAGS += -lopendmarc ++SUPPORT_DMARC=yes ++# CFLAGS += -I/usr/local/include +LDFLAGS += -lopendmarc # Uncomment the following if you need to change the default. You can # override it at runtime (main config option dmarc_tld_file) # DMARC_TLD_FILE=/etc/exim/opendmarc.tlds -@@ -758,18 +758,18 @@ FIXED_NEVER_USERS=root +@@ -764,18
powerpc64 bulk build report
Bulk build on powerpc64.ports.openbsd.org Started : Mon Sep 27 13:28:46 MDT 2021 Finished: Wed Sep 29 04:20:26 MDT 2021 Duration: 1 Days 14 hours 52 minutes Built using OpenBSD 7.0 (GENERIC.MP) #377: Sun Sep 26 11:01:41 MDT 2021 Built 9349 packages Number of packages built each day: Sep 27: 2976 Sep 28: 3206 Sep 29: 3167 Critical path missing pkgs: http://build-failures.rhaalovely.net/powerpc64/2021-09-27/summary.log Build failures: 7 http://build-failures.rhaalovely.net/powerpc64/2021-09-27/games/odamex.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/graphics/simgear.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/lang/gcc/11,-c++.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/math/gbc.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/productivity/gnucash.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/security/gpgme.log http://build-failures.rhaalovely.net/powerpc64/2021-09-27/sysutils/u-boot,aarch64.log Recurrent failures: failures/lang/gcc/11,-c++.log failures/math/gbc.log failures/sysutils/u-boot,aarch64.log New failures: +failures/games/odamex.log +failures/graphics/simgear.log +failures/productivity/gnucash.log +failures/security/gpgme.log Resolved failures: -failures/databases/sqlports,-list.log -failures/devel/gdb.log -failures/sysutils/ggrep.log Packages newly built: +archivers/blosc +archivers/brotli +archivers/deco +archivers/deutex +archivers/fuse-zip +archivers/innoextract +archivers/laszip +archivers/libarchive +archivers/libzip +archivers/minizip +archivers/pecl-lzf,php73 +archivers/pecl-lzf,php74 +archivers/pecl-lzf,php80 +archivers/pecl-rar,php73 +archivers/pecl-rar,php74 +archivers/pecl-rar,php80 +archivers/py-libarchive-c,python3 +archivers/py-rarfile,python3 +archivers/quazip +archivers/snappy +archivers/unarr +archivers/unshield +archivers/woff2 +archivers/zopfli +archivers/zstd +astro/celestia +astro/gnuastro +astro/sunclock +astro/sunclock,-main +astro/sunclock,-maps +astro/wmglobe +astro/xephem +audio/adplay +audio/ario +audio/audacious/player +audio/audacious/plugins +audio/audacity +audio/audiality2 +audio/calf +audio/chromaprint +audio/cmus +audio/cmus,-ffmpeg +audio/cmus,-main +audio/curseradio +audio/deadbeef +audio/disc-cover +audio/easytag +audio/faudio +audio/ffmpeg-normalize +audio/fluidsynth +audio/freealut +audio/glyr +audio/gmpc +audio/gmpc-plugins +audio/gogglesmm +audio/gqmpeg +audio/gradio +audio/grip +audio/gsound +audio/herrie +audio/hydrogen +audio/jack +audio/libbs2b +audio/libcanberra +audio/libcanberra,-gtk +audio/libcanberra,-gtk3 +audio/libcanberra,-main +audio/libebur128 +audio/libgpod +audio/liblastfm +audio/libmusicbrainz +audio/libmusicbrainz5 +audio/libmysofa +audio/libopenmpt +audio/libsamplerate +audio/libsndfile +audio/libsoxr +audio/lilv +audio/lmms +audio/lv2 +audio/milkytracker +audio/moc +audio/mp3cddb +audio/mp3info +audio/mp3splt-gtk +audio/mpd +audio/mscore +audio/multimux +audio/mumble +audio/mumble,-main +audio/mumble,-server +audio/musepack +audio/musikcube +audio/ncmpcpp +audio/ocp +audio/openal +audio/p5-gnupod +audio/pacpl +audio/parlatype +audio/paulstretch +audio/pianobar +audio/pithos +audio/portmidi +audio/potamus +audio/py-acoustid,python3 +audio/py-tagpy,python3 +audio/pykaraoke +audio/qsynth +audio/quodlibet +audio/rgain +audio/rhythmbox +audio/rubberband +audio/ruby-taglib,ruby27 +audio/ruby-taglib,ruby30 +audio/siren +audio/solfege +audio/sonata +audio/sox +audio/speech-dispatcher +audio/squeezecenter +audio/squeezelite +audio/sratom +audio/taglib +audio/tagtool +audio/tempest +audio/timidity,gtk2 +audio/twolame +audio/umurmur +audio/vamp-plugin-sdk +audio/xmcd +audio/xmms2 +audio/xmms2-scrobbler +audio/ympd +audio/yt-audio +benchmarks/netperf-wrapper +benchmarks/netperf-wrapper, +benchmarks/netperf-wrapper,,-main +benchmarks/netperf-wrapper,-main +benchmarks/sysbench,mysql +benchmarks/tsung +biology/bioperl +biology/p5-Bio-ASN1-EntrezGene +biology/p5-Bio-DB-EMBL +biology/p5-Bio-DB-NCBIHelper +biology/p5-Bio-Variation +biology/py-biopython,python3 +books/tex-by-topic +cad/abc +cad/fritzing +cad/geda-gaf +cad/gerbv +cad/graywolf +cad/gtkwave +cad/kicad +cad/kicad-share/footprints +cad/kicad-share/i18n +cad/kicad-share/packages3D +cad/kicad-share/symbols +cad/kicad-share/templates +cad/librecad +cad/oce +cad/opensta +cad/pcb +cad/pcb2gcode +cad/qcad +cad/qelectrotech +cad/qflow +cad/tkgate +cad/xnecview +cad/yosys +chinese/libchewing +chinese/libpinyin +comms/amtterm +comms/amtterm,-main +comms/amtterm,-term +comms/chirp +comms/dump1090 +comms/fldigi +comms/gammu +comms/gmfsk +comms/gpsk31 +comms/hackrf +comms/hylafax +comms/hylafax,a4 +comms/jpilot +comms/lcdproc +comms/mgetty+sendfax +comms/pterm +comms/py-gammu +comms/rtl-sdr +comms/sigrok/libsigrok +comms/sigrok/pulseview +comms/sigrok/sigrok-cli +comms/syncterm +comms/tkhylafax +comms/wammu +comms/xastir +comms/xdx +comms/xlog +converters/bdf2sfd +converters/lastools +converters/libpst +converte