From owner-svn-doc-head@freebsd.org Mon Jul 6 13:54:21 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BE24A3689B4; Mon, 6 Jul 2020 13:54:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B0n9n4gWXz458P; Mon, 6 Jul 2020 13:54:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 840651F550; Mon, 6 Jul 2020 13:54:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 066DsLxu088847; Mon, 6 Jul 2020 13:54:21 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 066DsLKr088846; Mon, 6 Jul 2020 13:54:21 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <202007061354.066DsLKr088846@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Mon, 6 Jul 2020 13:54:21 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54314 - head/ja_JP.eucJP/htdocs/security X-SVN-Group: doc-head X-SVN-Commit-Author: ryusuke X-SVN-Commit-Paths: head/ja_JP.eucJP/htdocs/security X-SVN-Commit-Revision: 54314 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 06 Jul 2020 13:54:21 -0000 Author: ryusuke Date: Mon Jul 6 13:54:21 2020 New Revision: 54314 URL: https://svnweb.freebsd.org/changeset/doc/54314 Log: - Merge the following from the English version: r54120 -> r54302 head/ja_JP.eucJP/htdocs/security/security.xml Modified: head/ja_JP.eucJP/htdocs/security/security.xml Modified: head/ja_JP.eucJP/htdocs/security/security.xml ============================================================================== --- head/ja_JP.eucJP/htdocs/security/security.xml Sat Jul 4 05:37:51 2020 (r54313) +++ head/ja_JP.eucJP/htdocs/security/security.xml Mon Jul 6 13:54:21 2020 (r54314) @@ -5,7 +5,7 @@ ]> - + @@ -213,7 +213,7 @@ releng/11.4 11.4-RELEASE n/a - TBD + 2020 年 6 月 16 日 11.4-RELEASE end-of-life @@ -221,7 +221,7 @@ 11.3-RELEASE n/a 2019 年 7 月 9 日 - 11.4-RELEASE 公開から 3 ヵ月後 + 2020 年 9 月 30 日 From owner-svn-doc-head@freebsd.org Tue Jul 7 10:11:38 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2E52E35CC71; Tue, 7 Jul 2020 10:11:38 +0000 (UTC) (envelope-from brueffer@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B1JBL0VMyz4MZT; Tue, 7 Jul 2020 10:11:38 +0000 (UTC) (envelope-from brueffer@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DF2CDDC26; Tue, 7 Jul 2020 10:11:37 +0000 (UTC) (envelope-from brueffer@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 067ABbvu043913; Tue, 7 Jul 2020 10:11:37 GMT (envelope-from brueffer@FreeBSD.org) Received: (from brueffer@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 067ABboi043912; Tue, 7 Jul 2020 10:11:37 GMT (envelope-from brueffer@FreeBSD.org) Message-Id: <202007071011.067ABboi043912@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: brueffer set sender to brueffer@FreeBSD.org using -f From: Christian Brueffer Date: Tue, 7 Jul 2020 10:11:37 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54315 - head/en_US.ISO8859-1/articles/committers-guide X-SVN-Group: doc-head X-SVN-Commit-Author: brueffer X-SVN-Commit-Paths: head/en_US.ISO8859-1/articles/committers-guide X-SVN-Commit-Revision: 54315 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Jul 2020 10:11:38 -0000 Author: brueffer Date: Tue Jul 7 10:11:37 2020 New Revision: 54315 URL: https://svnweb.freebsd.org/changeset/doc/54315 Log: Fix typos. Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml Modified: head/en_US.ISO8859-1/articles/committers-guide/article.xml ============================================================================== --- head/en_US.ISO8859-1/articles/committers-guide/article.xml Mon Jul 6 13:54:21 2020 (r54314) +++ head/en_US.ISO8859-1/articles/committers-guide/article.xml Tue Jul 7 10:11:37 2020 (r54315) @@ -3058,7 +3058,7 @@ Relnotes: yes Open new bug. Choose Services as the Product, and Bug Tracker as the - Component. In bug description list acounts you wish to be + Component. In bug description list accounts you wish to be merged. @@ -3765,7 +3765,7 @@ Relnotes: yes manually re-verified every import. If a particular piece of software lacks a maintainer, - you are encouraged to take up owership. If you are unsure + you are encouraged to take up ownership. If you are unsure of the current maintainership email &a.arch; and ask. From owner-svn-doc-head@freebsd.org Wed Jul 8 14:12:21 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 83DB33641A0; Wed, 8 Jul 2020 14:12:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B21Td30Ltz47G1; Wed, 8 Jul 2020 14:12:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4A9F021850; Wed, 8 Jul 2020 14:12:21 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 068ECLTx079459; Wed, 8 Jul 2020 14:12:21 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 068ECL77079447; Wed, 8 Jul 2020 14:12:21 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <202007081412.068ECL77079447@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Wed, 8 Jul 2020 14:12:21 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54316 - head/ja_JP.eucJP/books/handbook/introduction X-SVN-Group: doc-head X-SVN-Commit-Author: ryusuke X-SVN-Commit-Paths: head/ja_JP.eucJP/books/handbook/introduction X-SVN-Commit-Revision: 54316 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 14:12:21 -0000 Author: ryusuke Date: Wed Jul 8 14:12:20 2020 New Revision: 54316 URL: https://svnweb.freebsd.org/changeset/doc/54316 Log: - Merge the following from the English version: r53882 -> r54306 head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/introduction/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Tue Jul 7 10:11:37 2020 (r54315) +++ head/ja_JP.eucJP/books/handbook/introduction/chapter.xml Wed Jul 8 14:12:20 2020 (r54316) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r53882 + Original revision: r54306 $FreeBSD$ --> @@ -1068,7 +1068,7 @@ 責任感あふれる開発者を上記のソースツリー管理者として招くこと、 また仕事上の都合などでコアチームをやめた人たちの後任を見つけることもコアチームの役割です。 現在のコアチームは &os; 開発者 (committer) の中から - 2018 年 7 月に選挙によって選出されました。 + 2020 年 6 月に選挙によって選出されました。 コアチームを選出するための選挙は、2 年ごとに行なわれています。 From owner-svn-doc-head@freebsd.org Wed Jul 8 18:07:34 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 664E93692CD; Wed, 8 Jul 2020 18:07:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B26j2284dz4NBG; Wed, 8 Jul 2020 18:07:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2CBA024076; Wed, 8 Jul 2020 18:07:34 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 068I7Yxg025445; Wed, 8 Jul 2020 18:07:34 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 068I7Yod025444; Wed, 8 Jul 2020 18:07:34 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <202007081807.068I7Yod025444@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Wed, 8 Jul 2020 18:07:34 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54317 - head/de_DE.ISO8859-1/books/handbook/introduction X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/introduction X-SVN-Commit-Revision: 54317 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 18:07:34 -0000 Author: bhd Date: Wed Jul 8 18:07:33 2020 New Revision: 54317 URL: https://svnweb.freebsd.org/changeset/doc/54317 Log: Update to r54306: Update with the members of the 11th core team, core.xi Modified: head/de_DE.ISO8859-1/books/handbook/introduction/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/introduction/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/introduction/chapter.xml Wed Jul 8 14:12:20 2020 (r54316) +++ head/de_DE.ISO8859-1/books/handbook/introduction/chapter.xml Wed Jul 8 18:07:33 2020 (r54317) @@ -4,7 +4,7 @@ The FreeBSD German Documentation Project $FreeBSD$ - basiert auf: r53806 + basiert auf: r54306 --> Geschichte - Das &os; Projekt erblickte das Licht der Welt Anfang 1993 - teils als Auswuchs des Unofficial 386BSD - Patchkit unter der Regie der letzten drei - Koordinatoren des Patchkits: Nate Williams, Rod Grimes und - Jordan Hubbard. + Das &os; Projekt wurde Anfang 1993 ins Leben gerufen, + zum Teil als Ergebnis der Arbeit der letzten drei + Koordinatoren des Unofficial 386BSD Patchkit: + Nate Williams, Rod Grimes und Jordan Hubbard. 386BSD Das ursprngliche Ziel war es, einen zwischenzeitlichen @@ -922,7 +921,7 @@ Gegenteil der Beschrnkungen. Aufgrund zustzlicher Abhngigkeiten, die sich durch die Verwendung von GPL-Software bei kommerziellem Gebrauch ergeben, bevorzugen - wir daher Software unter dem transparenteren BSD-Copyright, wo + wir daher Software unter der transparenteren BSD-Lizenz, wo immer es angebracht ist. @@ -1014,8 +1013,9 @@ SVN im Mai und Juli 2012 umgezogen. Lesen Sie dazu Synchronisation der - Quellen fr weitere Informationen zum - Beziehen der &os; src/ Repository + Quellen fr weitere Informationen zur + Synchronisation des &os; + src/-Repositories und Die Ports-Sammlung verwenden fr Details zum Beziehen der &os; Ports-Sammlung. @@ -1066,7 +1066,7 @@ genauso wie neue Mitglieder des Core Teams zu rekrutieren, wenn andere ausscheiden. Das aktuelle Core Team wurde aus einer Menge von Kandidaten aus dem Kreis - der Committer im Juli 2018 gewhlt. Wahlen werden alle + der Committer im Juni 2020 gewhlt. Wahlen werden alle zwei Jahre abgehalten. From owner-svn-doc-head@freebsd.org Wed Jul 8 20:50:29 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id AAE7136EB66; Wed, 8 Jul 2020 20:50:29 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2BK14NDMz3gQ6; Wed, 8 Jul 2020 20:50:29 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5FF3926402; Wed, 8 Jul 2020 20:50:29 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 068KoTlZ049370; Wed, 8 Jul 2020 20:50:29 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 068KoSi1049363; Wed, 8 Jul 2020 20:50:28 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <202007082050.068KoSi1049363@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Wed, 8 Jul 2020 20:50:28 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54319 - in head/share: security/advisories security/patches/EN-20:13 security/patches/EN-20:14 security/patches/EN-20:15 security/patches/SA-20:18 security/patches/SA-20:19 security/pa... X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: in head/share: security/advisories security/patches/EN-20:13 security/patches/EN-20:14 security/patches/EN-20:15 security/patches/SA-20:18 security/patches/SA-20:19 security/patches/SA-20:20 xml X-SVN-Commit-Revision: 54319 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Jul 2020 20:50:29 -0000 Author: gordon (src committer) Date: Wed Jul 8 20:50:27 2020 New Revision: 54319 URL: https://svnweb.freebsd.org/changeset/doc/54319 Log: Add EN-20:13 through EN-20:15, and SA-20:18 through SA-20:20. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-20:13.bhyve.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:15.mps.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:19.unbound.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:20.ipv6.asc (contents, props changed) head/share/security/patches/EN-20:13/ head/share/security/patches/EN-20:13/bhyve.patch (contents, props changed) head/share/security/patches/EN-20:13/bhyve.patch.asc (contents, props changed) head/share/security/patches/EN-20:14/ head/share/security/patches/EN-20:14/linuxkpi.patch (contents, props changed) head/share/security/patches/EN-20:14/linuxkpi.patch.asc (contents, props changed) head/share/security/patches/EN-20:15/ head/share/security/patches/EN-20:15/mps.patch (contents, props changed) head/share/security/patches/EN-20:15/mps.patch.asc (contents, props changed) head/share/security/patches/SA-20:18/ head/share/security/patches/SA-20:18/posix_spawnp.patch (contents, props changed) head/share/security/patches/SA-20:18/posix_spawnp.patch.asc (contents, props changed) head/share/security/patches/SA-20:19/ head/share/security/patches/SA-20:19/unbound.11.3.patch (contents, props changed) head/share/security/patches/SA-20:19/unbound.11.3.patch.asc (contents, props changed) head/share/security/patches/SA-20:19/unbound.11.4.patch (contents, props changed) head/share/security/patches/SA-20:19/unbound.11.4.patch.asc (contents, props changed) head/share/security/patches/SA-20:19/unbound.12.1.patch (contents, props changed) head/share/security/patches/SA-20:19/unbound.12.1.patch.asc (contents, props changed) head/share/security/patches/SA-20:20/ head/share/security/patches/SA-20:20/ipv6.patch (contents, props changed) head/share/security/patches/SA-20:20/ipv6.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-20:13.bhyve.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:13.bhyve.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,143 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:13.bhyve Errata Notice + The FreeBSD Project + +Topic: Host crash in bhyve with PCI device passthrough + +Category: core +Module: bhyve +Announced: 2020-07-08 +Credits: Peter Grehan +Affects: FreeBSD 12.1 +Corrected: 2020-06-01 05:14:01 UTC (stable/12, 12.1-STABLE) + 2020-07-08 19:56:34 UTC (releng/12.1, 12.1-RELEASE-p7) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +bhyve(8) is a hypervisor that supports running a variety of guest operating +systems in virtual machines. bhyve(8) includes support for PCI devices +passthrough (a technique to pass host PCI devices to a virtual machine for its +exclusive control and use). + +II. Problem Description + +When an attempt is made to pass through a PCI device to a bhyve(8) VM (causing +initialization of IOMMU) on certain Intel chipsets using VT-d the PCI bus +stops working entirely resulting in a host crash. This issue occurs at least +on the Intel Skylake series processors and those released later. + +A device passed through to a guest VM running OpenBSD at least since version +6.4 on both AMD and Intel processors may not fully work in the guest. OpenBSD +issues 4-byte PCI configuration-space register reads and writes to consecutive +2-byte fields, which were not handled correctly by bhyve(8). + +III. Impact + +These issues prevent using bhyve in production with some combinations of host +hardware and/or guest operating system. + +IV. Workaround + +No workaround is available. Systems not using bhyve(8) for virtualization +with PCI passthrough are not affected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for errata update" + +The first problem requires a reboot as the affected part is the kernel. + +The second problem does not require a reboot as the affected part is the +bhyve userland executable. + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:13/bhyve.patch +# fetch https://security.FreeBSD.org/patches/EN-20:13/bhyve.patch.asc +# gpg --verify bhyve.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +d) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r361686 +releng/12.1/ r363022 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLjVfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cKMwQ/9HxrcUNvL8myn512t+drnCnDg/lNL2cqlc53VyDsvwesgXbGA3k1pQsyV +VLB2jn56+EWcq0b1eieLavK77YtdrbEfa72YOlTd576586VRroUC3d4o6eaAHKHS +Hzm/Qh5cQM46065Eoshz8T+N1/RNmU0ANS19ogBmogqhbJwwQUSr402a/BGrTES+ ++rx4ywmTOrmXxVQwAlRHp1/7pQ5PL3cK2ByYzuFjKjzNX3scHoMxOul2TC1bYwj6 +IhBT7NNxQuY/g7gxGM/ndifOiJtAlsxJdccWxZAMdYv3mzhnM2vqCmdz8KjB7UKH +2XOKB1RwSq0b1FBsur8Z0Pg6AlIRcNW952mAn2UJxx9mh/oCSj0sqtdmAKu0EO1e +Vn6+psOffB28ITvdBsf7D/3ixM8+jdAogFzW00iGPppF02QwM6FVxa3+mogOVtsv +R+Fu381qwQmqvMtAEXOxQ6NiAk3fTan+VuEDB8FnYPEs5JkWef/fn4SPRUrr04hY +yTkX8F3XID2XdSMTgJllQzhf1uCK3QT77Y0BcPJH+NPZIZiyKkROxqnpS7LGFlEs +v8dLXTOFnaHfdrjefB/QCwLMTcX1AfN1n0OxQigtwKC1rvKHweaqZBEujtDmyMOm +uFXhQjoT3o29i1O139Q/3yINEbVYn6U5INrW5ZUGt1nm/wL9PuA= +=mH7Y +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,131 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:14.linuxkpi Errata Notice + The FreeBSD Project + +Topic: Kernel panic in LinuxKPI subsystem + +Category: core +Module: linuxkpi +Announced: 2020-07-08 +Affects: FreeBSD 12.1 and 11.3 +Corrected: 2020-01-22 00:30:27 UTC (stable/12, 12.1-STABLE) + 2020-07-08 19:57:24 UTC (releng/12.1, 12.1-RELEASE-p7) + 2020-01-22 15:51:24 UTC (stable/11, 11.3-STABLE) + 2020-07-08 19:57:24 UTC (releng/11.3, 11.3-RELEASE-p11) + +Note: FreeBSD 11.4 was branched after the original commit to the stable/11 +branch and already includes this erratum. + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The LinuxKPI subsystem allows kernel code ported from Linux to run in the +FreeBSD kernel without extensive modification. Some graphics drivers make +use of this subsystem. + +II. Problem Description + +A bug in one of the LinuxKPI subroutines could cause a kernel panic. + +III. Impact + +Certain graphical applications may trigger a kernel panic. This is most +often observed when using X11 forwarding to run an application remotely. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for errata update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxpki.patch +# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxpki.patch.asc +# gpg --verify linuxkpi.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r356953 +releng/12.1/ r363023 +stable/11/ r356987 +releng/11.3/ r363023 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLkpfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJG7A//RWsupxbp1AMqYFz7KsC6zezh8pYU8rONJvWGgaH5MNTdzKVa+SDAg9il +HI2IOAsDDRFRQvweyf1yOPMdPFUv15ZPgYpUcx2MoAbLFNa5TsqcodE6t1hEjBrQ +20x0yjg/Fy6T17BaX3cziBFjxd3YW79jf/+FpzCTOoNasxIteiR5Vt4NbJ7Esqoa +u7U3uXtIvDmfVASfMYq2NmKWTP8cz+f2FCB3687G4jGmBhrfMK8DNVQ3RI6IjGEm +RUzmnYLX0Xbs83PTCYEkEqmEdj+o9zRokCPxdhFjd9XxnKaWh5vM0N6FNxBOcYER +OqGMy0X88wsqvs5l+FnXYdI/BzELrzXmB4lMEh9wXDfrCZt4wVkb0C0NBLGgrafV +95/YQobMsghe44ysVTmpfTi1++NnEDPgV/klVwBo6u9VluMH3PRxrTtW92SB0DOt +QABVpgV96LKibsO26PRLS5yqMEgUPJ57W6mQvL9RdsTL/4VBamHQmUinXM1VlMml +d2WVLguLw2vc86Mv2V4FZiC6A1eG91mUDTUYCeGxqBknl7DxBl+iGyM4Bu3Kw1+p +eRi1Y6hAR/Vb/VyE4mNTBd0UzZhRymaXkiVm7nAKZjTAvSbpbEe26QCPzZGUgVsT +UemEPi2lAAn2J3O46sEv8RjFjOOdrbOnyaZkJNBaKSPK7qq6etc= +=1UKD +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:15.mps.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:15.mps.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,129 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:15.mps Errata Notice + The FreeBSD Project + +Topic: Kernel panic in mps(4) driver + +Category: core +Module: mps +Announced: 2020-07-08 +Affects: All supported version of FreeBSD. +Corrected: 2020-06-11 14:48:20 UTC (stable/12, 12.1-STABLE) + 2020-07-08 19:58:00 UTC (releng/12.1, 12.1-RELEASE-p7) + 2020-06-11 14:49:38 UTC (stable/11, 11.4-STABLE) + 2020-07-08 19:58:00 UTC (releng/11.4, 11.4-RELEASE-p1) + 2020-07-08 19:58:00 UTC (releng/11.3, 11.3-RELEASE-p11) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +mps(4) is a disk controller driver. It exports an ioctl(2) interface used by +several command-line utilities to query for or set properties of the device. + +II. Problem Description + +mps(4) implements a pass-through interface which allows privileged user +processes to submit commands directly to disks behind the controller. A bug +in the code which copies command results out to the requesting process could +cause a kernel panic. + +III. Impact + +Administrative commands issued by, e.g., sas2ircu, could cause a kernel panic. + +IV. Workaround + +No workaround is available. Systems that do not use mps(4) are unaffected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for errata update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:15/mps.patch +# fetch https://security.FreeBSD.org/patches/EN-20:15/mps.patch.asc +# gpg --verify mps.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r362057 +releng/12.1/ r363024 +stable/11/ r362058 +releng/11.4/ r363024 +releng/11.3/ r363024 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLk5fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLlPxAAgUVjwHuRGD4sTiymH2QgkdjneeE99obAzXDTDDNAOWaJQqmZV2L+ooYq +2nnNdax0CpNvSaNF7KyEFYy30kcoBkSl8MBfOwtuUbO4fWUTDLIm3nUBn6YLvlkr +ZdrDEzLN3EXOoHnVez4+dcCostVDWAVMPiGzNitU4htPy3pPvwyEcko9lA4eOF5Q +ZanF1YjsAJOUvtmmCOr1XGRjzsW05Fbiyv6dAmaK7z508gAUj9t7x1a6XnIdLbJY +tx4+UcBT3yvdSkXNlqGa8EGtPXz9ue4Aq53PSy+C9pbUiEBPgvnLQB0IJNU5Kynv +fGlHMhee/Ih9+ZfSXoInvDJ+gVYdhufqQQ3GSUcdm7suUuQ+Gc8xn+KUUUZ8xtub +3EfDeQ2h2eKlaGs0RrVNHtE9ETn+aimagVp5wcws6JLw3Nm5cEAzJFz8fK8lIbXe +xONslLH1a6985k8CmHVDh6YULCZV9G3G+DGG3mvBnj+/wtysSaa3nOyQEPFuUXHI +rf6d9JWzV6Is3nx0+34StQu/lyyixwb1LssSjop08+J2G66/ZBVYoorQ1qVzU1lH +OkUg00JeHvFI4uKEEsv0/P31vM4aeW5iJsiWvjY6MAZ7VMmJMOrJEdiX+vycNkQ1 +cS7Qi6DCEpnFZCP61cEbYonBK1rgvNexTRTwIHIrATLLKEOtq+U= +=6tC9 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:18.posix_spawnp.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,138 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:18.posix_spawnp Security Advisory + The FreeBSD Project + +Topic: posix_spawnp(3) buffer overflow + +Category: core +Module: libc +Announced: 2020-07-08 +Credits: Andrew Gierth +Affects: FreeBSD 11.4 +Corrected: 2020-06-17 16:22:08 UTC (stable/12, 12.1-STABLE) + 2020-06-17 16:22:08 UTC (stable/11, 11.4-STABLE) + 2020-07-08 20:08:05 UTC (releng/11.4, 11.4-RELEASE-p1) +CVE Name: CVE-2020-7458 + +Note: This vulnerability was introduced after the release of FreeBSD 11.3 and +FreeBSD 12.1; FreeBSD 11.4 is the only affected release. + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +posix_spawnp(3) is a lightweight process creation mechanism provided by libc +for general application usage. + +II. Problem Description + +posix_spawnp spawns a new thread with a limited stack allocated on the heap +before delegating to execvp for the final execution within that thread. + +execvp would previously make unbounded allocations on the stack, directly +proportional to the length of the user-controlled PATH environment variable. + +III. Impact + +Long values in the user-controlled PATH environment variable cause +posix_spawnp to write beyond the end of stack that was allocated, ultimately +overflowing the heap-allocated stack with a direct copy of the value stored +in PATH. + +IV. Workaround + +No workaround is available. Few applications in the base system use +posix_spawnp(3) and none of them are particularly viable candidates for an +exploit. Use by third-party applications has not been investigated. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.4] +# fetch https://security.FreeBSD.org/patches/SA-20:18/posix_spawnp.patch +# fetch https://security.FreeBSD.org/patches/SA-20:18/posix_spawnp.patch.asc +# gpg --verify posix_spawnp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r362281 +stable/11/ r362281 +releng/11.4/ r363025 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLlNfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLdthAAgchE9dOcTvmFerK/SEAI7G/+3l1GRQ/hKJfvGbvNuZKKudpMdCmLHzil +MepCvRO7ft6OTBF66PaAscbdadD54CluQGjD96eLNnQ6dMgU5yZdWTUvvjdJze1R +200oAlAu2eoZvuRghSNFqh4s8iffYN/T4Tc1ubRCAyZUXYbq5rg3r21P9FugXX+Y +RZhYzUNRMCi4ZSGkUmcqLltZZtSrI9GOU2H4cKpedYaHJ+b76tALt1fCsSVZwMJK +7WKiqKkw4ilRH5gbUuTqngVjt7Uy9JGyS2WrAwhnxLIr6+4qxAkiOltwZdFNUhSJ +HGvTzl2As/gxxjqpqmvzegKfrGOd4pz2i7ZdAhhPWEK0sHNp1NttPQ7wWnU1Ikt3 +bkoiy+eJTF43GL7IpxurOOMDdH9MWL/RAZBZNpTof4XCjhEHvvMaSoeO/GLpcSja ++dYFoip65b1tlBtGt/tlgHVqlzCD86o6pBiRdZ7mYYLTxurDc/dcTpebypQPogcB +agD3IO0hMXnt1Q/UQVl1pC3LDnSvabeHVI7xuB1T9UP/CsAxTt1nhEM4b9/YnJv5 +Bt1cZFlBvZgrVFVvegYAf7lVz3TsF3xz2pKZD6wxezAk+QbH4ho6aTHWJkRotE4z +C5bcIEbIz6OX+J7VjOxcgkTu+bFykWb9xcTjtKpRexxICMOef+E= +=2OBY +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:19.unbound.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:19.unbound.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,143 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:19.unbound Security Advisory + The FreeBSD Project + +Topic: Multiple vulnerabilities in unbound + +Category: contrib +Module: unbound +Announced: 2020-07-08 +Affects: All supported versions of FreeBSD. +Corrected: 2020-05-24 16:47:27 UTC (stable/12, 12.1-STABLE) + 2020-07-08 20:25:06 UTC (releng/12.1, 12.1-RELEASE-p7) + 2020-05-24 11:47:27 UTC (stable/11, 11.4-STABLE) + 2020-07-08 20:22:38 UTC (releng/11.4, 11.4-RELEASE-p1) + 2020-07-08 20:20:59 UTC (releng/11.3, 11.3-RELEASE-p11) +CVE Name: CVE-2020-12662, CVE-2020-12663 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +Unbound is a validating, recursive, and caching DNS resolver. + +II. Problem Description + +Malformed answers from upstream name servers can send Unbound into an infinite +loop, resulting in denial of service. A malicious query can cause a traffic +amplification attack against third party authoritative nameservers. + +III. Impact + +Denial of service of the affected host, or of third parties via traffic +amplification. + +IV. Workaround + +No workaround is available. Systems not running Unbound are not affected. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 12.1] +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.12.1.patch +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.12.1.patch.asc +# gpg --verify unbound.12.1.patch.asc + +[FreeBSD 11.4] +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.11.4.patch +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.11.4.patch.asc +# gpg --verify unbound.11.4.patch.asc + +[FreeBSD 11.3] +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.11.3.patch +# fetch https://security.FreeBSD.org/patches/SA-20:19/unbound.11.3.patch.asc +# gpg --verify unbound.11.3.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch -p0 < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r361435 +releng/12.1/ r363029 +stable/11/ r361435 +releng/11.4/ r363028 +releng/11.3/ r363027 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLldfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLg3g/+KxaCk6wFvqDCYlT2Rx8ZfxuU4cG8anJvdanwI8pV7SWsVIilWvpIuW5Y +1P/TVmZiXpICToiUXdwaOMj8r/8QhmALXd3icb+QBUBdLlkm6Cuh/lSbEAyA63aF +YYDF9FsXITVMcUCiUCxpVWSzDUW3LD5jMC/0jjvb7N0VhQyn4vHgEUa74jstnu4r +36QV1s+ucsJafwAyzfobP+fCGKnVM8rmJ/3jE/eifN9RajFJdlkTtV0j6ReK9XQR +jWunCgYZs8Ur0RFu98hspeRsXPuygV83sDiVWPQUd+iKXC8fW52f+IpAVO4BB763 +ZOjXaeudVfqorBXpKsldggEaCrxbJlEdwR9oZOrNww4QDqgPnU4Fkdb2TXyl5Gtx +t0fbvEl2sxfx5M+3rF9ae++DPpmIiu8DiodF8XKfXicFZ2WpJmnwEY0SeEGYGyrO +MJZW3i45qfe4CneFtt1r1v1feX3XQZKuyjtb++S2/PDiSQ1ZrkdE3Y3VYS3X+pLt +C1ZFkw6nLDDSVzPiD+1i8VzRoKwS7zZKfAWMBJRiO3Jjh2vXsNRYO6wAMPq4HAvA +DkB0Ykm0ioDqtUwEKhqAcJEmu6P44BM9SJ0ApFeKQ8L+isNoiaEMEVFG1HW9avl6 +E+I33y5yBtvgrRiyqUvANh/ZYSb7FQDTf5rlUOwG+Pk/kUlMrUA= +=tonD +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:20.ipv6.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:20.ipv6.asc Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,131 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:20.ipv6 Security Advisory + The FreeBSD Project + +Topic: IPv6 socket option race condition and use after free + +Category: core +Module: network +Announced: 2020-07-08 +Credits: syzkaller, Andy Nguyen +Affects: All supported versions of FreeBSD. +Corrected: 2020-04-02 15:30:51 UTC (stable/12, 12.1-STABLE) + 2020-07-08 20:11:40 UTC (releng/12.1, 12.1-RELEASE-p7) + 2020-07-06 20:23:14 UTC (stable/11, 11.4-STABLE) + 2020-07-08 20:11:40 UTC (releng/11.4, 11.4-RELEASE-p1) + 2020-07-08 20:11:40 UTC (releng/11.3, 11.3-RELEASE-p11) +CVE Name: CVE-2020-7457 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The IPV6_2292PKTOPTIONS socket option allows user code to set IPv6 +header options on a socket. + +II. Problem Description + +The IPV6_2292PKTOPTIONS set handler was missing synchronization, +so racing accesses could modify freed memory. + +III. Impact + +A malicious user application could trigger memory corruption, leading +to privilege escalation. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or release / +security branch (releng) dated after the correction date and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:20/ipv6.patch +# fetch https://security.FreeBSD.org/patches/SA-20:20/ipv6.patch.asc +# gpg --verify ipv6.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r359565 +releng/12.1/ r363026 +stable/11/ r362975 +releng/11.4/ r363026 +releng/11.3/ r363026 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLvVfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJqxA/9H58yyRUSUy6BTRw0XkCQFO3r0NpTYPWK4RJFPWO2Jh5zL2QjxuSj3k9t +zgJXM6a1RRgOxevxSzJJXD74BZz3XLJnC9T0tXsp3nikMrd+NSVN0g2jfAbx0l7R +RFRUJOI2EfcGkIe0tZy4/nGr+H9eZiJt9a9vJ8DCoJuU9Ph/7w3GrVG+gbJfH4sV +KhvhrRzla4ePadnHyQZALL5ov554BUa3dB9STz8zbdjt5yFREpvCJ9mIOHKNPBCR +X5v7OMwhw++2Q0JtoMsmBHMi8zOkDpbjPk5eQNLHg3Iw9ZQrxW8KtM9Ru3KFtPw9 +gisI9e53NkCUGLm9iq3oQG6CnCMulTMAlgN5f0HflEwy3vd7R/ibNLvx2yObmVOU +cX1Nf0ydFfhoS/YQwArdGTUg12BlYL9lqiXTqojUBG+yikwA3XAIUJccpcYyZDLQ +jR5N8Ct7fV9Ec5pdu4xkSQhKsto9pQVfS0Kabv7hlwumynVL+S7qsmS7FT3IC/4n +FiXisrJr5TTNO8p/bIs8qooHYUkd06A5O8xy+gRDDPbgvYfevGWrd/vaHmiXpUsv +dvv9ZnU8xlaSi66AEPs9kYw/WhF55deqaU1M0p6Ob3+TGyJIR3j3IPTAIIXSgTrq +YiyvzqXM+ob3aysILYRv48LK7+5N/3hDU48FLUN6q1V99G7TV8o= +=JUip +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-20:13/bhyve.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-20:13/bhyve.patch Wed Jul 8 20:50:27 2020 (r54319) @@ -0,0 +1,342 @@ +--- sys/amd64/vmm/intel/vtd.c.orig ++++ sys/amd64/vmm/intel/vtd.c +@@ -51,6 +51,8 @@ + * Architecture Spec, September 2008. + */ + ++#define VTD_DRHD_INCLUDE_PCI_ALL(Flags) (((Flags) >> 0) & 0x1) ++ + /* Section 10.4 "Register Descriptions" */ + struct vtdmap { + volatile uint32_t version; +@@ -116,10 +118,11 @@ + static SLIST_HEAD(, domain) domhead; + + #define DRHD_MAX_UNITS 8 +-static int drhd_num; +-static struct vtdmap *vtdmaps[DRHD_MAX_UNITS]; +-static int max_domains; +-typedef int (*drhd_ident_func_t)(void); ++static ACPI_DMAR_HARDWARE_UNIT *drhds[DRHD_MAX_UNITS]; ++static int drhd_num; ++static struct vtdmap *vtdmaps[DRHD_MAX_UNITS]; ++static int max_domains; ++typedef int (*drhd_ident_func_t)(void); + + static uint64_t root_table[PAGE_SIZE / sizeof(uint64_t)] __aligned(4096); + static uint64_t ctx_tables[256][PAGE_SIZE / sizeof(uint64_t)] __aligned(4096); +@@ -175,6 +178,69 @@ + return (id); + } + ++static struct vtdmap * ++vtd_device_scope(uint16_t rid) ++{ ++ int i, remaining, pathremaining; ++ char *end, *pathend; ++ struct vtdmap *vtdmap; ++ ACPI_DMAR_HARDWARE_UNIT *drhd; ++ ACPI_DMAR_DEVICE_SCOPE *device_scope; ++ ACPI_DMAR_PCI_PATH *path; ++ ++ for (i = 0; i < drhd_num; i++) { ++ drhd = drhds[i]; ++ ++ if (VTD_DRHD_INCLUDE_PCI_ALL(drhd->Flags)) { ++ /* ++ * From Intel VT-d arch spec, version 3.0: ++ * If a DRHD structure with INCLUDE_PCI_ALL flag Set is reported ++ * for a Segment, it must be enumerated by BIOS after all other ++ * DRHD structures for the same Segment. ++ */ ++ vtdmap = vtdmaps[i]; ++ return(vtdmap); ++ } ++ ++ end = (char *)drhd + drhd->Header.Length; ++ remaining = drhd->Header.Length - sizeof(ACPI_DMAR_HARDWARE_UNIT); ++ while (remaining > sizeof(ACPI_DMAR_DEVICE_SCOPE)) { ++ device_scope = (ACPI_DMAR_DEVICE_SCOPE *)(end - remaining); ++ remaining -= device_scope->Length; ++ ++ switch (device_scope->EntryType){ ++ /* 0x01 and 0x02 are PCI device entries */ ++ case 0x01: ++ case 0x02: ++ break; ++ default: ++ continue; ++ } ++ ++ if (PCI_RID2BUS(rid) != device_scope->Bus) ++ continue; ++ ++ pathend = (char *)device_scope + device_scope->Length; ++ pathremaining = device_scope->Length - sizeof(ACPI_DMAR_DEVICE_SCOPE); ++ while (pathremaining >= sizeof(ACPI_DMAR_PCI_PATH)) { ++ path = (ACPI_DMAR_PCI_PATH *)(pathend - pathremaining); ++ pathremaining -= sizeof(ACPI_DMAR_PCI_PATH); ++ ++ if (PCI_RID2SLOT(rid) != path->Device) ++ continue; ++ if (PCI_RID2FUNC(rid) != path->Function) ++ continue; ++ ++ vtdmap = vtdmaps[i]; ++ return (vtdmap); ++ } ++ } ++ } ++ ++ /* No matching scope */ ++ return (NULL); ++} ++ + static void + vtd_wbflush(struct vtdmap *vtdmap) + { +@@ -240,7 +306,7 @@ + static int + vtd_init(void) + { +- int i, units, remaining; ++ int i, units, remaining, tmp; + struct vtdmap *vtdmap; + vm_paddr_t ctx_paddr; + char *end, envname[32]; +@@ -291,8 +357,9 @@ + break; + + drhd = (ACPI_DMAR_HARDWARE_UNIT *)hdr; +- vtdmaps[units++] = (struct vtdmap *)PHYS_TO_DMAP(drhd->Address); +- if (units >= DRHD_MAX_UNITS) ++ drhds[units] = drhd; ++ vtdmaps[units] = (struct vtdmap *)PHYS_TO_DMAP(drhd->Address); ++ if (++units >= DRHD_MAX_UNITS) + break; + remaining -= hdr->Length; + } +@@ -302,12 +369,18 @@ + + skip_dmar: + drhd_num = units; +- vtdmap = vtdmaps[0]; + +- if (VTD_CAP_CM(vtdmap->cap) != 0) +- panic("vtd_init: invalid caching mode"); ++ max_domains = 64 * 1024; /* maximum valid value */ ++ for (i = 0; i < drhd_num; i++){ ++ vtdmap = vtdmaps[i]; ++ ++ if (VTD_CAP_CM(vtdmap->cap) != 0) ++ panic("vtd_init: invalid caching mode"); + +- max_domains = vtd_max_domains(vtdmap); ++ /* take most compatible (minimum) value */ ++ if ((tmp = vtd_max_domains(vtdmap)) < max_domains) ++ max_domains = tmp; ++ } + + /* + * Set up the root-table to point to the context-entry tables +@@ -373,7 +446,6 @@ + struct vtdmap *vtdmap; + uint8_t bus; + +- vtdmap = vtdmaps[0]; + bus = PCI_RID2BUS(rid); + ctxp = ctx_tables[bus]; + pt_paddr = vtophys(dom->ptp); +@@ -385,6 +457,10 @@ + (uint16_t)(ctxp[idx + 1] >> 8)); + } + ++ if ((vtdmap = vtd_device_scope(rid)) == NULL) ++ panic("vtd_add_device: device %x is not in scope for " ++ "any DMA remapping unit", rid); ++ + /* + * Order is important. The 'present' bit is set only after all fields + * of the context pointer are initialized. +@@ -568,8 +644,6 @@ + if (drhd_num <= 0) + panic("vtd_create_domain: no dma remapping hardware available"); + *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@freebsd.org Thu Jul 9 08:59:20 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C91B0364A58; Thu, 9 Jul 2020 08:59:20 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2VV04n7Yz3SqH; Thu, 9 Jul 2020 08:59:20 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 82776E96C; Thu, 9 Jul 2020 08:59:20 +0000 (UTC) (envelope-from rcyu@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0698xK4A096556; Thu, 9 Jul 2020 08:59:20 GMT (envelope-from rcyu@FreeBSD.org) Received: (from rcyu@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0698xKuM096555; Thu, 9 Jul 2020 08:59:20 GMT (envelope-from rcyu@FreeBSD.org) Message-Id: <202007090859.0698xKuM096555@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rcyu set sender to rcyu@FreeBSD.org using -f From: Ruey-Cherng Yu Date: Thu, 9 Jul 2020 08:59:20 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54320 - head/zh_TW.UTF-8/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: rcyu X-SVN-Commit-Paths: head/zh_TW.UTF-8/share/xml X-SVN-Commit-Revision: 54320 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 08:59:20 -0000 Author: rcyu Date: Thu Jul 9 08:59:20 2020 New Revision: 54320 URL: https://svnweb.freebsd.org/changeset/doc/54320 Log: - Traditional Chinese Translation of the latest news item (July 1st) Merge the following from the English version : r54263 -> r54307 Modified: head/zh_TW.UTF-8/share/xml/news.xml Modified: head/zh_TW.UTF-8/share/xml/news.xml ============================================================================== --- head/zh_TW.UTF-8/share/xml/news.xml Wed Jul 8 20:50:27 2020 (r54319) +++ head/zh_TW.UTF-8/share/xml/news.xml Thu Jul 9 08:59:20 2020 (r54320) @@ -22,7 +22,7 @@ The FreeBSD Traditional Chinese Documentation Project From: www/share/xml/news.xml $FreeBSD$ - Original revision: r54263 + Original revision: r54307 --> @@ -32,6 +32,21 @@ 2020 + + + 7 + + + 1 + + 遺算 &os; Core Team 綏臥後 + +

荐 active committers 綏臥後榊筝絮 + &os; Core Team荅恰茫荀 + 絎劫

+
+
+
6 From owner-svn-doc-head@freebsd.org Thu Jul 9 09:38:07 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3037D3657D1; Thu, 9 Jul 2020 09:38:07 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2WLl0Vbgz3WVh; Thu, 9 Jul 2020 09:38:07 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E4FBFEEF1; Thu, 9 Jul 2020 09:38:06 +0000 (UTC) (envelope-from 0mp@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0699c6Qh021524; Thu, 9 Jul 2020 09:38:06 GMT (envelope-from 0mp@FreeBSD.org) Received: (from 0mp@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0699c6Ci021522; Thu, 9 Jul 2020 09:38:06 GMT (envelope-from 0mp@FreeBSD.org) Message-Id: <202007090938.0699c6Ci021522@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: 0mp set sender to 0mp@FreeBSD.org using -f From: Mateusz Piotrowski <0mp@FreeBSD.org> Date: Thu, 9 Jul 2020 09:38:06 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54321 - in head/en_US.ISO8859-1/books/handbook: geom serialcomms X-SVN-Group: doc-head X-SVN-Commit-Author: 0mp X-SVN-Commit-Paths: in head/en_US.ISO8859-1/books/handbook: geom serialcomms X-SVN-Commit-Revision: 54321 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 09:38:07 -0000 Author: 0mp Date: Thu Jul 9 09:38:06 2020 New Revision: 54321 URL: https://svnweb.freebsd.org/changeset/doc/54321 Log: Revert r52153, do not use sysrc for loader.conf sysrc(8) is only suitable for sh(1) files like rc.conf(5). The syntax of loader.conf(5) is not compatible with sh(1), e.g., because of the dots in the variables names. Modified: head/en_US.ISO8859-1/books/handbook/geom/chapter.xml head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/geom/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/geom/chapter.xml Thu Jul 9 08:59:20 2020 (r54320) +++ head/en_US.ISO8859-1/books/handbook/geom/chapter.xml Thu Jul 9 09:38:06 2020 (r54321) @@ -244,7 +244,7 @@ Done. adding a line to /boot/loader.conf: - &prompt.root; sysrc -f /boot/loader.conf geom_stripe_load=YES + &prompt.root; echo 'geom_stripe_load="YES"' >> /boot/loader.conf Modified: head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Thu Jul 9 08:59:20 2020 (r54320) +++ head/en_US.ISO8859-1/books/handbook/serialcomms/chapter.xml Thu Jul 9 09:38:06 2020 (r54321) @@ -1789,7 +1789,7 @@ raisechar=^^ console, issue the following command as the superuser: - &prompt.root; sysrc -f /boot/loader.conf console=comconsole + &prompt.root; echo 'console="comconsole"' >> /boot/loader.conf From owner-svn-doc-head@freebsd.org Thu Jul 9 15:11:45 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BECCE36DAE9; Thu, 9 Jul 2020 15:11:45 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B2flj4hPrz49H2; Thu, 9 Jul 2020 15:11:45 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 8482412970; Thu, 9 Jul 2020 15:11:45 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 069FBj0q026974; Thu, 9 Jul 2020 15:11:45 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 069FBjae026973; Thu, 9 Jul 2020 15:11:45 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <202007091511.069FBjae026973@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Thu, 9 Jul 2020 15:11:45 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54322 - head/share/security/advisories X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: head/share/security/advisories X-SVN-Commit-Revision: 54322 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 09 Jul 2020 15:11:45 -0000 Author: gordon (src committer) Date: Thu Jul 9 15:11:45 2020 New Revision: 54322 URL: https://svnweb.freebsd.org/changeset/doc/54322 Log: Fix the patch urls (pki -> kpi). Approved by: so Modified: head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc Modified: head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc ============================================================================== --- head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc Thu Jul 9 09:38:06 2020 (r54321) +++ head/share/security/advisories/FreeBSD-EN-20:14.linuxkpi.asc Thu Jul 9 15:11:45 2020 (r54322) @@ -24,6 +24,11 @@ Advisories, including descriptions of the fields above branches, and the following sections, please visit . +0. Revision history + +v1.0 Initial release. +v1.1 Correct typo in patch URL. + I. Background The LinuxKPI subsystem allows kernel code ported from Linux to run in the @@ -67,8 +72,8 @@ FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. -# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxpki.patch -# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxpki.patch.asc +# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxkpi.patch +# fetch https://security.FreeBSD.org/patches/EN-20:14/linuxkpi.patch.asc # gpg --verify linuxkpi.patch.asc b) Apply the patch. Execute the following commands as root: @@ -113,19 +118,19 @@ The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8GLkpfFIAAAAAALgAo +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl8HMxlfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n -5cJG7A//RWsupxbp1AMqYFz7KsC6zezh8pYU8rONJvWGgaH5MNTdzKVa+SDAg9il -HI2IOAsDDRFRQvweyf1yOPMdPFUv15ZPgYpUcx2MoAbLFNa5TsqcodE6t1hEjBrQ -20x0yjg/Fy6T17BaX3cziBFjxd3YW79jf/+FpzCTOoNasxIteiR5Vt4NbJ7Esqoa -u7U3uXtIvDmfVASfMYq2NmKWTP8cz+f2FCB3687G4jGmBhrfMK8DNVQ3RI6IjGEm -RUzmnYLX0Xbs83PTCYEkEqmEdj+o9zRokCPxdhFjd9XxnKaWh5vM0N6FNxBOcYER -OqGMy0X88wsqvs5l+FnXYdI/BzELrzXmB4lMEh9wXDfrCZt4wVkb0C0NBLGgrafV -95/YQobMsghe44ysVTmpfTi1++NnEDPgV/klVwBo6u9VluMH3PRxrTtW92SB0DOt -QABVpgV96LKibsO26PRLS5yqMEgUPJ57W6mQvL9RdsTL/4VBamHQmUinXM1VlMml -d2WVLguLw2vc86Mv2V4FZiC6A1eG91mUDTUYCeGxqBknl7DxBl+iGyM4Bu3Kw1+p -eRi1Y6hAR/Vb/VyE4mNTBd0UzZhRymaXkiVm7nAKZjTAvSbpbEe26QCPzZGUgVsT -UemEPi2lAAn2J3O46sEv8RjFjOOdrbOnyaZkJNBaKSPK7qq6etc= -=1UKD +5cJDsw/+PR1IEm7ZgK7zdSLfUzWlioBCyE+V/qV+IZjfAvAg8CMJwVwF9MCAOm/M +ON/9GRlkN6SawFL6zdGjRTXvOq+WPI+oGQtQXIFKWx/yUl67UI1ZnlxscQjme0LU +a6TBqyZhua71lYwRMVC08eacoD0v55WUjFOdGMN4ZxRxe5XMOXIC9DY5dizNGtfH +CeWaSdG2Q2JNMVrCyIewcER1QP1VvXkCm1axV85fyVBUvX5VBo+5bd9hhIqTmH/D +06lQF4wEbeCQ4ES62neDXgwLnkNunsKwbOUAQ45uvXZYKMG9ysScCBsjNP6bsMqD +0ktY9Srfah6UblZ9mVW/q+Vz8ur5PKlfpagIkoKqXdYvl2ehjzxCFmbAGW5lEusy +d/X7BsL65R2OaFrYq25FQ026bCPJ5+SfrO/kmZM+tQLNMqcS6DvmvZWrNRcksC4G +0TrUq4TbI/ZKLqFtttNZdpWsrjxaxi35yRTNVL0lQiJvawOG8nEWKCujKvAmsRtk +roq2SJ051qKGE5h2wz6YiNNngmkyPSjohygekEO+jRLImZECFvqlh9F5v0Gqy4tq +j16au8CdApKLCxgWzR23oOgvkaJvzV0z4mKflUYoODu5ic830rMgNq3TYVgU+lTM +1AW6lm0osrvda2+KazzvBWmio81bzxX18jfITRphCBGCQejdkNU= +=H/7U -----END PGP SIGNATURE----- From owner-svn-doc-head@freebsd.org Fri Jul 10 09:49:20 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 13F1936476B; Fri, 10 Jul 2020 09:49:20 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B37YD02cwz4PfS; Fri, 10 Jul 2020 09:49:20 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D98BF1FEF2; Fri, 10 Jul 2020 09:49:19 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06A9nJfR025504; Fri, 10 Jul 2020 09:49:19 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06A9nJRT025502; Fri, 10 Jul 2020 09:49:19 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <202007100949.06A9nJRT025502@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Fri, 10 Jul 2020 09:49:19 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54323 - in head/ja_JP.eucJP: htdocs share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: ryusuke X-SVN-Commit-Paths: in head/ja_JP.eucJP: htdocs share/xml X-SVN-Commit-Revision: 54323 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Jul 2020 09:49:20 -0000 Author: ryusuke Date: Fri Jul 10 09:49:19 2020 New Revision: 54323 URL: https://svnweb.freebsd.org/changeset/doc/54323 Log: - Add rel114.current.date entity. - Merge the following from the English version: r54124 -> r54273 head/ja_JP.eucJP/htdocs/where.xml Modified: head/ja_JP.eucJP/htdocs/where.xml head/ja_JP.eucJP/share/xml/l10n.ent Modified: head/ja_JP.eucJP/htdocs/where.xml ============================================================================== --- head/ja_JP.eucJP/htdocs/where.xml Thu Jul 9 15:11:45 2020 (r54322) +++ head/ja_JP.eucJP/htdocs/where.xml Fri Jul 10 09:49:19 2020 (r54323) @@ -6,7 +6,7 @@ ]> - + @@ -133,10 +133,9 @@
- + -

&os; &rel.current;-RELEASE

+

&os; &rel114.current;-RELEASE

@@ -149,59 +148,53 @@

- ?> - + -

&os; &rel1.current;-RELEASE

+

&os; &rel113.current;-RELEASE

@@ -214,44 +207,44 @@ @@ -259,64 +252,6 @@

- - -

&os; &rel2.current;-RELEASE

- - - - - - - - - - - - - - - - -
インストーライメージ仮想マシンイメージSD カードイメージ文書
- - - - - - - -
-
- ?> - &beta.desc; &beta.second; @@ -455,8 +390,7 @@

 

- &os; &rel1.current;-STABLE +

&os; &rel114.current;-STABLE

@@ -469,92 +403,45 @@
- ?> - - &os; &rel2.current;-STABLE - - - - - - - - - - - - - - - - -
インストーライメージ仮想マシンイメージSD カードイメージ文書
- - - - - - - -
- ?>

HTTP もしくは FTP 経由で &os; をダウンロードする際には、 ハンドブックの + From owner-svn-doc-head@freebsd.org Sat Jul 11 01:28:36 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 43D67351244; Sat, 11 Jul 2020 01:28:36 +0000 (UTC) (envelope-from bmah@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3XP01Pxdz4Cj8; Sat, 11 Jul 2020 01:28:36 +0000 (UTC) (envelope-from bmah@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1475AB295; Sat, 11 Jul 2020 01:28:36 +0000 (UTC) (envelope-from bmah@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06B1SaXX006336; Sat, 11 Jul 2020 01:28:36 GMT (envelope-from bmah@FreeBSD.org) Received: (from bmah@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06B1Saoq006335; Sat, 11 Jul 2020 01:28:36 GMT (envelope-from bmah@FreeBSD.org) Message-Id: <202007110128.06B1Saoq006335@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bmah set sender to bmah@FreeBSD.org using -f From: "Bruce A. Mah" Date: Sat, 11 Jul 2020 01:28:36 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54324 - head/share/pgpkeys X-SVN-Group: doc-head X-SVN-Commit-Author: bmah X-SVN-Commit-Paths: head/share/pgpkeys X-SVN-Commit-Revision: 54324 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 01:28:36 -0000 Author: bmah (ports committer) Date: Sat Jul 11 01:28:35 2020 New Revision: 54324 URL: https://svnweb.freebsd.org/changeset/doc/54324 Log: Somewhat belatedly update my key with a newer expiry date. Modified: head/share/pgpkeys/bmah.key Modified: head/share/pgpkeys/bmah.key ============================================================================== --- head/share/pgpkeys/bmah.key Fri Jul 10 09:49:19 2020 (r54323) +++ head/share/pgpkeys/bmah.key Sat Jul 11 01:28:35 2020 (r54324) @@ -3,15 +3,17 @@ sh addkey.sh bmah 4984910A8CAAEE8A ; --> -uid Bruce A. Mah uid Bruce A. Mah uid Bruce A. Mah uid Bruce A. Mah -sub rsa2048/3FE58165F851A044 2014-01-17 [E] [expires: 2020-01-02] +uid Bruce A. Mah +sub rsa2048/3FE58165F851A044 2014-01-17 [E] [expires: 2023-01-02] Key fingerprint = 32E2 00DA A25D A8B2 87F1 7CC3 3FE5 8165 F851 A044 +sub rsa2048/3FE58165F851A044 2014-01-17 [E] [expires: 2023-01-02] + Key fingerprint = 32E2 00DA A25D A8B2 87F1 7CC3 3FE5 8165 F851 A044 ]]> From owner-svn-doc-head@freebsd.org Sat Jul 11 05:34:19 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 224033562D2; Sat, 11 Jul 2020 05:34:19 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3drV6z2Qz4Nw4; Sat, 11 Jul 2020 05:34:18 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D364AE1B1; Sat, 11 Jul 2020 05:34:18 +0000 (UTC) (envelope-from linimon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06B5YIWK060272; Sat, 11 Jul 2020 05:34:18 GMT (envelope-from linimon@FreeBSD.org) Received: (from linimon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06B5YI7p060271; Sat, 11 Jul 2020 05:34:18 GMT (envelope-from linimon@FreeBSD.org) Message-Id: <202007110534.06B5YI7p060271@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: linimon set sender to linimon@FreeBSD.org using -f From: Mark Linimon Date: Sat, 11 Jul 2020 05:34:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54325 - head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Group: doc-head X-SVN-Commit-Author: linimon X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/versions X-SVN-Commit-Revision: 54325 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 05:34:19 -0000 Author: linimon Date: Sat Jul 11 05:34:18 2020 New Revision: 54325 URL: https://svnweb.freebsd.org/changeset/doc/54325 Log: Document OSVERSION 1300101. Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Sat Jul 11 01:28:35 2020 (r54324) +++ head/en_US.ISO8859-1/books/porters-handbook/versions/chapter.xml Sat Jul 11 05:34:18 2020 (r54325) @@ -904,6 +904,14 @@ is spelled &, < is < and > is >. 13.0-CURRENT after changing the internal API between the NFS kernel modules. + + + 1300101 + 363077 + July 10, 2020 + 13.0-CURRENT after implementing the array_size() function + in the LinuxKPI. + From owner-svn-doc-head@freebsd.org Sat Jul 11 14:56:43 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B8149365438; Sat, 11 Jul 2020 14:56:43 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3tKR4RK9z437V; Sat, 11 Jul 2020 14:56:43 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 7B9EC14473; Sat, 11 Jul 2020 14:56:43 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BEuhOL017019; Sat, 11 Jul 2020 14:56:43 GMT (envelope-from rene@FreeBSD.org) Received: (from rene@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BEuhXo017018; Sat, 11 Jul 2020 14:56:43 GMT (envelope-from rene@FreeBSD.org) Message-Id: <202007111456.06BEuhXo017018@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rene set sender to rene@FreeBSD.org using -f From: Rene Ladan Date: Sat, 11 Jul 2020 14:56:43 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54326 - head/en_US.ISO8859-1/books/porters-handbook/order X-SVN-Group: doc-head X-SVN-Commit-Author: rene X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/order X-SVN-Commit-Revision: 54326 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 14:56:43 -0000 Author: rene Date: Sat Jul 11 14:56:43 2020 New Revision: 54326 URL: https://svnweb.freebsd.org/changeset/doc/54326 Log: porters-handbook: fix Example 15.1 PR: 247082 Submitted by: Mikael Urankar Modified: head/en_US.ISO8859-1/books/porters-handbook/order/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/order/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/order/chapter.xml Sat Jul 11 05:34:18 2020 (r54325) +++ head/en_US.ISO8859-1/books/porters-handbook/order/chapter.xml Sat Jul 11 14:56:43 2020 (r54326) @@ -477,7 +477,7 @@ post-install-DOCS-on: post-install-EXAMPLES-on: ${MKDIR} ${STAGEDIR}${EXAMPLESDIR} - cd ${WRKSRC}/ex && ${COPYTREE_SHARE} . ${STAGEDIR}${DOCSDIR} + cd ${WRKSRC}/ex && ${COPYTREE_SHARE} . ${STAGEDIR}${EXAMPLESDIR} From owner-svn-doc-head@freebsd.org Sat Jul 11 15:48:50 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D322E367100; Sat, 11 Jul 2020 15:48:50 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3vTY50CDz467M; Sat, 11 Jul 2020 15:48:48 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 71884155A2; Sat, 11 Jul 2020 15:48:48 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BFmmwr048337; Sat, 11 Jul 2020 15:48:48 GMT (envelope-from allanjude@FreeBSD.org) Received: (from allanjude@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BFmm58048336; Sat, 11 Jul 2020 15:48:48 GMT (envelope-from allanjude@FreeBSD.org) Message-Id: <202007111548.06BFmm58048336@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: allanjude set sender to allanjude@FreeBSD.org using -f From: Allan Jude Date: Sat, 11 Jul 2020 15:48:48 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54327 - head/en_US.ISO8859-1/books/handbook/zfs X-SVN-Group: doc-head X-SVN-Commit-Author: allanjude X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/handbook/zfs X-SVN-Commit-Revision: 54327 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 15:48:51 -0000 Author: allanjude Date: Sat Jul 11 15:48:48 2020 New Revision: 54327 URL: https://svnweb.freebsd.org/changeset/doc/54327 Log: Don't use sysrc for sysctl OIDs PR: 246760 Submitted by: debdrup Reported by: Mike Plemmons Sponsored by: Klara Inc. Event: July 2020 Bugathon Differential Revision: https://reviews.freebsd.org/D12127 Modified: head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Sat Jul 11 14:56:43 2020 (r54326) +++ head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Sat Jul 11 15:48:48 2020 (r54327) @@ -2663,7 +2663,7 @@ mypool@replica2 0 &prompt.root; sysctl vfs.usermount=1 vfs.usermount: 0 -> 1 -&prompt.root; sysrc -f /etc/sysctl.conf vfs.usermount=1 +&prompt.root; echo vfs.usermount=1 >> /etc/sysctl.conf &prompt.root; zfs create recvpool/backup &prompt.root; zfs allow -u someuser create,mount,receive recvpool/backup &prompt.root; chown someuser /recvpool/backup From owner-svn-doc-head@freebsd.org Sat Jul 11 16:18:23 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 05BE83681B0; Sat, 11 Jul 2020 16:18:23 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3w7f6MvRz48ZR; Sat, 11 Jul 2020 16:18:22 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BDEE515CD0; Sat, 11 Jul 2020 16:18:22 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BGIM9P067230; Sat, 11 Jul 2020 16:18:22 GMT (envelope-from allanjude@FreeBSD.org) Received: (from allanjude@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BGIM9f067229; Sat, 11 Jul 2020 16:18:22 GMT (envelope-from allanjude@FreeBSD.org) Message-Id: <202007111618.06BGIM9f067229@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: allanjude set sender to allanjude@FreeBSD.org using -f From: Allan Jude Date: Sat, 11 Jul 2020 16:18:22 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54328 - head/en_US.ISO8859-1/books/handbook/disks X-SVN-Group: doc-head X-SVN-Commit-Author: allanjude X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/handbook/disks X-SVN-Commit-Revision: 54328 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 16:18:23 -0000 Author: allanjude Date: Sat Jul 11 16:18:22 2020 New Revision: 54328 URL: https://svnweb.freebsd.org/changeset/doc/54328 Log: Update the GELI handbook to be more accurate The description of the key file incorrectly identified it as the master key PR: 208578 Submitted by: Wout Decre (original version) Reviewed by: bcr, oshogbo Sponsored by: Klara Inc. Event: July 2020 Bugathon Differential Revision: https://reviews.freebsd.org/D15866 Modified: head/en_US.ISO8859-1/books/handbook/disks/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/disks/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/disks/chapter.xml Sat Jul 11 15:48:48 2020 (r54327) +++ head/en_US.ISO8859-1/books/handbook/disks/chapter.xml Sat Jul 11 16:18:22 2020 (r54328) @@ -2823,15 +2823,20 @@ device crypto Generate the Master Key - The following commands generate a master key - (/root/da2.key) that is protected - with a passphrase. The data source for the key file is - /dev/random and the sector size of - the provider (/dev/da2.eli) is 4kB as - a bigger sector size provides better performance: + The following commands generate a master key that all + data will be encrypted with. This key can never be changed. + Rather than using it directly, it is encrypted with one + or more user keys. The user keys are made up of an + optional combination of random bytes from a file, + /root/da2.key, and/or a passphrase. + In this case, the data source for the key file is + /dev/random. This command also + configures the sector size of the provider + (/dev/da2.eli) as 4kB, for better + performance: &prompt.root; dd if=/dev/random of=/root/da2.key bs=64 count=1 -&prompt.root; geli init -s 4096 -K /root/da2.key /dev/da2 +&prompt.root; geli init -K /root/da2.key -s 4096 /dev/da2 Enter new passphrase: Reenter new passphrase: From owner-svn-doc-head@freebsd.org Sat Jul 11 17:23:02 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C074436A042; Sat, 11 Jul 2020 17:23:02 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3xZG33qcz4FGq; Sat, 11 Jul 2020 17:23:02 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 12DC4169FB; Sat, 11 Jul 2020 17:23:02 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BHN1u6011124; Sat, 11 Jul 2020 17:23:01 GMT (envelope-from rene@FreeBSD.org) Received: (from rene@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BHN1EX011123; Sat, 11 Jul 2020 17:23:01 GMT (envelope-from rene@FreeBSD.org) Message-Id: <202007111723.06BHN1EX011123@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rene set sender to rene@FreeBSD.org using -f From: Rene Ladan Date: Sat, 11 Jul 2020 17:23:01 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54329 - head/en_US.ISO8859-1/books/porters-handbook/uses X-SVN-Group: doc-head X-SVN-Commit-Author: rene X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/uses X-SVN-Commit-Revision: 54329 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 17:23:02 -0000 Author: rene Date: Sat Jul 11 17:23:01 2020 New Revision: 54329 URL: https://svnweb.freebsd.org/changeset/doc/54329 Log: Porters Handbook: use a working Debian website for information on their fakeroot. PR: 244466 Submitted by: gerald Event: July 2020 Bugathon Modified: head/en_US.ISO8859-1/books/porters-handbook/uses/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/uses/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/uses/chapter.xml Sat Jul 11 16:18:22 2020 (r54328) +++ head/en_US.ISO8859-1/books/porters-handbook/uses/chapter.xml Sat Jul 11 17:23:01 2020 (r54329) @@ -655,7 +655,7 @@ Changes some default behavior of build systems to allow installing as a user. See for more + xlink:href="https://wiki.debian.org/FakeRoot"/> for more information on fakeroot. From owner-svn-doc-head@freebsd.org Sat Jul 11 17:50:13 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7A98A36AAE8; Sat, 11 Jul 2020 17:50:13 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3y9d2fCqz4H3K; Sat, 11 Jul 2020 17:50:13 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3E2E916CF7; Sat, 11 Jul 2020 17:50:13 +0000 (UTC) (envelope-from allanjude@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BHoDsV024298; Sat, 11 Jul 2020 17:50:13 GMT (envelope-from allanjude@FreeBSD.org) Received: (from allanjude@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BHoDFx024297; Sat, 11 Jul 2020 17:50:13 GMT (envelope-from allanjude@FreeBSD.org) Message-Id: <202007111750.06BHoDFx024297@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: allanjude set sender to allanjude@FreeBSD.org using -f From: Allan Jude Date: Sat, 11 Jul 2020 17:50:13 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54330 - head/en_US.ISO8859-1/books/handbook/firewalls X-SVN-Group: doc-head X-SVN-Commit-Author: allanjude X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/handbook/firewalls X-SVN-Commit-Revision: 54330 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 17:50:13 -0000 Author: allanjude Date: Sat Jul 11 17:50:12 2020 New Revision: 54330 URL: https://svnweb.freebsd.org/changeset/doc/54330 Log: Include an example of how to load IPv6 rules for ipfilter PR: 182218 Submitted by: debdrup Reported by: pl@catslair.org Sponsored by: Klara Inc. Event: July 2020 Bugathon Differential Revision: https://reviews.freebsd.org/D25624 Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sat Jul 11 17:23:01 2020 (r54329) +++ head/en_US.ISO8859-1/books/handbook/firewalls/chapter.xml Sat Jul 11 17:50:12 2020 (r54330) @@ -2906,6 +2906,7 @@ options IPFILTER_DEFAULT_BLOCK ipfilter_enable="YES" # Start ipf firewall ipfilter_rules="/etc/ipf.rules" # loads rules definition text file +ipv6_ipfilter_rules="/etc/ipf6.rules" # loads rules definition text file for IPv6 ipmon_enable="YES" # Start IP monitor log ipmon_flags="-Ds" # D = start as daemon # s = log to syslog From owner-svn-doc-head@freebsd.org Sat Jul 11 18:31:27 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3253E36CD92; Sat, 11 Jul 2020 18:31:27 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B3z5C0bzSz4PVN; Sat, 11 Jul 2020 18:31:27 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id ED14617559; Sat, 11 Jul 2020 18:31:26 +0000 (UTC) (envelope-from rene@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BIVQRC058601; Sat, 11 Jul 2020 18:31:26 GMT (envelope-from rene@FreeBSD.org) Received: (from rene@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BIVQtt058600; Sat, 11 Jul 2020 18:31:26 GMT (envelope-from rene@FreeBSD.org) Message-Id: <202007111831.06BIVQtt058600@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: rene set sender to rene@FreeBSD.org using -f From: Rene Ladan Date: Sat, 11 Jul 2020 18:31:26 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54331 - head/en_US.ISO8859-1/books/porters-handbook/testing X-SVN-Group: doc-head X-SVN-Commit-Author: rene X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/porters-handbook/testing X-SVN-Commit-Revision: 54331 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 18:31:27 -0000 Author: rene Date: Sat Jul 11 18:31:26 2020 New Revision: 54331 URL: https://svnweb.freebsd.org/changeset/doc/54331 Log: Porters Handbook: add some clarifications for Poudreire: - add a hint to create the distfiles directory if it does not already exist - add the new-style syntax to use a custom ports tree PR: 237794 Submitted by: vladimir.chukharev@gmail.com Event: July 2020 Bugathon Modified: head/en_US.ISO8859-1/books/porters-handbook/testing/chapter.xml Modified: head/en_US.ISO8859-1/books/porters-handbook/testing/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/porters-handbook/testing/chapter.xml Sat Jul 11 17:50:12 2020 (r54330) +++ head/en_US.ISO8859-1/books/porters-handbook/testing/chapter.xml Sat Jul 11 18:31:26 2020 (r54331) @@ -359,7 +359,9 @@ SVN_HOST=svn.FreeBSD.org example, Poudriere and the host share the distfiles storage directory. This avoids downloading tarballs which are already present on the - system. + system. Please create this directory if it does not + already exist so that Poudriere + can find it. @@ -604,7 +606,21 @@ subversive svn+https /poudriere/ports/subve /work/ports, point Poudriere to the location: - &prompt.root; poudriere ports -c -F -f none -M /work/ports -p development + + + For Poudriere older than + version 3.1.20: + + &prompt.root; poudriere ports -c -F -f none -M /work/ports -p development + + + + For Poudriere version 3.1.20 + and later: + + &prompt.root; poudriere ports -c -m null -M /work/ports -p development + + This will be listed in the table of known trees: From owner-svn-doc-head@freebsd.org Sat Jul 11 19:15:08 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0328036E12E; Sat, 11 Jul 2020 19:15:08 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4B403b6FFQz4SJt; Sat, 11 Jul 2020 19:15:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BA7F017DC2; Sat, 11 Jul 2020 19:15:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 06BJF7Yl085245; Sat, 11 Jul 2020 19:15:07 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 06BJF7Sl085244; Sat, 11 Jul 2020 19:15:07 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <202007111915.06BJF7Sl085244@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sat, 11 Jul 2020 19:15:07 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r54332 - head/de_DE.ISO8859-1/books/handbook/cutting-edge X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/cutting-edge X-SVN-Commit-Revision: 54332 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 11 Jul 2020 19:15:08 -0000 Author: bhd Date: Sat Jul 11 19:15:07 2020 New Revision: 54332 URL: https://svnweb.freebsd.org/changeset/doc/54332 Log: - Better wording of a title in german tanslation - Wrap long line Modified: head/de_DE.ISO8859-1/books/handbook/cutting-edge/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/cutting-edge/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/cutting-edge/chapter.xml Sat Jul 11 18:31:26 2020 (r54331) +++ head/de_DE.ISO8859-1/books/handbook/cutting-edge/chapter.xml Sat Jul 11 19:15:07 2020 (r54332) @@ -1413,7 +1413,7 @@ Working Copy Root Path: /usr/src Abschnitt beschriebene Bauprozess kann beginnen. - Beschaffung des Quellcodes + Synchronisation der Quellen Meldet die Ausgabe '/usr/src' is not a working copy, dann @@ -1629,9 +1629,10 @@ Working Copy Root Path: /usr/src &prompt.root; cd /usr/src/sys/amd64/conf &prompt.root; ln -s /root/STORAGESERVER . - Jetzt kann /root/STORAGESERVER bearbeitet - werden. Die Manualpage &man.config.5; zeigt, wie Treiber - und Optionen hinzugefgt oder entfernt werden. + Jetzt kann /root/STORAGESERVER + bearbeitet werden. Die Manualpage &man.config.5; zeigt, + wie Treiber und Optionen hinzugefgt oder entfernt + werden. Der angepasste Kernel wird mit der Variablen KERNCONF, die auf die