From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 07:08:44 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1C37357C763 for ; Mon, 22 Mar 2021 07:08:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F3lwD0JvGz4yyl; Mon, 22 Mar 2021 07:08:44 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id ED7ED10DC; Mon, 22 Mar 2021 07:08:43 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12M78hVg038015; Mon, 22 Mar 2021 07:08:43 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12M78h0J038014; Mon, 22 Mar 2021 07:08:43 GMT (envelope-from git) Date: Mon, 22 Mar 2021 07:08:43 GMT Message-Id: <202103220708.12M78h0J038014@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Sergio Carlavilla Delgado Subject: git: 0a0d8122aa - main - Add news entry about the reopening of the weblate instance. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: carlavilla X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 0a0d8122aa5a015b5ddc109d3ac2ee8830ed05b0 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 07:08:44 -0000 The branch main has been updated by carlavilla: URL: https://cgit.FreeBSD.org/doc/commit/?id=0a0d8122aa5a015b5ddc109d3ac2ee8830ed05b0 commit 0a0d8122aa5a015b5ddc109d3ac2ee8830ed05b0 Author: Sergio Carlavilla Delgado AuthorDate: 2021-03-22 07:07:56 +0000 Commit: Sergio Carlavilla Delgado CommitDate: 2021-03-22 07:07:56 +0000 Add news entry about the reopening of the weblate instance. --- website/data/en/news/news.toml | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/website/data/en/news/news.toml b/website/data/en/news/news.toml index aab365b0f6..aacd7a28e7 100644 --- a/website/data/en/news/news.toml +++ b/website/data/en/news/news.toml @@ -1,5 +1,9 @@ # Sort news by year, month and day -# $FreeBSD$ + +[[news]] +date = "2021-03-21" +title = "Reopening Weblate for translations" +description = "After the migration to Hugo/AsciiDoctor the weblate tool it's opened again. To get more information check the announcement." [[news]] date = "2021-03-20" From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 14:46:31 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3C8155B149F for ; Mon, 22 Mar 2021 14:46:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F3y4R19pTz3mPM; Mon, 22 Mar 2021 14:46:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1B5E873FD; Mon, 22 Mar 2021 14:46:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MEkVUk085597; Mon, 22 Mar 2021 14:46:31 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MEkVCb085596; Mon, 22 Mar 2021 14:46:31 GMT (envelope-from git) Date: Mon, 22 Mar 2021 14:46:31 GMT Message-Id: <202103221446.12MEkVCb085596@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Ben Woods Subject: git: 61fd9e9689 - main - 13.0R/relnotes - Add entry for changes to newsyslog(8) default config MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: woodsb02 X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 61fd9e9689f550cef55491c350ebad00c194f4c2 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 14:46:31 -0000 The branch main has been updated by woodsb02 (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=61fd9e9689f550cef55491c350ebad00c194f4c2 commit 61fd9e9689f550cef55491c350ebad00c194f4c2 Author: Ben Woods AuthorDate: 2021-03-22 14:38:34 +0000 Commit: Ben Woods CommitDate: 2021-03-22 14:42:53 +0000 13.0R/relnotes - Add entry for changes to newsyslog(8) default config The default /etc/newsyslog.conf now only includes files if they end with ".conf" and do not begin with a "." character. Approved by: gjb Differential Revision: https://reviews.freebsd.org/D29368 --- website/content/en/releases/13.0R/relnotes.adoc | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index 286ac773ce..628e6c0322 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -118,6 +118,13 @@ now be set via man:login.conf[5]. gitref:21c1a93c048f[repository=src], gitref:736a5a6d1dbb[repository=src], gitref:7466dbd68487[repository=src] +The default config for man:newsyslog[8] will now only include files from the +/etc/newsyslog.conf.d/ and /usr/local/etc/newsyslog.conf.d/ directories if the +filename ends with ".conf" and does not begin with a "." character. +This matches the man:syslog.conf[5] functionality, and also prevents ".sample" +or ".pkgnew" files being included. +gitref:9165316ff6bf[repository=src] + The kernel now supports enforcing a W^X memory mapping policy for user processes. The policy is not enforced by default but can be enabled by setting the From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 15:45:31 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 72F055B3197 for ; Mon, 22 Mar 2021 15:45:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F3zNW2tm4z3rW5; Mon, 22 Mar 2021 15:45:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 563011098D; Mon, 22 Mar 2021 15:45:31 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MFjV91069234; Mon, 22 Mar 2021 15:45:31 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MFjVqd069233; Mon, 22 Mar 2021 15:45:31 GMT (envelope-from git) Date: Mon, 22 Mar 2021 15:45:31 GMT Message-Id: <202103221545.12MFjVqd069233@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Glen Barber Subject: git: c677f35113 - main - 13.0: update schedule for RC3 builds MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: gjb X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: c677f35113bac5eee1bfbe2ddb47c33230cdb9ce Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 15:45:31 -0000 The branch main has been updated by gjb: URL: https://cgit.FreeBSD.org/doc/commit/?id=c677f35113bac5eee1bfbe2ddb47c33230cdb9ce commit c677f35113bac5eee1bfbe2ddb47c33230cdb9ce Author: Glen Barber AuthorDate: 2021-03-22 15:45:14 +0000 Commit: Glen Barber CommitDate: 2021-03-22 15:45:14 +0000 13.0: update schedule for RC3 builds Sponsored by: Rubicon Communications, LLC ("Netgate") --- website/content/en/releases/13.0R/schedule.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/en/releases/13.0R/schedule.adoc b/website/content/en/releases/13.0R/schedule.adoc index faeb0b9c61..e0eb2158d6 100644 --- a/website/content/en/releases/13.0R/schedule.adoc +++ b/website/content/en/releases/13.0R/schedule.adoc @@ -43,7 +43,7 @@ Announcements regarding the availability of the ALPHA snapshots will be sent to |BETA4 builds begin |26 February 2021 |26 February 2021 |Fourth beta test snapshot. |RC1 builds begin |5 March 2021 |5 March 2021 |First release candidate. |RC2 builds begin |12 March 2021 |12 March 2021 |Second release candidate. -|RC3 builds begin |19 March 2021 |- |Third release candidate. +|RC3 builds begin |19 March 2021 |19 March 2021 |Third release candidate. |RELEASE builds begin |26 March 2021 |- |{localRel}-RELEASE builds begin. |RELEASE announcement |30 March 2021 |- |{localRel}-RELEASE press release. |Turn over to the secteam |- |- |{localBranchReleng} branch is handed over to the FreeBSD Security Officer Team in one or two weeks after the announcement. From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 16:22:33 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id EA45B5B3FD9 for ; Mon, 22 Mar 2021 16:22:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F40CF6PNcz3v3p; Mon, 22 Mar 2021 16:22:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CEE0811293; Mon, 22 Mar 2021 16:22:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MGMXr2025372; Mon, 22 Mar 2021 16:22:33 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MGMXqY025371; Mon, 22 Mar 2021 16:22:33 GMT (envelope-from git) Date: Mon, 22 Mar 2021 16:22:33 GMT Message-Id: <202103221622.12MGMXqY025371@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: John Baldwin Subject: git: 231630d6db - main - Add more detail to the ubsec(4) note and fix a typo. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhb X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 231630d6dbdc709b18422b8ab709c508883b061c Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 16:22:34 -0000 The branch main has been updated by jhb: URL: https://cgit.FreeBSD.org/doc/commit/?id=231630d6dbdc709b18422b8ab709c508883b061c commit 231630d6dbdc709b18422b8ab709c508883b061c Author: John Baldwin AuthorDate: 2021-03-22 16:22:25 +0000 Commit: John Baldwin CommitDate: 2021-03-22 16:22:25 +0000 Add more detail to the ubsec(4) note and fix a typo. Reported by: linimon --- website/content/en/releases/13.0R/relnotes.adoc | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index 628e6c0322..fb0508714f 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -250,7 +250,7 @@ As part of this, the amd64-specific `ACPI_DMAR` kernel option has been renamed to `IOMMU`. gitref:6186bfbd1880[repository=src] {{< sponsored "DARPA" >}} {{< sponsored "AFRL" >}} -A driver for Arm System Memory Management Unity version 3.2 has been added +A driver for Arm System Memory Management Unit version 3.2 has been added to the aarch64 architecture. The driver is enabled by the `IOMMU` kernel option. gitref:4cc8701067e1[repository=src] {{< sponsored "DARPA" >}} {{< sponsored "AFRL" >}} {{< sponsored "Innovate UK" >}} @@ -291,8 +291,9 @@ Several network drivers for obsolete Ethernet adapters have been removed: * man:wb[4] Winbond W89C840F gitref:02fae06a11b4[repository=src] * man:xe[4] Xircom PCMCIA gitref:7a582e5374c8[repository=src] -The man:ubsec[4] driver has been removed. -gitref:883a2dc67213[repository=src] {{< sponsored "Chelsio Communications" >}} +The man:ubsec[4] driver for obsolete Broadcom BCM58xx crypto accelerators +has been removed. +gitref:97e251327f95[repository=src] {{< sponsored "Chelsio Communications" >}} A new man:safexcel[4] driver supports cryptographic requests via the EIP-97 packet processing module found on the ESPRESSObin. gitref:b356ddf07671[repository=src] {{< sponsored "Rubicon Communications, LLC" >}} From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 16:25:38 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 842645B40B3 for ; Mon, 22 Mar 2021 16:25:38 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F40Gp3Kb5z3vFS; Mon, 22 Mar 2021 16:25:38 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 652AA10E27; Mon, 22 Mar 2021 16:25:38 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MGPcYV025968; Mon, 22 Mar 2021 16:25:38 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MGPcJc025967; Mon, 22 Mar 2021 16:25:38 GMT (envelope-from git) Date: Mon, 22 Mar 2021 16:25:38 GMT Message-Id: <202103221625.12MGPcJc025967@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: John Baldwin Subject: git: e0f1a3ae3b - main - Add a brief entry for OpenZFS. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhb X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: e0f1a3ae3b709e316b1db7b9a361d31f3fdb6d36 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 16:25:38 -0000 The branch main has been updated by jhb: URL: https://cgit.FreeBSD.org/doc/commit/?id=e0f1a3ae3b709e316b1db7b9a361d31f3fdb6d36 commit e0f1a3ae3b709e316b1db7b9a361d31f3fdb6d36 Author: John Baldwin AuthorDate: 2021-03-22 16:23:12 +0000 Commit: John Baldwin CommitDate: 2021-03-22 16:23:12 +0000 Add a brief entry for OpenZFS. Discussed with: allanjude Differential Revision: https://reviews.freebsd.org/D29280 --- website/content/en/releases/13.0R/relnotes.adoc | 3 +++ 1 file changed, 3 insertions(+) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index fb0508714f..294bb66a55 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -363,6 +363,9 @@ The man:fusefs[5] protocol has been updated to 7.28 along with adding support for `FUSE_COPY_FILE_RANGE` and `FUSE_LSEEK`. gitref:92bbfe1f0d1f[repository=src] +The ZFS implementation is now provided by OpenZFS. +gitref:9e5787d2284e[repository=src] {{< sponsored "iXsystems" >}} + [[storage-general]] === General Storage From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 16:25:39 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A311E5B4284 for ; Mon, 22 Mar 2021 16:25:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F40Gq4FDSz3tsg; Mon, 22 Mar 2021 16:25:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 844DB1118D; Mon, 22 Mar 2021 16:25:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MGPdfn025989; Mon, 22 Mar 2021 16:25:39 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MGPd3L025988; Mon, 22 Mar 2021 16:25:39 GMT (envelope-from git) Date: Mon, 22 Mar 2021 16:25:39 GMT Message-Id: <202103221625.12MGPd3L025988@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: John Baldwin Subject: git: 737626b8dc - main - Another sweep of passive voice to active voice. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: jhb X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 737626b8dc59e58c59782cce16c7eb859ff29c19 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 16:25:39 -0000 The branch main has been updated by jhb: URL: https://cgit.FreeBSD.org/doc/commit/?id=737626b8dc59e58c59782cce16c7eb859ff29c19 commit 737626b8dc59e58c59782cce16c7eb859ff29c19 Author: John Baldwin AuthorDate: 2021-03-22 16:25:18 +0000 Commit: John Baldwin CommitDate: 2021-03-22 16:25:18 +0000 Another sweep of passive voice to active voice. Reviewed by: emaste Differential Revision: https://reviews.freebsd.org/D29293 --- website/content/en/releases/13.0R/relnotes.adoc | 52 ++++++++++++------------- 1 file changed, 26 insertions(+), 26 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index 294bb66a55..dc3e6ba119 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -155,7 +155,7 @@ resumes from sleep rather than a `kern` system event. gitref:f87655ec7694[reposi The man:diskinfo[8] utility now reports the physical device name GEOM attribute when available. gitref:b5961be1ab7[repository=src] -The man:elf2aout[1] utility has been removed. gitref:dd99ab06f360[repository=src] +Removed the man:elf2aout[1] utility. gitref:dd99ab06f360[repository=src] The man:freebsd-update[8] utility now displays progress for the "Fetching files..." stage. gitref:d6e1e31a0e6[repository=src] @@ -165,7 +165,7 @@ The man:freebsd-update[8] utility now supports the `updatesready` and `showconfi The manual page for the man:freebsd-update[8] utility documents using the `PAGER` environment variable for non-interactive use. gitref:32f4592764d[repository=src] -The obsolete version of the GNU debugger installed to [.filename]#/usr/libexec# for use by man:crashinfo[8] has been removed. +Removed the obsolete version of the GNU debugger that was installed to [.filename]#/usr/libexec# for use by man:crashinfo[8]. Detailed kernel crash information can be obtained by installing modern GDB from ports or packages. gitref:1c0ea326aa6d[repository=src] @@ -179,7 +179,7 @@ The manual page for the man:inetd[8] utility now includes comments for all examp [[userland-contrib]] === Contributed Software -The man:bc[1] and man:dc[1] utilities have been replaced by the version developed by Gavin D. Howard. +Replaced the man:bc[1] and man:dc[1] utilities with the version developed by Gavin D. Howard. The new versions do not depend on an external large number library, offer GNU bc extensions, are much faster than and fix POSIX compliance issues of the programs they replace. They support POSIX message catalogs and come with localized messages in Chinese, Dutch, English, French, German, Japanese, Polish, Portugueze, and Russian. The previous implementation is still available in FreeBSD-13 and can be selected instead of the new one by the build option `WITHOUT_GH_BC`. gitref:c41fef90a7d[repository=src] @@ -193,7 +193,7 @@ The previous implementation is still available in FreeBSD-13 and can be selected The new man:getlocalbase[3] function in libutil retrieves the LOCALBASE path in a standard way. gitref:30d21d27953[repository=src] -The man:cap_random[3] function has been removed as it has been +Removed the man:cap_random[3] function as it has been superseeded by man:getrandom[2]. gitref:a76f78dc3f43[repository=src] A new Linux-compatible man:copy_file_range[2] system call supports efficient @@ -223,34 +223,32 @@ Notably, if a process had been assigned a numbered cpuset then it will be assign allowed to the attaching process and the jail. Processes belonging to the superuser will implicitly widen their CPU mask as needed if they share no CPUs in common with the jail. -The in-kernel cryptographic framework has been overhauled to better support +Overhauled the in-kernel cryptographic framework to better support modern cryptographic algorithms as well as simplify the interface for both device drivers and framework consumers. gitref:c03414326909[repository=src] {{< sponsored "Chelsio Communications" >}} -Support for Kerberos GSS algorithms deprecated by RFCs 6649 and 8429 has been -removed. +Removed support for Kerberos GSS algorithms deprecated by RFCs 6649 and 8429. gitref:dee3aa83d1b6[repository=src] {{< sponsored "Chelsio Communications" >}} -Support for previously-deprecated algorithms in man:geli[4] has -been removed. +Removed support for previously-deprecated algorithms in man:geli[4]. gitref:e2b9919398c3[repository=src] {{< sponsored "Chelsio Communications" >}} -Support for IPsec algorithms deprecated by RFC 8221 as well as Triple DES -has been removed. +Removed support for IPsec algorithms deprecated by RFC 8221 as well as +Triple DES. gitref:16aabb761c0a[repository=src] {{< sponsored "Chelsio Communications" >}} -Support for previously-deprecated cryptographic algorithms has been removed +Removed support for previously-deprecated cryptographic algorithms from man:cryptodev[4] and the in-kernel cryptographic framework. gitref:6c80c319ef88[repository=src] {{< sponsored "Chelsio Communications" >}} -The amd64 DMAR driver has been refactored to provide a generic I/O MMU +Refactored the amd64 DMAR driver to provide a generic I/O MMU framework which can be used by other architectures. -As part of this, the amd64-specific `ACPI_DMAR` kernel option has been -renamed to `IOMMU`. +As part of this, renamed the amd64-specific `ACPI_DMAR` kernel option +to `IOMMU`. gitref:6186bfbd1880[repository=src] {{< sponsored "DARPA" >}} {{< sponsored "AFRL" >}} -A driver for Arm System Memory Management Unit version 3.2 has been added +Added a driver for the Arm System Memory Management Unit version 3.2 to the aarch64 architecture. The driver is enabled by the `IOMMU` kernel option. gitref:4cc8701067e1[repository=src] {{< sponsored "DARPA" >}} {{< sponsored "AFRL" >}} {{< sponsored "Innovate UK" >}} @@ -271,7 +269,7 @@ This section covers changes and additions to devices and device drivers since {r [[drivers-device]] === Device Drivers -Several network drivers for obsolete Ethernet adapters have been removed: +Removed several network drivers for obsolete Ethernet adapters: * man:bm[4] BMAC gitref:9e774e53407b[repository=src] * man:cs[4] Crystal Semiconductor CS8900/CS8920 gitref:e1edf1240b33[repository=src] @@ -291,8 +289,8 @@ Several network drivers for obsolete Ethernet adapters have been removed: * man:wb[4] Winbond W89C840F gitref:02fae06a11b4[repository=src] * man:xe[4] Xircom PCMCIA gitref:7a582e5374c8[repository=src] -The man:ubsec[4] driver for obsolete Broadcom BCM58xx crypto accelerators -has been removed. +Removed the man:ubsec[4] driver for obsolete Broadcom BCM58xx crypto +accelerators. gitref:97e251327f95[repository=src] {{< sponsored "Chelsio Communications" >}} A new man:safexcel[4] driver supports cryptographic requests via the EIP-97 @@ -326,8 +324,8 @@ For man:iscsi[4] and man:ctld[8], support for specifying network QoS in the form The man:ctld[8] utility now supports the `-f` flag to test the validity of configuration files. gitref:7fcbecd004f[repository=src] -The man:nand[4] device framework and man:nandfs[5] filesystem and associated -utilities have been removed. gitref:f5a95d9a0794[repository=src] +Removed the man:nand[4] device framework and man:nandfs[5] filesystem and +associated utilities. gitref:f5a95d9a0794[repository=src] man:gnop[8] can now apply configurable delays to read and write requests to simulate a slow disk. gitref:4f80c85519d5[repository=src] @@ -359,7 +357,7 @@ A new `nfsv4_server_only` variable can be set to `YES` in [.filename]#/etc/rc.co This avoids the need to run man:rpcbind[8] on an NFS server. gitref:4389a5661034[repository=src] -The man:fusefs[5] protocol has been updated to 7.28 along with adding support +Updated the man:fusefs[5] protocol to 7.28 along with adding support for `FUSE_COPY_FILE_RANGE` and `FUSE_LSEEK`. gitref:92bbfe1f0d1f[repository=src] @@ -431,7 +429,7 @@ The man:cc_cubic[4] man:tcp[4] congestion control algorithm aligns more closely The man:ping[8] utility now supports setting network QoS, with IP DSCP gitref:6034024daddb[repository=src] and Ethernet PCP gitref:81a6f4c7ae69[repository=src]. {{< sponsored "NetApp" >}} -The man:ping[8] and man:ping6[8] utilities have been merged. +Merged the man:ping[8] and man:ping6[8] utilities. man:ping[8] supports both IPv4 and IPv6. A legacy man:ping6[8] is retained for backwards compatibility. gitref:3cde9171d2d5[repository=src] @@ -456,7 +454,7 @@ The amd64 architecture now supports 57-bit virtual addresses (LA57) on supported [[ARM-ARM64]] === ARMv5 -Support for version 5 of the 32-bit ARM architecture has been removed. +Removed support for version 5 of the 32-bit ARM architecture. Building for `TARGET=arm` now defaults to a `TARGET_ARCH` of `armv7`. gitref:eb4977bd0fb2[repository=src] @@ -488,7 +486,7 @@ if_dwc now supports checksum offloading. gitref:98ea5a7b9a1[repository=src] === Sparc -Support for the `sparc64` architecture (SPARC 9) has been removed. +Removed support for the `sparc64` architecture (SPARC 9). gitref:58aa35d42975[repository=src] [[hardware-virtualization]] @@ -496,7 +494,9 @@ gitref:58aa35d42975[repository=src] The man:bhyve[8] utility supports additional COM3 and COM4 serial ports. gitref:eed1cc6cdfa[repository=src] -The deprecated bvmconsole and bvmdebug device models have been removed. This includes both the device models from man:bhyve[8] and the kernel device drivers for FreeBSD guests. gitref:c4df8cbfde5[repository=src] +Removed the deprecated bvmconsole and bvmdebug device models from man:bhyve[8] +and the associated kernel device drivers for FreeBSD guests. +gitref:c4df8cbfde5[repository=src] The man:bhyve[8] utility works reliably with more VNC clients including the macOS "Screen Sharing" application. gitref:2bb4be0f865[repository=src] From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 22:19:59 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2EC965BC245 for ; Mon, 22 Mar 2021 22:19:59 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F487g0vtXz4qLc; Mon, 22 Mar 2021 22:19:59 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0D35B15761; Mon, 22 Mar 2021 22:19:59 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MMJwAj017434; Mon, 22 Mar 2021 22:19:58 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MMJwRJ017433; Mon, 22 Mar 2021 22:19:58 GMT (envelope-from git) Date: Mon, 22 Mar 2021 22:19:58 GMT Message-Id: <202103222219.12MMJwRJ017433@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Daniel Ebdrup Jensen Subject: git: 3cce9c3099 - main - relnotes/13.0: note changed AES-NI identification by geli MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: debdrup X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 3cce9c309963a640877ae90da195f68d8d7c7327 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 22:19:59 -0000 The branch main has been updated by debdrup: URL: https://cgit.FreeBSD.org/doc/commit/?id=3cce9c309963a640877ae90da195f68d8d7c7327 commit 3cce9c309963a640877ae90da195f68d8d7c7327 Author: M. Bueker AuthorDate: 2021-03-22 22:08:06 +0000 Commit: Daniel Ebdrup Jensen CommitDate: 2021-03-22 22:12:16 +0000 relnotes/13.0: note changed AES-NI identification by geli A user on IRC wondered why his AES-NI-enabled CPU was identified by geli as "Crypto: accelerated software" on a 13.0-RC, when 12.2 identified it as "Crypto: hardware". To help alliviate this confusion, make explicit mention of the change. While here, also add note to clear up confusion about no functional change. Reviewed by: jhb Differential Revision: https://reviews.freebsd.org/D29281 --- website/content/en/releases/13.0R/relnotes.adoc | 3 +++ 1 file changed, 3 insertions(+) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index dc3e6ba119..3ade6e9c7e 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -228,6 +228,9 @@ modern cryptographic algorithms as well as simplify the interface for both device drivers and framework consumers. gitref:c03414326909[repository=src] {{< sponsored "Chelsio Communications" >}} +man:geli[8] now reports the use of accelerated software cryptography (such as AES-NI on x86 CPUs) as "accelerated software" rather than "hardware". +This is purely a change in naming, and does not imply reduced performance or support. gitref:a3d565a1188f[repository=src] {{< sponsored "Chelsio Communications" >}} + Removed support for Kerberos GSS algorithms deprecated by RFCs 6649 and 8429. gitref:dee3aa83d1b6[repository=src] {{< sponsored "Chelsio Communications" >}} From owner-dev-commits-doc-all@freebsd.org Mon Mar 22 22:20:00 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 486815BC59F for ; Mon, 22 Mar 2021 22:20:00 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F487h1Sjkz4pyM; Mon, 22 Mar 2021 22:20:00 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 244C315A21; Mon, 22 Mar 2021 22:20:00 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12MMK0GN017466; Mon, 22 Mar 2021 22:20:00 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12MMK0Z9017465; Mon, 22 Mar 2021 22:20:00 GMT (envelope-from git) Date: Mon, 22 Mar 2021 22:20:00 GMT Message-Id: <202103222220.12MMK0Z9017465@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Daniel Ebdrup Jensen Subject: git: 2bd242be80 - main - relnotes/13.0: change manul page reference MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: debdrup X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 2bd242be80752782143f64348984135c5b8757a9 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Mar 2021 22:20:00 -0000 The branch main has been updated by debdrup: URL: https://cgit.FreeBSD.org/doc/commit/?id=2bd242be80752782143f64348984135c5b8757a9 commit 2bd242be80752782143f64348984135c5b8757a9 Author: Daniel Ebdrup Jensen AuthorDate: 2021-03-22 22:15:41 +0000 Commit: Daniel Ebdrup Jensen CommitDate: 2021-03-22 22:15:41 +0000 relnotes/13.0: change manul page reference geli(4) doesn't exist on 12.2-RELEASE, nor on 14-CURRENT, so for the notes for 13.0-RELEASE, convert manual references to the existing manual page. --- website/content/en/releases/13.0R/relnotes.adoc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index 3ade6e9c7e..d7d7b46152 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -234,7 +234,7 @@ This is purely a change in naming, and does not imply reduced performance or sup Removed support for Kerberos GSS algorithms deprecated by RFCs 6649 and 8429. gitref:dee3aa83d1b6[repository=src] {{< sponsored "Chelsio Communications" >}} -Removed support for previously-deprecated algorithms in man:geli[4]. +Removed support for previously-deprecated algorithms in man:geli[8]. gitref:e2b9919398c3[repository=src] {{< sponsored "Chelsio Communications" >}} Removed support for IPsec algorithms deprecated by RFC 8221 as well as @@ -257,11 +257,11 @@ The driver is enabled by the `IOMMU` kernel option. gitref:4cc8701067e1[repository=src] {{< sponsored "DARPA" >}} {{< sponsored "AFRL" >}} {{< sponsored "Innovate UK" >}} The GENERIC kernels for amd64 and i386 now include man:aesni[4] to support -accelerated software cryptography for man:geli[4] by default. +accelerated software cryptography for man:geli[8] by default. gitref:074a91f746bd[repository=src] The GENERIC kernel for aarch64 now includes man:armv8crypto[4] to support -accelerated software cryptography for man:geli[4] by default. +accelerated software cryptography for man:geli[8] by default. gitref:074a91f746bd[repository=src] [[drivers]] @@ -311,7 +311,7 @@ gitref:ba610be90a7c[repository=src] {{< sponsored "Netflix" >}}, gitref:22bd0c9731d7[repository=src] The man:armv8crypto[4] driver which supports software cryptography on -ARMv8 CPUs now supports AES-XTS which is used by man:geli[4]. +ARMv8 CPUs now supports AES-XTS which is used by man:geli[8]. gitref:4979620ece98[repository=src] The man:armv8crypto[4] driver now supports AES-GCM which is used by IPsec From owner-dev-commits-doc-all@freebsd.org Tue Mar 23 18:50:39 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 75E145B836F for ; Tue, 23 Mar 2021 18:50:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F4gRg2y9lz3n7b; Tue, 23 Mar 2021 18:50:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5859D25F27; Tue, 23 Mar 2021 18:50:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12NIodTx048892; Tue, 23 Mar 2021 18:50:39 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12NIodVt048891; Tue, 23 Mar 2021 18:50:39 GMT (envelope-from git) Date: Tue, 23 Mar 2021 18:50:39 GMT Message-Id: <202103231850.12NIodVt048891@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Glen Barber Subject: git: 21da71a15d - main - 13.0: update schedule to include RC4 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: gjb X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 21da71a15dd24cd723cc8eb61b059df31b047333 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Mar 2021 18:50:39 -0000 The branch main has been updated by gjb: URL: https://cgit.FreeBSD.org/doc/commit/?id=21da71a15dd24cd723cc8eb61b059df31b047333 commit 21da71a15dd24cd723cc8eb61b059df31b047333 Author: Glen Barber AuthorDate: 2021-03-23 18:50:20 +0000 Commit: Glen Barber CommitDate: 2021-03-23 18:50:20 +0000 13.0: update schedule to include RC4 Sponsored by: Rubicon Communications, LLC ("Netgate") --- website/content/en/releases/13.0R/schedule.adoc | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/website/content/en/releases/13.0R/schedule.adoc b/website/content/en/releases/13.0R/schedule.adoc index e0eb2158d6..f2f61d0de1 100644 --- a/website/content/en/releases/13.0R/schedule.adoc +++ b/website/content/en/releases/13.0R/schedule.adoc @@ -44,8 +44,9 @@ Announcements regarding the availability of the ALPHA snapshots will be sent to |RC1 builds begin |5 March 2021 |5 March 2021 |First release candidate. |RC2 builds begin |12 March 2021 |12 March 2021 |Second release candidate. |RC3 builds begin |19 March 2021 |19 March 2021 |Third release candidate. -|RELEASE builds begin |26 March 2021 |- |{localRel}-RELEASE builds begin. -|RELEASE announcement |30 March 2021 |- |{localRel}-RELEASE press release. +|RC4 builds begin |26 March 2021 |- |Fourth release candidate. +|RELEASE builds begin |2 April 2021 |- |{localRel}-RELEASE builds begin. +|RELEASE announcement |6 April 2021 |- |{localRel}-RELEASE press release. |Turn over to the secteam |- |- |{localBranchReleng} branch is handed over to the FreeBSD Security Officer Team in one or two weeks after the announcement. |=== From owner-dev-commits-doc-all@freebsd.org Tue Mar 23 23:26:52 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7F0775BFBCF for ; Tue, 23 Mar 2021 23:26:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F4nZN39tcz4djM; Tue, 23 Mar 2021 23:26:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5BB201CFB; Tue, 23 Mar 2021 23:26:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12NNQq0D032719; Tue, 23 Mar 2021 23:26:52 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12NNQq6H032718; Tue, 23 Mar 2021 23:26:52 GMT (envelope-from git) Date: Tue, 23 Mar 2021 23:26:52 GMT Message-Id: <202103232326.12NNQq6H032718@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Chris Rees Subject: git: b60f63f9b8 - main - Correct example syntax MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: crees X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: b60f63f9b82f493c0c4b3539d6d1ad2943be111c Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Mar 2021 23:26:52 -0000 The branch main has been updated by crees: URL: https://cgit.FreeBSD.org/doc/commit/?id=b60f63f9b82f493c0c4b3539d6d1ad2943be111c commit b60f63f9b82f493c0c4b3539d6d1ad2943be111c Author: Chris Rees AuthorDate: 2021-03-23 23:26:22 +0000 Commit: Chris Rees CommitDate: 2021-03-23 23:26:22 +0000 Correct example syntax Reported by: John Ekins --- documentation/content/en/books/handbook/x11/_index.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/documentation/content/en/books/handbook/x11/_index.adoc b/documentation/content/en/books/handbook/x11/_index.adoc index a47e847fd5..f420bc9e54 100644 --- a/documentation/content/en/books/handbook/x11/_index.adoc +++ b/documentation/content/en/books/handbook/x11/_index.adoc @@ -373,7 +373,7 @@ Any of the other display modes can be selected with man:xrandr[1]. For example, + [source,shell] .... -% xrandr --mode 1280x1024 --rate 60 +% xrandr --output DVI-0 --mode 1280x1024 --rate 60 .... + A common task is using the external video output on a notebook computer for a video projector. From owner-dev-commits-doc-all@freebsd.org Wed Mar 24 01:29:07 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 20FE757C5F5 for ; Wed, 24 Mar 2021 01:29:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F4rHR0Srvz4n6h; Wed, 24 Mar 2021 01:29:07 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id F334E3769; Wed, 24 Mar 2021 01:29:06 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12O1T6cB001389; Wed, 24 Mar 2021 01:29:06 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12O1T6Ux001388; Wed, 24 Mar 2021 01:29:06 GMT (envelope-from git) Date: Wed, 24 Mar 2021 01:29:06 GMT Message-Id: <202103240129.12O1T6Ux001388@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Ed Maste Subject: git: 4b367e6b5e - main - handbook: Use Asciidoc formatting for links MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: emaste X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 4b367e6b5e8d3f5f6ecedff6d75142cba943360d Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 24 Mar 2021 01:29:07 -0000 The branch main has been updated by emaste (src committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=4b367e6b5e8d3f5f6ecedff6d75142cba943360d commit 4b367e6b5e8d3f5f6ecedff6d75142cba943360d Author: Ed Maste AuthorDate: 2021-03-24 01:27:48 +0000 Commit: Ed Maste CommitDate: 2021-03-24 01:27:48 +0000 handbook: Use Asciidoc formatting for links (not Markdown) --- .../content/en/books/handbook/mirrors/_index.adoc | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/documentation/content/en/books/handbook/mirrors/_index.adoc b/documentation/content/en/books/handbook/mirrors/_index.adoc index 54197edbca..dc6d122428 100644 --- a/documentation/content/en/books/handbook/mirrors/_index.adoc +++ b/documentation/content/en/books/handbook/mirrors/_index.adoc @@ -690,13 +690,13 @@ General usage and questions about git in the FreeBSD project: [freebsd-git](http Commit messages will be sent to the following mailing lists: -- [dev-commits-doc-all](https://lists.freebsd.org/mailman/listinfo/dev-commits-doc-all): All changes to the doc repository -- [dev-commits-ports-all](https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-all): All changes to the ports repository -- [dev-commits-ports-main](https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-main): All changes to the "main" branch of the ports repository -- [dev-commits-ports-branches](https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-branches): All changes to the quarterly branches of the ports repository -- [dev-commits-src-all](https://lists.freebsd.org/mailman/listinfo/dev-commits-src-all): All changes to the src repository -- [dev-commits-src-main](https://lists.freebsd.org/mailman/listinfo/dev-commits-src-main): All changes to the "main" branch of the src repository (the FreeBSD-CURRENT branch) -- [dev-commits-src-branches](https://lists.freebsd.org/mailman/listinfo/dev-commits-src-branches): All changes to all stable branches of the src repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-doc-all[dev-commits-doc-all]: All changes to the doc repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-all[dev-commits-ports-all]: All changes to the ports repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-main[dev-commits-ports-main]: All changes to the "main" branch of the ports repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-ports-branches[dev-commits-ports-branches]: All changes to the quarterly branches of the ports repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-src-all[dev-commits-src-all]: All changes to the src repository +- https://lists.freebsd.org/mailman/listinfo/dev-commits-src-main[dev-commits-src-main]: All changes to the "main" branch of the src repository (the FreeBSD-CURRENT branch) +- https://lists.freebsd.org/mailman/listinfo/dev-commits-src-branches[dev-commits-src-branches]: All changes to all stable branches of the src repository For more information, please refer to the "Commit message lists" section of C.2. "Mailing Lists" in handbook: https://www.freebsd.org/doc/en/books/handbook/eresources-mail.html From owner-dev-commits-doc-all@freebsd.org Thu Mar 25 18:59:11 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C925357840F for ; Thu, 25 Mar 2021 18:59:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F5vXb5L87z4WW9; Thu, 25 Mar 2021 18:59:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AA18042E7; Thu, 25 Mar 2021 18:59:11 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12PIxBZT093618; Thu, 25 Mar 2021 18:59:11 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12PIxBRf093617; Thu, 25 Mar 2021 18:59:11 GMT (envelope-from git) Date: Thu, 25 Mar 2021 18:59:11 GMT Message-Id: <202103251859.12PIxBRf093617@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Mark Johnston Subject: git: b002508ba5 - main - Updates for GSOC 2020 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: markj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: b002508ba59a21a92bd958f4fd6dc78f8e32e084 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Mar 2021 18:59:11 -0000 The branch main has been updated by markj (src committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=b002508ba59a21a92bd958f4fd6dc78f8e32e084 commit b002508ba59a21a92bd958f4fd6dc78f8e32e084 Author: Mark Johnston AuthorDate: 2021-03-25 18:59:02 +0000 Commit: Mark Johnston CommitDate: 2021-03-25 18:59:02 +0000 Updates for GSOC 2020 --- website/content/en/projects/summerofcode.adoc | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/website/content/en/projects/summerofcode.adoc b/website/content/en/projects/summerofcode.adoc index 7c42db82bf..c9eb5ba78f 100644 --- a/website/content/en/projects/summerofcode.adoc +++ b/website/content/en/projects/summerofcode.adoc @@ -5,7 +5,7 @@ sidenav: developers = FreeBSD Summer Projects -The FreeBSD Project is looking forward to participating as a mentoring organization in https://summerofcode.withgoogle.com/[Google Summer of Code] 2020. This program offers students a stipend of https://developers.google.com/open-source/gsoc/help/student-stipends[up to $6,600 USD] to contribute to an open source project over the summer break. We have had over 200 successful students working on FreeBSD as part of this program since 2005. +The FreeBSD Project is looking forward to participating as a mentoring organization in https://summerofcode.withgoogle.com/[Google Summer of Code] 2021. This program offers students a stipend of https://developers.google.com/open-source/gsoc/help/student-stipends[up to $6,600 USD] to contribute to an open source project over the summer break. We have had over 200 successful students working on FreeBSD as part of this program since 2005. This page and the https://wiki.freebsd.org/SummerOfCodeIdeas[ideas lists] will be updated throughout the application period to include new information, such as project ideas, proposal information, and potential mentor contact information. If you don't see an idea that interests you, visit again in a couple of days! Additionally, we welcome proposals unrelated to the ideas listed here. @@ -36,6 +36,7 @@ For additional ideas about upcoming development projects in FreeBSD, take a look For a complete list of student projects from previous years, visit: +* https://wiki.FreeBSD.org/SummerOfCode2020Projects[Summer of Code 2020 FreeBSD Projects Wiki] * https://wiki.FreeBSD.org/SummerOfCode2019Projects[Summer of Code 2019 FreeBSD Projects Wiki] * https://wiki.FreeBSD.org/SummerOfCode2018Projects[Summer of Code 2018 FreeBSD Projects Wiki] * https://wiki.FreeBSD.org/SummerOfCode2017Projects[Summer of Code 2017 FreeBSD Projects Wiki] @@ -117,11 +118,11 @@ We expect project work to be done in GitHub repositories in order to facilitate + At the time of writing, Google has announced the following dates of interest relating to the application process: + -** *12 March* - Student application period opens. -** *27 March 18:00 UTC* - Student application period closes. -** *23 April* - Accepted students announced, students start creating their work plans. Community bonding period starts. -** *14 May* - Coding starts. -** *6 August* - Suggested end of coding. +** *29 March* - Student application period opens. +** *13 April 18:00 UTC* - Student application period closes. +** *17 May* - Accepted students announced, students start creating their work plans. Community bonding period starts. +** *7 June* - Coding starts. +** *16 August* - Suggested end of coding. + Note that these dates may change, and the Google FAQ timeline is the authoritative source of detailed schedule information: ** https://summerofcode.withgoogle.com/how-it-works/[GSoC Timeline] From owner-dev-commits-doc-all@freebsd.org Thu Mar 25 23:56:22 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C15905A8643 for ; Thu, 25 Mar 2021 23:56:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F627V4xH7z4rdv; Thu, 25 Mar 2021 23:56:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 977E1105DA; Thu, 25 Mar 2021 23:56:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12PNuMZ2016008; Thu, 25 Mar 2021 23:56:22 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12PNuMN0016007; Thu, 25 Mar 2021 23:56:22 GMT (envelope-from git) Date: Thu, 25 Mar 2021 23:56:22 GMT Message-Id: <202103252356.12PNuMN0016007@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Gordon Tetlow Subject: git: 98ec8b7512 - main - Add FreeBSD-SA-21:07.openssl. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: gordon X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 98ec8b7512c644be2229f079208e6698bdb09af6 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Mar 2021 23:56:22 -0000 The branch main has been updated by gordon (src committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=98ec8b7512c644be2229f079208e6698bdb09af6 commit 98ec8b7512c644be2229f079208e6698bdb09af6 Author: Gordon Tetlow AuthorDate: 2021-03-25 23:55:47 +0000 Commit: Gordon Tetlow CommitDate: 2021-03-25 23:56:03 +0000 Add FreeBSD-SA-21:07.openssl. Approved by: so --- website/data/security/advisories.toml | 4 + .../advisories/FreeBSD-SA-21:07.openssl.asc | 170 ++++++ .../security/patches/SA-21:07/openssl-12.patch | 281 +++++++++ .../security/patches/SA-21:07/openssl-12.patch.asc | 16 + .../security/patches/SA-21:07/openssl-13.patch | 651 +++++++++++++++++++++ .../security/patches/SA-21:07/openssl-13.patch.asc | 16 + 6 files changed, 1138 insertions(+) diff --git a/website/data/security/advisories.toml b/website/data/security/advisories.toml index 10229d9ce6..08e22e3be7 100644 --- a/website/data/security/advisories.toml +++ b/website/data/security/advisories.toml @@ -1,6 +1,10 @@ # Sort advisories by year, month and day # $FreeBSD$ +[[advisories]] +name = "FreeBSD-SA-21:07.openssl" +date = "2021-03-25" + [[advisories]] name = "FreeBSD-SA-21:06.xen" date = "2021-02-24" diff --git a/website/static/security/advisories/FreeBSD-SA-21:07.openssl.asc b/website/static/security/advisories/FreeBSD-SA-21:07.openssl.asc new file mode 100644 index 0000000000..af47414066 --- /dev/null +++ b/website/static/security/advisories/FreeBSD-SA-21:07.openssl.asc @@ -0,0 +1,170 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-21:07.openssl Security Advisory + The FreeBSD Project + +Topic: Multiple vulnerabilities in OpenSSL + +Category: contrib +Module: openssl +Announced: 2021-03-25 +Affects: FreeBSD 12.2 and later +Corrected: 2021-03-25 15:45:19 UTC (stable/13, 13.0-STABLE) + 2021-03-25 16:25:06 UTC (releng/13.0, 13.0-RC3-p1) + 2021-03-25 17:14:46 UTC (stable/12, 12.2-STABLE) + 2021-03-25 23:45:45 UTC (releng/12.2, 12.2-RELEASE-p5) +CVE Name: CVE-2021-3449, CVE-2021-3450 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a +collaborative effort to develop a robust, commercial-grade, full-featured +Open Source toolkit for the Transport Layer Security (TLS) protocol. It is +also a general-purpose cryptography library. + +II. Problem Description + +This advisory covers two distinct OpenSSL issues: + +The X509_V_FLAG_X509_STRICT flag enables additional security checks of the +certificates present in a certificate chain. It is not set by default. +Starting from OpenSSL version 1.1.1h a check to disallow certificates in the +chain that have explicitly encoded elliptic curve parameters was added as an +additional strict check. An error in the implementation of this check meant +that the result of a previous check to confirm that certificates in the chain +are valid CA certificates was overwritten. This effectively bypasses the +check that non-CA certificates must not be able to issue other certificates. +[CVE-2021-3450] + +A TLSv1.2 renegotiation ClientHello message sent to a TLS server that omits +the signature_algorithms extension (where it was present in the initial +ClientHello), but includes a signature_algorithms_cert extension results in a +NULL pointer dereference in the server. [CVE-2021-3449] + +III. Impact + +The X509_V_FLAG_X509_STRICT issue can result in a bypass of the check that +non-CA certificates must not be able to issue other certificates. + +The renegotiation issue can result in a crash and a denial of service attack. + +IV. Workaround + +For the X509_V_FLAG_X509_STRICT issue, no workaround is available, but +software that doesn't explicitly set the X509_V_FLAG_X509_STRICT flag is +unaffected. + +For the renegotiation issue, either turning off TLSv1.2 (as TLSv1.3 is +unaffected) or turning off renegotiation on the TLS server mitigates the +issue. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 13.x] +# fetch https://security.FreeBSD.org/patches/SA-21:07/openssl-13.patch +# fetch https://security.FreeBSD.org/patches/SA-21:07/openssl-13.patch.asc +# gpg --verify openssl-13.patch.asc + +[FreeBSD 12.x] +# fetch https://security.FreeBSD.org/patches/SA-21:07/openssl-12.patch +# fetch https://security.FreeBSD.org/patches/SA-21:07/openssl-12.patch.asc +# gpg --verify openssl-12.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/13/ b6c1fdcdf5033d20c61cc77d66f58f31cc65e2ba +releng/13.0/ 7d3f5a19f455e0e3fb17ac3f9af288e8c7fffc15 +stable/12/ r369521 +releng/12.2/ r369523 +- ------------------------------------------------------------------------- + +[FreeBSD 13.x] +To see which files were modified by a particular revision, run the following +command in a checked out git repository, replacing NNNNNN with the revision +hash: + +# git show --stat NNNNNN + +Or visit the following URL, replace NNNNNN with the revision hash: + + + +[FreeBSD 12.x] +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQIzBAEBCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmBdIi4ACgkQ05eS9J6n +5cJ3lRAAgeIfMDB04FRSVkOr4/GL5hAHwUmTfxJU2oPFJMELYD3NbVJR51fsXuuV +bHf1X9xq9jlYLyoLNpG89g1/jVYBPikZl3BraIm8/Rxp3/PeYEbkJKoaVaqdV8Lg +fQURad6z3cFSFTiZXuDaSvcXzuT5X/0U+UFncSsQJ2oF6YqWtAQzilTyti7mWxDR +/j0pS10GDmiEbHI/XVt683rNPhlzvha+npzpLhY+PFUQ4gwUQJrJVwoYHbPYEV2M +KngxHQ/P1u3jBnAtreEbfCEOfQYmhj7mNPMUl4KWRTvPsczTVohx4X96zi+rXgBw +RqNntzhLsRYsKGP4xgRmuIQjNA+udctCjrz1vDioZkG8YOYBWK9ygr7OwEyRWYar +65kykuQhKmqGqCx+r/rw7WzxwkJH+9fNKkQ+27mv7ibfqS8yD+CfELb+7aepuxGj +r8o2wLk+hfWttCV2fN3GIPhYAoU3UlvNWIMvxJXP8KL9Hf5JCte2ePKzVFLoYsQK +rdizxBhgngbWEISghZdmm2Qx4vG714z2bkmOjRn3muvZ5B2o9xP45Auj7nA3hZN1 +ET3jSWJHWutZds5wWlHfL7m4xr39D6BR/+6F1cmgmKr5O5YNSGWYEIqnh2G65KrM +ULNSgrlOfDr4oodovCXeRxXOplINMFNU4b4OpgyIQNvGysyLle0= +=+CMP +-----END PGP SIGNATURE----- diff --git a/website/static/security/patches/SA-21:07/openssl-12.patch b/website/static/security/patches/SA-21:07/openssl-12.patch new file mode 100644 index 0000000000..70ee0e6250 --- /dev/null +++ b/website/static/security/patches/SA-21:07/openssl-12.patch @@ -0,0 +1,281 @@ +--- crypto/openssl/crypto/x509/x509_vfy.c.orig ++++ crypto/openssl/crypto/x509/x509_vfy.c +@@ -526,15 +526,19 @@ + ret = 1; + break; + } +- if ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && num > 1) { ++ if (ret > 0 ++ && (ctx->param->flags & X509_V_FLAG_X509_STRICT) && num > 1) { + /* Check for presence of explicit elliptic curve parameters */ + ret = check_curve(x); +- if (ret < 0) ++ if (ret < 0) { + ctx->error = X509_V_ERR_UNSPECIFIED; +- else if (ret == 0) ++ ret = 0; ++ } else if (ret == 0) { + ctx->error = X509_V_ERR_EC_KEY_EXPLICIT_PARAMS; ++ } + } +- if ((x->ex_flags & EXFLAG_CA) == 0 ++ if (ret > 0 ++ && (x->ex_flags & EXFLAG_CA) == 0 + && x->ex_pathlen != -1 + && (ctx->param->flags & X509_V_FLAG_X509_STRICT)) { + ctx->error = X509_V_ERR_INVALID_EXTENSION; +--- crypto/openssl/ssl/s3_lib.c.orig ++++ crypto/openssl/ssl/s3_lib.c +@@ -4638,6 +4638,7 @@ + + OPENSSL_clear_free(s->s3->tmp.psk, psklen); + s->s3->tmp.psk = NULL; ++ s->s3->tmp.psklen = 0; + if (!s->method->ssl3_enc->generate_master_secret(s, + s->session->master_key, pskpms, pskpmslen, + &s->session->master_key_length)) { +@@ -4667,8 +4668,10 @@ + else + OPENSSL_cleanse(pms, pmslen); + } +- if (s->server == 0) ++ if (s->server == 0) { + s->s3->tmp.pms = NULL; ++ s->s3->tmp.pmslen = 0; ++ } + return ret; + } + +--- crypto/openssl/ssl/ssl_lib.c.orig ++++ crypto/openssl/ssl/ssl_lib.c +@@ -779,8 +779,10 @@ + s->ext.ecpointformats = + OPENSSL_memdup(ctx->ext.ecpointformats, + ctx->ext.ecpointformats_len); +- if (!s->ext.ecpointformats) ++ if (!s->ext.ecpointformats) { ++ s->ext.ecpointformats_len = 0; + goto err; ++ } + s->ext.ecpointformats_len = + ctx->ext.ecpointformats_len; + } +@@ -789,8 +791,10 @@ + OPENSSL_memdup(ctx->ext.supportedgroups, + ctx->ext.supportedgroups_len + * sizeof(*ctx->ext.supportedgroups)); +- if (!s->ext.supportedgroups) ++ if (!s->ext.supportedgroups) { ++ s->ext.supportedgroups_len = 0; + goto err; ++ } + s->ext.supportedgroups_len = ctx->ext.supportedgroups_len; + } + #endif +@@ -800,8 +804,10 @@ + + if (s->ctx->ext.alpn) { + s->ext.alpn = OPENSSL_malloc(s->ctx->ext.alpn_len); +- if (s->ext.alpn == NULL) ++ if (s->ext.alpn == NULL) { ++ s->ext.alpn_len = 0; + goto err; ++ } + memcpy(s->ext.alpn, s->ctx->ext.alpn, s->ctx->ext.alpn_len); + s->ext.alpn_len = s->ctx->ext.alpn_len; + } +@@ -2834,6 +2840,7 @@ + OPENSSL_free(ctx->ext.alpn); + ctx->ext.alpn = OPENSSL_memdup(protos, protos_len); + if (ctx->ext.alpn == NULL) { ++ ctx->ext.alpn_len = 0; + SSLerr(SSL_F_SSL_CTX_SET_ALPN_PROTOS, ERR_R_MALLOC_FAILURE); + return 1; + } +@@ -2853,6 +2860,7 @@ + OPENSSL_free(ssl->ext.alpn); + ssl->ext.alpn = OPENSSL_memdup(protos, protos_len); + if (ssl->ext.alpn == NULL) { ++ ssl->ext.alpn_len = 0; + SSLerr(SSL_F_SSL_SET_ALPN_PROTOS, ERR_R_MALLOC_FAILURE); + return 1; + } +--- crypto/openssl/ssl/statem/extensions.c.orig ++++ crypto/openssl/ssl/statem/extensions.c +@@ -1136,6 +1136,7 @@ + /* Clear any signature algorithms extension received */ + OPENSSL_free(s->s3->tmp.peer_sigalgs); + s->s3->tmp.peer_sigalgs = NULL; ++ s->s3->tmp.peer_sigalgslen = 0; + + return 1; + } +@@ -1145,6 +1146,7 @@ + /* Clear any signature algorithms extension received */ + OPENSSL_free(s->s3->tmp.peer_cert_sigalgs); + s->s3->tmp.peer_cert_sigalgs = NULL; ++ s->s3->tmp.peer_cert_sigalgslen = 0; + + return 1; + } +--- crypto/openssl/ssl/statem/extensions_clnt.c.orig ++++ crypto/openssl/ssl/statem/extensions_clnt.c +@@ -816,6 +816,7 @@ + OPENSSL_free(s->psksession_id); + s->psksession_id = OPENSSL_memdup(id, idlen); + if (s->psksession_id == NULL) { ++ s->psksession_id_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, + SSL_F_TLS_CONSTRUCT_CTOS_EARLY_DATA, ERR_R_INTERNAL_ERROR); + return EXT_RETURN_FAIL; +@@ -1375,6 +1376,7 @@ + OPENSSL_free(s->ext.peer_ecpointformats); + s->ext.peer_ecpointformats = OPENSSL_malloc(ecpointformats_len); + if (s->ext.peer_ecpointformats == NULL) { ++ s->ext.peer_ecpointformats_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, + SSL_F_TLS_PARSE_STOC_EC_PT_FORMATS, ERR_R_INTERNAL_ERROR); + return 0; +@@ -1492,8 +1494,13 @@ + s->ext.scts_len = (uint16_t)size; + if (size > 0) { + s->ext.scts = OPENSSL_malloc(size); +- if (s->ext.scts == NULL +- || !PACKET_copy_bytes(pkt, s->ext.scts, size)) { ++ if (s->ext.scts == NULL) { ++ s->ext.scts_len = 0; ++ SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SCT, ++ ERR_R_MALLOC_FAILURE); ++ return 0; ++ } ++ if (!PACKET_copy_bytes(pkt, s->ext.scts, size)) { + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_SCT, + ERR_R_INTERNAL_ERROR); + return 0; +@@ -1592,6 +1599,7 @@ + OPENSSL_free(s->ext.npn); + s->ext.npn = OPENSSL_malloc(selected_len); + if (s->ext.npn == NULL) { ++ s->ext.npn_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_NPN, + ERR_R_INTERNAL_ERROR); + return 0; +@@ -1632,6 +1640,7 @@ + OPENSSL_free(s->s3->alpn_selected); + s->s3->alpn_selected = OPENSSL_malloc(len); + if (s->s3->alpn_selected == NULL) { ++ s->s3->alpn_selected_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_ALPN, + ERR_R_INTERNAL_ERROR); + return 0; +@@ -1663,6 +1672,7 @@ + s->session->ext.alpn_selected = + OPENSSL_memdup(s->s3->alpn_selected, s->s3->alpn_selected_len); + if (s->session->ext.alpn_selected == NULL) { ++ s->session->ext.alpn_selected_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PARSE_STOC_ALPN, + ERR_R_INTERNAL_ERROR); + return 0; +--- crypto/openssl/ssl/statem/statem_clnt.c.orig ++++ crypto/openssl/ssl/statem/statem_clnt.c +@@ -2461,6 +2461,7 @@ + s->s3->tmp.ctype_len = 0; + OPENSSL_free(s->pha_context); + s->pha_context = NULL; ++ s->pha_context_len = 0; + + if (!PACKET_get_length_prefixed_1(pkt, &reqctx) || + !PACKET_memdup(&reqctx, &s->pha_context, &s->pha_context_len)) { +@@ -2770,16 +2771,17 @@ + } + s->ext.ocsp.resp = OPENSSL_malloc(resplen); + if (s->ext.ocsp.resp == NULL) { ++ s->ext.ocsp.resp_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_PROCESS_CERT_STATUS_BODY, + ERR_R_MALLOC_FAILURE); + return 0; + } ++ s->ext.ocsp.resp_len = resplen; + if (!PACKET_copy_bytes(pkt, s->ext.ocsp.resp, resplen)) { + SSLfatal(s, SSL_AD_DECODE_ERROR, SSL_F_TLS_PROCESS_CERT_STATUS_BODY, + SSL_R_LENGTH_MISMATCH); + return 0; + } +- s->ext.ocsp.resp_len = resplen; + + return 1; + } +@@ -3349,9 +3351,11 @@ + err: + OPENSSL_clear_free(s->s3->tmp.pms, s->s3->tmp.pmslen); + s->s3->tmp.pms = NULL; ++ s->s3->tmp.pmslen = 0; + #ifndef OPENSSL_NO_PSK + OPENSSL_clear_free(s->s3->tmp.psk, s->s3->tmp.psklen); + s->s3->tmp.psk = NULL; ++ s->s3->tmp.psklen = 0; + #endif + return 0; + } +@@ -3426,6 +3430,7 @@ + err: + OPENSSL_clear_free(pms, pmslen); + s->s3->tmp.pms = NULL; ++ s->s3->tmp.pmslen = 0; + return 0; + } + +--- crypto/openssl/ssl/statem/statem_srvr.c.orig ++++ crypto/openssl/ssl/statem/statem_srvr.c +@@ -2178,6 +2178,7 @@ + OPENSSL_free(s->s3->alpn_selected); + s->s3->alpn_selected = OPENSSL_memdup(selected, selected_len); + if (s->s3->alpn_selected == NULL) { ++ s->s3->alpn_selected_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, SSL_F_TLS_HANDLE_ALPN, + ERR_R_INTERNAL_ERROR); + return 0; +@@ -2853,9 +2854,16 @@ + if (s->post_handshake_auth == SSL_PHA_REQUEST_PENDING) { + OPENSSL_free(s->pha_context); + s->pha_context_len = 32; +- if ((s->pha_context = OPENSSL_malloc(s->pha_context_len)) == NULL +- || RAND_bytes(s->pha_context, s->pha_context_len) <= 0 +- || !WPACKET_sub_memcpy_u8(pkt, s->pha_context, s->pha_context_len)) { ++ if ((s->pha_context = OPENSSL_malloc(s->pha_context_len)) == NULL) { ++ s->pha_context_len = 0; ++ SSLfatal(s, SSL_AD_INTERNAL_ERROR, ++ SSL_F_TLS_CONSTRUCT_CERTIFICATE_REQUEST, ++ ERR_R_INTERNAL_ERROR); ++ return 0; ++ } ++ if (RAND_bytes(s->pha_context, s->pha_context_len) <= 0 ++ || !WPACKET_sub_memcpy_u8(pkt, s->pha_context, ++ s->pha_context_len)) { + SSLfatal(s, SSL_AD_INTERNAL_ERROR, + SSL_F_TLS_CONSTRUCT_CERTIFICATE_REQUEST, + ERR_R_INTERNAL_ERROR); +@@ -2969,6 +2977,7 @@ + OPENSSL_cleanse(psk, psklen); + + if (s->s3->tmp.psk == NULL) { ++ s->s3->tmp.psklen = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, + SSL_F_TLS_PROCESS_CKE_PSK_PREAMBLE, ERR_R_MALLOC_FAILURE); + return 0; +@@ -3508,6 +3517,7 @@ + #ifndef OPENSSL_NO_PSK + OPENSSL_clear_free(s->s3->tmp.psk, s->s3->tmp.psklen); + s->s3->tmp.psk = NULL; ++ s->s3->tmp.psklen = 0; + #endif + return MSG_PROCESS_ERROR; + } +@@ -4117,6 +4127,7 @@ + s->session->ext.alpn_selected = + OPENSSL_memdup(s->s3->alpn_selected, s->s3->alpn_selected_len); + if (s->session->ext.alpn_selected == NULL) { ++ s->session->ext.alpn_selected_len = 0; + SSLfatal(s, SSL_AD_INTERNAL_ERROR, + SSL_F_TLS_CONSTRUCT_NEW_SESSION_TICKET, + ERR_R_MALLOC_FAILURE); diff --git a/website/static/security/patches/SA-21:07/openssl-12.patch.asc b/website/static/security/patches/SA-21:07/openssl-12.patch.asc new file mode 100644 index 0000000000..a37ae98422 --- /dev/null +++ b/website/static/security/patches/SA-21:07/openssl-12.patch.asc @@ -0,0 +1,16 @@ +-----BEGIN PGP SIGNATURE----- + +iQIzBAABCgAdFiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAmBdIjQACgkQ05eS9J6n +5cL5OQ//dm5Ga7kMttdTzTkHdEYYi7GhRae/Jhaxc1/lYu1shQcOO4PrasasOOmD +lLsLOP/ZJ5mNFzFz8aiVS5cci995MYhmgCesOStJpwoFhTjGq2Oek+TUGCjJ6vSt +W6qivOsffvMxhnpONFo1qmtDPsEgu0/BtpKkE9j9KohkptrlUoMNvE0p6e0lu02k +wZGZlQDSrNnbyTtFBYPw0q0hYMqcKTTAb/h8TSJvAdwSM3eFr2bGqiKWRu4EagV2 +fMch81jYSZUjy7/vkfm77sIl5tRgIzi3V53AAB6llZukA8ClRk4VQFR4Lng5dF3b +zh4M5GQSEDn3kx5iEEn/GduTO/ECa6fGyQNmaofXs7ObzBT7195wvk2YheuoXZgz +UuQ99cQU6zTqomGg13sf7YOxzrJAnqRyn5mhiQRhPGHsHd5yeKBdxBMhQnY8o73k +kvyYhZyYExW4GYmazuiVxPj24aA1h40XCK4cRhFh4VBgpjpAIxPyBIFOicuguNZM +ESzpTmdLKBV04n+tm0JA729qyFHXlAub9+Tsvcx8hXxiC9QytbLKmXdpiq26l+d/ +7aIcoEkzBR2b4dewP7a8UpibXRKBX0r6oNRBSUgGjctgw822Yr4XHfUruJ5nIOFj +vyZcsM3ircMyGeJ7Dmz3ljWAQMyrQZbRfC/usFahHYSRf1k8PJ4= +=m/x3 +-----END PGP SIGNATURE----- diff --git a/website/static/security/patches/SA-21:07/openssl-13.patch b/website/static/security/patches/SA-21:07/openssl-13.patch new file mode 100644 index 0000000000..07fdf17450 --- /dev/null +++ b/website/static/security/patches/SA-21:07/openssl-13.patch @@ -0,0 +1,651 @@ +--- crypto/openssl/CHANGES.orig ++++ crypto/openssl/CHANGES +@@ -7,6 +7,50 @@ + https://github.com/openssl/openssl/commits/ and pick the appropriate + release branch. + ++ Changes between 1.1.1j and 1.1.1k [25 Mar 2021] ++ ++ *) Fixed a problem with verifying a certificate chain when using the ++ X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks ++ of the certificates present in a certificate chain. It is not set by ++ default. ++ ++ Starting from OpenSSL version 1.1.1h a check to disallow certificates in ++ the chain that have explicitly encoded elliptic curve parameters was added ++ as an additional strict check. ++ ++ An error in the implementation of this check meant that the result of a ++ previous check to confirm that certificates in the chain are valid CA ++ certificates was overwritten. This effectively bypasses the check ++ that non-CA certificates must not be able to issue other certificates. ++ ++ If a "purpose" has been configured then there is a subsequent opportunity ++ for checks that the certificate is a valid CA. All of the named "purpose" ++ values implemented in libcrypto perform this check. Therefore, where ++ a purpose is set the certificate chain will still be rejected even when the ++ strict flag has been used. A purpose is set by default in libssl client and ++ server certificate verification routines, but it can be overridden or ++ removed by an application. ++ ++ In order to be affected, an application must explicitly set the ++ X509_V_FLAG_X509_STRICT verification flag and either not set a purpose ++ for the certificate verification or, in the case of TLS client or server ++ applications, override the default purpose. ++ (CVE-2021-3450) ++ [Tomáš Mráz] ++ ++ *) Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously ++ crafted renegotiation ClientHello message from a client. If a TLSv1.2 ++ renegotiation ClientHello omits the signature_algorithms extension (where ++ it was present in the initial ClientHello), but includes a ++ signature_algorithms_cert extension then a NULL pointer dereference will ++ result, leading to a crash and a denial of service attack. ++ ++ A server is only vulnerable if it has TLSv1.2 and renegotiation enabled ++ (which is the default configuration). OpenSSL TLS clients are not impacted ++ by this issue. ++ (CVE-2021-3449) ++ [Peter Kästle and Samuel Sapalski] ++ + Changes between 1.1.1i and 1.1.1j [16 Feb 2021] + + *) Fixed the X509_issuer_and_serial_hash() function. It attempts to +--- crypto/openssl/NEWS.orig ++++ crypto/openssl/NEWS +@@ -5,6 +5,14 @@ + This file gives a brief overview of the major changes between each OpenSSL + release. For more details please read the CHANGES file. + ++ Major changes between OpenSSL 1.1.1j and OpenSSL 1.1.1k [25 Mar 2021] ++ ++ o Fixed a problem with verifying a certificate chain when using the ++ X509_V_FLAG_X509_STRICT flag (CVE-2021-3450) ++ o Fixed an issue where an OpenSSL TLS server may crash if sent a ++ maliciously crafted renegotiation ClientHello message from a client ++ (CVE-2021-3449) ++ + Major changes between OpenSSL 1.1.1i and OpenSSL 1.1.1j [16 Feb 2021] + + o Fixed a NULL pointer deref in the X509_issuer_and_serial_hash() +--- crypto/openssl/README.orig ++++ crypto/openssl/README +@@ -1,7 +1,7 @@ + +- OpenSSL 1.1.1j 16 Feb 2021 ++ OpenSSL 1.1.1k 25 Mar 2021 + +- Copyright (c) 1998-2020 The OpenSSL Project ++ Copyright (c) 1998-2021 The OpenSSL Project + Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson + All rights reserved. + +--- crypto/openssl/apps/s_cb.c.orig ++++ crypto/openssl/apps/s_cb.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -934,7 +934,8 @@ + if (!SSL_build_cert_chain(ssl, 0)) + return 0; + } else if (exc->chain != NULL) { +- SSL_set1_chain(ssl, exc->chain); ++ if (!SSL_set1_chain(ssl, exc->chain)) ++ return 0; + } + } + exc = exc->prev; +--- crypto/openssl/apps/s_time.c.orig ++++ crypto/openssl/apps/s_time.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -263,7 +263,8 @@ + nConn, totalTime, ((double)nConn / totalTime), bytes_read); + printf + ("%d connections in %ld real seconds, %ld bytes read per connection\n", +- nConn, (long)time(NULL) - finishtime + maxtime, bytes_read / nConn); ++ nConn, (long)time(NULL) - finishtime + maxtime, ++ nConn > 0 ? bytes_read / nConn : 0l); + + /* + * Now loop and time connections using the same session id over and over +--- crypto/openssl/crypto/asn1/asn1_par.c.orig ++++ crypto/openssl/crypto/asn1/asn1_par.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -325,6 +325,7 @@ + } + if (BIO_puts(bp, "]") <= 0) + goto end; ++ dump_cont = 0; + } + + if (!nl) { +--- crypto/openssl/crypto/asn1/bio_ndef.c.orig ++++ crypto/openssl/crypto/asn1/bio_ndef.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 2008-2018 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 2008-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -113,6 +113,8 @@ + ndef_aux = *(NDEF_SUPPORT **)parg; + + derlen = ASN1_item_ndef_i2d(ndef_aux->val, NULL, ndef_aux->it); ++ if (derlen < 0) ++ return 0; + if ((p = OPENSSL_malloc(derlen)) == NULL) { + ASN1err(ASN1_F_NDEF_PREFIX, ERR_R_MALLOC_FAILURE); + return 0; +--- crypto/openssl/crypto/engine/eng_devcrypto.c.orig ++++ crypto/openssl/crypto/engine/eng_devcrypto.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 2017-2019 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 2017-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -758,8 +758,9 @@ + void engine_load_devcrypto_int() + { + ENGINE *e = NULL; ++ int fd; + +- if ((cfd = open("/dev/crypto", O_RDWR, 0)) < 0) { ++ if ((fd = open("/dev/crypto", O_RDWR, 0)) < 0) { + #ifndef ENGINE_DEVCRYPTO_DEBUG + if (errno != ENOENT) + #endif +@@ -767,6 +768,18 @@ + return; + } + ++#ifdef CRIOGET ++ if (ioctl(fd, CRIOGET, &cfd) < 0) { ++ fprintf(stderr, "Could not create crypto fd: %s\n", strerror(errno)); ++ close(fd); ++ cfd = -1; ++ return; ++ } ++ close(fd); ++#else ++ cfd = fd; ++#endif ++ + if ((e = ENGINE_new()) == NULL + || !ENGINE_set_destroy_function(e, devcrypto_unload)) { + ENGINE_free(e); +--- crypto/openssl/crypto/evp/evp_enc.c.orig ++++ crypto/openssl/crypto/evp/evp_enc.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +--- crypto/openssl/crypto/modes/cbc128.c.orig ++++ crypto/openssl/crypto/modes/cbc128.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 2008-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 2008-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -69,7 +69,8 @@ + in += 16; + out += 16; + } +- memcpy(ivec, iv, 16); ++ if (ivec != iv) ++ memcpy(ivec, iv, 16); + } + + void CRYPTO_cbc128_decrypt(const unsigned char *in, unsigned char *out, +@@ -114,7 +115,8 @@ + out += 16; + } + } +- memcpy(ivec, iv, 16); ++ if (ivec != iv) ++ memcpy(ivec, iv, 16); + } else { + if (STRICT_ALIGNMENT && + ((size_t)in | (size_t)out | (size_t)ivec) % sizeof(size_t) != 0) { +--- crypto/openssl/crypto/modes/gcm128.c.orig ++++ crypto/openssl/crypto/modes/gcm128.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 2010-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 2010-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -1385,8 +1385,8 @@ + else + ctx->Yi.d[3] = ctr; + for (i = 0; i < 16 / sizeof(size_t); ++i) { +- size_t c = in[i]; +- out[i] = c ^ ctx->EKi.t[i]; ++ size_t c = in_t[i]; ++ out_t[i] = c ^ ctx->EKi.t[i]; + ctx->Xi.t[i] ^= c; + } + GCM_MUL(ctx); +--- crypto/openssl/crypto/o_time.c.orig ++++ crypto/openssl/crypto/o_time.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 2001-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -133,8 +133,8 @@ + static int julian_adj(const struct tm *tm, int off_day, long offset_sec, + long *pday, int *psec) + { +- int offset_hms, offset_day; +- long time_jd; ++ int offset_hms; ++ long offset_day, time_jd; + int time_year, time_month, time_day; + /* split offset into days and day seconds */ + offset_day = offset_sec / SECS_PER_DAY; +--- crypto/openssl/crypto/rand/rand_lib.c.orig ++++ crypto/openssl/crypto/rand/rand_lib.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -432,9 +432,13 @@ + RAND_POOL *rand_pool_new(int entropy_requested, int secure, + size_t min_len, size_t max_len) + { +- RAND_POOL *pool = OPENSSL_zalloc(sizeof(*pool)); ++ RAND_POOL *pool; + size_t min_alloc_size = RAND_POOL_MIN_ALLOCATION(secure); + ++ if (!RUN_ONCE(&rand_init, do_rand_init)) ++ return NULL; ++ ++ pool = OPENSSL_zalloc(sizeof(*pool)); + if (pool == NULL) { + RANDerr(RAND_F_RAND_POOL_NEW, ERR_R_MALLOC_FAILURE); + return NULL; +--- crypto/openssl/crypto/rsa/rsa_ssl.c.orig ++++ crypto/openssl/crypto/rsa/rsa_ssl.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +--- crypto/openssl/crypto/x509/x509_vfy.c.orig ++++ crypto/openssl/crypto/x509/x509_vfy.c +@@ -524,15 +524,19 @@ + ret = 1; + break; + } +- if ((ctx->param->flags & X509_V_FLAG_X509_STRICT) && num > 1) { ++ if (ret > 0 ++ && (ctx->param->flags & X509_V_FLAG_X509_STRICT) && num > 1) { + /* Check for presence of explicit elliptic curve parameters */ + ret = check_curve(x); +- if (ret < 0) ++ if (ret < 0) { + ctx->error = X509_V_ERR_UNSPECIFIED; +- else if (ret == 0) ++ ret = 0; ++ } else if (ret == 0) { + ctx->error = X509_V_ERR_EC_KEY_EXPLICIT_PARAMS; ++ } + } +- if ((x->ex_flags & EXFLAG_CA) == 0 ++ if (ret > 0 ++ && (x->ex_flags & EXFLAG_CA) == 0 + && x->ex_pathlen != -1 + && (ctx->param->flags & X509_V_FLAG_X509_STRICT)) { + ctx->error = X509_V_ERR_INVALID_EXTENSION; +--- crypto/openssl/include/openssl/opensslv.h.orig ++++ crypto/openssl/include/openssl/opensslv.h +@@ -1,5 +1,5 @@ + /* +- * Copyright 1999-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1999-2021 The OpenSSL Project Authors. All Rights Reserved. + * + * Licensed under the OpenSSL license (the "License"). You may not use + * this file except in compliance with the License. You can obtain a copy +@@ -39,8 +39,8 @@ + * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for + * major minor fix final patch/beta) + */ +-# define OPENSSL_VERSION_NUMBER 0x101010afL +-# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.1j-freebsd 16 Feb 2021" ++# define OPENSSL_VERSION_NUMBER 0x101010bfL ++# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.1k-freebsd 25 Mar 2021" + + /*- + * The macros below are to be used for shared library (.so, .dll, ...) +--- crypto/openssl/ssl/s3_lib.c.orig ++++ crypto/openssl/ssl/s3_lib.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved + * Copyright 2005 Nokia. All rights reserved. + * +@@ -4629,6 +4629,7 @@ + + OPENSSL_clear_free(s->s3->tmp.psk, psklen); + s->s3->tmp.psk = NULL; ++ s->s3->tmp.psklen = 0; + if (!s->method->ssl3_enc->generate_master_secret(s, + s->session->master_key, pskpms, pskpmslen, + &s->session->master_key_length)) { +@@ -4658,8 +4659,10 @@ + else + OPENSSL_cleanse(pms, pmslen); + } +- if (s->server == 0) ++ if (s->server == 0) { + s->s3->tmp.pms = NULL; ++ s->s3->tmp.pmslen = 0; ++ } + return ret; + } + +--- crypto/openssl/ssl/ssl_lib.c.orig ++++ crypto/openssl/ssl/ssl_lib.c +@@ -1,5 +1,5 @@ + /* +- * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. ++ * Copyright 1995-2021 The OpenSSL Project Authors. All Rights Reserved. + * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved + * Copyright 2005 Nokia. All rights reserved. + * +@@ -781,8 +781,10 @@ + s->ext.ecpointformats = + OPENSSL_memdup(ctx->ext.ecpointformats, + ctx->ext.ecpointformats_len); +- if (!s->ext.ecpointformats) ++ if (!s->ext.ecpointformats) { ++ s->ext.ecpointformats_len = 0; + goto err; ++ } + s->ext.ecpointformats_len = + ctx->ext.ecpointformats_len; + } +@@ -791,8 +793,10 @@ + OPENSSL_memdup(ctx->ext.supportedgroups, + ctx->ext.supportedgroups_len + * sizeof(*ctx->ext.supportedgroups)); +- if (!s->ext.supportedgroups) ++ if (!s->ext.supportedgroups) { ++ s->ext.supportedgroups_len = 0; + goto err; ++ } + s->ext.supportedgroups_len = ctx->ext.supportedgroups_len; + } + #endif +@@ -802,8 +806,10 @@ + + if (s->ctx->ext.alpn) { + s->ext.alpn = OPENSSL_malloc(s->ctx->ext.alpn_len); +- if (s->ext.alpn == NULL) ++ if (s->ext.alpn == NULL) { ++ s->ext.alpn_len = 0; + goto err; ++ } + memcpy(s->ext.alpn, s->ctx->ext.alpn, s->ctx->ext.alpn_len); + s->ext.alpn_len = s->ctx->ext.alpn_len; + } +@@ -2923,6 +2929,7 @@ + OPENSSL_free(ctx->ext.alpn); + ctx->ext.alpn = OPENSSL_memdup(protos, protos_len); + if (ctx->ext.alpn == NULL) { ++ ctx->ext.alpn_len = 0; + SSLerr(SSL_F_SSL_CTX_SET_ALPN_PROTOS, ERR_R_MALLOC_FAILURE); + return 1; + } +@@ -2942,6 +2949,7 @@ + OPENSSL_free(ssl->ext.alpn); + ssl->ext.alpn = OPENSSL_memdup(protos, protos_len); + if (ssl->ext.alpn == NULL) { ++ ssl->ext.alpn_len = 0; + SSLerr(SSL_F_SSL_SET_ALPN_PROTOS, ERR_R_MALLOC_FAILURE); + return 1; + } +--- crypto/openssl/ssl/statem/extensions.c.orig ++++ crypto/openssl/ssl/statem/extensions.c +@@ -336,6 +336,8 @@ + tls_construct_stoc_key_share, tls_construct_ctos_key_share, + final_key_share + }, ++#else ++ INVALID_EXTENSION, + #endif + { + /* Must be after key_share */ +@@ -1137,6 +1139,7 @@ + /* Clear any signature algorithms extension received */ + OPENSSL_free(s->s3->tmp.peer_sigalgs); + s->s3->tmp.peer_sigalgs = NULL; ++ s->s3->tmp.peer_sigalgslen = 0; + + return 1; *** 214 LINES SKIPPED *** From owner-dev-commits-doc-all@freebsd.org Fri Mar 26 11:29:52 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id CE5A15BB49C for ; Fri, 26 Mar 2021 11:29:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F6KWh5VS0z4Xv0; Fri, 26 Mar 2021 11:29:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AB2D1195A9; Fri, 26 Mar 2021 11:29:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12QBTqP0085838; Fri, 26 Mar 2021 11:29:52 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12QBTqPX085837; Fri, 26 Mar 2021 11:29:52 GMT (envelope-from git) Date: Fri, 26 Mar 2021 11:29:52 GMT Message-Id: <202103261129.12QBTqPX085837@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Ryusuke SUZUKI Subject: git: 4d67595062 - main - Add 13.0-RC3 announcement MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: ryusuke X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 4d6759506263c765867a40893a48c1d8c3857dea Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Mar 2021 11:29:52 -0000 The branch main has been updated by ryusuke: URL: https://cgit.FreeBSD.org/doc/commit/?id=4d6759506263c765867a40893a48c1d8c3857dea commit 4d6759506263c765867a40893a48c1d8c3857dea Author: Ryusuke SUZUKI AuthorDate: 2021-03-26 11:29:30 +0000 Commit: Ryusuke SUZUKI CommitDate: 2021-03-26 11:29:30 +0000 Add 13.0-RC3 announcement --- website/data/ja/news/news.toml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/website/data/ja/news/news.toml b/website/data/ja/news/news.toml index 80e27d8e1d..9b3efa8198 100644 --- a/website/data/ja/news/news.toml +++ b/website/data/ja/news/news.toml @@ -1,6 +1,11 @@ # Sort news by year, month and day # $FreeBSD$ +[[news]] +date = "2021-03-20" +title = "FreeBSD 13.0-RC3 公開" +description = "

FreeBSD 13.0 リリースサイクルから 3 回目のリリース候補版が公開されました (アナウンス)。 FreeBSD ミラーサイト から amd64, arm64, armv6, armv7, i386, powerpc, powerpc64, powerpcspe, powerpc64le および riscv64 アーキテクチャの ISO イメージを入手できます。

" + [[news]] date = "2021-03-15" description = "新コミッタ就任: Ka Ho Ng (src)" From owner-dev-commits-doc-all@freebsd.org Fri Mar 26 22:00:23 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 697F05AEB03 for ; Fri, 26 Mar 2021 22:00:23 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F6bWC2cH0z3p1D; Fri, 26 Mar 2021 22:00:23 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4C93521667; Fri, 26 Mar 2021 22:00:23 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12QM0Nru076109; Fri, 26 Mar 2021 22:00:23 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12QM0NUW076108; Fri, 26 Mar 2021 22:00:23 GMT (envelope-from git) Date: Fri, 26 Mar 2021 22:00:23 GMT Message-Id: <202103262200.12QM0NUW076108@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Daniel Ebdrup Jensen Subject: git: 7859bada69 - main - handbook/cutting-edge: Recommend etcupdate(8) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: debdrup X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 7859bada6955d3b5858ae6f43a5c23d3dc0bead6 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Mar 2021 22:00:23 -0000 The branch main has been updated by debdrup: URL: https://cgit.FreeBSD.org/doc/commit/?id=7859bada6955d3b5858ae6f43a5c23d3dc0bead6 commit 7859bada6955d3b5858ae6f43a5c23d3dc0bead6 Author: Dries Michiels AuthorDate: 2021-03-26 21:47:10 +0000 Commit: Daniel Ebdrup Jensen CommitDate: 2021-03-26 21:47:10 +0000 handbook/cutting-edge: Recommend etcupdate(8) Since etcupdate(8) has lived in base since 10.0 and seen plenty of use by both committers and contributors, it's time to recommend using it. Reviewed by: jhb (prior version) Differential Revision: https://reviews.freebsd.org/D27848 --- .../en/books/handbook/cutting-edge/_index.adoc | 52 ++++++++++++++++++++-- 1 file changed, 49 insertions(+), 3 deletions(-) diff --git a/documentation/content/en/books/handbook/cutting-edge/_index.adoc b/documentation/content/en/books/handbook/cutting-edge/_index.adoc index a9512d215e..ee11b2951b 100644 --- a/documentation/content/en/books/handbook/cutting-edge/_index.adoc +++ b/documentation/content/en/books/handbook/cutting-edge/_index.adoc @@ -617,9 +617,10 @@ check /usr/src/UPDATING <.> # make -j4 buildworld <.> # make -j4 kernel <.> # shutdown -r now <.> +# etcupdate -p <.> # cd /usr/src <.> # make installworld <.> -# mergemaster -Ui <.> +# etcupdate -B <.> # shutdown -r now <.> .... @@ -635,6 +636,8 @@ check /usr/src/UPDATING <.> <.> Reboot the system to the new kernel. +<.> Update and merge configuraton files in [.filename]#/etc/# required before installworld. + <.> Go to the source directory. <.> Install the world. @@ -863,11 +866,54 @@ If a custom kernel was built, `KERNCONF` must also be set to use the new custom A few final tasks complete the update. Any modified configuration files are merged with the new versions, outdated libraries are located and removed, then the system is restarted. +[[updating-src-completing-merge-etcupdate]] +==== Merging Configuration Files with man:etcupdate[8] + +man:etcupdate[8] is a tool for managing updates to files that are not updated as part of an installworld such as files located in [.filename]#/etc/#. +It manages updates by doing a three-way merge of changes made to these files against the local versions. +It is also designed to minimize the amount of user intervention, in contrast to man:mergemaster[8]'s interactive prompts. + +[NOTE] +==== +In general, man:etcupdate[8] does not need any specific arguments for its job. +There is however a handy in between command for sanity checking what will be done the first time man:etcupdate[8] is used: + +[source,shell] +.... +# etcupdate diff +.... + +This command allows the user to audit configuration changes. +==== + +If man:etcupdate[8] is not able to merge a file automatically, the merge conflicts can be resolved with manual interaction by issuing: + +[source,shell] +.... +# etcupdate resolve +.... + +[WARNING] +==== +When switching from man:mergemaster[8] to man:etcupdate[8], the first run might merge changes incorrectly generating spurious conflicts. +To prevent this, perform the following steps *before* updating sources and building the new world: + +[source,shell] +.... +# etcupdate bootstrap <.> +# etcupdate diff <.> +.... + +<.> Bootstrap the database of stock [.filename]#/etc# files, for more information see man:etcupdate[8]. + +<.> Check the diff after bootstrapping. Trim any local changes that are no longer needed to reduce the chance of conflicts in future updates. +==== + [[updating-src-completing-merge-mergemaster]] ==== Merging Configuration Files with man:mergemaster[8] -man:mergemaster[8] provides an easy way to merge changes that have been made to system configuration files with new versions of those files. - +man:mergemaster[8] provides a way to merge changes that have been made to system configuration files with new versions of those files. +man:mergemaster[8] is an alternative to the preferred man:etcupdate[8] With `-Ui`, man:mergemaster[8] automatically updates files that have not been user-modified and installs new files that are not already present: [source,shell] From owner-dev-commits-doc-all@freebsd.org Sat Mar 27 21:27:22 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 47AB05A8A70 for ; Sat, 27 Mar 2021 21:27:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7Bkf1cqKz4k9J; Sat, 27 Mar 2021 21:27:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2A77F1425C; Sat, 27 Mar 2021 21:27:22 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12RLRM1Y042541; Sat, 27 Mar 2021 21:27:22 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12RLRMga042540; Sat, 27 Mar 2021 21:27:22 GMT (envelope-from git) Date: Sat, 27 Mar 2021 21:27:22 GMT Message-Id: <202103272127.12RLRMga042540@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Raphael Kubo da Costa Subject: git: c21ecd7c5d - main - Update my PGP key. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: rakuco X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: c21ecd7c5d3ce5e26c880904227c5f56a5cc5f20 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 27 Mar 2021 21:27:22 -0000 The branch main has been updated by rakuco (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=c21ecd7c5d3ce5e26c880904227c5f56a5cc5f20 commit c21ecd7c5d3ce5e26c880904227c5f56a5cc5f20 Author: Raphael Kubo da Costa AuthorDate: 2021-03-27 21:23:20 +0000 Commit: Raphael Kubo da Costa CommitDate: 2021-03-27 21:23:20 +0000 Update my PGP key. --- documentation/static/pgpkeys/rakuco.key | 56 +++++++++++++++------------------ 1 file changed, 26 insertions(+), 30 deletions(-) diff --git a/documentation/static/pgpkeys/rakuco.key b/documentation/static/pgpkeys/rakuco.key index cb57678000..cb009d53ab 100644 --- a/documentation/static/pgpkeys/rakuco.key +++ b/documentation/static/pgpkeys/rakuco.key @@ -1,11 +1,8 @@ -// $FreeBSD: head/share/pgpkeys/rakuco.key 53866 2020-02-05 12:24:40Z rakuco $ -// // sh addkey.sh rakuco 8DD07D2118DCEED6 ; - [.literal-block-margin] .... -pub rsa4096/8DD07D2118DCEED6 2011-10-03 [SCEA] [expires: 2021-03-31] +pub rsa4096/8DD07D2118DCEED6 2011-10-03 [SCEA] [expires: 2022-03-27] Key fingerprint = 6911 54FE BA6E 6106 5789 7099 8DD0 7D21 18DC EED6 uid Raphael Kubo da Costa (Personal key) uid Raphael Kubo da Costa (Personal Gmail account.) @@ -64,18 +61,18 @@ n7xvPyzQ9RPAH4mFl8QefMRkUq0qkWlxlkvj1rGbVhWTD0d92MqoVhzOQJ87QEfI /eSG06U8sEt9UK3w4wcLs0rQqV5HPwY6kGmzahh2+wV+KY17y4ch9DebYMujDcET kvvM/gD1Ham23nnAnvrAd2ycFv1aaZeWGgRB/1wBUrwEvomViQJYBBMBCgBCAhsv BgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAIZARYhBGkRVP66bmEGV4lwmY3QfSEY -3O7WBQJeOrITBQkR21RrAAoJEI3QfSEY3O7W3tQQAK2lO/9zBbMzsZ5+YwmbIEsi -mIvP2JD4IXIX6j853OKjq29Sx0zyum0aJRLCZf2Sq/QrlWl5PRrqW3rWLurIU0HS -vorBi1jlSTfzmXGKodPRD9UE8A8uxkWcJSC1S+jA5JK1Nxd0wpQDHHVhbeS2os1h -mHk+aT7CK2HhdiqSGUY+JUdbYuJ+M+qvm3asM5m4yGd2NJrXwrfx5tU00CQg9lf9 -OWTtucqQZDPDKwsTe1uo+b9a+4tzmHKNYeOTJHrCKzpy9hSMTSXDU3cdDUU47MDW -QISTf/dBwiYxekKPRWKbN8u0G3vMDjzL+GRBdKKHdwVuWRHtZGtzFLqUHnQzWrjn -050s/rMkptuB9PGt0cWHVt91bbnrnQX5XGcajBwKyiQ/QPW0lXGuSNeXNW9PI+P0 -Q+b93nCjV7qbQD2O99VKLdXZKghjMF67em35CnGR8Z7hOBAKYU5BIVSP+7Kemy5n -aoRtk75J0lZSgQK3DR6IqjvLJk8CB8wyt+1OMwdrhoofpw/jQgum0JGAAkqMZZ3G -kLDYqxMvRh8AqbtCmE4WtQBaTb7DU6PuTq1WIDE34Tv2aTvjD0rCGaUkOBM1MRR5 -cakY+qmREzR0MFMKacqCt7bYBLoP5j2OMABLrT4xac/Qh0QFI+AacFplJxOpTEDt -o9hqMPfr5aJyBY9d3VBviQI7BBMBAgAlAhsvBgsJCAcDAgYVCAIJCgsEFgIDAQIe +3O7WBQJgX5ydBQkTt7x1AAoJEI3QfSEY3O7WOqwQAINPmzi+nJ2JC3ETbUaCd32n +TjajvjgR4hb/mJFnIm979IUaX4iInwTBB1t6RCaXgSf7WP56iusMglfkoHblIpxq +7fhY9jf8Ma7I3iFhjqkxMmD7Uhv8Gg//dxjrk9BJ/pBd/adc951zGv+LpUiJsjwV +sCPDAdqlpMG+6dQqsNZom1HS6FQpLNyxG3UVgcx8GayEqyeOUUhJcV4K8LSHVNKI +wKdImsJ+Auv7MjLkMJszjEH/5hAvPdV4i3aZdsTrZUfyL31kM6vNGj525TANtipM +ujku+dXdRXzt209FKFLXf+ygQdEosXbRrDeRxTYSLHW0Tx3mDWBefDVS+Fx3aeQS +maBq8ZKRi2Pppnjl9sqjTEh3HGw6/Eg4lcFxtfxi8KAZDKjBatjDgXxo6qhJgxRP +oi47EJAXbHz7fsEcj2emxxwTblDvvmca60WPh8Ef1M1B/+wzWNSEacj/QeRRLmT3 +/RxKrikgNM286udlTho8ILuZa+Yt0ahMP3kCW7agvywJ3WMnCbEtjyex/6mLfWzn +NRFjZh3QZlYoYc16826ys14m7f9RGmFkSq5UtlvyPHDjWEO+Z2yuQmLPRcfno+vo +azD7vli5GIzuRLzPjaZEfWUHV/pSxd5ph7uTKGiAdDs8iGNGywZ8nej2dPuxiyDY ++Z+m87GEoYG7SzaYOqA+iQI7BBMBAgAlAhsvBgsJCAcDAgYVCAIJCgsEFgIDAQIe AQIXgAUCUD9bEwIZAQAKCRCN0H0hGNzu1jgPD/9IuHFS7GFJ9Q3jG15K05+FyLYK YUyX5OJIv3k/S2EEpQQVfNwa/2L+NvlaJ2gfKmxLQ1wD3SkBfowah+W70+ri9EiO iOM2Xub2P/ogOLNibjzZ6JUMUBSgZ1Hl1OX59bmgXiFIRVRVOlOLa7hKulqU1O97 @@ -127,18 +124,18 @@ E8pcLBb1hax0GoMxltgbNdJtdler5Yab8Mde+fnO9U6pH60Xi8sJ1wRg3MQ6noB7 LQ+5DOD50mIEDmCmkcDm0pG61zVcIoK0QlJhcGhhZWwgS3VibyBkYSBDb3N0YSAo UGVyc29uYWwgR21haWwgYWNjb3VudC4pIDxrdWJpdG9AZ21haWwuY29tPokCVQQT AQoAPwIbLwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AWIQRpEVT+um5hBleJcJmN -0H0hGNzu1gUCXjqyGQUJEdtUawAKCRCN0H0hGNzu1hFAD/4nbWREM4nVAoqBQooU -zwx3d8Ne8E6CF6aKfDCxjVhUhHOs+ozGtl7gYyt1BKPvb/ufFurGHOK7QCfmdO98 -XVKxNKJKXobUg1mgTmqX4rwvG6UxIQnCJGLdSo2u5WjYPSdk+5gl98KZoJWtGWYL -fZRI+tXmiF7nOzBz0PLtLxRYMfOliMgJm1EDVufImuipPybSnsuD44g2YTo0hQfw -WUsn+5CyvsUBdPuUMKgQ/d3u201yZsvds2pj1ZgE/7ijJxvkHJUvczblBT4X2bh2 -obxLHI8qhm3Q7jP2nD84D77alwxySJgLLba8OO5JvyXbKDJOJYPd1D2JL27qPodB -D8VgI4pkCJcAnUYbFwCnzjI0zowER9WVs/PqBzZjmGIP6nt4DBSUDYV4NN9w7PUa -6zQHo13mgK9jD9JyfcxdE1SdKRuUaquZeapMVzBTa54QGYka9+sg9lCILVsPFiRC -6bKnR8kDZQVIBExWULtLIZ6aenDeRH27rZv8kKEZzNKczC8Y0Z5IXUlKgnpLCW3k -zAVgMb9O2fN+hG7g86c/owo3LHJ3743mTipugLsHfy7qq5O+0wAzz7TGJyb8L8jg -vC3nDRVeAyVIT2PkN5Oa5FfwCx5nB1hsXJOuV7XbJVMEwnSr+KSQebChKwX4zgqh -ECwX7oEB3QIHW3AqcbBBYcfZIYkCOAQTAQIAIgUCUD9atQIbLwYLCQgHAwIGFQgC +0H0hGNzu1gUCYF+cogUJE7e8dQAKCRCN0H0hGNzu1qI8D/9VenuFUsy+iWN3T7Lg +avCUW8rgAK/svPVxmLNzXlpOoiyfmUtSzDsWNkdVFXz60FDPpIqcGOj99OanBDxQ ++TpCdcgKdz3oJGGYseM8lSNO/AQaMcR8DPD1UM6HU3b4vTUs8M0gasbsIqk94RuD +ILJaf0EVgPU84AlTW1st3QR672aRTtsoGbHU2pxcQJR7jQcjNy0NDXnoTFiYbHcz +LuRhe3tTnNrhrixzwZltIfo3ZtVyOJsjJzL09LbUnQ0FKiu09SiZd4NchkFAaVbh +6Pk5ly06XW0WcQHEm4oxEA+omDdE8WUHviiz1aJdNhp2K6Ay+ZnoZWMG8q+P/gk0 +faJy60fRAopHRDG83PnVFJraRf30OWjDzmQoiArC6E9v4bEZqyJZrlseNvqfmESC +4B121dYf/HL4ob4EjZK8S9+JEEtFCqeAFi76HSzLBKDYXaaui+M2KKALAov4zMnM +9jocmwT07QlrySlzIkVYFLUcfsh/HsKmpIkX+MFgEHH1xmHYQWea0Wn2/knup39f +W89mrKSPDI+PygmPap9xh1BtQclN+iW2MzjP7ONzP7d7h5McaPCY3ijcosFvlDR1 +yGKIpBxuziIuISF5XykbvUdokTATevzsvYZ71BOesVNH5lCxVzljUn29+nOF9Kcs +R9J86e5K04DsyHqbe0mpzNnhUYkCOAQTAQIAIgUCUD9atQIbLwYLCQgHAwIGFQgC CQoLBBYCAwECHgECF4AACgkQjdB9IRjc7tZAVw//c5aUfVZRhq6hULgVSTL4uLO8 RJ5nt8l/k68Jjd/KeMWaP4KZFRNPrHUATasZgOXKRX8aXtxNOxnunft/7uvvIZBc dOa+YgGm2hJMUkSCem3uT/HnF8jqWLUGBts2b3gA74NhVLsM3lPaCu+g4T4qjTwR @@ -188,7 +185,6 @@ r38h+KNx+vAnu9w8RcRwQylqbpi0YvZHRs162BwcbEKKC876r8MHq0zH5y4AUovR JygqE6L8kkb6ZKPapXHmTnUP5WKdjj8V2SV+4iQhWH1FTlBF1OIp7eQ6/P6zz94c lstfIkMxYOQ/kyXsSPldz/y6VU9o2wWZHFRtvTluwmF9hnHnk58n/1sxuB2YqT8s Z+R9Jdio+3bVDxOYVJ0= -=ZVdy +=8KAP -----END PGP PUBLIC KEY BLOCK----- .... - From owner-dev-commits-doc-all@freebsd.org Sun Mar 28 13:38:05 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 29B6D579D14 for ; Sun, 28 Mar 2021 13:38:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7cGj0kz2z4d78; Sun, 28 Mar 2021 13:38:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0C1C42110E; Sun, 28 Mar 2021 13:38:05 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12SDc47q098939; Sun, 28 Mar 2021 13:38:04 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12SDc47u098938; Sun, 28 Mar 2021 13:38:04 GMT (envelope-from git) Date: Sun, 28 Mar 2021 13:38:04 GMT Message-Id: <202103281338.12SDc47u098938@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Piotr Kubaj Subject: git: 32eb71f1f3 - main - relnotes/13.0: add POWER-related changes MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: pkubaj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 32eb71f1f383e145f3f37da78a626586675ce28c Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Mar 2021 13:38:05 -0000 The branch main has been updated by pkubaj (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=32eb71f1f383e145f3f37da78a626586675ce28c commit 32eb71f1f383e145f3f37da78a626586675ce28c Author: Piotr Kubaj AuthorDate: 2021-03-28 13:37:37 +0000 Commit: Piotr Kubaj CommitDate: 2021-03-28 13:37:37 +0000 relnotes/13.0: add POWER-related changes Approved by: gjb --- website/content/en/releases/13.0R/relnotes.adoc | 28 +++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index d7d7b46152..3f81f1ad13 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -487,6 +487,34 @@ if_dwc now supports flow control. gitref:2b4a66ed171[repository=src] if_dwc now supports checksum offloading. gitref:98ea5a7b9a1[repository=src] +=== POWER + +All powerpc architectures switched to LLVM and are currently mostly similar to amd64 toolchain-wise. gitref:678da4[repository=src] + +Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d[repository=src] + +powerpc (32-bit) switched to Secure-PLT. gitref:e861da[repository=src] + +powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abe[repository=src] + +ixl(4) was ported to powerpc64. gitref:c5568b[repository=src] + +mrsas(4) was ported to powerpc64. gitref:e34a05[repository=src] + +aacraid(4) was ported to powerpc64. gitref:d8c51c[repository=src] + +Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:65bbba[repository=src] + +Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c4[repository=src] + +virtio fixes. gitref:f272c8[repository=src] + +drm-kmod support (not base related, but involved fixing linuxkpi). gitref:937a05[repository=src] + +Plenty of stability fixes, which fix many kernel panics. + +Plenty of performance improvements - performance during bulk -a package building is at least 60% higher. + === Sparc Removed support for the `sparc64` architecture (SPARC 9). From owner-dev-commits-doc-all@freebsd.org Sun Mar 28 13:51:40 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0AB1D57A159 for ; Sun, 28 Mar 2021 13:51:40 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7cZM6lgwz4fKQ; Sun, 28 Mar 2021 13:51:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id D068C212B7; Sun, 28 Mar 2021 13:51:39 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12SDpdwb022545; Sun, 28 Mar 2021 13:51:39 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12SDpdgL022544; Sun, 28 Mar 2021 13:51:39 GMT (envelope-from git) Date: Sun, 28 Mar 2021 13:51:39 GMT Message-Id: <202103281351.12SDpdgL022544@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Piotr Kubaj Subject: git: d6c8f237ee - main - relnotes/13.0: move driver changes to Device Drivers block, correct commit hashes MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: pkubaj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: d6c8f237ee31bccddea643435dce22c4f930b09b Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Mar 2021 13:51:40 -0000 The branch main has been updated by pkubaj (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=d6c8f237ee31bccddea643435dce22c4f930b09b commit d6c8f237ee31bccddea643435dce22c4f930b09b Author: Piotr Kubaj AuthorDate: 2021-03-28 13:50:58 +0000 Commit: Piotr Kubaj CommitDate: 2021-03-28 13:50:58 +0000 relnotes/13.0: move driver changes to Device Drivers block, correct commit hashes --- website/content/en/releases/13.0R/relnotes.adoc | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index 3f81f1ad13..f70fbc2c83 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -318,6 +318,12 @@ The man:armv8crypto[4] driver now supports AES-GCM which is used by IPsec and kernel TLS. gitref:f76393a6305b6[repository=src] {{< sponsored "Ampere Computing" >}} +man:ixl[4] was ported to powerpc64. gitref:c5568b[repository=src] + +man:mrsas[4] was ported to powerpc64. gitref:e34a05[repository=src] + +man:aacraid[4] was ported to powerpc64. gitref:d8c51c[repository=src] + [[storage]] == Storage @@ -491,19 +497,13 @@ if_dwc now supports checksum offloading. gitref:98ea5a7b9a1[repository=src] All powerpc architectures switched to LLVM and are currently mostly similar to amd64 toolchain-wise. gitref:678da4[repository=src] -Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d[repository=src] - -powerpc (32-bit) switched to Secure-PLT. gitref:e861da[repository=src] - -powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abe[repository=src] - -ixl(4) was ported to powerpc64. gitref:c5568b[repository=src] +Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d1[repository=src] -mrsas(4) was ported to powerpc64. gitref:e34a05[repository=src] +powerpc (32-bit) switched to Secure-PLT. gitref:e861dab[repository=src] -aacraid(4) was ported to powerpc64. gitref:d8c51c[repository=src] +powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abea[repository=src] -Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:65bbba[repository=src] +Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:65bbba2[repository=src] Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c4[repository=src] From owner-dev-commits-doc-all@freebsd.org Sun Mar 28 14:05:33 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 64B3657AB0E for ; Sun, 28 Mar 2021 14:05:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7ctP2TMTz4g6C; Sun, 28 Mar 2021 14:05:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 43A49216F1; Sun, 28 Mar 2021 14:05:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12SE5XcT041658; Sun, 28 Mar 2021 14:05:33 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12SE5Xxd041657; Sun, 28 Mar 2021 14:05:33 GMT (envelope-from git) Date: Sun, 28 Mar 2021 14:05:33 GMT Message-Id: <202103281405.12SE5Xxd041657@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Piotr Kubaj Subject: git: 0b86c6e1d7 - main - relnotes/13.0: move virtio also to drivers section MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: pkubaj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 0b86c6e1d7a30a0103a1df83ae378796121bc1a6 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Mar 2021 14:05:33 -0000 The branch main has been updated by pkubaj (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=0b86c6e1d7a30a0103a1df83ae378796121bc1a6 commit 0b86c6e1d7a30a0103a1df83ae378796121bc1a6 Author: Piotr Kubaj AuthorDate: 2021-03-28 14:05:05 +0000 Commit: Piotr Kubaj CommitDate: 2021-03-28 14:05:05 +0000 relnotes/13.0: move virtio also to drivers section --- website/content/en/releases/13.0R/relnotes.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index f70fbc2c83..cca8496a46 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -324,6 +324,8 @@ man:mrsas[4] was ported to powerpc64. gitref:e34a05[repository=src] man:aacraid[4] was ported to powerpc64. gitref:d8c51c[repository=src] +man:virtio[4] was ported to powerpc64. gitref:f272c8[repository=src] + [[storage]] == Storage @@ -507,8 +509,6 @@ Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by defau Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c4[repository=src] -virtio fixes. gitref:f272c8[repository=src] - drm-kmod support (not base related, but involved fixing linuxkpi). gitref:937a05[repository=src] Plenty of stability fixes, which fix many kernel panics. From owner-dev-commits-doc-all@freebsd.org Sun Mar 28 16:03:19 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 34EA557E028 for ; Sun, 28 Mar 2021 16:03:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7gVH10Rvz4nDQ; Sun, 28 Mar 2021 16:03:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 1526E22D56; Sun, 28 Mar 2021 16:03:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12SG3J9x009022; Sun, 28 Mar 2021 16:03:19 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12SG3Jqo009021; Sun, 28 Mar 2021 16:03:19 GMT (envelope-from git) Date: Sun, 28 Mar 2021 16:03:19 GMT Message-Id: <202103281603.12SG3Jqo009021@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Piotr Kubaj Subject: git: 55f6dc4ba6 - main - relnotes/13.0: extend commit hashes to 12 characters MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: pkubaj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 55f6dc4ba6af1bed8c72b71f3d3812a8ca6c43a4 Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Mar 2021 16:03:19 -0000 The branch main has been updated by pkubaj (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=55f6dc4ba6af1bed8c72b71f3d3812a8ca6c43a4 commit 55f6dc4ba6af1bed8c72b71f3d3812a8ca6c43a4 Author: Piotr Kubaj AuthorDate: 2021-03-28 16:02:51 +0000 Commit: Piotr Kubaj CommitDate: 2021-03-28 16:02:51 +0000 relnotes/13.0: extend commit hashes to 12 characters Reported by: mhorne --- website/content/en/releases/13.0R/relnotes.adoc | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index cca8496a46..e34f74484e 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -318,13 +318,13 @@ The man:armv8crypto[4] driver now supports AES-GCM which is used by IPsec and kernel TLS. gitref:f76393a6305b6[repository=src] {{< sponsored "Ampere Computing" >}} -man:ixl[4] was ported to powerpc64. gitref:c5568b[repository=src] +man:ixl[4] was ported to powerpc64. gitref:c5568ba08741[repository=src] -man:mrsas[4] was ported to powerpc64. gitref:e34a05[repository=src] +man:mrsas[4] was ported to powerpc64. gitref:e34a057ca6eb[repository=src] -man:aacraid[4] was ported to powerpc64. gitref:d8c51c[repository=src] +man:aacraid[4] was ported to powerpc64. gitref:d8c51c6f74b6[repository=src] -man:virtio[4] was ported to powerpc64. gitref:f272c8[repository=src] +man:virtio[4] was ported to powerpc64. gitref:f272c8de6e47[repository=src] [[storage]] == Storage @@ -497,17 +497,17 @@ if_dwc now supports checksum offloading. gitref:98ea5a7b9a1[repository=src] === POWER -All powerpc architectures switched to LLVM and are currently mostly similar to amd64 toolchain-wise. gitref:678da4[repository=src] +All powerpc architectures switched to LLVM and are currently mostly similar to amd64 toolchain-wise. gitref:678da4a27447[repository=src] -Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d1[repository=src] +Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d169acc[repository=src] -powerpc (32-bit) switched to Secure-PLT. gitref:e861dab[repository=src] +powerpc (32-bit) switched to Secure-PLT. gitref:e861dab45186[repository=src] -powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abea[repository=src] +powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abea4d087[repository=src] -Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:65bbba2[repository=src] +Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:65bbba25d214[repository=src] -Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c4[repository=src] +Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c417e303[repository=src] drm-kmod support (not base related, but involved fixing linuxkpi). gitref:937a05[repository=src] From owner-dev-commits-doc-all@freebsd.org Sun Mar 28 23:13:03 2021 Return-Path: Delivered-To: dev-commits-doc-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4F8965B30B1 for ; Sun, 28 Mar 2021 23:13:03 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4F7s271rdWz3mm8; Sun, 28 Mar 2021 23:13:03 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3210EB27; Sun, 28 Mar 2021 23:13:03 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 12SND3oP012822; Sun, 28 Mar 2021 23:13:03 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 12SND3Qn012821; Sun, 28 Mar 2021 23:13:03 GMT (envelope-from git) Date: Sun, 28 Mar 2021 23:13:03 GMT Message-Id: <202103282313.12SND3Qn012821@gitrepo.freebsd.org> To: doc-committers@FreeBSD.org, dev-commits-doc-all@FreeBSD.org From: Piotr Kubaj Subject: git: c5a8a124c3 - main - relnotes/13.0: further powerpc* changes MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: pkubaj X-Git-Repository: doc X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: c5a8a124c35c182d95a046f0b3b795ffdbb785af Auto-Submitted: auto-generated X-BeenThere: dev-commits-doc-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the doc repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Mar 2021 23:13:03 -0000 The branch main has been updated by pkubaj (ports committer): URL: https://cgit.FreeBSD.org/doc/commit/?id=c5a8a124c35c182d95a046f0b3b795ffdbb785af commit c5a8a124c35c182d95a046f0b3b795ffdbb785af Author: Piotr Kubaj AuthorDate: 2021-03-28 23:12:29 +0000 Commit: Piotr Kubaj CommitDate: 2021-03-28 23:12:29 +0000 relnotes/13.0: further powerpc* changes Reported by: adalava --- website/content/en/releases/13.0R/relnotes.adoc | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/website/content/en/releases/13.0R/relnotes.adoc b/website/content/en/releases/13.0R/relnotes.adoc index e34f74484e..aebce15393 100644 --- a/website/content/en/releases/13.0R/relnotes.adoc +++ b/website/content/en/releases/13.0R/relnotes.adoc @@ -45,6 +45,8 @@ Binary upgrades between RELEASE versions (and snapshots of the various security Source-based upgrades (those based on recompiling the FreeBSD base system from source code) from previous versions are supported, according to the instructions in [.filename]#/usr/src/UPDATING#. +Upgrading powerpc64 systems from earlier FreeBSD Releases is NOT supported. Users need to reinstall, due to using new ABI. + [IMPORTANT] ==== Upgrading FreeBSD should only be attempted after backing up _all_ data and configuration files. @@ -210,6 +212,8 @@ gitref:adeebf4cd47c[repository=src] New man:aio_readv[2] and man:aio_writev[2] system calls provide vectored analogues of man:aio_read[2] and man:aio_write[2]. gitref:022ca2fc7fe0 +powerpc64 switched to ELFv2 ABI at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. This also makes the binaries from previous FreeBSD versions incompatible with 13.0-RELEASE. Kernel still supports ELFv1, so jails and chroots using older FreeBSD versions are still compatible. gitref:e4399d169acc[repository=src] + [[kernel]] == Kernel @@ -499,8 +503,6 @@ if_dwc now supports checksum offloading. gitref:98ea5a7b9a1[repository=src] All powerpc architectures switched to LLVM and are currently mostly similar to amd64 toolchain-wise. gitref:678da4a27447[repository=src] -Because lld doesn't support ELFv1 ABI, powerpc64 also switched to ELFv2 at the same time it switched to LLVM. This brings us to a parity with modern Linux distributions. gitref:e4399d169acc[repository=src] - powerpc (32-bit) switched to Secure-PLT. gitref:e861dab45186[repository=src] powerpc64le (64-bit little endian port) was introduced, targeting POWER8 and newer processors. gitref:b75abea4d087[repository=src] @@ -509,7 +511,9 @@ Radix MMU support for powerpc64 and powerpc64le (experimental, disabled by defau Superpages support for powerpc64 and powerpc64le (experimental, disabled by default). gitref:e2d6c417e303[repository=src] -drm-kmod support (not base related, but involved fixing linuxkpi). gitref:937a05[repository=src] +drm-kmod support (not base related, but involved fixing linuxkpi). gitref:937a05ba81c3[repository=src] + +Support QEMU/KVM pseries without hugepages. gitref:b934fc74683b[repository=src] Plenty of stability fixes, which fix many kernel panics.