From nobody Sun Oct 29 01:18:41 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SHz7c4s8mz4yHhD for ; Sun, 29 Oct 2023 01:18:52 +0000 (UTC) (envelope-from dufresnep@zoho.com) Received: from sender3-pp-o99.zoho.com (sender3-pp-o99.zoho.com [136.143.184.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SHz7b4h1Jz3Tn6 for ; Sun, 29 Oct 2023 01:18:51 +0000 (UTC) (envelope-from dufresnep@zoho.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=zoho.com header.s=zm2022 header.b=KFiNn2SS; arc=pass ("zohomail.com:s=zohoarc:i=1"); spf=pass (mx1.freebsd.org: domain of dufresnep@zoho.com designates 136.143.184.99 as permitted sender) smtp.mailfrom=dufresnep@zoho.com; dmarc=pass (policy=reject) header.from=zoho.com ARC-Seal: i=1; a=rsa-sha256; t=1698542328; cv=none; d=zohomail.com; s=zohoarc; b=chnpCoNUZG2im4FiVgQ8nCGQv4zxeMJgH6fkqH+0liy44G3wVYhJKS8JKf1OHmkLi2kFaG02fKVB5e2ZLa4iTXyS5uvWjHkJfo4zmlbUFXYFS17IdgdFeI4jXrxurjgyJPL9qWKpl0bjWWuST48MGUK5nLNennhwdc/2fWH8b5M= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1698542328; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:Subject:To:To:Message-Id:Reply-To; bh=OXm6tzMPwvDduckfOjftEJK1vOTpJ1Q5IKldO3spyso=; b=BiolmkkAXwFgYRzv1xKG99l+fdvDtX7Fpv+CyME9PCwWNsWdLS6q81+d2adH1P1bQI+6fR4WecwHv+WMYAJLugZmzOy6H04xympl3usO4VfAp79me3+5Oe97iMWehjsZAftWsCmSuRZygL8UfqKYFmJ3ziy0bbnB4XUsn5ORgN0= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=zoho.com; spf=pass smtp.mailfrom=dufresnep@zoho.com; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1698542328; s=zm2022; d=zoho.com; i=dufresnep@zoho.com; h=Date:Date:From:From:To:To:Cc:Cc:Message-ID:In-Reply-To:References:Subject:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Feedback-ID:Message-Id:Reply-To; bh=OXm6tzMPwvDduckfOjftEJK1vOTpJ1Q5IKldO3spyso=; b=KFiNn2SSyFZFOzNlQPOBRQ6FaqK/oP9+JJvjE+nPwi7TKFuR962uOQHgi2Dr1Un+ a6AdAdQ6SeSw2/0wZw5+dfpS81RXx+FArlIbCig/dXaSjNc29+J/3OZxjoyveV18eX6 qkOXtJ7fSDt/YxUEzBuR9WmqIhlyByDVULZ2aaHk= Received: from mail.zoho.com by mx.zohomail.com with SMTP id 1698542321636524.6952337055222; Sat, 28 Oct 2023 18:18:41 -0700 (PDT) Received: from [66.129.153.16] by mail.zoho.com with HTTP;Sat, 28 Oct 2023 18:18:41 -0700 (PDT) Date: Sat, 28 Oct 2023 21:18:41 -0400 From: Paul Dufresne To: "stable" Cc: "Kirill Orlov" Message-ID: <18b7902ffd4.ad1c2c7a46103.1922278204507311894@zoho.com> In-Reply-To: References: <18b78476914.e31ef40044402.789687992348441821@zoho.com> Subject: Re: So much longer to update than install fresh (+ no install feedback) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Importance: Medium User-Agent: Zoho Mail X-Mailer: Zoho Mail Feedback-ID: rr0801122811e9305451f178de0b9712f000008181ae05ab43a79b9620fdc6d86a69a6f7746e0bfd96733be63e:zu08011227fbfa95f6a7d812b1a9fac5d60000b6771eeda652ce614dbdaf63a9fd3786cf8bf669806690a479:rf08011232c77e8d3964756ae1e787e0a200003d5a77c3ce679dfdb60195726863d497adb61ea8d51e63c0311fff493f476f1df22d3dd7:ZohoMail X-Spamd-Result: default: False [-4.18 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; ARC_ALLOW(-1.00)[zohomail.com:s=zohoarc:i=1]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[zoho.com,reject]; R_DKIM_ALLOW(-0.20)[zoho.com:s=zm2022]; R_SPF_ALLOW(-0.20)[+ip4:136.143.184.0/24]; NEURAL_HAM_SHORT(-0.19)[-0.190]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; FROM_HAS_DN(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[136.143.184.99:from]; MLMMJ_DEST(0.00)[stable@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; BLOCKLISTDE_FAIL(0.00)[66.129.153.16:server fail,136.143.184.99:server fail]; RCVD_IN_DNSWL_NONE(0.00)[136.143.184.99:from]; MID_RHS_MATCH_FROM(0.00)[]; FREEMAIL_CC(0.00)[me.com]; DKIM_TRACE(0.00)[zoho.com:+]; RCPT_COUNT_TWO(0.00)[2]; TO_DN_ALL(0.00)[]; FREEMAIL_FROM(0.00)[zoho.com]; DWL_DNSWL_NONE(0.00)[zoho.com:dkim]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:2639, ipnet:136.143.184.0/24, country:US]; FREEMAIL_ENVFROM(0.00)[zoho.com]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4SHz7b4h1Jz3Tn6 X-Spamd-Bar: ---- >Le sam., 28 oct. 2023 19:09:50 -0400 Kirill Orlov a =C3=A9crit ---- >=20 > My bump from 13.2-RELEASE to 14.0-RC1 took around 7 mins on asus ux461. = Upgrades to RC2 and RC3 were around 5 mins, very swift. Tho no betas in my = case=20 > =20 Looking at the specs of Asus UX461, I see it come with an SSD (either SATA = or NVME). I guess the slowliness I see is probably due to "still" using a spinning di= sk, and I am not too surprised you get it very much faster. Admittedly, spinning disk are becoming less common. I have only one SSD (SATA, probably a relatively slow one), and I don't thi= nk I want to erase it to test. On the other hand, I think I will test now with UFS. Might mention that my Internet speed is 60 MBits/sec... a bit slow, but not= that much. From nobody Sun Oct 29 02:19:29 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SJ0Tn00xpz4yLrS for ; Sun, 29 Oct 2023 02:19:41 +0000 (UTC) (envelope-from dufresnep@zoho.com) Received: from sender4-pp-o91.zoho.com (sender4-pp-o91.zoho.com [136.143.188.91]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SJ0Tl72ZQz3ZXr for ; Sun, 29 Oct 2023 02:19:39 +0000 (UTC) (envelope-from dufresnep@zoho.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=zoho.com header.s=zm2022 header.b=AjiBFpCv; arc=pass ("zohomail.com:s=zohoarc:i=1"); spf=pass (mx1.freebsd.org: domain of dufresnep@zoho.com designates 136.143.188.91 as permitted sender) smtp.mailfrom=dufresnep@zoho.com; dmarc=pass (policy=reject) header.from=zoho.com ARC-Seal: i=1; a=rsa-sha256; t=1698545976; cv=none; d=zohomail.com; s=zohoarc; b=aBYC3DysbRyer7VwLiEu7Eg5XuHtmi+/NF2RfGQdlQbZQaxZDC00LoZanmtSsBD7lnYOj6U3ceTXs3y7gJBVCPKjy9GWOzrV5laYsBuMVr8Ddz4gl2kQ6VEpU1Wwi/mLzcMEeAlbaIMHMA0LpWFoNrVhKVpYXtsJ2pSr89ksKHU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1698545976; h=Content-Type:Content-Transfer-Encoding:Date:Date:From:From:MIME-Version:Message-ID:Subject:Subject:To:To:Message-Id:Reply-To:Cc; bh=BKTYQEAgtq7ieAz3OOpbWPRYQhR2Ji2IZemDyX/0DiY=; b=Q0BYaOHRKjuP+0/LmBnENlvEhYmX0RXCtLzxPtaMOMh0uXBBX3ppRgCH2MUXQ7socg3W3JokX/VOQg+vrs3JZUGctq2AssTZDg73355nr3UWGrTJ2AkNhcfPi7YKF3oehJYC4r/ATHCm6m7r5uZxfl04PzcmGZfOgzK8WMvsyuU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=zoho.com; spf=pass smtp.mailfrom=dufresnep@zoho.com; dmarc=pass header.from= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; t=1698545976; s=zm2022; d=zoho.com; i=dufresnep@zoho.com; h=Date:Date:From:From:To:To:Message-ID:Subject:Subject:MIME-Version:Content-Type:Content-Transfer-Encoding:Feedback-ID:Message-Id:Reply-To:Cc; bh=BKTYQEAgtq7ieAz3OOpbWPRYQhR2Ji2IZemDyX/0DiY=; b=AjiBFpCvCWeloehksxNZKaSlDIRUSJC6YYzpms8UhmJJpkFFNA3sZ6j8Ukadz2et TdEiEf9Qo2Ae0I/pn29jJzxloGlvxAH4DnAh2QynV8+Lt+X3JqUnhI3zLBAWd5ehSEJ 9oCeDVjMTyyrGBjUXvaikRJ9iyk853mKId1+crSk= Received: from mail.zoho.com by mx.zohomail.com with SMTP id 1698545969300404.190295642096; Sat, 28 Oct 2023 19:19:29 -0700 (PDT) Received: from [66.129.153.16] by mail.zoho.com with HTTP;Sat, 28 Oct 2023 19:19:29 -0700 (PDT) Date: Sat, 28 Oct 2023 22:19:29 -0400 From: Paul Dufresne To: "stable" Message-ID: <18b793aa884.11e5e9c1f46454.1347353722877751946@zoho.com> Subject: So much longer to update than install fresh (+ no install feedback) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Importance: Medium User-Agent: Zoho Mail X-Mailer: Zoho Mail Feedback-ID: rr0801122838f3decc7e069c34ae574d70000061246155cb7f6430d6640f4a6ac3cb729d097e1f4b068872a856:zu080112273a0f63c1bbf24fdabe1e59bf00003453dbe4655a29c996646b663db7acd189665a499e7be91e27:rf080112325578892f48f86f4e3ebc4812000059c1df0358377981bf856befb3c747e47681e9d4b893374cc2606f4eca2fcd4300adde43:ZohoMail X-Spamd-Result: default: False [-4.22 / 15.00]; ARC_ALLOW(-1.00)[zohomail.com:s=zohoarc:i=1]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[zoho.com,reject]; NEURAL_HAM_SHORT(-0.23)[-0.227]; R_DKIM_ALLOW(-0.20)[zoho.com:s=zm2022]; R_SPF_ALLOW(-0.20)[+ip4:136.143.188.0/24]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; FROM_EQ_ENVFROM(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:2639, ipnet:136.143.188.0/23, country:US]; FREEMAIL_ENVFROM(0.00)[zoho.com]; RCVD_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[136.143.188.91:from]; TO_DN_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[zoho.com:dkim]; FROM_HAS_DN(0.00)[]; DKIM_TRACE(0.00)[zoho.com:+]; FREEMAIL_FROM(0.00)[zoho.com]; RCPT_COUNT_ONE(0.00)[1]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[] X-Rspamd-Queue-Id: 4SJ0Tl72ZQz3ZXr X-Spamd-Bar: ---- I retested with UFS rather than ZFS. The freebsd-update install after reboot gone from 42m49s with ZFS to 5m39s with UFS. More details: -the 44 patch update for 13.2 took 29s for the update phase, 34s for the install phase. /usr/bin/time -h freebsd-update -r 14.0-BETA1 10750 patchs, 1309 files 17m42s, 6m23s user, 3m10s sys (ZFS was a bit less than 20 mins) first install (before reboot): 18s real, 7s user, 5s sys (ZFS was 35.4s real) second install (after reboot): 5m39s real, 1m13s user, 1m3s sys (ZFS was 42m49s real, 1m20 user, 1m27 sys) Time of UFS is about 13% of time of ZFS for the install phase of the upgrade from 13.2 to 14.0-BETA1. My hardware is a i3-8100 with a Seagate Barracuda 7200.10 of 250 Gbytes. From nobody Sun Oct 29 09:50:30 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SJBV70lwjz4ylLL for ; Sun, 29 Oct 2023 09:50:39 +0000 (UTC) (envelope-from mad@madpilot.net) Received: from mail.madpilot.net (vogon.madpilot.net [159.69.1.99]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SJBV61kYDz4fyY for ; Sun, 29 Oct 2023 09:50:38 +0000 (UTC) (envelope-from mad@madpilot.net) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=madpilot.net header.s=bjowvop61wgh header.b="g kA92Vx"; spf=pass (mx1.freebsd.org: domain of mad@madpilot.net designates 159.69.1.99 as permitted sender) smtp.mailfrom=mad@madpilot.net; dmarc=pass (policy=quarantine) header.from=madpilot.net Received: from mail (mail [IPv6:fd5c:5351:d272::3]) by mail.madpilot.net (Postfix) with ESMTP id 4SJBV45JF6z6f23 for ; Sun, 29 Oct 2023 10:50:36 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=madpilot.net; h= content-transfer-encoding:content-type:content-type:in-reply-to :from:from:content-language:references:subject:subject:date:date :message-id:received; s=bjowvop61wgh; t=1698573031; x= 1700387432; bh=CExJJKgWVDUdaSkKSrbrU+KhjxCQV+8FTobkGy543mU=; b=g kA92Vxw4r3yeC6SZiu1AVpAmuQQ323XrGRmS17ELNd/zMkckJPzoCgowpe4xWdOm rP2/SNfCIB4RwVuUcrNEa8sWi/YGS4dsuEzul9gHkN9ev5Zy9aT52xLiFimXqOTL c8GpeQlt/OPufLkpDNxmJkenarHkUIXUhEM4rnuJQdCuQLsa7fcOf/DwlYiyl75S fF6LSmyLZFbK4V6YsALK3J/LMNhvuAstGhYSbwfOBY5xl7nThhIB7sThDyb2Voq5 /layCoO4lmmfN50zFTehXrQxVqFOxx8Ft6E+Qijp9Tm36lMDTeQcwC3SZgqTba9i E0veXU0jL9DiQVRD/ofrg== Received: from mail.madpilot.net ([IPv6:fd5c:5351:d272::3]) by mail (mail.madpilot.net [IPv6:fd5c:5351:d272::3]) (amavisd-new, port 10026) with ESMTP id nqfeRLoSMclP for ; Sun, 29 Oct 2023 10:50:31 +0100 (CET) Message-ID: <06636139-bb9c-4726-a430-3166d216517b@madpilot.net> Date: Sun, 29 Oct 2023 10:50:30 +0100 Subject: Re: periodic daily takes a very long time to run (14-stable) To: stable@freebsd.org References: <1122335317.4913.1698407124469@localhost> <794932758.6659.1698413675475@localhost> <8a5c1f89eb5842f20e463c7d60538e598da3bc46.camel@gromit.dlib.vt.edu> <767774d4-50b5-47c8-9cf1-c0c99fe33e00@madpilot.net> Content-Language: en-US, it From: Guido Falsi Autocrypt: addr=mad@madpilot.net; keydata= xsBNBE+G+l0BCADi/WBQ0aRJfnE7LBPsM0G3m/m3Yx7OPu4iYFvS84xawmRHtCNjWIntsxuX fptkmEo3Rsw816WUrek8dxoUAYdHd+EcpBcnnDzfDH5LW/TZ4gbrFezrHPdRp7wdxi23GN80 qPwHEwXuF0X4Wy5V0OO8B6VT/nA0ADYnBDhXS52HGIJ/GCUjgqJn+phDTdCFLvrSFdmgx4Wl c0W5Z1p5cmDF9l8L/hc959AeyNf7I9dXnjekGM9gVv7UDUYzCifR3U8T0fnfdMmS8NeI9NC+ wuREpRO4lKOkTnj9TtQJRiptlhcHQiAlG1cFqs7EQo57Tqq6cxD1FycZJLuC32bGbgalABEB AAHNHkd1aWRvIEZhbHNpIDxtYWRAbWFkcGlsb3QubmV0PsLAeAQTAQIAIgUCT4b6XQIbAwYL CQgHAwIGFQgCCQoLBBYCAwECHgECF4AACgkQGuaGDlbL0pOWigf/YVTVf3+ZRnzeGP7CjGV1 Wrrxzjc8h8W64NZasV0XLHGFjl5MYwtm9jJ9gbL8Ubtqstey7lYpjOk2fG6YDhY5eptWCpR6 1QqYrioukhCfKbodSk6PnIZcx719nJVK2P7ihdFEN78TavpBwqIf9hGEcKkMpbRFQv1mYvXD hKVwQGY+8bkH/a/pAWmIyD4qMfKCMurH5DexxEt5SYWu5BB5hd/DWyZ0wuZ+F79KMPzLBPJW 5cpdLNbrvenSqFZGJEGhtTp7GFJJr6lTy8VLBArxmFHiY5jGyR45eZEGDcz86FfGgvPnnpi7 aNCc/ROdF7fnZYPh8uZGGjQbd4EYK4xMzc7BTQRTEHtBARAAoWGsNx6g90r8gcNKaiPpJBiK y8ztV2FyV5LsT0OgQBW3vIxt/odtsxVNNjpyS/BNZCyzLAsFc1WrGBzhYsmPN9SGB5/5YTvk zf5YViU5VAsZlj/MRWCZrWtpic4c0A7N4csOYReNtk/q8YB4PIFsZ9A+kTuoZhnu5t5PdfBA 74+SVwKu84+PZk9wDEY1LbFVT8vM42oKsmoswlIhwJ2xuJI/gbk+cMUe0yiRpNjo4Svw4RB8 4B6uFwdRr/PtS7xi2Zqoof5AaQT9YSBpGpKJOe/Qk5MP4PF6Fqq+go89n77Y2kJkwcHaLoD/ GJ+ZDASIiMRe1y54FHOQ1RCTGGpnJLXdKuGhwv3J21pU8HNlq0ASNQMMQmYAwtUWzjmp/KEy I1qkcmjafcxb8TmiaoK8SQN1Zf96fc/sIrZN6Z5oOCEyyCQ0prH/PTA2jlRkKQ487PTGk2JS KU5VuS57Nlk2DrnvjWp57aV9eFAhpnrrJPuGmFz83/Pc8gC0t7N7i7VVHYRcC5naxYB2UoI1 OUkyxpT/HvQFXXVZ3/KmdXMzrx191AggCPWIwUAP+VcaURSYpeDk6/ZVAOVOe1ChqcJisCD7 wK20/OOvJ2AtkWreGu1CZ9zSx7nK/VYdLr34GxQ4bT1G+9rBQNnFSNbX2TJ431Mdo1GCjDeR K4CtSnrNKYkAEQEAAcLAXwQYAQgACQUCUxB7QQIbDAAKCRAa5oYOVsvSkw3nCADhsKRf+rAR ULTpOh5HoLam62ZJZAyCkNqqu/rke5uj5AaaDY/h7BNhBDiDqhhZLTeofGpVVaErPsWN+tX5 0fypsIt9KAhy90GFrtrIZlWuyK4wsoZvDfp9yaRk+lIM58dw/Rcfxn670JaPTFSRPECVn/uL qBhJSkbYlY212YT9fxVUTJe6wIvDLQrQEjrQD/h1FMhfcLhAqsndltRd6DPvTKeMd/6VAxn0 hkoBKhEy5LkWjM9CHppu+bBkQ91/kj2uJQSXO8euonwHHS3c+6N2i2H7I0emcHGu07wuRB2t Dnw/RLBxohffdPZT2kbxuG7lhVHzwVDw5DRwSw8GkOdy In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Result: default: False [-2.00 / 15.00]; MISSING_MIME_VERSION(2.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[madpilot.net,quarantine]; R_SPF_ALLOW(-0.20)[+mx]; R_DKIM_ALLOW(-0.20)[madpilot.net:s=bjowvop61wgh]; MIME_GOOD(-0.10)[text/plain]; MLMMJ_DEST(0.00)[stable@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:159.69.0.0/16, country:DE]; RCVD_TLS_LAST(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; DKIM_TRACE(0.00)[madpilot.net:+]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_NONE(0.00)[]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SJBV61kYDz4fyY X-Spamd-Bar: - List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org On 29/10/23 00:58, void wrote: > On Sun, Oct 29, 2023 at 12:49:14AM +0200, Guido Falsi wrote: > >> Correcting myaelf: >> >> The version we currently have in the ports tree (3.7.x) does not care >> for atime, as far as I can see in the source code. It checks mtime only. >> >> Newer versions do use it though! > > Thanks for checking. I've set it to on and think I'll leave it on as > long as there's no e.g performance penalty. One less thing to think about > changing again when the port moves versions. Well actually atime does have a performance penalty. The fact has been discussed a lot, but the net effect of atime is that every pure read operation causes a write operation (to update atime) to be created, so it does cause extra disc activity. There was an old thread involving Linux Torvalds about this. The thread is about the linux kernel, but most arguments apply to any filesystem saving last access time [1] That's why since a few years ago it is being disabled by default almost everywhere. Enabling it for all filesystems makes no sense. Enabling it for ccache, depends, my wild guess is that the performance penalty is really minor, but I have performed no testing. [1] http://web.archive.org/web/20110427023154/http://kerneltrap.org/node/14148 -- Guido Falsi From nobody Sun Oct 29 23:41:14 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SJXwp11fyz4yMxg for ; Sun, 29 Oct 2023 23:41:30 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic301-22.consmr.mail.gq1.yahoo.com (sonic301-22.consmr.mail.gq1.yahoo.com [98.137.64.148]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SJXwm75FFz4vHQ for ; Sun, 29 Oct 2023 23:41:28 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=MSM11CPs; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.64.148 as permitted sender) smtp.mailfrom=marklmi@yahoo.com; dmarc=pass (policy=reject) header.from=yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1698622886; bh=TrNGjBt4N9ohAzK6eZY82ejGTX1XMj0q82QeXMEIafU=; h=From:Subject:Date:To:References:From:Subject:Reply-To; b=MSM11CPs1OKhznyWQM03co8yZNKmnqBKrLBBrOpqvddQKm6m4QGlOa4ZLUbSLd2k+odFzebBvWAU0lZDQWxsZiF2tucING93Bl93eDyZCZm3BynuiMm537G3uO6u3srvGj9fZnzu6QXj4/+w7mMSAq6xiZnVsWr5rfBa8EKYlnwXtoRmNG0arWSA+lhIFkOjO2BgfQ5a0g78NA4Az+MBGKa92GXTmaZQdtaS/X+J3/9Heoxh68737o5KVfEGOqT2nEIP7F4C0Elo9yZlJrLsbUKHAgZBgFOUmWUZs4I1oBxUI1Xhi527FRo9RDKKmZ3UTzk0moUlg6aZDGs41sAwKQ== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1698622886; bh=IFXBTSUjrUNsv/5zXB6wWkFW+aar6JKJKz2wmTrsU1p=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=p8YFoOngcZAyk54tN3eJxSJhs2U96Z+PK9bkFQm3MzvTqz3cf0AGW/Cde7v9mY0xndaxHiLPutvSiXNEyoQYbsRgxlbW9wDlZZLJPLdHAPc4A1WuuUJcTSLuJKpupJPpCHrflaH7Fan6kxwePTL2Jr6bgtRdGgj6bPmG+4SVIDGn/y9jp6n6A32U34yahk0d6fB1d4sTfsfi6PgAxococy9YxZGeFBucqyqOUu7fTgZuDBmoxEEp/W8OeCFTnduD9iho1m4F7ofCADkCGE7YkZuFKBC9rkvOAqSpd5JZE/j+7tnDZzqWnjlgCOR29bF5yQI8XLXRa6lqrMllBV9UOQ== X-YMail-OSG: Y6U1yVQVM1lSgVDAtEz3sewkelRxB41yD2c0H8fFBvtfITSqu16hANl6NF9k9Dt pNAGkcgzWKXYeYRA7H4fq5Y67DaFDjgiMtE2BkGKp7lFPvhjL4N3_f_Wz_Bviv274T9zaIZyembt eMJvr_JIOi.uT.cM_I.Zil_VGrAA9DAHOAuIqizhHmOTIhhovzzWxG.mKmbQx7.T1k9fT0Ot5QWQ LGg94r6XU8LkFd69VJlp6b5mRNqJIFrzTQ9XP8tf5FS3dzhPWK4R65QcOwolX46QPmHiLSnCvxWk droreDfd3d6s9owdykD69bJrNFI8GlBrkpz26IjrS_UKK4cocM1B9FhmzvhqARb6lJTE9itLfGzY .ufW9bRii_4qrKcmD666cALcEDZLkEUgRF3vBHWaQpg3xRL9m5WiyhzkJnvOKYBg30xkIR_8Axk2 UlvvfiYXVoOuAG3x4wbaoSw3XNvWP3v1yTBQfeb5X826V.UZ0lpUZTUATxWVotdeu1hNx9jiDIcZ hjgvgeyPRiewSbSTy1OQL83QmbhVQ41kBRBpP8fbB20l8X2AT7.KvkzNPe_LiNG6vcnX079hyXJr 1Q7R12C_F3uIaqj5HpiywGyDTK8KP5nzl0DsfAkunfhJJ249l6y3Km9ZgIveAKdLMPeUTBt91hgn mCEjnyZfEDgcmlGDRDSbe46L_cfJi043djNV8Kp_BR3P9Sh4XB2xL7bob1S3pBOWKWLmTLgB5Q1e XNAA13K2Ey2R1y4P7VdwPJ_fRlpHMR2_fCzaCmKPtJHaVfkHLUiPFJsP5e_S9EVHV3toClkp8EBR Jzu3.D2TAfrTeMat6udJkcmV6piVBvju_AVp6dKT9qqNFAHaHtl.as6scLZRIhyamh18M2fvUC6w kI8A6tVtOvS_ZYHPA_XZ1gCIpaewxQt3QQmPoSpkBtqErzJ7Ob4RCqI81HapnMjYRm7EEABQfrOq sjitSiDorhDzJY98pRVNR0rR7ZHIvbcA6Q4OitVKw_GsRkGqYoy6tPnXkNKHK5DkVZOeCfNyLHOD ffN.C7TStYGLXsl5uhxBDKImtsdPckYZC9LZYCdeHwo5rJdaWhIiXhUWwk_B3z5SJ4K7XIqmkjhA qivnPqy7C0lw3qi0MshyrYhtKKyPcg9pPLNU_dfYs.GfYLEEnzBl5KkBp8z63ennsOuVlpp9efXS H35viawsi747M.vSRWrzmMdo9hG_LZ_iMWBBH.vtoWJUlQ005y0UirPJ3ofJ0DDoCPMZaar5PjPv QZU.EEAvO1WlJMqZksrUbozPpnmOUVsCc0ikCpfxDNRItHRIwjy7N9tsbeiUWFPlkCcz_k.5hQUR E09RPrqIsqsnzOc6RvttSsqLcV4zz72PS.dUvb7_0SVQ5RkoyjI2hW9vilQH.IMRIGhUFhzvqIQ6 YhhIDFle_GDQP9YjK9NwNt86CMX2.E3uleY1nev0DXwcgPXF0LMwu5wjCQ8zVN_rgrQ.jJ_A8yY8 Z60sNmMqc8Ra4E2ZFYVrE9rOgbkZbGp33Aj7XSwlupISCw4pVZzrMArgAEnRjLNVFfwka1D1JI8o c6t7QPXdMCAgb4MCmV3roKpX446fp62jixaPQf9xpWd33MKD.PyaoXap5saZqqtV37pN1o0KndYY kNZeXk5f6dgYBIdVjT5nm4KuzuL7O1ek8o0rHajEO5btGP7aMgSifeb193ItnnJ9IPnAKmf_iZ3K WTriGUDDpVw.jQJ6U0h4jWVmMjoBM5niLOHoNGdhDaiL2leGH_gjsVQlguDG82TXEPjf7wlV5zKE wC_vmqG60ZAd07nOgAVSyTBSPf9vV.ifvhvEYihwt_6rLqifMC4itSrETK61R.R13qvZrwA5RrUa j01qUpTyVMsqRBES5DkK8P6rmJZs73cUZzbBKXqP1veRJDenBMA.g.BD1rGJsgqwJbBUTjm2UOk2 s3fJ0Z2zKz0sV24Bphr8mpSV6f3PWfQ5BPffimNkismW0pUfrCQhCqhCkuRrcIRDt3xeLo19fTvR xyWJBoTcXNdREa3XhflrXpSSDCB.z2IMdy0ZYvcAUNkBYxJVF_xWJrwGIsqoWxyJ.mX8P6UwtzTI LKHDTNB00zD3Oy9o7U7sIFBFlRB75zuUTZQ4LfdcvbKC2DVxSPucu2SqYSPdeN8CN.jFmWFU.GCz OOQ9ZtfcIUD08q9WNF3KOoJjk8gtk60nI_gRqbQLnzXMzMk23B3JC9HBFW2camPNiAtwT7BatADA Q3CwHDDzhiSK0nXsfKDZO2Ti__pKos0WYRXkO_IiQ6qZb.YiaPSA4LXiUqzDq X-Sonic-MF: X-Sonic-ID: 52031a41-b8c8-4dd4-a7b2-fa1accf85d97 Received: from sonic.gate.mail.ne1.yahoo.com by sonic301.consmr.mail.gq1.yahoo.com with HTTP; Sun, 29 Oct 2023 23:41:26 +0000 Received: by hermes--production-gq1-59b5df67b6-72bc4 (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID e4b055a72632bcefce7f7cc27e046918; Sun, 29 Oct 2023 23:41:25 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.200.91.1.1\)) Subject: FYI: 13.2-STABLE stable/13-n256634-c4dfacd0b3c3 snapshot's send mail notices Message-Id: <0004B2EA-F71A-4645-A3F0-5ED26B9B86CE@yahoo.com> Date: Sun, 29 Oct 2023 16:41:14 -0700 To: FreeBSD-STABLE Mailing List X-Mailer: Apple Mail (2.3774.200.91.1.1) References: <0004B2EA-F71A-4645-A3F0-5ED26B9B86CE.ref@yahoo.com> X-Spamd-Result: default: False [-3.48 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.982]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; MV_CASE(0.50)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[98.137.64.148:from]; RCPT_COUNT_ONE(0.00)[1]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.64.148:from]; DKIM_TRACE(0.00)[yahoo.com:+]; TO_DN_ALL(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4SJXwm75FFz4vHQ X-Spamd-Bar: --- For reasons of investigating a 13.2-STABLE related bugzilla report I'd dd'd and booted the snapshot that results in: # uname -apKU FreeBSD generic 13.2-STABLE FreeBSD 13.2-STABLE = stable/13-n256634-c4dfacd0b3c3 GENERIC arm64 aarch64 1302508 1302508 I noticed the following messages on the console: Oct 27 03:01:00 generic sendmail[2521]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:02:00 generic sendmail[2521]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:02:01 generic sendmail[2628]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:03:02 generic sendmail[2628]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:03:02 generic sendmail[2633]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:04:02 generic sendmail[2633]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:04:05 generic sendmail[2787]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:04:05 generic sendmail[2832]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:04:05 generic sendmail[2833]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:04:05 generic sendmail[2847]: My unqualified host name = (generic) unknown; sleeping for retry Oct 27 03:05:05 generic sendmail[2787]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:05:05 generic sendmail[2833]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:05:05 generic sendmail[2832]: unable to qualify my own domain = name (generic) -- using short name Oct 27 03:05:05 generic sendmail[2847]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:01:00 generic sendmail[4605]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:02:00 generic sendmail[4605]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:02:01 generic sendmail[4713]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:03:01 generic sendmail[4713]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:03:01 generic sendmail[4718]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:04:01 generic sendmail[4718]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:04:03 generic sendmail[4867]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:04:03 generic sendmail[4913]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:04:03 generic sendmail[4912]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:04:03 generic sendmail[4927]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 03:05:03 generic sendmail[4867]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:05:03 generic sendmail[4913]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:05:03 generic sendmail[4912]: unable to qualify my own domain = name (generic) -- using short name Oct 28 03:05:03 generic sendmail[4927]: unable to qualify my own domain = name (generic) -- using short name Oct 28 04:15:21 generic sendmail[5154]: My unqualified host name = (generic) unknown; sleeping for retry Oct 28 04:16:21 generic sendmail[5154]: unable to qualify my own domain = name (generic) -- using short name Oct 29 03:01:00 generic sendmail[6807]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:02:00 generic sendmail[6807]: unable to qualify my own domain = name (generic) -- using short name Oct 29 03:02:01 generic sendmail[6916]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:03:01 generic sendmail[6916]: unable to qualify my own domain = name (generic) -- using short name Oct 29 03:03:01 generic sendmail[6921]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:04:01 generic sendmail[6921]: unable to qualify my own domain = name (generic) -- using short name Oct 29 03:04:03 generic sendmail[7070]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:04:03 generic sendmail[7115]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:04:03 generic sendmail[7116]: My unqualified host name = (generic) unknown; sleeping for retry Oct 29 03:04:03 generic sendmail[7130]: My unqualified host name = (generic) unknown; sleeping for retry It has been up 2 days 17 hr+ at that last. I do not know if that indicates a problem or not. Very little is changed from the snapshot expansion. I was only looking into the status of the system-clang related libc++ and such and the media content is just temporary for that purpose. =3D=3D=3D Mark Millard marklmi at yahoo.com From nobody Mon Oct 30 09:43:54 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SJpJ30KKPz4xhCP for ; Mon, 30 Oct 2023 09:44:03 +0000 (UTC) (envelope-from zlei@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SJpJ26wL0z4NNl; Mon, 30 Oct 2023 09:44:02 +0000 (UTC) (envelope-from zlei@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698659043; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=ztHbSGVqrJA8uLzBjEgEgJHDOU5zVm2rkpzXpHlj6hk=; b=sFqI62kZfKXC6A3/SqeAI15FRVWfoz5QUY92MBgx9ewOqfMI0dXfvD4iy6D523GdXRWRiC JOt0MNfrEp3blUZfJ/QOi5gFXcLEzMu0o3GeTYDtvQjZyNw2usn8vIAMPh/0pX6xabU+Ff MKZ2VXgUkrfahX7vB6OvwcWJcZDjA5R6c4dlkw+FXg3CQSxzexJxu6GukN+QleCgcHfyz6 NidOH2IfGqwdm74LknkHjdgzuedPvxyqI6GcRhNDxcYWkzdk/TefTI9qAt/D0f1J4by9aj nGcXk+E8B4YJdj5gPf9BXXVWvU5MYp6yK+cKZOcQexwA3rhJ7aXlDaXQ8b70PQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698659043; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=ztHbSGVqrJA8uLzBjEgEgJHDOU5zVm2rkpzXpHlj6hk=; b=Y6F7D6nYac+oDrIlUUVYTJ/mhWvOvNk0nCE8FHp2Gq5uoqcU0/wgy8JFlXHKzBEJimEADM 79Tfa6W05zJW45UMU+t0uC9Ij7VstkN5zEPqp2dUej8Nt7uuIsZiNvjpBQIiqGLQn++2Ol QbF/Q1f2zuWfAPAWx+SGWDSDkn53KPwT9NxYRMpKTe/zo3Tzl/qAGb9WnyEPj8SLfUy5lh qmBTQY6f8NsLUE3Gj7SKe2LK0Z1wF1Q1CwCdcKI+JybRO4C/bg1OkJNOxVHGpabceOmzQv 4qo0cEsYmA3c4kEZxlfWkPA8VqlqWhWcedxZImd+DTRYc/QqQENYsDVaxDsdIg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698659043; a=rsa-sha256; cv=none; b=SWYMgBACbog1JJkhjDgLBSHWaQykXQqGM3/rbrkXX1mq5CRPg5NPaLazZK98huGr6cfjBF uxsgtCpqpOTnN+5HcP7XR0Bvcj9vDRjn4iHgZ+gZ7mxuf4KwImCJfqZtT95ieGYyW3FS3H i9OVaOmk33ECeiJbnT8Zi80CH2kz5NrAjyBJcxG60tUzdXnaOPgkvX6VSov5H3W4eK1ps1 v9MvZl/uNuc/wU249S5ygSXE+mnGxjssAPkPulB6Z4K+y5S9LmJPi7vPgISjGj9pgfoBLg xCUpW+O4urjDAZ+crVQ6HptoyCu6rJU3FES20Kgxx2BXSuyDvl4dTG3ENWYI5Q== Received: from smtpclient.apple (ns1.oxydns.net [45.32.91.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: zlei/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4SJpJ14VJ7z17PR; Mon, 30 Oct 2023 09:44:01 +0000 (UTC) (envelope-from zlei@FreeBSD.org) From: Zhenlei Huang Message-Id: Content-Type: multipart/alternative; boundary="Apple-Mail=_FCC8F54C-7E19-46C5-8D25-3C7C6CE083C2" List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.4\)) Subject: Re: FreeBSD 14.0-RC1 and RC2 dvd1 packages Date: Mon, 30 Oct 2023 17:43:54 +0800 In-Reply-To: <8CA8A7CB-CFE4-49E5-B892-6BBB6758CCBA@freebsd.org> Cc: erickleuschke , freebsd-stable@freebsd.org, release FreeBSD Engineering Team To: Glen Barber References: <7E920253-8CEF-4F2A-9C0A-9B4984059949@FreeBSD.org> <8CA8A7CB-CFE4-49E5-B892-6BBB6758CCBA@freebsd.org> X-Mailer: Apple Mail (2.3696.120.41.1.4) --Apple-Mail=_FCC8F54C-7E19-46C5-8D25-3C7C6CE083C2 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 > On Oct 27, 2023, at 11:02 AM, Glen Barber wrote: >=20 > Does the KDE set fail to build on quarterly? If so, that would = explain this. >=20 > Nothing else has changed. Seems got fixed in RC3. FreeBSD-14.0-RC3-amd64-dvd1.iso 4538284032 >=20 > Glen > Sent from my phone. > Please excuse my brevity and/or typos. >=20 >> On Oct 26, 2023, at 10:56 PM, Zhenlei Huang wrote: >>=20 >> =EF=BB=BF >>=20 >>> On Oct 25, 2023, at 9:19 AM, erickleuschke = > = wrote: >>>=20 >>> Hello, >>>=20 >>> I just noticed some of the prebuilt packages like KDE were removed = from the RC2 dvd1, and these packages were available in RC1, is there = anyone know the reason of this change? >>>=20 >>> FreeBSD-14.0-RC1-amd64-dvd1.iso size: 4539054080 >>> FreeBSD-14.0-RC2-amd64-dvd1.iso size: 2741667840 >>=20 >> Forwarded to re@. >>=20 >>>=20 >>> Thanks >>=20 >>=20 >>=20 --Apple-Mail=_FCC8F54C-7E19-46C5-8D25-3C7C6CE083C2 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8

On Oct 27, 2023, at 11:02 AM, Glen Barber <gjb@freebsd.org> = wrote:

Does the KDE set fail to build = on quarterly?  If so, that would explain this.

Nothing else has changed.

Seems got fixed in RC3.

FreeBSD-14.0-RC3-amd64-dvd1.iso = 4538284032


Glen
Sent from my phone.
Please = excuse my brevity and/or typos.

On Oct = 26, 2023, at 10:56 PM, Zhenlei Huang <zlei@freebsd.org> = wrote:

=EF=BB=BF

On Oct 25, 2023, at 9:19 AM, = erickleuschke <erickleuschke@protonmail.com> wrote:

Hello,

I = just noticed some of the prebuilt packages like KDE were removed from = the RC2 dvd1, and these packages were available in RC1, is there anyone = know the reason of this change?

=20
=20
FreeBSD-14.0-RC1-amd64-dvd1.iso size: 4539054080
FreeBSD-14.0-RC2-amd64-dvd1.iso size: = 2741667840

Forwarded to re@.


Thanks





= --Apple-Mail=_FCC8F54C-7E19-46C5-8D25-3C7C6CE083C2-- From nobody Mon Oct 30 14:15:11 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SJwK53bR6z4y007 for ; Mon, 30 Oct 2023 14:15:21 +0000 (UTC) (envelope-from SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl) Received: from smtp-relay-int.realworks.nl (smtp-relay-int.realworks.nl [194.109.157.24]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SJwK34wY6z3FvR for ; Mon, 30 Oct 2023 14:15:19 +0000 (UTC) (envelope-from SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=klop.ws header.s=rw2 header.b=eG3DSWi9; spf=pass (mx1.freebsd.org: domain of "SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl" designates 194.109.157.24 as permitted sender) smtp.mailfrom="SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl"; dmarc=pass (policy=quarantine) header.from=klop.ws Date: Mon, 30 Oct 2023 15:15:11 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=klop.ws; s=rw2; t=1698675312; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=cOURoCEssnEROw1i3RRw+9KxKlC74HPX5xAuPdsehCE=; b=eG3DSWi9ULPcbqa9Cl5MQ8OSALD1R4SUzJcKMl+f2m0456xTL/Qd4NJjM2lrhaHfVL3iyL Rzvh8otB7uyIM9y0j9u/V9ZVTCM25obaaF4n3xYvyJQCkzrhQDkWmBIuWuIkX7kDJACEke 8+h8sGszWFo+IxY7TCYMhqxvyFt5RkGKFOMq/LLG9RUZVvQFcSFJPj3UusEJ5afSQwfk2Q K8O60zj5ZavAo2GQY6AbzTENKLM+U9H66ZIyILuVO2oGxMlNMl1Jzj3wLKwqklQNjP0IUy dLd1CoMx0c4zm2xjylsjp1ifDhZLbWf+FqCdkeho8YChrpCIbQcvDiRjxPeIZw== From: Ronald Klop To: void Cc: freebsd-stable@freebsd.org Message-ID: <1189591588.6325.1698675311830@localhost> In-Reply-To: References: <1122335317.4913.1698407124469@localhost> <794932758.6659.1698413675475@localhost> <1210534753.8409.1698420229888@localhost> Subject: Re: periodic daily takes a very long time to run (14-stable) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_6324_617361068.1698675311818" X-Mailer: Realworks (677.7) Importance: Normal X-Priority: 3 (Normal) X-Spamd-Result: default: False [-3.20 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.999]; DMARC_POLICY_ALLOW(-0.50)[klop.ws,quarantine]; MID_RHS_NOT_FQDN(0.50)[]; FORGED_SENDER(0.30)[ronald-lists@klop.ws,SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl]; R_SPF_ALLOW(-0.20)[+ip4:194.109.157.0/24]; R_DKIM_ALLOW(-0.20)[klop.ws:s=rw2]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_TO(0.00)[f-m.fm]; RCVD_COUNT_ZERO(0.00)[0]; ARC_NA(0.00)[]; DKIM_TRACE(0.00)[klop.ws:+]; RCPT_COUNT_TWO(0.00)[2]; FROM_HAS_DN(0.00)[]; HAS_X_PRIO_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; ASN(0.00)[asn:3265, ipnet:194.109.0.0/16, country:NL]; TO_MATCH_ENVRCPT_SOME(0.00)[]; FROM_NEQ_ENVFROM(0.00)[ronald-lists@klop.ws,SRS0=GIGA=GM=klop.ws=ronald-lists@realworks.nl] X-Rspamd-Queue-Id: 4SJwK34wY6z3FvR X-Spamd-Bar: --- ------=_Part_6324_617361068.1698675311818 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Van: void Datum: vrijdag, 27 oktober 2023 18:38 Aan: freebsd-stable@freebsd.org Onderwerp: Re: periodic daily takes a very long time to run (14-stable) > > On Fri, Oct 27, 2023 at 05:23:49PM +0200, Ronald Klop wrote: > > >Well. You could remove daily_clean_disks_enable="YES" from /etc/periodic.conf. >That saves you the "find". I have never used it before. The default is "off". > > Yes, I'll try that, but it's a very recent addition. The periodic daily problem > is something thats been happening since even before the machine went from 13-stable to 14-stable. The addition of daily_clean_disks has made > a bad problem worse, because rather than the problem happening for ~1 hour > it happens for 3. > > periodic daily should be finished soon, it's moved onto /usr/local/etc/periodic/security/460.pkg-checksum > > edit: it finished, took exactly 3 hrs: > # date && periodic daily && date > Fri Oct 27 13:40:15 BST 2023 > Fri Oct 27 16:40:14 BST 2023 > > >The list of files it checks for doesn't look very useful to me in 2023. >This does do a full find over *all* directories and files. *every day* ??? > > yeah that was sort of my reaction. I've not looked yet for a monthly-clean_disks where I could define an exclude pattern for things like > ccache. That to me would be useful. > > The reason it was enabled was no more than a "sounds like a good idea" > variable to enable on a machine that is presently used mainly > for poudriere, which can tend to generate a lot of core consequential to > pkg build failures etc. > > >If you have a lot of *.core files you are better of putting this in >sysctl.conf: kern.corefile=/var/tmp/%U.%N.%I.%P.core . >So you know where to look to delete them. > > >Actually my RPI3 has this in cron: @daily find /var/tmp/ -name "*.core" -mtime +7 -ls -delete . > > thanks for these, have implemented both > > >That is pretty heavy for you setup if you manage to run things in parallel as the RPI4 >has 4CPUs. > PARALLEL_JOBS=1 > TMPFS=ALL # with excludes for things like llvm & rust & gcc > > >It doesn't help to run daily_cleanup together. ;-) > > Before I started asking about the issue, what I was trying to address/work around was that sometimes (if for example the poudriere run went over 24 hrs) it would run into periodic daily. This caused problems before I made it worse by adding > daily cleanup LOL > > Now to test periodic daily without daily cleanup... > > How long does yours take? > -- > > > > Mine takes: [root@rpi4 ~]# date && periodic daily && date Mon Oct 30 14:35:53 CET 2023 Mon Oct 30 14:54:18 CET 2023 ========================================= [root@rpi4 ~]# cat /etc/periodic.conf daily_output="/var/log/daily.log" daily_status_security_output="/var/log/daily.log" weekly_output="/var/log/weekly.log" weekly_status_security_output="/var/log/weekly.log" monthly_output="/var/log/monthly.log" monthly_status_security_output="/var/log/monthly.log" # 223.backup-zfs daily_backup_zfs_enable="YES" # Backup output from zpool/zfs list daily_backup_zfs_props_enable="YES" # Backup zpool/zfs filesystem properties daily_backup_zfs_verbose="YES" # Report diff between the old and new backups. # 404.status-zfs daily_status_zfs_enable="YES" # Check ZFS # 800.scrub-zfs daily_scrub_zfs_enable="YES" ========================================= So comparable to your "fixed" daily. I can probably gain some speed by setting exec/setuid off on some ZFS volumes too. Regards, Ronald. ------=_Part_6324_617361068.1698675311818 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit

Van: void <void@f-m.fm>
Datum: vrijdag, 27 oktober 2023 18:38
Aan: freebsd-stable@freebsd.org
Onderwerp: Re: periodic daily takes a very long time to run (14-stable)

On Fri, Oct 27, 2023 at 05:23:49PM +0200, Ronald Klop wrote:

>Well. You could remove daily_clean_disks_enable="YES" from /etc/periodic.conf. >That saves you the "find". I have never used it before. The default is "off".

Yes, I'll try that, but it's a very recent addition. The periodic daily problem
is something thats been happening since even before the machine went from 13-stable to 14-stable. The addition of daily_clean_disks has made
a bad problem worse, because rather than the problem happening for ~1 hour
it happens for 3.

periodic daily should be finished soon, it's moved onto /usr/local/etc/periodic/security/460.pkg-checksum

edit: it finished, took exactly 3 hrs:
# date && periodic daily && date
Fri Oct 27 13:40:15 BST 2023
Fri Oct 27 16:40:14 BST 2023

>The list of files it checks for doesn't look very useful to me in 2023. >This does do a full find over *all* directories and files. *every day* ???

yeah that was sort of my reaction. I've not looked yet for a monthly-clean_disks where I could define an exclude pattern for things like
ccache. That to me would be useful.

The reason it was enabled was no more than a "sounds like a good idea"
variable to enable on a machine that is presently used mainly
for poudriere, which can tend to generate a lot of core consequential to
pkg build failures etc.

>If you have a lot of *.core files you are better of putting this in >sysctl.conf: kern.corefile=/var/tmp/%U.%N.%I.%P.core . >So you know where to look to delete them.

>Actually my RPI3 has this in cron: @daily  find /var/tmp/ -name "*.core" -mtime +7 -ls -delete .

thanks for these, have implemented both

>That is pretty heavy for you setup if you manage to run things in parallel as the RPI4 >has 4CPUs.
PARALLEL_JOBS=1
TMPFS=ALL # with excludes for things like llvm & rust & gcc

>It doesn't help to run daily_cleanup together. ;-)

Before I started asking about the issue, what I was trying to address/work around was that sometimes (if for example the poudriere run went over 24 hrs) it would run into periodic daily. This caused problems before I made it worse by adding
daily cleanup LOL

Now to test periodic daily without daily cleanup...

How long does yours take?
-- 
 



Mine takes:

[root@rpi4 ~]# date && periodic daily && date
Mon Oct 30 14:35:53 CET 2023
Mon Oct 30 14:54:18 CET 2023

=========================================
[root@rpi4 ~]# cat /etc/periodic.conf
daily_output="/var/log/daily.log"
daily_status_security_output="/var/log/daily.log"

weekly_output="/var/log/weekly.log"
weekly_status_security_output="/var/log/weekly.log"

monthly_output="/var/log/monthly.log"
monthly_status_security_output="/var/log/monthly.log"

# 223.backup-zfs
daily_backup_zfs_enable="YES"                           # Backup output from zpool/zfs list
daily_backup_zfs_props_enable="YES"                     # Backup zpool/zfs filesystem properties
daily_backup_zfs_verbose="YES"                          # Report diff between the old and new backups.
# 404.status-zfs
daily_status_zfs_enable="YES"                           # Check ZFS
# 800.scrub-zfs
daily_scrub_zfs_enable="YES"

=========================================

So comparable to your "fixed" daily.

I can probably gain some speed by setting exec/setuid off on some ZFS volumes too.

Regards,
Ronald.
  ------=_Part_6324_617361068.1698675311818-- From ml@ft-c.de Wed Nov 1 08:05:44 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SL01r0lBqz4yxW8 for ; Wed, 1 Nov 2023 08:05:52 +0000 (UTC) (envelope-from ml@ft-c.de) Received: from einhorn-mail-out.in-berlin.de (einhorn.in-berlin.de [192.109.42.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail.in-berlin.de", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SL01p4W60z4tr2 for ; Wed, 1 Nov 2023 08:05:50 +0000 (UTC) (envelope-from ml@ft-c.de) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of ml@ft-c.de designates 192.109.42.8 as permitted sender) smtp.mailfrom=ml@ft-c.de; dmarc=none X-Envelope-From: ml@ft-c.de X-Envelope-To: Received: from authenticated.user (localhost [127.0.0.1]) by einhorn.in-berlin.de with ESMTPSA id 3A185lWP2485950 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT) for ; Wed, 1 Nov 2023 09:05:48 +0100 Message-ID: <5a677e1de51c11cb5ebab9cd139e6598558111cc.camel@ft-c.de> Subject: linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option TCP_INFO From: ft Reply-To: ml@ft-c.de To: stable@FreeBSD.org Date: Wed, 01 Nov 2023 09:05:44 +0100 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.4 FreeBSD GNOME Team List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 X-Spamd-Result: default: False [-2.94 / 15.00]; NEURAL_HAM_MEDIUM(-0.97)[-0.974]; NEURAL_HAM_LONG(-0.95)[-0.954]; NEURAL_HAM_SHORT(-0.61)[-0.612]; R_SPF_ALLOW(-0.20)[+ip4:192.109.42.0/24]; RCVD_IN_DNSWL_LOW(-0.10)[192.109.42.8:from]; ONCE_RECEIVED(0.10)[]; MIME_GOOD(-0.10)[text/plain]; RWL_MAILSPIKE_GOOD(-0.10)[192.109.42.8:from]; ARC_NA(0.00)[]; DMARC_NA(0.00)[ft-c.de]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; HAS_REPLYTO(0.00)[ml@ft-c.de]; MIME_TRACE(0.00)[0:+]; MLMMJ_DEST(0.00)[stable@FreeBSD.org]; TO_DN_NONE(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_ONE(0.00)[1]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:29670, ipnet:192.109.42.0/24, country:DE]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4SL01p4W60z4tr2 X-Spamd-Bar: -- Hello,=20 I get many many dmesg messages:=20 linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option TCP_INFO (11) uname -a FreeBSD ftc 13.2-RELEASE-p2 FreeBSD 13.2-RELEASE-p2 GENERIC amd64 last pkg upgrade: 31.10.2023 Updating FreeBSD repository catalogue... FreeBSD repository is up to date. All repositories are up to date. Checking for upgrades (64 candidates): 100% Processing candidates (64 candidates): 100% Checking integrity... done (0 conflicting) Your packages are up to date. I work with jails for postgresql and apache. The desktop is xfce4. You need more informations? What should I do. Franz From nobody Wed Nov 1 08:29:19 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SL0Xx4yw6z500Xq for ; Wed, 1 Nov 2023 08:29:21 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from fc.opsec.eu (fc.opsec.eu [IPv6:2001:14f8:200:4::4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SL0Xx3Cc4z3Dj0 for ; Wed, 1 Nov 2023 08:29:21 +0000 (UTC) (envelope-from pi@freebsd.org) Authentication-Results: mx1.freebsd.org; none Received: from pi by fc.opsec.eu with local (Exim 4.96.2 (FreeBSD)) (envelope-from ) id 1qy6bH-0009CN-1S; Wed, 01 Nov 2023 09:29:19 +0100 Date: Wed, 1 Nov 2023 09:29:19 +0100 From: Kurt Jaeger To: ft Cc: stable@freebsd.org Subject: Re: linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option TCP_INFO Message-ID: References: <5a677e1de51c11cb5ebab9cd139e6598558111cc.camel@ft-c.de> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5a677e1de51c11cb5ebab9cd139e6598558111cc.camel@ft-c.de> X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:12502, ipnet:2001:14f8::/32, country:DE] X-Rspamd-Queue-Id: 4SL0Xx3Cc4z3Dj0 Hi! > I get many many dmesg messages: > linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option > TCP_INFO (11) [...] > What should I do. On FreeBSD: man tcp says: TCP_INFO Information about a socket's underlying TCP session may be retrieved by passing the read-only option TCP_INFO to getsockopt(2). It accepts a single argument: a pointer to an instance of struct tcp_info. This API is subject to change; consult the source to determine which fields are currently filled out by this option. FreeBSD specific additions include send window size, receive window size, and bandwidth-controlled window space. On Debian: man tcp says: TCP_INFO (since Linux 2.4) Used to collect information about this socket. The kernel re- turns a struct tcp_info as defined in the file /usr/in- clude/linux/tcp.h. This option should not be used in code in- tended to be portable. So maybe start searching in the code what/why that call happens and what it really meant (on both systems). -- pi@FreeBSD.org +49 171 3101372 Now what ? From nobody Wed Nov 1 12:55:04 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SL6Rj5rYTz4rlw8 for ; Wed, 1 Nov 2023 12:55:13 +0000 (UTC) (envelope-from fluffy@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SL6Rj5Hf8z4KN1; Wed, 1 Nov 2023 12:55:13 +0000 (UTC) (envelope-from fluffy@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698843313; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=OTEEdUfTEYKjecJU9sWe38agKOAZAXSzBgrT11bnsgY=; b=YAcxTAlrapHUu1V/IVkHUFnDIXXjJulKa1qo9oAGj7UxqcfqXLOxzbVJHPo9vahbadI0ac WgBRNX7XqaGeAoKp5PF7wGAvkeTWoTyjnfvtWuA5eXCWErQvpQ2YPiKoq4CUmIhoLua7LV ZdiUWolPlTZMlJXTDAyH1z3DMXnz2h/SDa8gDtFAR5CLBM+/qHA/tsHtgo8cHds20nQDc3 mEq+yDNFmrxpmT/oW0oS8mRrowl1FgNSl4tnCL8Jt/XWgpw+KmLGVKqAT9durV2ShWGaMN v0gP4Z//ejatRE8ew8k1NkdhzDbWcYMacPeQHHjulJCs6hPq4nlPtQJjt85USw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698843313; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=OTEEdUfTEYKjecJU9sWe38agKOAZAXSzBgrT11bnsgY=; b=Ln0QdqWzl0ja7HHrnX7Puwo1orqC1x7bbzVrijN2BZG6DYlLZIv7ShxcFjHqU4mF/GAO6/ 29zZJN306w766yGbLhshAhy38k7i7u4IpBRyk//vyu9tYFNaXdCRpTwMAsjReRhGx1yZvB 7F4MQlJ17+8fvlhNg5rXPi9JO/2rbnYNn2f2gC0hG+uspImc1b8BgSnJu+HCoiF62UpRTO JgkKaVsCrPd+yK9EH9/mt7CtFykAwnQjq5fmc0+aLGDwc7UasRcJ6I6lzVFJVDdTmZC1sA +J+y/pqnWLSl5ju0aFx4D1vLh9F5UqN3IPDqpI3EPHMUkMGXJw/9R+mqVuyryA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698843313; a=rsa-sha256; cv=none; b=QJa3Ednho0Xr0STLcwBWMiuIZEjBNo/SXU2oH2YyttU6djSKJdJF0/qLAt55E9PNryw9VV xtND2mkR4y+G6ECWEqHMpu10sjt7zDD7ESgV6LaTPzckBds6vMa4dyKDLVCKWn8Y/VggjY lQrUvsFD0zoFODsDGuYcz8eoo7l1+p2XF+K1ThqskJBwi0wzWtl/NEcYfB8n9cNOPqEW6x 2wg0mD99wjrQBY5RhpTrM1Xz4dNFH7VpQHoVhgZjRMWPz2F0jDYoK7L8LWzRg8B4VjqJkY Q+cBg/9HJGR084FIrmX5loRiHo6oMiorIKzEOpC+MGfE7vuJBnc31WxNgOo6Vg== Received: from [10.216.0.102] (unknown [188.243.165.67]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: fluffy) by smtp.freebsd.org (Postfix) with ESMTPSA id 4SL6Rj0Knfz16wl; Wed, 1 Nov 2023 12:55:12 +0000 (UTC) (envelope-from fluffy@FreeBSD.org) Message-ID: <8cb2a4cc-492d-4eb9-bbb1-02b4ad1f567d@FreeBSD.org> Date: Wed, 1 Nov 2023 15:55:04 +0300 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option TCP_INFO To: Kurt Jaeger , ft Cc: stable@freebsd.org References: <5a677e1de51c11cb5ebab9cd139e6598558111cc.camel@ft-c.de> Content-Language: ru, en-GB, en-US From: Dima Panov Organization: FreeBSD.org In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------IcCLegNg1xYySZtBUND4r5G1" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------IcCLegNg1xYySZtBUND4r5G1 Content-Type: multipart/mixed; boundary="------------JfMxrslsX14o4rF3i8jDLybS"; protected-headers="v1" From: Dima Panov To: Kurt Jaeger , ft Cc: stable@freebsd.org Message-ID: <8cb2a4cc-492d-4eb9-bbb1-02b4ad1f567d@FreeBSD.org> Subject: Re: linux: jid 0 pid 2834 (ThreadPoolSingl): unsupported TCP socket option TCP_INFO References: <5a677e1de51c11cb5ebab9cd139e6598558111cc.camel@ft-c.de> In-Reply-To: --------------JfMxrslsX14o4rF3i8jDLybS Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 TW9pbi1tb2luIQ0KDQoNCkxpbnV4b2xhdG9yIGNvbXBhdCBsYXllciBtaXNzZWQgYW55IFRD UF9JTkZPIHRyYW5zbGF0aW9uIGJldHdlZW4gQlNEIDw9PiBMaW51eCBBQkkgYW5kIGhhdmUg b25seSB0aGlzIGRlYnVnIG1lc3NhZ2UgKHVuc3VwcG9ydGVkIFRDUCBzb2NrZXQgb3B0aW9u IFRDUF9JTkZPICgxMSkuKQ0KU29tZW9uZSB3aXRoIHByb3BlciBza2lsbCBuZWVkcyB0byBp bXBsZW1lbnQgdGhpcyBsYXllci4NCg0KT24gMDEuMTEuMjAyMyAxMToyOSwgS3VydCBKYWVn ZXIgd3JvdGU6DQo+IEhpIQ0KDQo+IA0KPj4gSSBnZXQgbWFueSBtYW55IGRtZXNnIG1lc3Nh Z2VzOg0KPj4gbGludXg6IGppZCAwIHBpZCAyODM0IChUaHJlYWRQb29sU2luZ2wpOiB1bnN1 cHBvcnRlZCBUQ1Agc29ja2V0IG9wdGlvbg0KPj4gVENQX0lORk8gKDExKQ0KPiBbLi4uXQ0K Pj4gV2hhdCBzaG91bGQgSSBkby4NCj4gDQo+IE9uIEZyZWVCU0Q6DQo+IA0KPiBtYW4gdGNw DQo+IA0KPiBzYXlzOg0KPiANCj4gICAgICAgVENQX0lORk8gICAgICAgICAgICAgIEluZm9y bWF0aW9uIGFib3V0IGEgc29ja2V0J3MgdW5kZXJseWluZyBUQ1Agc2Vzc2lvbg0KPiAgICAg ICAgICAgICAgICAgICAgICAgICAgICAgbWF5IGJlIHJldHJpZXZlZCBieSBwYXNzaW5nIHRo ZSByZWFkLW9ubHkgb3B0aW9uDQo+ICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUQ1Bf SU5GTyB0byBnZXRzb2Nrb3B0KDIpLiAgSXQgYWNjZXB0cyBhIHNpbmdsZQ0KPiAgICAgICAg ICAgICAgICAgICAgICAgICAgICAgYXJndW1lbnQ6IGEgcG9pbnRlciB0byBhbiBpbnN0YW5j ZSBvZiBzdHJ1Y3QNCj4gICAgICAgICAgICAgICAgICAgICAgICAgICAgIHRjcF9pbmZvLg0K PiANCj4gICAgICAgICAgICAgICAgICAgICAgICAgICAgIFRoaXMgQVBJIGlzIHN1YmplY3Qg dG8gY2hhbmdlOyBjb25zdWx0IHRoZSBzb3VyY2UNCj4gICAgICAgICAgICAgICAgICAgICAg ICAgICAgIHRvIGRldGVybWluZSB3aGljaCBmaWVsZHMgYXJlIGN1cnJlbnRseSBmaWxsZWQg b3V0DQo+ICAgICAgICAgICAgICAgICAgICAgICAgICAgICBieSB0aGlzIG9wdGlvbi4gIEZy ZWVCU0Qgc3BlY2lmaWMgYWRkaXRpb25zIGluY2x1ZGUNCj4gICAgICAgICAgICAgICAgICAg ICAgICAgICAgIHNlbmQgd2luZG93IHNpemUsIHJlY2VpdmUgd2luZG93IHNpemUsIGFuZA0K PiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYmFuZHdpZHRoLWNvbnRyb2xsZWQgd2lu ZG93IHNwYWNlLg0KPiANCj4gT24gRGViaWFuOg0KPiANCj4gbWFuIHRjcA0KPiANCj4gc2F5 czoNCj4gDQo+ICAgICAgICAgVENQX0lORk8gKHNpbmNlIExpbnV4IDIuNCkNCj4gICAgICAg ICAgICAgICAgVXNlZCB0byBjb2xsZWN0IGluZm9ybWF0aW9uIGFib3V0IHRoaXMgc29ja2V0 LiAgVGhlICBrZXJuZWwgIHJlLQ0KPiAgICAgICAgICAgICAgICB0dXJucyAgYSAgc3RydWN0 ICB0Y3BfaW5mbyAgYXMgIGRlZmluZWQgIGluICB0aGUgIGZpbGUgIC91c3IvaW4tDQo+ICAg ICAgICAgICAgICAgIGNsdWRlL2xpbnV4L3RjcC5oLiAgVGhpcyBvcHRpb24gc2hvdWxkIG5v dCBiZSB1c2VkIGluICBjb2RlICBpbi0NCj4gICAgICAgICAgICAgICAgdGVuZGVkIHRvIGJl IHBvcnRhYmxlLg0KPiANCj4gU28gbWF5YmUgc3RhcnQgc2VhcmNoaW5nIGluIHRoZSBjb2Rl IHdoYXQvd2h5IHRoYXQgY2FsbCBoYXBwZW5zDQo+IGFuZCB3aGF0IGl0IHJlYWxseSBtZWFu dCAob24gYm90aCBzeXN0ZW1zKS4NCj4gDQoNCi0tIA0KU2luY2VyZWx5LA0KRGltYSAoZmx1 ZmZ5QEZyZWVCU0Qub3JnLCBodHRwczovL3QubWUvRmx1ZmZ5QlNEKQ0KKGRlc2t0b3AsIGtk ZSwgeDExLCBvZmZpY2UsIHBvcnRzLXNlY3RlYW0pQEZyZWVCU0QgdGVhbQ0K --------------JfMxrslsX14o4rF3i8jDLybS-- --------------IcCLegNg1xYySZtBUND4r5G1 Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc" -----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEELTAsy5mEEwxvh7r8+4ugndU5jykFAmVCSqgFAwAAAAAACgkQ+4ugndU5jylr /Q//eR3ebhF+oYwXJwmVBNfkmiz3dEklaAnhmsjEQlNUvnIEEZe83sb0kBQ0XSEzu4MSQyQNewF2 UxuATC+18XWGCxLmZJrp/daTDNlI+pHj4TnHRnUHe29cuoA2/wddYI4OX0d0SYsiXYDNMT1LPVR2 ZFxogxsWdps5sNNNx2DcSTethtbPh3A+nd+EFF5YdSsVG9SQoxcn+amCf8s3oc+xHz7O8/tDmztS Z0P2DwEnJpOHejkPh18pERUB8SrJZDr1EbhVGcPem46sbGMP57I36f3JkFXoFxZWtdTnIob+X6XE CcaT71QBGuItf3EXC/+GS16kFJQ9m/EmfBsFqPDg6tDP11zr+l2qNRX1u5PK1tn9RCtjHWcRQr7E eLfYuHVy4F8d+etDhm5RXMdQuUzMYukzKkgT4LrHKHLRhQeKDViHgvBH8LtmG92H5+AjLR9z23eS h3fXHR2c/b8AFKgGvOAJ37aNC9+aD3aQLXuKj4okgAq1Gfpp3mtUQJbFDItvqXGG7goas5nz36Ym OqUrNCnLGcpbU1rvLlMJj6krcMTnn0F1dTkVShjN2v/hPLS6MKQdFbwygHLHQs1euncsr+ekDD+0 QjafYPtZCeyuCcP49twJ1WYSCmh6aW91sfHThUbKORodkBLwFeltQWfwpUs/LKh0JyewXKwftGHn YNs= =+WoZ -----END PGP SIGNATURE----- --------------IcCLegNg1xYySZtBUND4r5G1-- From nobody Wed Nov 1 15:01:05 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SL9Dx5mB5z4yRSH; Wed, 1 Nov 2023 15:01:05 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SL9Dx5NPWz4YBT; Wed, 1 Nov 2023 15:01:05 +0000 (UTC) (envelope-from salvadore@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698850865; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=rZWnhkuO43bqOY2WC46VagOEZE7iAWVe8q+EEe6B6Q8=; b=Wo67U9/cjQCe53U9WZpEhdbM0GPnb6uaRL+asRosDtUUivFkBDVBbfGSouvUM2yCClKRnw TBkl3uCr9fWEGM2ehFtapMLFLSQ5WG6NXvnERN2/hyfD8fmQxzctAMBFomT5DBSRiyCgPe BXgnPJ880+9iOvccS4fA2RKY5jsMHzj6TdXf59mWIO7xqCKPVoe8c2TMbczTMwqzmdGYi7 2RUnW16DCwMvAZEeyEItEuVAB8O6oel8IcRcEk1RvdB/WDagbKWcF9RNHxOyeyQV5blMVx UmrLb1TPFRWzgwuf7lbwJEOdK9SxlFxFoFIGht+vefjWlB1OsOQkpcQP0tjEcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698850865; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=rZWnhkuO43bqOY2WC46VagOEZE7iAWVe8q+EEe6B6Q8=; b=xZ/9YuwoI4HtdAn37TM0lemK354lajghxldtvTK8P3UQnQwcDfgurddDMkyQoaa6YioqFC hsOq4TNlNaiPf9eClLxgxPbAXQ9sNmDFPoc/8oKZeVbolIwk/7pt6GmYkSgrqGtE/9hG86 a/JqQGQjFYYEwwuCd7NJPldvWunQ4T7amniHd72YGjreS+MHnZwn6x7ra822NCJDWqzzEv 8Hca8Y682U2z1AvGyGHYyT0NR9M6scLj2TDhLEL9M1vZGfUHPmLnf5xFDClbOcLuRccU8w 2/GG8n/CP+etbkd+doh1Ac0w+jO9D0qGwsVounMYgUD9S+l+i3MHUoMqn/jbnQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698850865; a=rsa-sha256; cv=none; b=JBMcQeqeR27cguN6traFrr6NskPAeVJ8adfAKRd+qxenNBNp4i6Iw6IvfbW9MhVpZ6emx1 qHFxb1yjgBUyyDpXr4U+ElwxrS/8AQaeCQB8mTa1qerG12wXDsrRB33k2Y98lW7Da981W5 Z7phn4iwXmomc0U8A8quJLiWk1mWWu5qlZOrKubFRJTwTxtqsSoCUSFrGnagQUgCkXB3u1 kX/cvi08SHTEOFxEyGq01yZqGR2PnZHhvjrQqqJcBqTSF7Jp0+fuG98ydLZA3NEWVtPJ3y ukBhdd+S/gEfnvRvaEBtpzSLuhjEEosQhM2p75ZQaqLF32PjSlZrfgjHZCfq/Q== Received: by freefall.freebsd.org (Postfix, from userid 1472) id 896E03A70; Wed, 1 Nov 2023 15:01:05 +0000 (UTC) Date: Wed, 1 Nov 2023 15:01:05 +0000 From: Lorenzo Salvadore To: freebsd-hackers@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD Status Report - Third Quarter 2023 Message-ID: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline; filename=report Content-Transfer-Encoding: 8bit FreeBSD Status Report Third Quarter 2023 Here is the third 2023 status report, with 32 entries. This is the summer quarter and thus it includes many interesting news from Google Summer of Code. Of course, we also have our usual team reports and many projects share with us their latest news. Much important work has been done for the first release of FreeBSD 14. Have a nice read. Lorenzo Salvadore, on behalf of the Status Team. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ A rendered version of this report is available here: https://www.freebsd.org/status/report-2023-07-2023-09/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Table of Contents • FreeBSD Team Reports □ FreeBSD Core Team □ FreeBSD Foundation □ FreeBSD Release Engineering Team □ Continuous Integration □ Ports Collection • Projects □ Filling gaps in the FreeBSD desktop experience □ LLDB Kernel Module Improvement • Userland □ OpenSSL 3 in base — Improved □ Login Classes Fixes and Improvements □ Process Visibility Security Policies □ Linux compatibility layer update • Kernel □ Enabling Snapshots on Filesystems Using Journaled Soft Updates □ SquashFS driver for FreeBSD kernel • Architectures □ NXP DPAA2 support □ SIMD enhancements for amd64 □ Integrate mfsBSD into the Release Building Tools • Cloud □ OpenStack on FreeBSD □ FreeBSD on Microsoft HyperV and Azure □ FreeBSD on EC2 • Documentation □ Documentation Engineering Team □ FreeBSD Online Editor and Man Page Editor □ FreeBSD Expert System • Ports □ KDE on FreeBSD □ Pantheon desktop on FreeBSD □ FreeBSD Office Team □ Wifibox: Use Linux to Drive your Wireless Card on FreeBSD □ GCC on FreeBSD □ Valgrind: valgrind-devel updated for FreeBSD 15 □ GitLab 16.3 Available □ PortOptsCLI — Ports Collection Accessibility • Third Party Projects □ Introducing the BSD Cafe project □ Containers and FreeBSD: Pot, Potluck and Potman ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Demise of Hans Petter Selasky The FreeBSD Core Team would like to thank Hans Petter Selasky for his years of service. We were saddened by his death and joined the community in mourning. In Memoriam. Meetings with The FreeBSD Foundation The Core Team and The FreeBSD Foundation continue to meet to discuss the next steps to take for the management, development, and future of FreeBSD. The Core Team had two meetings with the Board of Directors, and employees of, the Foundation. They discussed how the Foundation can help the Core Team and the Project in general. Portmgr termlimits The Core Team discussed with the Ports Management Team the introduction of a time limit in which a developer can belong to the team. The proposal was approved by the Ports Management Team and will take effect at the beginning of 2024, with regular lurker programs to have a steady stream of new Ports Management Team members. Deprecation of 32-bit platforms for FreeBSD 15 Work is underway to mark support for 32-bit platforms as "deprecated" for FreeBSD 15. Matrix IM The testing of the Matrix instance and the Element-web client is still in progress. The beta is planned to be released after EuroBSDCon in September. Improve Commit Bit Expiration Policy The Core Team will clarify how to update the PGP key once a developer has become Alumni. EuroBSDCon Core Team members met with the FreeBSD Foundation in Coimbra during EuroBSDcon to discuss the direction of the Project. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Foundation Links: FreeBSD Foundation URL: https://freebsdfoundation.org/ Technology Roadmap URL: https://freebsdfoundation.org/blog/technology-roadmap/ Donate URL: https://freebsdfoundation.org/donate/ Foundation Partnership Program URL: https://freebsdfoundation.org/our-donors/ freebsd-foundation-partnership-program/ FreeBSD Journal URL: https://freebsdfoundation.org/journal/ Foundation Events URL: https://freebsdfoundation.org/our-work/events/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Donations from individuals and corporations fund and manage software development projects, conferences, and developer summits. We also provide travel grants to FreeBSD contributors, purchase and support hardware to improve and maintain FreeBSD infrastructure, and provide resources to improve security, quality assurance, and cluster administration efforts. We publish marketing material to promote, educate, and advocate for FreeBSD, facilitate collaboration between commercial vendors and FreeBSD developers, and finally, represent the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. This quarter we helped FreeBSD celebrate its 30th anniversary! This excitement has propelled us to accelerate our efforts to move FreeBSD forward in growth and innovation, which has focused us on identifying key areas we can invest our resources. At our board meeting in September, we refined our goals to focus on increasing FreeBSD adoption and visibility, diversifying our funding stream, and investing in the community health and long-term stability of the Project. We are in the process of identifying the key audiences and markets to target, while putting measurable outcomes to these goals. In this status report, you will read more about our work to help further FreeBSD’s growth and innovation. We will highlight all the technical work we are doing to improve FreeBSD, both by our internal staff of software developers, as well as external project funding efforts. You will read about our advocacy work to promote FreeBSD to audiences outside of our community. Finally, you will see the great efforts made to connect with current and potential commercial users. Fundraising We would like to express our sincere gratitude to all those who generously donated to support our work. In addition to numerous individual contributions, we are especially grateful for the significant donations from NetApp, Netflix, and ARM. In Q3 alone, we received $183,842, bringing our total for the year to $375,000. This year our budget is around $2,230,000, which includes increased spending toward FreeBSD advocacy and software development. More than half of our budget is allocated toward work directly related to improving FreeBSD and keeping it secure. By providing a dedicated individual focused on partnerships, we can effectively emphasize the significance of investing in our efforts and underscore the long-term viability of FreeBSD to companies. Your support is crucial to our mission, and we deeply appreciate your commitment to the FreeBSD community. Please consider making a donation toward our 2023 fundraising campaign! https://freebsdfoundation.org/donate/ For our larger commercial donors, check out our updated FreeBSD Foundation Partnership Program. Partnerships and Research For Partnerships and Research this quarter, progress was made in three key areas: First, the Enterprise Working Group started to gather steam with growth up to 58 participants and active projects in four work streams. These are cloud native, Samba, bhyve manageability, and support for AI workloads. There is interest in several additional areas and I expect that by the end of this year and Q1 of next year, we will see meaningful feature updates in multiple areas of focus. Second, we made good progress working with other open source community members and organizations, notably the Open Source Initiative, to advance proposals and technology from the FreeBSD community. Working with the Open Source Initiative’s Open Policy Alliance, we are submitting a response to the US government’s request for information on how the US government can support open source security and sustainability. As part of this, Greg Wallace participated on a panel organized by the Open Policy Alliance at the recent All Things Open conference in Raleigh, North Carolina. Greg Wallace has also been tracking how the US government incorporates CHERI into its policy recommendations for security by default, such as this recent report from US and global government security agencies. On Page 28, CHERI is listed right after Rust as a key 'Secure by Design' tactic. Finally, we continue to strengthen partnerships with a growing number of companies using FreeBSD. Several conferences aided these relationships, including EuroBSDCon, Open Source Summit, and All Things Open. We have also developed a new program to support vendor/cloud users that work with the US government. The program details will be announced at the FreeBSD Vendor Summit. Advocacy Much of our effort is dedicated to the FreeBSD Project advocacy. This may involve highlighting interesting FreeBSD work, producing literature and video tutorials, attending events, or giving presentations. The goal of the literature we produce is to teach people FreeBSD basics and help make their path to adoption or contribution easier. Other than attending and presenting at events, we encourage and help community members run their own FreeBSD events, give presentations, or staff FreeBSD tables. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, working together on projects, and facilitating collaboration between developers and commercial users. This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. We continue to add new events to our yearly roster. This July, we held a workshop and staffed a table at FOSSY, a new open source conference in Portland, Oregon. In addition to attending and planning conferences, we are continually working on new training initiatives and updating our selection of how-to guides to facilitate getting more folks to try out FreeBSD. Check out some of our advocacy work: • Held a workshop and hosted a table at FOSSY, July 13-16, 2023, in Portland, Oregon. • Friend-level sponsor of COSCUP, July 27-29, 2023, in New Taipei, Taiwan • Presented at the EuroBSDCon FreeBSD Developer Summit, and sponsored and staffed a table at EuroBSDCon 2023, September 14-17, 2023 in Coimbra, Portugal • Attended the Open Source Summit, Europe, September 19-21, Bilbao, Spain • Continued planning the November 2023 FreeBSD Vendor Summit, taking place November 2-3, 2023, in San Jose, California • Continued to administer our Google Summer of Code program • Published the July Newsletter • Additional Blog Posts □ Advocating at Events: May 2023 FreeBSD Dev Summit and BSDCan □ Top Ten Reasons to Upgrade to FreeBSD 13.2 □ July 2023 Software Development Projects Update □ FreeBSD for Research: CHERI/Morello □ Meet the FreeBSD Google Summer of Code Students ☆ Soobin Rho ☆ Raghav Sharma ☆ Sudhanshu Mohan Kashyap ☆ Aymeric Wibo □ Meet The Summer 2023 University of Waterloo Co-Op Student: Naman Sood □ Meet FreeBSD Foundation 2023 Summer Intern: Jake Freeland • FreeBSD in the News □ FreeBSD Foundation Joins OSI’s Open Policy Alliance □ Hackernoon: 5 Reasons We Use Open Source FreeBSD as Our Enterprise OS □ What the Dev Podcast: The Evolution of the FreeBSD Project. We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. As we mentioned previously, the FreeBSD Journal is now a free publication. Find out more and access the latest issues at https://www.freebsdfoundation.org/journal/. You can find out more about events we attended and upcoming events at https://freebsdfoundation.org/our-work/events/. OS Improvements During the third quarter of 2023, 282 src, 652 ports, and 24 doc tree commits identified The FreeBSD Foundation as a sponsor. Some of this Foundation-sponsored work is described in separate report entries: • Enabling Snapshots on Filesystems Using Journaled Soft Updates • Login Classes Fixes and Improvements • OpenSSL 3 in base — Improved • OpenStack on FreeBSD • Process Visibility Security Policies • SIMD enhancements for amd64. Members of the Technology Team attended EuroBSDCon 2023 in Coimbra, Portugal. Li-Wen Hsu gave a tutorial to help newcomers contribute to FreeBSD. Before the conference, the FreeBSD Developer Summit took place, where the team presented a short update on their recent work. Six summer internships or projects wrapped up. • Jake Freeland spent the summer working on a a Capsicum project to trace violations, adapt various daemons such as syslogd(8), and write documentation. • Naman Sood worked on various tasks, mostly related to networking. • En-Wei Wu completed another wireless internship to improve and extend wtap, the net80211(4) Wi-Fi simulator. • Yan-Hao Wang worked on a documentation and testing project to, e.g., build an online man page editor and add test cases for some userspace tools. • Christos Margiolis completed his project to improve the kinst DTrace provider by implementing inline function tracing and porting kinst to arm64 and riscv. • In preparation for FreeBSD 14.0, Muhammad Moinur (Moin) Rahman committed over 700 fixes or workarounds for ports affected by recent OpenSSL and LLVM updates. For more information about current and past Foundation-contracted work, visit the Foundation Projects page. Here is a sampling of other Foundation-sponsored work completed over the quarter: • Improved riscv64 CPU identity and feature detection • Rewrote intro(9) man page from scratch • Performed code maintenance and fixed bugs in the hwpmc(4) module and the pmc(3) library and tools • Committed various freebsd-update(8) fixes in preparation for FreeBSD 14.0 • Committed many (37) updates and fixes to the LinuxKPI, iwlwifi, and net802.11 code • Updated SSH first to OpenSSH 9.3p2, then 9.4p1 • Patched ssh-keygen to generate Ed25519 keys when invoked without arguments • Added a clean-room implementation of the Linux membarrier(2) system call • Increased MAXCPU to 1024 on amd64 and arm64 • Committed fixes for automatic Zenbleed misbehavior/data leaks prevention on affected machines (via chicken bit) • Reviewed the use of scheduling priorities throughout the kernel for work in progress to harden the rtprio() system call and make it more useful in some cases. Supporting FreeBSD Infrastructure The Foundation provides hardware and two staff members to help support the FreeBSD cluster. With your donations, the Foundation, in coordination with the Cluster Administration Team, purchased five new package builders, three new web servers, a new firewall/router, two package mirrors, and two new servers for continuous integration. With the exception of one of the package mirrors, all the new hardware will be located on the east coast of the USA. Continuous Integration and Quality Assurance The Foundation provides a full-time staff member and funds projects to improve continuous integration, automated testing, and overall quality assurance efforts for the FreeBSD project. You can read more about CI work in a dedicated report entry. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to https://freebsdfoundation.org to find more about how we support FreeBSD and how we can help you! ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Release Engineering Team Links: FreeBSD 14.0-RELEASE schedule URL: https://www.freebsd.org/releases/14.0R/ schedule/ FreeBSD releases URL: https://download.freebsd.org/releases/ISO-IMAGES/ FreeBSD development snapshots URL: https://download.freebsd.org/snapshots/ ISO-IMAGES/ Contact: FreeBSD Release Engineering Team, The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the third quarter of the year, the FreeBSD Release Engineering Team started work on the upcoming 14.0-RELEASE cycle. As of this writing, BETA3 had been released, with BETA4 to follow shortly after. The Release Engineering Team continued providing weekly development snapshot builds for the main and stable/13 branches. Sponsor: Tarsnap Sponsor: https://www.gofundme.com/f/gjbbsd/ Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Continuous Integration Links: FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI Tinderbox view URL: https://https://tinderbox.freebsd.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org Hosted CI wiki URL: https://wiki.FreeBSD.org/HostedCI 3rd Party Software CI URL: https://wiki.FreeBSD.org/3rdPartySoftwareCI Tickets related to freebsd-testing@ URL: https://bugs.freebsd.org/bugzilla/buglist.cgi?bug_status=open&email1=testing%40FreeBSD.org&emailassigned_to1=1&emailcc1=1&emailtype1=equals FreeBSD CI Repository URL: https://github.com/freebsd/freebsd-ci dev-ci Mailing List URL: https://lists.FreeBSD.org/subscription/dev-ci Contact: Jenkins Admin Contact: Li-Wen Hsu Contact: freebsd-testing Mailing List Contact: IRC #freebsd-ci channel on EFNet In the third quarter of 2023, we worked with the project contributors and developers to address their testing requirements. Concurrently, we collaborated with external projects and companies to enhance their products by testing more on FreeBSD. Important completed tasks: • Add jobs for stable/14 branch • Update the "Tinderbox" view of the CI results, now includes test results and the "starting point" of the current failing or unstable series. • This is mainly done by the Foundation intern, Yan-Hao Wang. His other contributions are in the other entry of this report. Work in progress tasks: • Designing and implementing pre-commit CI building and testing and pull/ merged-request based system (to support the workflow working group) • Proof of concept system is in progress. • Designing and implementing use of CI cluster to build release artifacts as release engineering does • Simplifying CI/test environment setting up for contributors and developers • Setting up the CI stage environment and putting the experimental jobs on it • Improving the hardware test lab and adding more hardware for testing • Merge https://reviews.freebsd.org/D38815 • Merge https://reviews.freebsd.org/D36257 Open or queued tasks: • Collecting and sorting CI tasks and ideas • Setting up public network access for the VM guest running tests • Implementing use of bare-metal hardware to run test suites • Adding drm ports building tests against -CURRENT • Planning to run ztest tests • Helping more software get FreeBSD support in its CI pipeline (Wiki pages: 3rdPartySoftwareCI, HostedCI) • Working with hosted CI providers to have better FreeBSD support Please see freebsd-testing@ related tickets for more WIP information, and do not hesitate to join the effort! Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Collection Links: About FreeBSD Ports URL:https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://docs.freebsd.org/en/articles/contributing/#ports-contributing FreeBSD Ports Monitoring URL: http://portsmon.freebsd.org/ Ports Management Team URL: https://www.freebsd.org/portmgr/ Ports Tarball URL: http://ftp.freebsd.org/pub/FreeBSD/ports/ports/ Contact: René Ladan Contact: FreeBSD Ports Management Team The Ports Management Team is responsible for overseeing the overall direction of the Ports Tree, building packages, and personnel matters. Below is what happened in the last quarter. • According to INDEX, there are currently 34,600 ports in the Ports Collection. There are currently 3,000 open ports PRs of which some 730 are unassigned. The last quarter saw 11,454 commits by 130 committers on the main branch and 828 commits by 37 committers on the 2023Q3 branch. Compared to last quarter, this means a slight decrease in the number of unassigned PRs, a 10% increase in the number of commits on the main branch but also less backports to the quarterly branch. The number of ports also grew a bit. During Q3 we welcomed Joel Bodenmann (jbo@) as a new ports committer, granted a ports commit bit to mizhka@ who was already a src committer, and took the commit bits of knu@ and uqs@ in for safe-keeping after a year of inactivity. Portgmr discussed and worked on the following things during Q3: • Some progress has been made on sub-packages and a lightning talk was given by pizzamig@ at EuroBSDCon • Overhauling some parts of the ports tree (LIB_DEPENDS, PREFIX, MANPREFIX, MANPATH) Support for FreeBSD 13.1 was removed from the ports tree as it reached its end-of-life on August 1st. The following happened on the infrastructure side: • USES for ebur128 and guile were added • Default versions for Mono, Perl, and PostgreSQL were updated to respectively 5.20, 5.34, and 15 • Default versions for ebur128, guile, and pycryptography were added at respectively "rust", 2.2, and "rust" • Updates to major ports that happened were: □ pkg to 1.20.7 □ chromium to 117.0.5938.132 □ Firefox to 118.0.1 □ KDE to 5.27.8 □ Rust to 1.72.0 □ Wine to 8.0.2 During the last quarter, pgkmgr@ ran 18 exp-runs to test various ports upgrades, updates to default versions of ports, and changes to pycryptography. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. Filling gaps in the FreeBSD desktop experience Links: External media manager URL: https://github.com/outpaddling/qmediamanager devd-based automounter URL: https://github.com/outpaddling/devd-mount SUID mount tool URL: https://github.com/outpaddling/npmount Popup notification for updates URL: https://github.com/outpaddling/ freebsd-update-notify Contact: Jason Bacon The sysutils/desktop-installer port, available for over a decade now, quickly configures a bare FreeBSD system with any desktop environment or window manager. However, the FreeBSD base and ports collection has been missing some common features that end users expect from a desktop OS. The desktop-installer battery monitor script has been enhanced to display popup notifications at various levels of charge/discharge. deskutils/qmediamanager, in conjunction with sysutils/devd-mount and sysutils/npmount, mounts inserted media upon notification from devd, and displays a popup window offering the user options to show filesystem information, open a file manager, reformat, copy a disk image to the device, or unmount. It provides a convenient and secure way to work with external media such as USB sticks. A fourth new port — deskutils/freebsd-update-notify — displays a popup when new base updates are available, or when a configurable time limit has elapsed. If the user chooses to proceed with updates, the entire system is updated (packages, ports, and base) with auto-update-system(1) (a feature of sysutils/auto-admin). These new tools bring the FreeBSD desktop experience a step closer to the convenience of the most popular desktop operating systems. The tools are effectively prototypes, stable and reliable, but in need of review. Feedback from users regarding default behavior and configuration options will be appreciated. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ LLDB Kernel Module Improvement Links: GSoC Wiki Project URL: https://wiki.freebsd.org/SummerOfCode2023Projects/LLDBKernelModuleImprovement Project Codebase URL: https://github.com/aokblast/freebsd-src/tree/lldb_dynamicloader_freebsd_kernel LLVM PullRequest URL: https://github.com/llvm/llvm-project/pull/67106 Contact: Sheng-Yi Hong The LLDB Kernel Module Improvement Project described in the previous quarter report implements DynamicLoader Plugin for FreeBSD Kernel on LLDB. All of the work is done — that is, this plugin can correctly load all kernel modules and their debug files extracted from kernel coredump. This plugin has been tested on both x86-64 for relocatable type kernel module and arm64(EC2) for shared library type kernel module. Both of these platforms show this plugin works well. Currently, this plugin prepares to be landed to LLVM codebase in LLVM PullRequest Sponsor: The Google Summer of Code '23 program ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Userland Changes affecting the base system and programs in it. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ OpenSSL 3 in base — Improved Links: OpenSSL Downloads URL: https://www.openssl.org/source/ Contact: Pierre Pronchery This is a follow-up to the previous quarterly report on the integration of OpenSSL 3 into the base system. The most obvious updates since the previous report are certainly the 3.0.10 and then 3.0.11 releases, fixing CVE issues with low to medium severity ( CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-4807). However these are not the only changes, and this quarter some issues specific to the integration were fixed, most of which were found while building ports with OpenSSL 3 in the base system. Fixes included: • Linking the engines and the legacy provider with the libcrypto.so shared object, for proper visibility of symbols, and for which a hack was required in the build system. • Correcting the list of source files for the FIPS provider. • Ensuring backward compatibility for the deprecated 0.9.8 API, which was notably helpful for the PAM authentication module from security/ pam_ssh_agent_auth, based on OpenSSH’s ssh-agent(1) authentication mechanism. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Login Classes Fixes and Improvements Links: Start of the reviews stack URL: https://reviews.freebsd.org/D40339 Contact: Olivier Certner Context Login classes are a mechanism mainly used to set various process properties and attributes at login, depending on the user logging in and the login class he is a member of. A login class typically specifies resource limits, environment variables and process properties such as scheduling priority and umask. See login.conf(5) for more information. Changes The priority and umask capabilities now accept the inherit special value to explicitly request property inheritance from the login process. This is useful, e.g., when temporarily logging in as another user from a process with a non-default priority to ensure that processes launched by this user still have the same priority level. Users can now override the global setting for the priority capability (in /etc/ login.conf) in their local configuration file (~/.login_conf). Note however that they cannot increase their priority if they are not privileged, and that using inherit in this context makes no sense, since the global setting is always applied first. Fixes: • Fix a bug where, when the priority capability specifies a realtime priority, the final priority used was off-by-one (and the numerically highest priority in the real time class (31) could never be set). • Security: Prevent a setuid/setgid process from applying directives from some user’s ~/.login_conf (directives there that cannot be applied because of a lack of privileges could suddenly become applicable in such a process). We have also updated the relevant manual pages to reflect the new functionality, and improved the description of the priority and umask capabilities in login.conf(5). Status Some of the patches in the series have been reviewed thanks to Konstantin Belousov and Warner Losh. Other patches are waiting for reviews (and reviewers, volunteers welcome!), which are not expected to be labored. We plan to improve consistency by deprecating the priority reset to 0 when no value for the capability priority is explicitly specified, which has been the case for umask for 15+ years. Sponsor: Kumacom SAS (for development work) Sponsor: The FreeBSD Foundation (for some reviews) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Process Visibility Security Policies Links: Start of the reviews stack URL: https://reviews.freebsd.org/D40626 Contact: Olivier Certner Context FreeBSD implements three built-in security policies that limit which processes are visible to particular users, with the goal of preventing information leaks and unwanted interactions. The first one can prevent an unprivileged user from seeing or interacting with processes that do not have the user’s UID as their real UID. It can be activated by setting the sysctl security.bsd.see_other_uids to 0 (default is 1). The second one can prevent an unprivileged user from seeing or interacting with processes whose credentials do not have any group that the user is a member of. It can be activated by setting the sysctl security.bsd.see_other_gids to 0 (default is 1). The third one can prevent an unprivileged user’s process from seeing or interacting with processes that are in a jail that is a strict sub-jail of the former. The jail subsystem already prevents such a process to see processes in jails that are not descendant of its own (see jail(8) and in particular the section "Hierarchical Jails"). One possible use of this policy is, in conjunction with the first one above, to hide processes in sub-jails that have the same real UID as some user in an ancestor jail, because users having identical UIDs in these different jails are logically considered as different users. It can be activated by setting the sysctl security.bsd.see_jail_proc to 0 (default is 1). After a review of these policies' code and real world testing, we noticed a number of problems and limitations which prompted us to work on this topic. Changes The policy controlled by the security.bsd.see_jail_proc sysctl has received the following fixes and improvements: • Harden the security.bsd.see_jail_proc policy by preventing unauthorized users from attempting to kill, change priority of or debug processes with same (real) UID in a sub-jail at random, which, provided the PID of such a process is guessed correctly, would succeed even if these processes are not visible to them. • Make this policy overridable by MAC policies, as are the others. The policy controlled by security.bsd.see_other_gids was fixed to consider the real group of a process instead of its effective group when determining whether the user trying to access the process is a member of one of the process' groups. The rationale is that some user should continue to see processes it has launched even when they acquire further privileges by virtue of the setgid bit. Conversely, they should not see processes launched by a privileged user that temporarily enters the user’s primary group. This new behavior is consistent with what security.bsd.see_other_uids has always been doing for user IDs (i.e., considering some process' real user ID and not the effective ID). We have updated manual pages related to these security policies, including security(7), sysctl(8), and ptrace(2). Several manual pages of internal functions either implementing or leveraging these policies have also been revamped. Status Thanks to the help of Mitchell Horne, Pau Amma, Benedict Reuschling and Ed Maste, most of the submitted changes have been reviewed and approved, so they should reach the tree soon. The patch series starts with review D40626. From there, click on the "Stack" tab to see the full list of reviews implementing the changes. As a later step, we are considering turning the security.bsd.see_jail_proc policy on by default (i.e., the default value of the sysctl would become 0) unless there are objections. Sponsor: Kumacom SAS (for development work) Sponsor: The FreeBSD Foundation (for most of the reviews) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Linux compatibility layer update Links: Linuxulator status Wiki page URL: https://wiki.freebsd.org/Linuxulator Linux app status Wiki page URL: https://wiki.freebsd.org/LinuxApps Contact: Dmitry Chagin The goal of this project is to improve FreeBSD’s ability to execute unmodified linux(4) binaries. As of 22dca7acf775, xattr system calls are implemented. That makes it possible to use Linux rsync. As of bbe017e0415a, ioprio system calls are implemented. That makes it possible to debootstrap Ubuntu 23.04. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Kernel Updates to kernel subsystems/features, driver support, filesystems, and more. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Enabling Snapshots on Filesystems Using Journaled Soft Updates Contact: Marshall Kirk McKusick This project has made UFS/FFS filesystem snapshots available when running with journaled soft updates. The details of this project were described in the 2022 fourth quarter report. This project had two milestones: The first milestone of this project was to make it possible to take snapshots when running with journaled soft updates and to use them for doing background dumps on a live filesystem. Background dumps are requested by using the -L flag to dump(8). This milestone was completed in Q4 of 2022 and was made available in the 13.2 release as described in the 2023 first quarter report. The second milestone of this project was to do a background check using a snapshot on a filesystem running with journaled soft updates. This milestone was completed in the third quarter of 2023 in time to be included as part of the 14.0 release. It was also made available in the 13.2-STABLE release. Sponsored by: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SquashFS driver for FreeBSD kernel Links: Wiki page URL: https://wiki.freebsd.org/SummerOfCode2023Projects/PortSquashFuseToTheFreeBSDKernel Source code URL: https://github.com/Mashijams/freebsd-src/tree/gsoc/testing Contact: Raghav Sharma This quarter we finished SquashFS driver work for the kernel. We now can mount SquashFS archives on FreeBSD 13.2-RELEASE or greater, and perform all basic read-only filesystem operations. Code work includes: • Implementing vop_lookup() and vop_readdir() hooks for directory read support. • Implementing vop_read() and vop_strategy() hooks for files read support. • Implementing vop_readlink() hook for symlinks read support. We also implemented extended attributes interface functions for SquashFS. All that remains is to implement their kernel interface hooks. There were a lot of bug fixes as well. One major issue was to find out why we can not list the first entry of the root directory, it transpires that SquashFS could have inode_number as zero, which the kernel, for some reason, skips while listing dirents. For now, we fixed it by passing dummy inode_number, instead of zero, to dirent. The code review is currently ongoing with my mentor Chuck Tuffli. I am happy to say that SquashFS will find its place in upcoming FreeBSD releases. Sponsor: The Google Summer of Code 2023 program ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Architectures Updating platform-specific features and bringing in support for new hardware platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ NXP DPAA2 support Links: DPAA2 in the FreeBSD source tree URL: https://cgit.freebsd.org/src/tree/sys/dev/dpaa2 DPAA2 on Github URL: https://github.com/mcusim/freebsd-src Contact: Dmitry Salychev Contact: Bjoern A. Zeeb What is DPAA2? DPAA2 is a hardware-level networking architecture found in some NXP SoCs which contains hardware blocks including Management Complex (MC, a command interface to manipulate DPAA2 objects), Wire Rate I/O processor (WRIOP, packets distribution, queuing, drop decisions), Queues and Buffers Manager (QBMan, Rx/ Tx queues control, Rx buffer pools) and others. The Management Complex runs NXP-supplied firmware which provides DPAA2 objects as an abstraction layer over those blocks to simplify access to the underlying hardware. Changes from the previous report • Isolation between DPAA2 channels improved. • Panic under heavy network load fixed. • FDT/ACPI MDIO support. • NFS root mount do not hang on netboot over DPAA2 anymore. • Drivers started to communicate with MC via their own command portals (DPMCP). • List of all closed issues. Work in Progress Work on dev/sff started to support SFF/SFP modules in order to test DPAA2 drivers on links above 1 Gbit/s. Plan • Heavy network load tests (2.5 Gbit/s, 10 Gbit/s) and bottlenecks mitigation. • Cached memory-backed software portals. • Driver resources de-allocation to unload dpaa2.ko properly. • Further parts (DPSW, DCE, etc.) supported by the hardware. Sponsor: Traverse Technologies (providing Ten64 HW for testing) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SIMD enhancements for amd64 Links: Project proposal URL: http://fuz.su/~fuz/freebsd/2023-04-05_libc-proposal.txt simd(7) URL: https://man.freebsd.org/cgi/man.cgi?query=simd&sektion=7&manpath=FreeBSD+15.0-CURRENT Contact: Robert Clausecker SIMD instruction set extensions such as SSE, AVX, and NEON are ubiquitous on modern computers and offer performance advantages for many applications. The goal of this project is to provide SIMD-enhanced versions of common libc functions (mostly those described in string(3)), speeding up most C programs. For each function optimised, up to four implementations will be provided: • a scalar implementation optimised for amd64, but without any SIMD usage, • either a baseline implementation using SSE and SSE2, or an x86-64-v2 implementation using all SSE extensions up to SSE4.2, • an x86-64-v3 implementation using AVX and AVX2, and • an x86-64-v4 implementation using AVX-512F/BW/CD/DQ. Users will be able to select which level of SIMD enhancements to use by setting the ARCHLEVEL environment variable. While the current project only concerns amd64, the work may be expanded to other architectures like arm64 in the future. During the last few months, significant progress has been made on this project. SIMD-enhanced versions of bcmp(3), index(3), memchr(3), memcmp(3), stpcpy(3), strchr(3), strchrnul(3), strcpy(3), strcspn(3), strlen(3), strnlen(3), and strspn(3) have landed. Functions memcpy(3), memmove(3), strcmp(3), timingsafe_bcmp(3) (see D41673), and timingsafe_memcmp(3) (see D41696) are work in progress. Unfortunately, the work has not made the cut for FreeBSD 14.0, but it is slated to be part of FreeBSD 14.1. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Integrate mfsBSD into the Release Building Tools Links: Wiki Article URL: https://wiki.freebsd.org/SummerOfCode2023Projects/IntegrateMfsBSDIntoTheReleaseBuildingTools Code Review on Phabricator URL: https://reviews.freebsd.org/D41705 FreeBSD Foundation Blog Post URL: https://freebsdfoundation.org/blog/meet-the-2023-freebsd-google-summer-of-code-students-soobin-rho/ Contact: Soobin Rho What is mfsBSD? "mfsBSD is a toolset to create small-sized but full-featured mfsroot based distributions of FreeBSD that store all files in memory (MFS) [Memory File System] and load from hard drive, USB storage device, or optical medium. It can be used for a variety of purposes, including diskless systems, recovery partitions and remotely overwriting other operating systems." Martin Matuška is the creator of mfsBSD. He is also author of the original (2009) mfsBSD white paper, from which the excerpt above is taken. Upstream mfsBSD is maintained in the repository on GitHub. Purpose of this Project This project integrates mfsBSD into the FreeBSD release tool set, creating an additional target of mfsBSD images (.img and .iso files) in /usr/src/release/ Makefile. Prior to integration, mfsBSD only existed outside the FreeBSD release tool chain, and only -RELEASE versions were produced. With this project, mfsBSD images will be available at the official FreeBSD release page. You will also be able to build mfsBSD yourself by invoking cd / usr/src/release && make release WITH_MFSBSD=1, which will then create mfsbsd-se.img and mfsbsd-se.iso at /usr/obj/usr/src/${ARCH}/release/. Changes from last quarter The code is ready, and is currently under review. If you would like to get involved with the review process, please feel free to do so! Here is my revision. Sponsor: Google, Inc. (GSoC 2023) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cloud Updating cloud-specific features and bringing in support for new cloud platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ OpenStack on FreeBSD Links: OpenStack URL: https://www.openstack.org/ OpenStack on FreeBSD URL: https://github.com/openstack-on-freebsd Contact: Chih-Hsin Chang Contact: Li-Wen Hsu OpenStack, an open-source cloud operating system, has been a valuable resource for deploying various resource types on cloud platforms. However, the challenge has been running OpenStack’s control plane on FreeBSD hosts. Our project’s mission is to enable FreeBSD to function seamlessly as an OpenStack host. Throughout this quarter, we focused on the last bit of the entire proof of concept (POC), the VM console integration. The goal is to let users get serial consoles via the OpenStack client to access the VM instances running on the FreeBSD-based OpenStack cluster. This is also important because right now we do not have a port for the managed DHCP service in Neutron. Users need to manually configure the correct IP addresses for the VM instances to have network connectivity. However, bhyve(8) does not natively expose serial consoles, so we need to instead export the nmdm(4) device over the network. This is done by a custom proxy called socat-manager, and yes, we leverage socat(1) to listen on specific ports allocated by OpenStack nova-compute to be integrated into their workflow. With the aid of another critical part, the custom Libvirt hook for bhyve, we can connect the two endpoints and make the consoles accessible to the users. During development of the hook script, we found that the hook interface provided by Libvirt specifically for bhyve was not well implemented. Fortunately, the Libvirt developer fixed the issue promptly, and we plan to refine our hook script when the fix is released in the future. We also addressed the nested bhyve issue (running bhyve VMs on top of Linux KVM) in our development environment mentioned in the last quarterly report. It is caused by the APIC emulation of the two VT-x features: VID and PostIntr. Our host’s CPUs have these two features so we need to disable them at the L1 guest, which acts as a bhyve host, in /boot/loader.conf to make L2 guests not hanging. It is crucial for us to be able to work on the project in a fully virtualized environment due to the lack of physical resources. This could be equally important for people interested in the project, lowering the bar for them to try out or validate the entire POC on their environment without too demanding setup requirements. Looking ahead to Q4, our focus is wrapping up the POC with revised documentation and porting to FreeBSD 14.0-RELEASE. Dependencies that lack the corresponding FreeBSD packages will be ported one by one. We also aim to rebase our work with OpenStack 2023.1 Antelope. We invite those interested to explore our documentation and contribute to this project’s success. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on Microsoft HyperV and Azure Links: Microsoft Azure article on FreeBSD wiki URL: https://wiki.freebsd.org/ MicrosoftAzure Microsoft HyperV article on FreeBSD wiki URL: https://wiki.freebsd.org/HyperV Contact: Microsoft FreeBSD Integration Services Team Contact: freebsd-cloud Mailing List Contact: The FreeBSD Azure Release Engineering Team Contact: Wei Hu Contact: Souradeep Chakrabarti Contact: Li-Wen Hsu In this quarter, we have worked mainly on ARM64 architecture support and building and publishing both UFS and ZFS based images to Azure community gallery. There are some testing images available in the project’s testing public gallery, named FreeBSDCGTest-d8a43fa5-745a-4910-9f71-0c9da2ac22bf: • FreeBSD-CURRENT-testing • FreeBSD-CURRENT-gen2-testing • FreeBSD-CURRENT-arm64-testing • FreeBSD-CURRENT-zfs-testing • FreeBSD-CURRENT-zfs-gen1-testing To use them, when creating a virtual machine: 1. In Select an Image step, choose Community Images in Other items 2. Search FreeBSD We are aiming to provide all those images for 14.0-RELEASE. Work in progress tasks: • Automating the image building and publishing process and merge to src/ release/. • Building and publishing all supported VM images to Azure Marketplace • Building and publishing snapshot builds to Azure community gallery The above tasks are sponsored by The FreeBSD Foundation, with resources provided by Microsoft. Wei Hu and Souradeep Chakrabarti have fixed several critical bugs in arm64: • https://bugs.freebsd.org/267654 • https://bugs.freebsd.org/272461 • https://bugs.freebsd.org/272666 The root cause was identified and fixed in e7a9817b8d32: Hyper-V: vmbus: implementat bus_get_dma_tag in vmbus And continue working on improving Microsoft Azure Network Adapter (MANA) support. Open tasks: • Update FreeBSD related doc at Microsoft Learn • Support FreeBSD in Azure Pipelines • Update Azure agent port to the latest version • Upstream local modifications of Azure agent Sponsor: Microsoft for people in Microsoft, and for resources for the rest Sponsor: The FreeBSD Foundation for everything else ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on EC2 Links: FreeBSD/EC2 Patreon URL: https://www.patreon.com/cperciva Contact: Colin Percival FreeBSD is available on both x86 (Intel and AMD) and ARM64 (Graviton) EC2 instances. Work continues to ensure that upcoming instance types will be supported. Weekly FreeBSD snapshots now include experimental ZFS-root AMIs for 14.0 and 15.0. This change will be present in FreeBSD 14.0-RELEASE. Work is underway to start publishing experimental "cloud-init" AMIs. This is expected to arrive in time for FreeBSD 14.0-RELEASE. This work is supported by Colin’s FreeBSD/EC2 Patreon. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Noteworthy changes in the documentation tree, manual pages, or new external books/documents. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Engineering Team Link: FreeBSD Documentation Project URL: https://www.freebsd.org/docproj/ Link: FreeBSD Documentation Project Primer for New Contributors URL: https://docs.freebsd.org/en/books/fdp-primer/ Link: Documentation Engineering Team URL: https://www.freebsd.org/administration/#t-doceng Contact: FreeBSD Doceng Team The doceng@ team is a body to handle some of the meta-project issues associated with the FreeBSD Documentation Project; for more information, see the FreeBSD Doceng Team Charter. During this quarter: • The search functionality of the documentation portal was moved from DuckDuckGo to our own search engine; for more information, see this commit • grahamperrin@'s doc commit bit was taken for safekeeping as per his request • pluknet@'s doc commit bit was taken for safekeeping as per his request. Porter’s Handbook New USES knobs have been added to the Handbook: • USES= ebur128. • USES= guile. FreeBSD Translations on Weblate Link: Translate FreeBSD on Weblate URL: https://wiki.freebsd.org/Doc/Translation/Weblate Link: FreeBSD Weblate Instance URL: https://translate-dev.freebsd.org/ Q3 2023 Status • 17 team languages • 189 registered users Four new translators joined Weblate: • minso in Korean (ko) and French (fr_FR) • strgalt-t in German (de_DE) • bsdmeg in German (de_DE) • mvsf in Portuguese (pt_BR) Languages • Chinese (Simplified) (zh-cn) (progress: 7%) • Chinese (Traditional) (zh-tw) (progress: 3%) • Dutch (nl) (progress: 1%) • French (fr) (progress: 1%) • German (de) (progress: 1%) • Indonesian (id) (progress: 1%) • Italian (it) (progress: 5%) • Korean (ko) (progress: 33%) • Norwegian (nb-no) (progress: 1%) • Persian (fa-ir) (progress: 2%) • Polish (progress: 1%) • Portuguese (progress: 0%) • Portuguese (pt-br) (progress: 22%) • Spanish (es) (progress: 35%) • Turkish (tr) (progress: 2%) We want to thank everyone that contributed, translating or reviewing documents. And please, help promote this effort on your local user group, we always need more volunteers. FreeBSD Handbook Working Group Contact: Sergio Carlavilla • The Network chapter has been rewritten • The Jails chapter has been rewritten • The next section to work on will be the file systems part: UFS, OpenZFS, Other File Systems. FAQ Working Group Contact: Sergio Carlavilla The idea is to write a new FAQ. Will be released alongside FreeBSD 14.0. FreeBSD Website Revamp — WebApps Working Group Contact: Sergio Carlavilla Working group in charge of creating the new FreeBSD Documentation Portal and redesigning the FreeBSD main website and its components. FreeBSD developers can follow and join the working group on the FreeBSD Slack channel #wg-www21. The work will be divided into three phases: 1. Redesign of the Manual Pages on web Scripts to generate the HTML pages using mandoc. (Complete, Approved by Doceng, Deploy Date Not Decided Yet) Public instance on https://man-dev.FreeBSD.org 2. Redesign of the FreeBSD main website New design, responsive and dark theme. (Almost Complete, Presented at EuroBSDCon) 3. Redesign of the Ports page on web Ports scripts to create an applications portal. (Work in progress) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Online Editor and Man Page Editor Links: FreeBSD Online Document Editor URL: https://github.com/Wang-Yan-Hao/ FreeBSD-Online-Document-Editor FreeBSD Online Man Page Editor URL: https://github.com/Wang-Yan-Hao/ man_page_editor Contact: Yan-Hao Wang Contact: Li-Wen Hsu Currently, our document translation process involves using Weblate and direct editing of the doc repository. We acknowledge that this process can be somewhat cumbersome, so we are striving to offer a more convenient alternative, similar to what the wiki community does. Introducing the Online Document Editor and Man Page Editor, a user-friendly, WYSIWYG static site designed for translating documents and man pages. Our goal is to consolidate all translation functions within a single platform, making the translation process as straightforward as possible. However, we still require assistance with these two projects, as follows: 1. The Document editor and Man page editor were developed using simple JavaScript. We are seeking a web developer to assess the code’s efficiency since I (Yan-Hao Wang) am not well-versed in front-end development. 2. We are also seeking a cybersecurity developer to assist us in identifying and addressing security issues within these two projects. This is crucial to ensure the secure hosting of these projects and mitigate any potential vulnerabilities. 3. As there is currently no existing JavaScript library to render mandoc, I had to create my own. However, there are still some concealed errors during the editing process. We are in need of a JavaScript developer to help rectify these rendering issues. Sponsor: FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Expert System Links: FreeBSD Expert System URL: https://github.com/Wang-Yan-Hao/ freebsd_expert_system Contact: Yan-Hao Wang Contact: Li-Wen Hsu Machine Learning and Deep Learning technologies have become increasingly prevalent in today’s world, much like the proliferation of ChatGPT. We are working on developing a ChatGPT plugin that can access the latest FreeBSD data, transforming ChatGPT into a FreeBSD expert system. We have already scripted data cleaning and built an embedded model to search for relevant information. Nevertheless, we require assistance for the following aspect of this project: • While I am not an expert in Machine Learning or Deep Learning, we encounter numerous challenges in these domains, such as the adequacy of data cleaning and uncertainties in the final plugin development process. We would appreciate guidance in this regard. Sponsor: FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ KDE on FreeBSD Links: KDE/FreeBSD initiative URL: https://freebsd.kde.org/ FreeBSD — KDE Community Wiki URL: https://community.kde.org/FreeBSD Contact: Adriaan de Groot The KDE on FreeBSD project packages CMake, Qt, and software from the KDE Community, for the FreeBSD ports tree. The software includes a full desktop environment called KDE Plasma (for both X11 and Wayland) and hundreds of applications that can be used on any FreeBSD machine. The KDE team (kde@) is part of desktop@ and x11@, building the software stack to make FreeBSD beautiful and usable as a daily-driver graphical desktop workstation. The notes below describe mostly ports for KDE, but also include items that are important for the entire desktop stack. Infrastructure Qt5 is now on long-term support and updates only rarely. There was an update to 5.15.10 in this quarter. Qt6 is now updated with the regular upstream releases, with the 6.5.2 release landing at the end of July and 6.5.3 following later. CMake saw no updates this quarter, so we are now lagging by at least one minor release. The changelog for the latest releases does not have much for FreeBSD, so there is no special reason to upgrade. sysutils/polkit and sysutils/consolekit2 were both updated, bringing improved security policy and console handling to the FreeBSD desktop. x11/sddm was updated to provide a better graphical login manager. multimedia/pipewire was updated to version 0.3.81. This provides multimedia support for desktops such as KDE and GNOME. KDE Stack KDE Gear releases happen every quarter, KDE Plasma updates once a month, and KDE Frameworks have a new release every month as well. These (large) updates land shortly after their upstream release and are not listed separately. • KDE Frameworks reached version 5.110. The KDE Frameworks 5 series is winding down, although it will be six months or so before it enters long-term support upstream. • KDE Plasma Desktop was updated to version 5.27.8. Just like frameworks, work on KDE Plasma 5 is winding down upstream in favor of KDE Plasma 6. • KDE Gear updated to 23.08.1. Related Ports The KDE ecosystem includes a wide range of ports — most maintained by kde@, all building on a shared base of Qt and KDE Frameworks. The kde@ team updates them all as needed. This quarter, for instance, tcberner@ and arrowd@ updated or fixed (much more than) this selection of ports: • astro/merkaartor • devel/massif-visualizer • finance/alkimia • irc/quassel • net-im/kaidan • sysutils/bsdisks • sysutils/k3b Thanks to jhale@, devel/qtcreator was updated to 11.0.3, providing another featureful integrated development environment for creating Qt and KDE applications. Deprecations Web browsers are huge, and have a considerable security surface. The venerable www/qt5-webkit WebKit port has been slated for removal and consumers have been moved to WebEngine. The fork of WebKit that we relied on is no longer actively maintained. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Pantheon desktop on FreeBSD Links: elementary OS URL: https://elementary.io/ Development repository URL: https://codeberg.org/olivierd/ freebsd-ports-elementary Contact: Olivier Duchateau The Pantheon desktop environment is designed for elementary OS. It builds on GNOME technologies (such as Mutter, GTK 3 and 4) and it is written in Vala. The goal is to have a complete desktop environment for end users. 13.2-RELEASE or higher is required, because several core components depend on deskutils/xdg-desktop-portal. The repository contains a file called elementary.mk for the Mk/Uses framework, official applications, and curated ports which depend on x11-toolkits/granite7. I have submitted several patches in order to keep these ports up-to-date: • deskutils/iconbrowser • multimedia/elementary-videos • x11-themes/gnome-icons-elementary • editors/elementary-code The bug reports for updating the following ports are still open on bugzilla: • x11-toolkits/granite7: Update to 7.3.0 • deskutils/elementary-calendar: Update to 7.0.0 • x11/elementary-terminal: Update to 6.1.2 In the same time, I have also worked on updating the GNOME stack (especially WebKitGTK, libwnck, Mutter, Vala). I noticed several regressions particularly with x11/plank (it is related to monitoring open applications). Three new applications have been added to the development repository: • deskutils/atlas, a map viewer • deskutils/nimbus, a weather applet • audio/leopod, podcasts client ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Office Team Links: The FreeBSD Office project URL: https://wiki.freebsd.org/Office The FreeBSD Office mailing list URL: https://lists.freebsd.org/subscription/freebsd-office Contact: FreeBSD Office team ML Contact: Dima Panov Contact: Li-Wen Hsu The FreeBSD Office team works on a number of office-related software suites and tools such as OpenOffice and LibreOffice. Work during this quarter was focused on providing the latest stable release of LibreOffice suite and companion apps to all FreeBSD users. During the 2023Q3 period we pushed maintenance patches for the LibreOffice port and brought the latest, 7.6.2, release and all companion libraries such as MDDS, libIxion and more to the ports tree. All prerelease development of LibreOffice ports is carried out in the in LibreOffice WIP repo. Together with LibreOffice, we also updated Boost to the latest, 1.83 release. Everyone interested in Boost porting can submit patches to the Boost WIP repository. We are looking for people to help with the open tasks: • The open bugs list contains all filed issues which need some attention • Upstream local patches in ports Patches, comments and objections are always welcome in the mailing list and Bugzilla. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Wifibox: Use Linux to Drive your Wireless Card on FreeBSD Links: Project GitHub Page URL: https://github.com/pgj/freebsd-wifibox net/wifibox port URL: https://cgit.freebsd.org/ports/tree/net/wifibox Contact: PÁLI Gábor János Wifibox is an experimental project for exploring the ways of deploying a virtualized Linux guest to drive wireless networking cards on the FreeBSD host system. There have been guides to describe how to set this up manually, and Wifibox aims to implement those ideas as a single easy-to-use software package. • It uses bhyve(8) to run the embedded Linux system. This helps to achieve low resource footprint. It requires an x64 CPU with I/O MMU (AMD-Vi, Intel VT-d), ~150 MB physical memory, and some disk space available for the guest virtual disk image, which can be even ~30 MB only in certain cases. It works with FreeBSD 12 and later, some cards may require FreeBSD 13 though. • The guest is constructed using Alpine Linux, a security-oriented, lightweight distribution based on musl libc and BusyBox, with some custom extensions and patches imported from Arch Linux most notably. It is shipped with a number of diagnostic tools for better management of the hardware in use. The recent version features Linux 6.1, but Linux 6.5 is also available as an alternative. • Configuration files are shared with the host system. The guest uses wpa_supplicant(8) or hostapd(8) (depending on the configuration) so it is possible to import the host’s wpa_supplicant.conf(5) or hostapd.conf(5) file without any changes. • When configured, wpa_supplicant(8) and hostapd(8) control sockets could be exposed by the guest, which enables use of related utilities directly from the host, such as wpa_cli(8) or wpa_gui(8) from the net/wpa_supplicant_gui package, or hostapd_cli(8). • Everything is shipped in a single package that can be easily installed and removed. This comes with an rc(8) system service that automatically launches the guest on boot and stops it on shutdown. • It can be configured to forward IPv6 traffic, which is currently an experimental option but turned on by default. Wifibox has been mainly tested with Intel chipsets, and it has shown great performance and stability. Therefore, it might serve as an interim solution whilst FreeBSD matures its support for these chipsets. It was confirmed that Wifibox works with Atheros, Realtek, and Mediatek chipsets too, and feedback is more than welcome about others. Broadcom chips (that are often found in MacBook Pros) can also work, but there are known stability issues. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ GCC on FreeBSD Links: GCC Project URL: https://gcc.gnu.org/ GCC 10 release series URL: https://gcc.gnu.org/gcc-10/ GCC 11 release series URL: https://gcc.gnu.org/gcc-11/ GCC 12 release series URL: https://gcc.gnu.org/gcc-12/ GCC 13 release series URL: https://gcc.gnu.org/gcc-13/ Contact: Lorenzo Salvadore The process to update GCC default version to GCC 13 has started with an exp-run . Thanks to Antoine Brodin who ran the exp-run and to all other developers and ports maintainers involved. The same exp-run contains additional patches as anticipated in last quarterly status report. In particular, it contains patches to update • lang/gcc11 to version 11.4.0; • lang/gcc12 to version 12.3.0; • lang/gcc13 to version 13.2.0. The reader might remember that I had planned to update GCC default version to GCC 13 as soon as 13.1.0 was out, but as it can be noted the GCC developers were faster to release 13.2.0 than I was working on the GCC ports. Most of the bugs reported in the exp-run are due to the same error: error: expected identifier before '__is_convertible'. It seems that the issue is an incompatibility between FreeBSD 12’s libcxx and GCC 13 headers. Please check the discussion in the exp-run for more information and to provide your feedback. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Valgrind: valgrind-devel updated for FreeBSD 15 Links: Valgrind Home Page URL: https://www.valgrind.org/ Valgrind News URL: https://www.valgrind.org/docs/manual/dist.news.html Contact: Paul Floyd devel/valgrind-devel is in the process of being updated. This contains most of what will be in the official release of Valgrind 3.22 due out in October. memcheck has been enhanced with some more checks. It will now report usage of realloc with a size of zero. Such usage is not portable and is deprecated (C23 will make it Undefined Behaviour). memcheck now validates the values used for alignment and sized delete for memalign, posix_memalign, aligned_alloc and all aligned and sized overloads of operator new and operator delete. Reading DWARF debuginfo is now done in a lazy manner which can improve performance. As usual there are numerous small bugfixes. Specific to FreeBSD there is now support for FreeBSD 15. Two extra _umtx_op operations are now supported, UMTX_OP_GET_MIN_TIMEOUT and UMTX_OP_SET_MIN_TIMEOUT. There is a fix for the use of sysctl kern proc pathname with the guest pid or -1, which previously returned the path of the Valgrind host. The sysctl will now return the path of the guest. Support for the close_range system call has been added. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ GitLab 16.3 Available Link: Gitlab 16.3 New Features URL: https://about.gitlab.com/releases/2023/08/22/gitlab-16-3-released/ Contact: Matthias Fechner GitLab is a DevOps platform. It brings velocity with confidence, security without sacrifice, and visibility into DevOps success. Version 16.3 is now available on FreeBSD: please check the www/gitlab-ce port. The upgrade is very important as version 16.3 will be required for all further upgrades. Upgrade to 16.4 is only possible from GitLab 16.3. Documentation for installation can be found at https://gitlab.fechner.net/ mfechner/Gitlab-docu/-/blob/master/install/16.3-freebsd.md?ref_type=heads. Documentation for upgrading is available at https://gitlab.fechner.net/mfechner /Gitlab-docu/-/blob/master/update/16.1-16.3-freebsd.md?ref_type=heads. I will wait for the upgrade to 16.4 (which will be released around 20.9. or 22.9., not sure) until ports quarterly branch 2023Q4 is created, to avoid breaking systems that do not use the main branch (latest). GitLab users should always choose the main branch, as described in the installation manual. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ PortOptsCLI — Ports Collection Accessibility Link: Project repository URL: https://gitlab.com/alfix/portoptscli Contact: Alfonso Sabato Siciliano Contact: FreeBSD Accessibility mailing list FreeBSD provides the Ports Collection to give users and administrators a simple way to install applications. It is possible to configure a port before the building and installation. The command make config uses ports-mgmt/dialog4ports and ports-mgmt/portconfig to set up a port interactively via a text user interface (TUI). Unfortunately, screen readers perform poorly with a TUI; it is a well-known accessibility problem. FreeBSD provides tens of thousands of ports; port configuration is a key feature, but it is inaccessible to users with vision impairment. PortOptsCLI (Port Options CLI) is a new utility for setting port options via a command line interface. Properly, PortOptsCLI provides commands to navigate configuration dialogues (checklists and/or radio buttons) and set up their items interactively. It is also suitable for a speech synthesizer; currently it is tested with accessibility/orca. PortOptsCLI can be installed via the ports-mgmt/portoptscli port or package. Tips and new ideas are welcome. If possible, send reports to the FreeBSD Accessibility mailing list, to share and to track discussions in a public place. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Third Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Introducing the BSD Cafe project Links: BSD Cafe project homepage URL: https://wiki.bsd.cafe/ BSD Cafe Mastodon instance URL: https://mastodon.bsd.cafe/ Contact: Stefano Marinelli We are thrilled to unveil the inaugural component of the BSD Cafe project! Months ago, when I first registered the bsd.cafe domain, I envisioned a themed bar where friends, acquaintances, and patrons could gather for casual conversations about *BSD systems, Linux, and open-source technology. Just like any bar, our discussions can encompass a wide array of topics, all while maintaining a spirit of mutual respect. BSD Cafe is poised to become a hub for a variety of tools and services, all powered by *BSD. Our initial offering is a brand-new instance of Mastodon (open-source microblogging software and service), serving as a gateway to the fediverse — a federation of services, many of which use the ActivityPub decentralised social networking protocol. Registration is now open. The server operates under clearly defined guidelines that promote positive conduct and unequivocally prohibit any form of hate. Inclusiveness, respect, and constructive dialogue stand as the cornerstones of this instance. Our primary server is currently hosted in Finland on a small VM, running on FreeBSD. Services are partitioned into VNET jails, interconnected within a local area network through a dedicated bridge. Additionally, we implement a VPN system and have the flexibility to migrate individual jails to more robust machines. For multimedia data and cache hosting, we employ a separate physical server (also FreeBSD-based, within a jail), fronted by Cloudflare. The goal here is to cache and geodistribute data, effectively reducing network congestion on the main VPS. Our reverse proxy (frontend), mail server, media server, and the instance itself are all accessible via IPv6. At its inception, this Mastodon instance was devoid of preloaded content. Our intention is for it to grow organically, based on the interests and followers of its users. At this stage, we have refrained from preemptive blocks. We strongly encourage users to promptly report anything that they believe requires attention. We invite you to join us at https://mastodon.bsd.cafe/ in order to cultivate a community that values constructive interactions and embraces inclusiveness — a secure and serene space meant for all. Furthermore, we have established a website at https://wiki.bsd.cafe/, which will provide an overview of our tools, services, rules, uptime, and more. Recently, a Miniflux installation has been performed, so the BSD Cafe users can use it as a personal RSS Feed Reader. More information: https://wiki.bsd.cafe/ miniflux-bsd-cafe. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Containers and FreeBSD: Pot, Potluck and Potman Links: Pot organization on GitHub URL: https://github.com/bsdpot Contact: Luca Pizzamiglio (Pot) Contact: Bretton Vine (Potluck) Contact: Michael Gmelin (Potman) Pot is a jail management tool that also supports orchestration through Nomad. During this quarter, Pot 0.15.6 was finished, adding custom pf(4) rule configuration hooks. Additionally, Nomad Pot Driver 0.9.1 that allows setting Pot attributes in Nomad job descriptions was released. Potluck aims to be to FreeBSD and Pot what Dockerhub is to Linux and Docker: a repository of Pot flavours and complete container images for usage with Pot and in many cases Nomad. Quite a few new container images were made available, e.g. a Caddy S3 proxy, a Mastodon instance, and a Redis container. In total there are now 50 containers available that can either be downloaded as ready-made images at the Potluck image registry, if you trust our build process, or that you can build yourself from the Pot flavour files stored in the Potluck GitHub repository. The July/August 2023 edition of the FreeBSD Journal contains Luca’s Jail Orchestration with pot and nomad article, explaining how to use Pot and Potluck together with Nomad to orchestrate containers on multiple hosts. Last but not least, a patch (90b1184d93c8) added build cluster support to the devel/sccache port. As always, feedback and patches are welcome. Sponsors: Nikulipe UAB, Honeyguide Group From nobody Thu Nov 2 16:28:29 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLq7P1vQVz4yphZ for ; Thu, 2 Nov 2023 16:28:33 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLq7N1s8Sz4p0n for ; Thu, 2 Nov 2023 16:28:32 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates 2607:f3e0:0:1::12 as permitted sender) smtp.mailfrom=mike@sentex.net; dmarc=none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 3A2GSUG0095839 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL) for ; Thu, 2 Nov 2023 12:28:30 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:c1c6:784b:c650:7216] ([IPv6:2607:f3e0:0:4:c1c6:784b:c650:7216]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 3A2GSSoC040747 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Thu, 2 Nov 2023 12:28:29 -0400 (EDT) (envelope-from mike@sentex.net) Message-ID: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> Date: Thu, 2 Nov 2023 12:28:29 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: FreeBSD-STABLE Mailing List From: mike tancsa Subject: RELENG_13 to 14 upgrade fail Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 X-Spamd-Result: default: False [-3.39 / 15.00]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[199.212.134.19:received]; XM_UA_NO_VERSION(0.01)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; ARC_NA(0.00)[]; RCVD_TLS_ALL(0.00)[]; FREEFALL_USER(0.00)[mike]; TO_DN_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; DMARC_NA(0.00)[sentex.net]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SLq7N1s8Sz4p0n X-Spamd-Bar: --- On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot to update the boot loader so now at bootup, I have ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 Can't find /boot/zfsloader What is the best way to recover from this ? Its a raw vm image. gpart is p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs I was thinking perhaps start up a second vm thats RELENG_14, mdconfig the image, and then what do I need to do ? Just gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ?     ---Mike From nobody Thu Nov 2 16:39:01 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqMX6YDGz4yrN6 for ; Thu, 2 Nov 2023 16:39:04 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqMX66VQz4r5K for ; Thu, 2 Nov 2023 16:39:04 +0000 (UTC) (envelope-from matthew@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698943144; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=icYaG08rXQIlwROGz+MxPeG321PxOlN6AnwE5CBnuRI=; b=pArt8s66FixFLEgg28un80w3p/KCF4R19gj7dexn7cLXQ9bfRexI8/NtIc0oR/NdvQftgS DKzmYZxw4klbNRBuYX9WQ0Jn1QaIyDpY45ZYaDQ9SxPPbkDWhHaYR9oqnkssMJUwiARCmC oXIGty8VulZ7//nuDEaQsMHZbe02nvBmEU3mnJfktx5Ua2wcEWljF1a7mRD7AKapEmVRFd TeClo+dmhhlDq55lsT8xVOntWbSEgPnKVWjr0ZeItUnZAa9uDcVzmvXdefoF7n0u9fYf2T TMpxz0dvuqM0mL0i/MGtFCjvcCMLoI2mad7SRdpNZVCWFixlBS6TNusX0GIFGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698943144; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=icYaG08rXQIlwROGz+MxPeG321PxOlN6AnwE5CBnuRI=; b=J5J+z58rHxkgXfJ+PtgpgyC/hR/ohC3h0/wxejNH7j64uVaVjYizB9yoMeMErk5Hkyj5HE YCvhP+Ktf0TdlbrRyXtdifhennYXWpj8a5Sc3N2q4eAuTXTYTjpMCdSuEz05K33RtQFx3R JCqRtEZn663A1UkoJ8fy1B9jUCdPTce7R/5CV0tshX/y+J7CiqkOfUhwZxI/SY8EvctKTR Q4EchGh6QDCGpFmiy1gFIp3L8R+zVJ2jKFy0+Z1UlL0xI1FUZFdCbB1uNwltH4Z+m4o4v7 PZcNZSQIRODSCjCPMmnPOtvjgAQUj7wh532Bc1syfIeIwgIsykmEiIFt97NNqw== ARC-Authentication-Results: i=1; smtp.infracaninophile.co.uk; dmarc=none (p=none dis=none) header.from=FreeBSD.org ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698943144; a=rsa-sha256; cv=none; b=xHU6gnUTlJxqHpBn/g1fbD56Dc+d14ZpxxUMtZcayvd173znc6KVQRjeVgFwcGGT3H7sWt DG6RONaW+aS2tzLVZlm18y1XLHylqLPZ2rg9b1UpW9jMSmsqBviDTOHP39rIRMoyjZE9Tp Or2JKhnnid9TfRYDPIbD4KXGbFrhjRw1/Sd48JkVxcbe1oXUWAkS96K6n+3gGZ8rm4rzUb Og+Qrl5dGQ5aGr0fqPUf68Zwek1VH/mXHhencyuOP6qdLsyXqJNjm2qO/2SUDuTu5GB+7N Pmwy1lB9Zkq8xzqpl5iNzgrZ7cMbaYgFZnbuZPLQsa/pDzBkAEXf1R0io3KHtA== Received: from smtp.infracaninophile.co.uk (smtp.infracaninophile.co.uk [81.2.117.100]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: matthew/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4SLqMX4HwRz1f2q for ; Thu, 2 Nov 2023 16:39:04 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from [IPV6:2001:8b0:151:1:8845:6c34:d770:9f9b] (unknown [IPv6:2001:8b0:151:1:8845:6c34:d770:9f9b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (prime256v1) server-digest SHA256) (No client certificate requested) (Authenticated sender: m.seaman@infracaninophile.co.uk) by smtp.infracaninophile.co.uk (Postfix) with ESMTPSA id 59BBE20A5D for ; Thu, 2 Nov 2023 16:39:02 +0000 (GMT) Authentication-Results: smtp.infracaninophile.co.uk; dmarc=none (p=none dis=none) header.from=FreeBSD.org Message-ID: <345a1748-4114-4cdc-82c3-8f2dd79b9d97@FreeBSD.org> Date: Thu, 2 Nov 2023 16:39:01 +0000 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail Content-Language: en-GB To: stable@freebsd.org References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> From: Matthew Seaman In-Reply-To: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 02/11/2023 16:28, mike tancsa wrote: > On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot > to update the boot loader so now at bootup, I have > ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 > > Can't find /boot/zfsloader > > What is the best way to recover from this ? Its a raw vm image. gpart is > p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs > > I was thinking perhaps start up a second vm thats RELENG_14, mdconfig > the image, and then what do I need to do ? Just > > gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? Yes -- basically you fix this by booting from some other media, and copying in the updated RELENG_14 bootblocks to your disk image. Very much analogously to how you'ld fix it on physical hardware. You should be able to boot your VM from the installation memstick image by loading it into the virtual CD drive -- that's probably the simplest. Cheers, Matthew From nobody Thu Nov 2 16:39:37 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqNS2Bknz4yrRG for ; Thu, 2 Nov 2023 16:39:52 +0000 (UTC) (envelope-from delphij@gmail.com) Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqNR4n2Kz4s3y for ; Thu, 2 Nov 2023 16:39:51 +0000 (UTC) (envelope-from delphij@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-ed1-x52a.google.com with SMTP id 4fb4d7f45d1cf-53e751aeb3cso1842479a12.2 for ; Thu, 02 Nov 2023 09:39:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698943190; x=1699547990; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=fFBsHEoExvRlebM2CK7X398d1+w5bU5AjdGfmc//Tu4=; b=KqCF0RO0njk6pe4nZtNT8Y+3fHySYLviMWbLwjjzd7XHWFtHYlAOYfOAgyiumSjW8b kZVWbuADfApA+4NNYbX0fxVltX0ZMEEbeOXP4TB6X7itzN7E9RXlhR43qfT99O5/J6cA axtFP6xWborR15TYRiUKprWWJnl9Cqh7r/PmQ2+8khsnCxAVpf0mojJFbsVoetqmf1Ug Dqz3Yqx/ujO9p8PXVlmkRZ6vft9mNUmtFe5cOQZmnpZAjLMlSmT+88VkVQve4Tr9di4p 9q4ZBVGeAtzSMs5bAhY3NwnhheFxlmIuCJF9kNZGvk2KlROMD2P8xiEF+pjOGNCgkKxI ZpcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698943190; x=1699547990; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=fFBsHEoExvRlebM2CK7X398d1+w5bU5AjdGfmc//Tu4=; b=wiKGmLaNq/UqTYuAWP7vqwA6ZOq0zb5YVBuFwS3InB4Q4PQNBdF/Y0CLP8/tylmcE8 0YQ4VqMyoCMitjHkvKRC6WetlgxC6J8Vb3mEPEabdCNTz2JZFb6Sk6VYNgzd8Eip3Sqf 64UcGcO6LGX6FXeiRsbVkBFV0Nty563vJVLVsXcBV6Kvdkpimq+Atd2thow7G4hpfPmF T6VVfGon54NKgDCTBYQSon9ahO/hkFlalwEoIc7n2R2x4A6PD8eETGUVdNfacPJqzWJj pHoS/qij4rJw/aTWuTVH+vV3yuBE6QmkZBNhYvWX2Ui1z41sPNkpfWFdULPt+xLOrDS1 q9hg== X-Gm-Message-State: AOJu0Yzx3HxrDqsiurfeAvGxL8H2ekQI77LTu1cvgyZBcnhaRANaf0gH O6OU8iARaY6ilooGNks3HerojtMUzrDceucB6bY= X-Google-Smtp-Source: AGHT+IHnktXYugNsMlEEpNqV3JxfSUskYx3ApTV5uhHQeJiX/byCQJ4+yOTdlq2zul0+dLWQnaVIYtEPHsgWZ5qKUtE= X-Received: by 2002:a50:9f83:0:b0:53e:bb41:7506 with SMTP id c3-20020a509f83000000b0053ebb417506mr3999648edf.33.1698943189358; Thu, 02 Nov 2023 09:39:49 -0700 (PDT) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> In-Reply-To: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> From: Xin LI Date: Thu, 2 Nov 2023 09:39:37 -0700 Message-ID: Subject: Re: RELENG_13 to 14 upgrade fail To: mike tancsa Cc: FreeBSD-STABLE Mailing List Content-Type: multipart/alternative; boundary="0000000000004b9cee06092e09a4" X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US] X-Rspamd-Queue-Id: 4SLqNR4n2Kz4s3y --0000000000004b9cee06092e09a4 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Nov 2, 2023 at 9:28=E2=80=AFAM mike tancsa wrote: > On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot > to update the boot loader so now at bootup, I have > ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 > > Can't find /boot/zfsloader > > What is the best way to recover from this ? Its a raw vm image. gpart is > p1=3Dfreebsd-boot, p2=3Dfreebsd-swap,p3=3Dfreebsd-zfs > > I was thinking perhaps start up a second vm thats RELENG_14, mdconfig > the image, and then what do I need to do ? Just > > gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? > Yes, note that if the host is running FreeBSD you can mdconfig the image on the host directly and do it on the host too. BTW. pmbr is very simple and doesn't change that often, updating gptzfsboot should be sufficient. Cheers, --0000000000004b9cee06092e09a4 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


--0000000000004b9cee06092e09a4-- From nobody Thu Nov 2 16:36:51 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqP11Rb9z4yrPN for ; Thu, 2 Nov 2023 16:40:21 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqP02ZWvz4t7Y for ; Thu, 2 Nov 2023 16:40:20 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates 2607:f3e0:0:1::12 as permitted sender) smtp.mailfrom=mike@sentex.net; dmarc=none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 3A2Gap55096461 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL) for ; Thu, 2 Nov 2023 12:36:51 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:c1c6:784b:c650:7216] ([IPv6:2607:f3e0:0:4:c1c6:784b:c650:7216]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 3A2Gaox5041531 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Thu, 2 Nov 2023 12:36:50 -0400 (EDT) (envelope-from mike@sentex.net) Message-ID: <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> Date: Thu, 2 Nov 2023 12:36:51 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail (resolved) Content-Language: en-US From: mike tancsa To: FreeBSD-STABLE Mailing List References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== In-Reply-To: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 X-Spamd-Result: default: False [-3.39 / 15.00]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[199.212.134.19:received]; XM_UA_NO_VERSION(0.01)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; ARC_NA(0.00)[]; RCVD_TLS_ALL(0.00)[]; FREEFALL_USER(0.00)[mike]; TO_DN_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; DMARC_NA(0.00)[sentex.net]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SLqP02ZWvz4t7Y X-Spamd-Bar: --- On 11/2/2023 12:28 PM, mike tancsa wrote: > On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot > to update the boot loader so now at bootup, I have > ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 > > Can't find /boot/zfsloader > > What is the best way to recover from this ? Its a raw vm image. gpart > is p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs > > I was thinking perhaps start up a second vm thats RELENG_14, mdconfig > the image, and then what do I need to do ? Just > > gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? > > A little easier than I though. I just grabbed the 2 files from a RELENG_14 image and put them in /tmp on my nfs server where the raw vm image is. Then mdconfig -f problem-vm-image.raw gpart bootcode -b /tmp/pmbr -p /tmp/gptzfsboot -i 1 md0 mdconfig -d -u 0 and its up and running again     ---Mike From nobody Thu Nov 2 16:43:57 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqTn388Jz4yrkD for ; Thu, 2 Nov 2023 16:44:29 +0000 (UTC) (envelope-from karl@denninger.net) Received: from colo1.denninger.net (colo1.denninger.net [104.236.120.189]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqTm3B9tz4vX0 for ; Thu, 2 Nov 2023 16:44:28 +0000 (UTC) (envelope-from karl@denninger.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of karl@denninger.net designates 104.236.120.189 as permitted sender) smtp.mailfrom=karl@denninger.net; dmarc=pass (policy=none) header.from=denninger.net Received: from denninger.net (096-033-195-197.res.spectrum.com [96.33.195.197]) by colo1.denninger.net (Postfix) with ESMTP id 9AD092110C2 for ; Thu, 2 Nov 2023 12:44:07 -0400 (EDT) Received: from dummy.faircode.eu (D3.Denninger.Net [192.168.10.13]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by denninger.net (Postfix) with ESMTPSA id CE2813A0D28 for ; Thu, 2 Nov 2023 12:43:55 -0400 (EDT) Date: Thu, 2 Nov 2023 12:43:57 -0400 (EDT) From: Karl Denninger To: stable@freebsd.org Message-ID: <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> In-Reply-To: <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> Subject: Re: RELENG_13 to 14 upgrade fail (resolved) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=sha-256; protocol="application/pkcs7-signature"; smime-type=signed-data; boundary="----=_Part_4_100483483.1698943437076" X-Correlation-ID: <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> X-Spamd-Result: default: False [-0.79 / 15.00]; SIGNED_SMIME(-2.00)[]; MIME_BASE64_TEXT_BOGUS(1.00)[]; NEURAL_SPAM_MEDIUM(1.00)[1.000]; NEURAL_SPAM_LONG(1.00)[0.999]; NEURAL_HAM_SHORT(-0.99)[-0.990]; DMARC_POLICY_ALLOW(-0.50)[denninger.net,none]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; MIME_BASE64_TEXT(0.10)[]; ASN(0.00)[asn:14061, ipnet:104.236.64.0/18, country:US]; MIME_TRACE(0.00)[0:+,1:+,2:~]; MLMMJ_DEST(0.00)[stable@freebsd.org]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_HAS_DN(0.00)[]; FREEFALL_USER(0.00)[karl]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SLqTm3B9tz4vX0 X-Spamd-Bar: / ------=_Part_4_100483483.1698943437076 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: base64 QmV3YXJlIGlmIHlvdSdyZSBvbiBhIGNsb3VkIHByb3ZpZGVyIGFuZCBjYW4ndCBnZXQgdG8gdGhl IHVubW91bnRlZCBpbWFnZSEKClBsZWFzZSB0ZWxsIG1lIHRoaXMgd2FzIGZyb20gYSBwb29sIHVw Z3JhZGUgKGluIG90aGVyIHdvcmRzIHlvdSBzaG90IHlvdXJzZWxmIGluIHRoZSBmb290KSBhbmQg Tk9UIGR1ZSB0byBzb21ldGhpbmcgdGhlIHVwZ3JhZGUgZGlkIElUU0VMRi4K ------=_Part_4_100483483.1698943437076 Content-Type: application/pkcs7-signature; name=smime.p7s Content-Transfer-Encoding: base64 Content-Disposition: inline; filename=smime.p7s MIAGCSqGSIb3DQEHAqCAMIACAQExDTALBglghkgBZQMEAgEwCwYJKoZIhvcNAQcBoIAwggcSMIIE +qADAgECAhICxvMh+D0BXW3fcVIJqc5dY18wDQYJKoZIhvcNAQELBQAwezELMAkGA1UEBhMCVVMx EDAOBgNVBAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1 ZGEgU3lzdGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQTAeFw0y MjA2MjkxNjE2MzZaFw0yNzA2MjgxNjE2MzZaMDoxCzAJBgNVBAYTAlVTMRIwEAYDVQQIDAlUZW5u ZXNzZWUxFzAVBgNVBAMMDkthcmwgRGVubmluZ2VyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC CgKCAgEAvh1UssVbSYctzobPjwBkbjv/w4WvQNepeRTwE6+sLnXvc41+X9pa5EclPL4Ql02Vu1m7 1mSqXGfK9HbWZoivbhefBHOoYb35MSc24PelhwcORbpneWoWc7giQ7QgFlvEe/yjfs8M0H9fgdzF S5m2lwBQbis8kioSjHB2yt/8I1GE4Mvt1Cur9kga6ML5FAQvo8TYN1stdhrE13FEv/BWCF4FVT4H 2Wa2ySW+R1jkKb74SC6Twg98bGCRTShD5bVylh0+0LXNhzaopIDcI/KKjm/j3mRjIlmqbGrSpvJs bjjhjhAYQKE1U8FB5TDU4OkFAibblhQit/KjgspPR2o/vOpVFPERuhZEV1oDGzUJtZlkREIcN2sY Bi0p7Y4585ya+b7L10mEenPlyi3eSkGXEuiy/BR2DY6lShwWDPoQ5602TKmttCSwBdWGoLrQ4jEV EVNt4lku2wPbTHF3KpHJU0g7RbcWoUYn10SOxKathkirhF3v9U32+QhPELGwqRrH0sL9rWf0qalR tPDHUYl8TebZmYkFqNeSMlqHijl5f4SsQPSj7gx54F19Ntm9ZcvuWTmW8QQGWTKHeMuG+BYkVIUS Pe6/ZQsbD/xDx7rkyGfNgWIa4W7Wm/B7kaNqH53tk3wFmNgZQOxMTPF0oTHfW0T2azU6JD0D1Alg oAnSAE0CAwEAAaOCAc8wggHLMDwGCCsGAQUFBwEBBDAwLjAsBggrBgEFBQcwAYYgaHR0cDovL29j c3AuY3VkYXN5c3RlbXMubmV0Ojg4ODgwCQYDVR0TBAIwADARBglghkgBhvhCAQEEBAMCBaAwDgYD VR0PAQH/BAQDAgXgMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDBDAzBglghkgBhvhCAQ0E JhYkT3BlblNTTCBHZW5lcmF0ZWQgQ2xpZW50IENlcnRpZmljYXRlMB0GA1UdDgQWBBSxJZjVnlYL AT3uzvDYgc4742J6UTCBygYDVR0jBIHCMIG/gBRdwF7Cp43TzQ+fm8VRAhirXNOOz6GBkaSBjjCB izELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGExEjAQBgNVBAcMCU5pY2V2aWxsZTEZMBcG A1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3VkYSBTeXN0ZW1zIENBMSEwHwYDVQQD DBhDdWRhIFN5c3RlbXMgTExDIDIwMTcgQ0GCEwDkSIqCEM5eu9/FjGMhNdgN2EgwHQYDVR0RBBYw FIESa2FybEBkZW5uaW5nZXIubmV0MA0GCSqGSIb3DQEBCwUAA4ICAQCqrnO3LtMXPBTbQEGrmb6H A81kI+xxvWLzG1pzIvnJIYgN63VuTcFoNBwYQYaNWJZ6lfp7QlRNi/Hs6IR1pvigHX14Ka2i/Olb J98sDZWbv9wjjKaNgC7h5Z/GELR92PHm78yjHZX9m+Vgfu5jhSMVyK+AJzTiygpKuWYcwuiVuib8 Nz9HLIhmt1K32rWCA+Tbz4JGkLxIIphIxt6bGasEEy9lsaIb8O/Nz6w7d8EtF3jYb0OtYN0CRWSr r/m5hh92AUj6NbejVBgK/iaM1+ZQ4oQfCRpAbfzcHWHnOPWtPLi9AWz2gCezY7iDxu2NAJOz12U9 +8sf2ZWvT8yzCRYG3pTpGmrXc225TGTwxFWdu5eJRjJlfNy5t2D9e7HQMkv1qZmr+1piVJEPYriC s0qXXPNovTH7o5db2wbcLZBzTz7SrrpSBTOGcKzyo5VXS6k0qg/JvchxImND7gKKKutzqSVheobz GoiDwVhAFSGg1vbhtDLIS5fQ5x5zMqyU37gt92fZjhjM+3UQYyXeWFtNsQM2J1LhATqY/i0L+UfF yBTBxV5LahCr0K13jNkVPj3GaijgZE5LcQS59zSOVXwNeSZNHOVeV3DqqN6dob68L164p629qRER J6Kpn65F098zquWOq8kR/Lu9+JRhBdHSC186FeDzO1xYraE3j6BI5jCCBqAwggSIoAMCAQICEwDk SIqCEM5eu9/FjGMhNdgN2EgwDQYJKoZIhvcNAQELBQAwgYsxCzAJBgNVBAYTAlVTMRAwDgYDVQQI DAdGbG9yaWRhMRIwEAYDVQQHDAlOaWNldmlsbGUxGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMx GDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTEhMB8GA1UEAwwYQ3VkYSBTeXN0ZW1zIExMQyAyMDE3 IENBMB4XDTE3MDgxNzE2NDIxN1oXDTI3MDgxNTE2NDIxN1owezELMAkGA1UEBhMCVVMxEDAOBgNV BAgMB0Zsb3JpZGExGTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lz dGVtcyBDQTElMCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQTCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBALVomi01Qj5biM/vFAM7wv9vheIXhGyz07QH7e8wfs2OTzl9 nTnZCFmkxWWlpo76wIgqobeg0Ru44fMkH80MkWeqHuKMHCF1a612yrbdTHpO/GBqTIw+lPpNE0Qn NwFVADSSlvLUNUPQQpIr8WtZYGIWZLGDupR+Yir+YzOATp6keS3JEzc4ard1tF05SB+6Zauodc6t 0nPTrET03Ni9z22ipmd3v0VS0T+dJlWbVVLcaurtEpXrmie9fdA5bhbWV0QfCCBpnGBYY2JH8Ph6 iwAYXGe5h5aUoQLvRz30ynWCJa7H7u6vqFzYT4BpMaH58Z6KM7mrjQ4Z3500yArwSzScNHDzWVFy XbhJZQSTL3LwMCuAgWVF3p3dljCBzUMxNaRNq/HdmkBKnlNaKHrIjwALBuhO+VRh6igyw+01r0Tp RDWe3tUSLmzKPGcOW1sQWgthxcFyqFGEURMl70J16ci0AcC07JrfDn5+YLaP/EnPb2iDUodipYeW jcqzCL0bvtqf7OHqdaQy4ez7TcNTwNo4RbNkRq/eVUPi7vpspENNuGHRswCTh5euIYuHgxShfciZ 9yvomjKF5WsB0cMv8GLFswfVRSyl5G6pAxDlvZPqlptc/Sg4HgWqV1aIOAkEZF3NYuAJgbzA8YkZ iAeJuXmsWIjkjHcVCdyKlzpJ1TM5AgMBAAGjggEKMIIBBjAdBgNVHQ4EFgQUXcBewqeN080Pn5vF UQIYq1zTjs8wgcAGA1UdIwSBuDCBtYAUG7WhGFQw0TOM4OiUORrmThAQMGKhgZGkgY4wgYsxCzAJ BgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRIwEAYDVQQHDAlOaWNldmlsbGUxGTAXBgNVBAoM EEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTEhMB8GA1UEAwwYQ3Vk YSBTeXN0ZW1zIExMQyAyMDE3IENBggkArEDLVYGjaRgwEgYDVR0TAQH/BAgwBgEB/wIBADAOBgNV HQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBAIHnrzpQIFUhPnaM7ezP2kq6HG4LaemLxm+g HC38gf2mI8DXn8IYXVd5dR27aqaE6MeRUs2A7tcHUbwK6W7Gh84hRx7RpkbIH69nXKUdeUx4HRHz Z/l3Pf9PtFCyjnljZWiDZlvs9hMLkH2g3LfKWyc0vNqdiVxbcAB/NlxvFi4B2e6rQibcSkabwOgi 1Rx/WkN7O6Aqb/Iq021jqwPIQ2O0TFnfvtxgDch0jCqfUyHg4BP9GaHxq7atkCjT5sxgHL0LXUTH SFDzNZy89kEOfi/hG07yD4q5BlBwmc7T0sk23D3hbd3aaPhrteuwoydkq+bpb0EkhDg2aG3jBcC0 9DXED5CnE9OawYBTQK8eapULtcLerEWFo6sPZ2y84ArpKfcwSkf9it9gJftrtzPnNbcOwlDqjelh +edDP6GfAuXPgwrXs0gDRY50AX0hu1Cpqt/jj48TJRsq3PWvQoZ4Yuz5UZ13YUsDR7vK7PEkNhxo FNXCpoeFTb8Wdr+MZTsGGsoe0ltv9eUt4UnbjK+6JgqlhZBJLJm7VH+C9mMd4ZvfjiMYGxl0IOt3 G1BBxUDo7GwwA9JQ8yuWD0tYQsQRidW6VAl6tbGlR5wYf3Y7TrDCY+DKSTP/9SaaCNVKHsSs28vS VRhQx+6dhU787mHCFb4/iC+IJfMEV5O0Nkfbn07tMIIGpDCCBIygAwIBAgIJAKxAy1WBo2kYMA0G CSqGSIb3DQEBCwUAMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJ TmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3Rl bXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTAeFw0xNzA4MTcxNjIyMTFa Fw0zNzA4MTIxNjIyMTFaMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UE BwwJTmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5 c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTCCAiIwDQYJKoZIhvcN AQEBBQADggIPADCCAgoCggIBAMLtuLlcCZbjm/Oeev1Q9nvYhmkSpEwmfMZ1wcNU10QGkO641Jeo fIBUbft1yRBXSAbaNf/9ePVaBriZponFHKg4Ierm2Pnt9oDYhc4u7siS5+6y/BYmLH6IdF/RXQWd g7ZCizR32n2er5enDW/IXJTCzw21V8A4xFdMkEgWOiL1hXrmO7blP93N2Y1luXDOZnIP3lpCDSD4 jKcC9205BAkNjRn0G3yIEo4bMVmdvrz0MfktmxsZMhYG5LMElFKuC8Mo/EGNTOxFVez8BfaJIlVL dRNPx9XSRVv1kfa7ccgvOgspRWxGUexFr6QZN2Sf/S0k/ZgHPqmnmhHMwjfWeqiTXhglzL/jwLn+ G2iZASMEBpig+5/GUFuU2m/vYqsnNoOsUQPQ+3yfO+qJd6cLj3PG1xTFMPJRiSMu9E747yGe7s7j LL8AVX59V3H3MblgKvfZOULBBcGF570EFf2ERIeQiT8V1hYsKfgdQ2veksCMX4iJljpXzWznf7pr yW8lM+VtNwsQ+Y9i8wZJ248K7+0FiSVguTa7Pp3XSfXNlgTzQ5OAjEdYPKB5imrHeK2nekwcMIuu tj2F8iFXRGzTXKUxMqQZHLV2EhB8JItN3PO/jWBbu7CdXfcURYKPx8pifipdd8hkyXkjPUHx9GWH O5ZtZGJN8WsDHwAjU7LWr4x9AgMBAAGjggEHMIIBAzAdBgNVHQ4EFgQUG7WhGFQw0TOM4OiUORrm ThAQMGIwgcAGA1UdIwSBuDCBtYAUG7WhGFQw0TOM4OiUORrmThAQMGKhgZGkgY4wgYsxCzAJBgNV BAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRIwEAYDVQQHDAlOaWNldmlsbGUxGTAXBgNVBAoMEEN1 ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTEhMB8GA1UEAwwYQ3VkYSBT eXN0ZW1zIExMQyAyMDE3IENBggkArEDLVYGjaRgwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8E BAMCAQYwDQYJKoZIhvcNAQELBQADggIBACQkBkaAActTjhVFUObRG2GHEarcmAks+RBVZsazxqie jPwE8LCz2mvp97VhH4l4pBKN9UybsJJrY3zh+0J7/8mhYJ18DqRBEB4/IIeulqGl3Z+n+KbvFs1c +RyqLfkoSjeuhNLs7Fo1D7/m5N6G6J+6Kpo8EP9sAN8uIGqdfGynUsV77BpPVKeEbIozdtxUX0ch lIG7+p19v87iB++p17q04vfkpfp4uOSuJiCMMg53BSxlpDks2zrQBJ5KNSGF/XexUIwk7jc5sL94 Qba7b3ddpPhjKF92yMOQ/utFdD5/4NFTz91MwFjHlrXwGYM7omGzknIbO5qPl12JrsvdvtCpLtJI w73d31k1AvfdigZAvpgWCjlW9rfxeMuc7YAa8sDFjhPBj+k+DBMZBQeSXvzxQO9YnUWScLOj4ulG F/DLbG35SDTXTkalIujmO9HfXumsQfoyFibrMq8cP3rdocC78QFwofv2uQplg6cQbtZDZlrozB0h zFhJ7sbjHf3GbzsJlvCZ2JKSdwbClHBpFsK3V3Ka/bG7XHbivYtasQTe4dY2ROyswPhtQ0L9kzhY q2IB3Y3u2t9ffYXLffO7jvCrYlu5KRoydT4Jaj6jVkIilwEkFDaK4F4mMqaVnYEfZM8cicB7Q+kQ 6ZdKQI+qAUQNsqbA81FG1uncVSTlvUe6AAAxggNUMIIDUAIBATCBkTB7MQswCQYDVQQGEwJVUzEQ MA4GA1UECAwHRmxvcmlkYTEZMBcGA1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3Vk YSBTeXN0ZW1zIENBMSUwIwYDVQQDDBxDdWRhIFN5c3RlbXMgTExDIDIwMTcgSW50IENBAhICxvMh +D0BXW3fcVIJqc5dY18wCwYJYIZIAWUDBAIBoIGWMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEw HAYJKoZIhvcNAQkFMQ8XDTIzMTEwMjE2NDM1NlowKwYJKoZIhvcNAQk0MR4wHDALBglghkgBZQME AgGhDQYJKoZIhvcNAQELBQAwLwYJKoZIhvcNAQkEMSIEIFcle6Fc7k8G3aMr7Wtk7dg6Q1EhlcSo 7BvYnVLZaPCuMA0GCSqGSIb3DQEBCwUABIICAAXe+kYZEXobMl44vZFB7ZM/A9YPSify69Vt7oYn NqCx7L2Q826xiY9zYg+0+PX1hrxMh0J29hsmoZ70J4TRBI2TkESe5lz8R22QbUvRXHfLGuF9qxXI sw9OF5mp8gzjwfjPtMpdQ9/vVSlLG5n1HEaIKpuiP3z2D29GyNbq+UizmqLgO1fXSXFDAc33sAH2 S2d+Hibw9arfKtN5kfdwkxFrlMOSEJ2GZA6n6QLUwrX3LTD/d45v4YMJD9GL1DAEnBN17Qzw8/gb f9sVa+P/1vT1HYi1zFfMKxQFs2gc21VNaGP44HhUXZ8t9BxYRGTex3iEcoChHL71x/OSqeX3m8d/ 3w5hD1dREHXVOqY0B6fpGHBfZiIIB3CMlmSwae7e45CNyeylY+o0eNGKlvhmb61PlnhHtkUaQAMS rf0fPZLdrEB7mYHvpOc5G9t1lSmwtN/freLaCjpjrv7xBH4zbhWcJTY3U8xsrDckNoNGiooP4q/G 0bXOQ4DyjU/fRWKHDte2T0EzkTapDn4lrG3fCMXTXPadWbx9vDyjmLL4/HrzHX2ezPQ8KBOMye2w joV4gDtCwEpnjhrIviIeEwk4+ZBM2jnmIYtr547k1jmqhPI1+MSypgJOnYQSUIRahSWUFk2B7kHJ d3yHwNATh14X0HyM0C5IfKaeMtyTHo1E9GekAAAAAAAA ------=_Part_4_100483483.1698943437076-- From nobody Thu Nov 2 16:56:39 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqls4W8Jz4ysZW for ; Thu, 2 Nov 2023 16:56:41 +0000 (UTC) (envelope-from karl@denninger.net) Received: from colo1.denninger.net (colo1.denninger.net [104.236.120.189]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqlr62zVz3DVq for ; Thu, 2 Nov 2023 16:56:40 +0000 (UTC) (envelope-from karl@denninger.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of karl@denninger.net designates 104.236.120.189 as permitted sender) smtp.mailfrom=karl@denninger.net; dmarc=pass (policy=none) header.from=denninger.net Received: from denninger.net (096-033-195-197.res.spectrum.com [96.33.195.197]) by colo1.denninger.net (Postfix) with ESMTP id 9BDB72110C2 for ; Thu, 2 Nov 2023 12:56:51 -0400 (EDT) Received: from [192.168.10.25] (D15.Denninger.Net [192.168.10.25]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by denninger.net (Postfix) with ESMTPSA id C31093A0D31 for ; Thu, 2 Nov 2023 12:56:39 -0400 (EDT) Message-ID: <3b5dfb8c-709d-4a40-bd0f-806e6ab9c283@denninger.net> Date: Thu, 2 Nov 2023 12:56:39 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail (resolved) Content-Language: en-US To: stable@freebsd.org References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> From: Karl Denninger In-Reply-To: <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-512; boundary="------------ms080600020102010208010102" X-Spamd-Result: default: False [-5.89 / 15.00]; SIGNED_SMIME(-2.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.996]; DMARC_POLICY_ALLOW(-0.50)[denninger.net,none]; R_SPF_ALLOW(-0.20)[+mx:c]; MIME_GOOD(-0.20)[multipart/signed,multipart/alternative,text/plain]; XM_UA_NO_VERSION(0.01)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:14061, ipnet:104.236.64.0/18, country:US]; ARC_NA(0.00)[]; FREEFALL_USER(0.00)[karl]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_LAST(0.00)[]; HAS_ATTACHMENT(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SLqlr62zVz3DVq X-Spamd-Bar: ----- This is a cryptographically signed message in MIME format. --------------ms080600020102010208010102 Content-Type: multipart/alternative; boundary="------------x2LiHSOvGOR0DKLHBW8B9iUB" --------------x2LiHSOvGOR0DKLHBW8B9iUB Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Ok.... that had me for a minute or two in the original message, as it wasn't clear! On 11/2/2023 12:43, Karl Denninger wrote: > Beware if you're on a cloud provider and can't get to the unmounted image! > > Please tell me this was from a pool upgrade (in other words you shot yourself in the foot) and NOT due to something the upgrade did ITSELF. -- Karl Denninger karl@denninger.net /The Market Ticker/ /[S/MIME encrypted email preferred]/ --------------x2LiHSOvGOR0DKLHBW8B9iUB Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 7bit

Ok.... that had me for a minute or two in the original message, as it wasn't clear!

On 11/2/2023 12:43, Karl Denninger wrote:
Beware if you're on a cloud provider and can't get to the unmounted image!

Please tell me this was from a pool upgrade (in other words you shot yourself in the foot) and NOT due to something the upgrade did ITSELF.
--
Karl Denninger
karl@denninger.net
The Market Ticker
[S/MIME encrypted email preferred]
--------------x2LiHSOvGOR0DKLHBW8B9iUB-- --------------ms080600020102010208010102 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgMFADCABgkqhkiG9w0BBwEAAKCC DbowggagMIIEiKADAgECAhMA5EiKghDOXrvfxYxjITXYDdhIMA0GCSqGSIb3DQEBCwUAMIGL MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAf BgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTAeFw0xNzA4MTcxNjQyMTdaFw0yNzA4 MTUxNjQyMTdaMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkwFwYDVQQKDBBD dWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExJTAjBgNVBAMMHEN1 ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQC1aJotNUI+W4jP7xQDO8L/b4XiF4Rss9O0B+3vMH7Njk85fZ052QhZpMVlpaaO+sCI KqG3oNEbuOHzJB/NDJFnqh7ijBwhdWutdsq23Ux6TvxgakyMPpT6TRNEJzcBVQA0kpby1DVD 0EKSK/FrWWBiFmSxg7qUfmIq/mMzgE6epHktyRM3OGq3dbRdOUgfumWrqHXOrdJz06xE9NzY vc9toqZnd79FUtE/nSZVm1VS3Grq7RKV65onvX3QOW4W1ldEHwggaZxgWGNiR/D4eosAGFxn uYeWlKEC70c99Mp1giWux+7ur6hc2E+AaTGh+fGeijO5q40OGd+dNMgK8Es0nDRw81lRcl24 SWUEky9y8DArgIFlRd6d3ZYwgc1DMTWkTavx3ZpASp5TWih6yI8ACwboTvlUYeooMsPtNa9E 6UQ1nt7VEi5syjxnDltbEFoLYcXBcqhRhFETJe9CdenItAHAtOya3w5+fmC2j/xJz29og1KH YqWHlo3Kswi9G77an+zh6nWkMuHs+03DU8DaOEWzZEav3lVD4u76bKRDTbhh0bMAk4eXriGL h4MUoX3Imfcr6JoyheVrAdHDL/BixbMH1UUspeRuqQMQ5b2T6pabXP0oOB4FqldWiDgJBGRd zWLgCYG8wPGJGYgHibl5rFiI5Ix3FQncipc6SdUzOQIDAQABo4IBCjCCAQYwHQYDVR0OBBYE FF3AXsKnjdPND5+bxVECGKtc047PMIHABgNVHSMEgbgwgbWAFBu1oRhUMNEzjODolDka5k4Q EDBioYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJ TmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5 c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYIJAKxAy1WBo2kY MBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4IC AQCB5686UCBVIT52jO3sz9pKuhxuC2npi8ZvoBwt/IH9piPA15/CGF1XeXUdu2qmhOjHkVLN gO7XB1G8CuluxofOIUce0aZGyB+vZ1ylHXlMeB0R82f5dz3/T7RQso55Y2Vog2Zb7PYTC5B9 oNy3ylsnNLzanYlcW3AAfzZcbxYuAdnuq0Im3EpGm8DoItUcf1pDezugKm/yKtNtY6sDyENj tExZ377cYA3IdIwqn1Mh4OAT/Rmh8au2rZAo0+bMYBy9C11Ex0hQ8zWcvPZBDn4v4RtO8g+K uQZQcJnO09LJNtw94W3d2mj4a7XrsKMnZKvm6W9BJIQ4Nmht4wXAtPQ1xA+QpxPTmsGAU0Cv HmqVC7XC3qxFhaOrD2dsvOAK6Sn3MEpH/YrfYCX7a7cz5zW3DsJQ6o3pYfnnQz+hnwLlz4MK 17NIA0WOdAF9IbtQqarf44+PEyUbKtz1r0KGeGLs+VGdd2FLA0e7yuzxJDYcaBTVwqaHhU2/ Fna/jGU7BhrKHtJbb/XlLeFJ24yvuiYKpYWQSSyZu1R/gvZjHeGb344jGBsZdCDrdxtQQcVA 6OxsMAPSUPMrlg9LWELEEYnVulQJerWxpUecGH92O06wwmPgykkz//UmmgjVSh7ErNvL0lUY UMfunYVO/O5hwhW+P4gviCXzBFeTtDZH259O7TCCBxIwggT6oAMCAQICEgLG8yH4PQFdbd9x Ugmpzl1jXzANBgkqhkiG9w0BAQsFADB7MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlk YTEZMBcGA1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3VkYSBTeXN0ZW1zIENB MSUwIwYDVQQDDBxDdWRhIFN5c3RlbXMgTExDIDIwMTcgSW50IENBMB4XDTIyMDYyOTE2MTYz NloXDTI3MDYyODE2MTYzNlowOjELMAkGA1UEBhMCVVMxEjAQBgNVBAgMCVRlbm5lc3NlZTEX MBUGA1UEAwwOS2FybCBEZW5uaW5nZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQC+HVSyxVtJhy3Ohs+PAGRuO//Dha9A16l5FPATr6wude9zjX5f2lrkRyU8vhCXTZW7WbvW ZKpcZ8r0dtZmiK9uF58Ec6hhvfkxJzbg96WHBw5Fumd5ahZzuCJDtCAWW8R7/KN+zwzQf1+B 3MVLmbaXAFBuKzySKhKMcHbK3/wjUYTgy+3UK6v2SBrowvkUBC+jxNg3Wy12GsTXcUS/8FYI XgVVPgfZZrbJJb5HWOQpvvhILpPCD3xsYJFNKEPltXKWHT7Qtc2HNqikgNwj8oqOb+PeZGMi WapsatKm8mxuOOGOEBhAoTVTwUHlMNTg6QUCJtuWFCK38qOCyk9Haj+86lUU8RG6FkRXWgMb NQm1mWREQhw3axgGLSntjjnznJr5vsvXSYR6c+XKLd5KQZcS6LL8FHYNjqVKHBYM+hDnrTZM qa20JLAF1YagutDiMRURU23iWS7bA9tMcXcqkclTSDtFtxahRifXRI7Epq2GSKuEXe/1Tfb5 CE8QsbCpGsfSwv2tZ/SpqVG08MdRiXxN5tmZiQWo15IyWoeKOXl/hKxA9KPuDHngXX022b1l y+5ZOZbxBAZZMod4y4b4FiRUhRI97r9lCxsP/EPHuuTIZ82BYhrhbtab8HuRo2ofne2TfAWY 2BlA7ExM8XShMd9bRPZrNTokPQPUCWCgCdIATQIDAQABo4IBzzCCAcswPAYIKwYBBQUHAQEE MDAuMCwGCCsGAQUFBzABhiBodHRwOi8vb2NzcC5jdWRhc3lzdGVtcy5uZXQ6ODg4ODAJBgNV HRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIFoDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI KwYBBQUHAwIGCCsGAQUFBwMEMDMGCWCGSAGG+EIBDQQmFiRPcGVuU1NMIEdlbmVyYXRlZCBD bGllbnQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFLElmNWeVgsBPe7O8NiBzjvjYnpRMIHKBgNV HSMEgcIwgb+AFF3AXsKnjdPND5+bxVECGKtc047PoYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQ MA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5 c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lz dGVtcyBMTEMgMjAxNyBDQYITAORIioIQzl6738WMYyE12A3YSDAdBgNVHREEFjAUgRJrYXJs QGRlbm5pbmdlci5uZXQwDQYJKoZIhvcNAQELBQADggIBAKquc7cu0xc8FNtAQauZvocDzWQj 7HG9YvMbWnMi+ckhiA3rdW5NwWg0HBhBho1YlnqV+ntCVE2L8ezohHWm+KAdfXgpraL86Vsn 3ywNlZu/3COMpo2ALuHln8YQtH3Y8ebvzKMdlf2b5WB+7mOFIxXIr4AnNOLKCkq5ZhzC6JW6 Jvw3P0csiGa3UrfatYID5NvPgkaQvEgimEjG3psZqwQTL2Wxohvw783PrDt3wS0XeNhvQ61g 3QJFZKuv+bmGH3YBSPo1t6NUGAr+JozX5lDihB8JGkBt/NwdYec49a08uL0BbPaAJ7NjuIPG 7Y0Ak7PXZT37yx/Zla9PzLMJFgbelOkaatdzbblMZPDEVZ27l4lGMmV83Lm3YP17sdAyS/Wp mav7WmJUkQ9iuIKzSpdc82i9Mfujl1vbBtwtkHNPPtKuulIFM4ZwrPKjlVdLqTSqD8m9yHEi Y0PuAooq63OpJWF6hvMaiIPBWEAVIaDW9uG0MshLl9DnHnMyrJTfuC33Z9mOGMz7dRBjJd5Y W02xAzYnUuEBOpj+LQv5R8XIFMHFXktqEKvQrXeM2RU+PcZqKOBkTktxBLn3NI5VfA15Jk0c 5V5XcOqo3p2hvrwvXrinrb2pEREnoqmfrkXT3zOq5Y6ryRH8u734lGEF0dILXzoV4PM7XFit oTePoEjmMYIFBDCCBQACAQEwgZEwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGEx GTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTEl MCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQQISAsbzIfg9AV1t33FSCanO XWNfMA0GCWCGSAFlAwQCAwUAoIICQzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqG SIb3DQEJBTEPFw0yMzExMDIxNjU2MzlaME8GCSqGSIb3DQEJBDFCBEAlEPLJBx4BtKsuCA5n ZYWulHegjRrUvx5e0DBnYIEOJgCVJyRFjmjJp6df5vnBiF++K9WP+isCNY3eLPgIzxfaMGwG CSqGSIb3DQEJDzFfMF0wCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzAO BggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYFKw4DAgcwDQYIKoZIhvcNAwICASgw gaIGCSsGAQQBgjcQBDGBlDCBkTB7MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTEZ MBcGA1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3VkYSBTeXN0ZW1zIENBMSUw IwYDVQQDDBxDdWRhIFN5c3RlbXMgTExDIDIwMTcgSW50IENBAhICxvMh+D0BXW3fcVIJqc5d Y18wgaQGCyqGSIb3DQEJEAILMYGUoIGRMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9y aWRhMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMg Q0ExJTAjBgNVBAMMHEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0ECEgLG8yH4PQFdbd9x Ugmpzl1jXzANBgkqhkiG9w0BAQEFAASCAgALpZUGR7G6sPXQbIhSIPcQXZxR8it1EvtKy4RH fwVkxGCQthHLsMFfcBh5fI89j81sW8jtDKI9kaqjGWfoNYSVqD6xVuP95TaC5nAcN/W18jlH SJGEh9Yj671ZmOsfuCpd3PsGEjFFXSG/CD/et+pc+vQ4FvNSEDTiATGZGcveSCIohaOWGtls eTnyTz9gSCy/iyZ9tRytMrKAS3GYpGp2nuZ9fiWomB3yl/SXJTuE3KUqb1v9wqp2sZkcyDI4 FkJBHujUYzATarEg3UoiMFe7vyzRqVDjmmL2wrro/lRMcqjbFqS1uRItPP5ggBmTbppuLAuq Hz6/L+tfVJ4RO4z2+MGtgnqeFtBtKbXpXMztFGJpuCqgNlaz++Jsh2qHJVBKPcXOX+FgT05n m9GOyGQ488fw9PCRArFH5Z/oyXW0dEpiZSs7fsyT4MF/1aRajBzauMRrAr7MiRTaNf4pAtT5 dOS7mL1s2PQQBUb7obyfRJXVnYqqVD+WkAkUp5z8bruaHlOLKm2neoUm5yS1HBb3ri5Baib2 7dGoq1umgHiZXofhSc0vI6AaYM5xqOEP+a5H/i10+2C8fmgi1PZuLnQQddBz8iBaw3z8Aozk VILMgPGFLy5Le6sq5/hO/mdb9Hdm6xlw4jIOSulGpxDybjXuKCcUzlmrgzBv7E9VM9alEwAA AAAAAA== --------------ms080600020102010208010102-- From nobody Thu Nov 2 16:55:19 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqr42cRlz4ysvT for ; Thu, 2 Nov 2023 17:00:20 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqr42CQHz3Fj0 for ; Thu, 2 Nov 2023 17:00:20 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 3A2GtJ51097719 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL); Thu, 2 Nov 2023 12:55:19 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:c1c6:784b:c650:7216] ([IPv6:2607:f3e0:0:4:c1c6:784b:c650:7216]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 3A2GtI4m043152 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Thu, 2 Nov 2023 12:55:18 -0400 (EDT) (envelope-from mike@sentex.net) Message-ID: <1ac2d06a-1c8a-4b32-89e8-92dbc2101ffd@sentex.net> Date: Thu, 2 Nov 2023 12:55:19 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail (resolved) Content-Language: en-US To: Karl Denninger , stable@freebsd.org References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> From: mike tancsa Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== In-Reply-To: <27b1cbb0-adeb-4d8e-bb12-51ad3332d922@denninger.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA] X-Rspamd-Queue-Id: 4SLqr42CQHz3Fj0 On 11/2/2023 12:43 PM, Karl Denninger wrote: > Please tell me this was from a pool upgrade (in other words you shot yourself in the foot) and NOT due to something the upgrade did ITSELF. Pool upgrade. I have made the leap for a few servers with buildworld/kernel, but this test vm was the first one I tried to do a pool upgrade on and forgot to update the loader. So far, the OS upgrades have been pretty smooth.     ---Mike From nobody Thu Nov 2 16:50:54 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqr43NJ7z4yt1Q for ; Thu, 2 Nov 2023 17:00:20 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqr42ynrz3Fj1 for ; Thu, 2 Nov 2023 17:00:20 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 3A2GosKG097397 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL); Thu, 2 Nov 2023 12:50:54 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:c1c6:784b:c650:7216] ([IPv6:2607:f3e0:0:4:c1c6:784b:c650:7216]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 3A2Gor1P042795 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Thu, 2 Nov 2023 12:50:53 -0400 (EDT) (envelope-from mike@sentex.net) Content-Type: multipart/alternative; boundary="------------5GR0cuQ5jDdf1dJGRHRxpXX7" Message-ID: <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> Date: Thu, 2 Nov 2023 12:50:54 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail Content-Language: en-US To: Xin LI Cc: FreeBSD-STABLE Mailing List References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> From: mike tancsa Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== In-Reply-To: X-Scanned-By: MIMEDefang 2.84 X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA] X-Rspamd-Queue-Id: 4SLqr42ynrz3Fj1 This is a multi-part message in MIME format. --------------5GR0cuQ5jDdf1dJGRHRxpXX7 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 11/2/2023 12:39 PM, Xin LI wrote: > > > On Thu, Nov 2, 2023 at 9:28 AM mike tancsa wrote: > > On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I > forgot > to update the boot loader so now at bootup, I have > ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 > > Can't find /boot/zfsloader > > What is the best way to recover from this ? Its a raw vm image. > gpart is > p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs > > I was thinking perhaps start up a second vm thats RELENG_14, mdconfig > the image, and then what do I need to do ? Just > > gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? > > > Yes, note that if the host is running FreeBSD you can mdconfig the > image on the host directly and do it on the host too. > > BTW. pmbr is very simple and doesn't change that often, updating > gptzfsboot should be sufficient. > Thanks!  Another server I have (zoo) is EFI. I have not upgraded the boot pool yet, but its a mirror (ada8 and ada9). Both are p1=efi p2=freebsd-boot p3=swap p4=zfs root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt root@zoo2:~ # ls -lR /mnt/EFI/ total 2 drwxr-xr-x  1 root wheel 512 Feb  1  2021 BOOT drwxr-xr-x  1 root wheel 512 Nov 21  2020 freebsd /mnt/EFI/BOOT: total 1747 -rwxr-xr-x  1 root wheel 894464 Feb  1  2021 BOOTX64.efi /mnt/EFI/freebsd: total 1747 -rwxr-xr-x  1 root wheel 894464 Feb  1  2021 loader.efi root@zoo2:~ # They appear to be the same.  Do I just replace both those files ? root@zoo2:~ # find /mnt -type f | xargs md5 MD5 (/mnt/EFI/freebsd/loader.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee MD5 (/mnt/EFI/BOOT/BOOTX64.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee root@zoo2:~ # with root@zoo2:~ # ls -l /boot/loader.efi -r-xr-xr-x  2 root wheel 659968 Oct 31 13:02 /boot/loader.efi root@zoo2:~ #     ---Mike --------------5GR0cuQ5jDdf1dJGRHRxpXX7 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit
On 11/2/2023 12:39 PM, Xin LI wrote:


On Thu, Nov 2, 2023 at 9:28 AM mike tancsa <mike@sentex.net> wrote:
On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot
to update the boot loader so now at bootup, I have
ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2

Can't find /boot/zfsloader

What is the best way to recover from this ? Its a raw vm image. gpart is
p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs

I was thinking perhaps start up a second vm thats RELENG_14, mdconfig
the image, and then what do I need to do ? Just

gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ?

Yes, note that if the host is running FreeBSD you can mdconfig the image on the host directly and do it on the host too.

BTW. pmbr is very simple and doesn't change that often, updating gptzfsboot should be sufficient.


Thanks!  Another server I have (zoo) is EFI. I have not upgraded the boot pool yet, but its a mirror (ada8 and ada9). Both are
p1=efi
p2=freebsd-boot
p3=swap
p4=zfs


root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt
root@zoo2:~ # ls -lR /mnt/EFI/
total 2
drwxr-xr-x  1 root wheel 512 Feb  1  2021 BOOT
drwxr-xr-x  1 root wheel 512 Nov 21  2020 freebsd

/mnt/EFI/BOOT:
total 1747
-rwxr-xr-x  1 root wheel 894464 Feb  1  2021 BOOTX64.efi

/mnt/EFI/freebsd:
total 1747
-rwxr-xr-x  1 root wheel 894464 Feb  1  2021 loader.efi
root@zoo2:~ #

They appear to be the same.  Do I just replace both those files ?

root@zoo2:~ # find /mnt -type f | xargs md5
MD5 (/mnt/EFI/freebsd/loader.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee
MD5 (/mnt/EFI/BOOT/BOOTX64.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee
root@zoo2:~ #

with

root@zoo2:~ # ls -l /boot/loader.efi
-r-xr-xr-x  2 root wheel 659968 Oct 31 13:02 /boot/loader.efi
root@zoo2:~ #

    ---Mike

--------------5GR0cuQ5jDdf1dJGRHRxpXX7-- From nobody Thu Nov 2 17:03:55 2023 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLqwF4QLjz4ytM5 for ; Thu, 2 Nov 2023 17:03:57 +0000 (UTC) (envelope-from karl@denninger.net) Received: from colo1.denninger.net (colo1.denninger.net [104.236.120.189]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLqwD5JJnz3J6K for ; Thu, 2 Nov 2023 17:03:56 +0000 (UTC) (envelope-from karl@denninger.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of karl@denninger.net designates 104.236.120.189 as permitted sender) smtp.mailfrom=karl@denninger.net; dmarc=pass (policy=none) header.from=denninger.net Received: from denninger.net (096-033-195-197.res.spectrum.com [96.33.195.197]) by colo1.denninger.net (Postfix) with ESMTP id 4A9712110C2 for ; Thu, 2 Nov 2023 13:04:07 -0400 (EDT) Received: from [192.168.10.25] (D15.Denninger.Net [192.168.10.25]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by denninger.net (Postfix) with ESMTPSA id 93F7E3A0E3E for ; Thu, 2 Nov 2023 13:03:55 -0400 (EDT) Message-ID: <444f906f-c20a-439b-bf99-71565acbad14@denninger.net> Date: Thu, 2 Nov 2023 13:03:55 -0400 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: RELENG_13 to 14 upgrade fail Content-Language: en-US To: stable@freebsd.org References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> From: Karl Denninger In-Reply-To: <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-512; boundary="------------ms050201030609030900030200" X-Spamd-Result: default: False [-5.89 / 15.00]; SIGNED_SMIME(-2.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.996]; DMARC_POLICY_ALLOW(-0.50)[denninger.net,none]; R_SPF_ALLOW(-0.20)[+mx:c]; MIME_GOOD(-0.20)[multipart/signed,multipart/alternative,text/plain]; XM_UA_NO_VERSION(0.01)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~,4:~]; FROM_EQ_ENVFROM(0.00)[]; ASN(0.00)[asn:14061, ipnet:104.236.64.0/18, country:US]; ARC_NA(0.00)[]; FREEFALL_USER(0.00)[karl]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_TLS_LAST(0.00)[]; HAS_ATTACHMENT(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; RCPT_COUNT_ONE(0.00)[1]; MID_RHS_MATCH_FROM(0.00)[] X-Rspamd-Queue-Id: 4SLqwD5JJnz3J6K X-Spamd-Bar: ----- This is a cryptographically signed message in MIME format. --------------ms050201030609030900030200 Content-Type: multipart/alternative; boundary="------------v0XIeEiLnvF4M6oKaPLH0G4H" --------------v0XIeEiLnvF4M6oKaPLH0G4H Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Loader.efi, yes. On "modern" systems this is usually the same file (hard link) as loader_lua.efi. On 11/2/2023 12:50, mike tancsa wrote: > On 11/2/2023 12:39 PM, Xin LI wrote: >> >> >> On Thu, Nov 2, 2023 at 9:28 AM mike tancsa wrote: >> >> On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I >> forgot >> to update the boot loader so now at bootup, I have >> ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 >> >> Can't find /boot/zfsloader >> >> What is the best way to recover from this ? Its a raw vm image. >> gpart is >> p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs >> >> I was thinking perhaps start up a second vm thats RELENG_14, >> mdconfig >> the image, and then what do I need to do ? Just >> >> gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? >> >> >> Yes, note that if the host is running FreeBSD you can mdconfig the >> image on the host directly and do it on the host too. >> >> BTW. pmbr is very simple and doesn't change that often, updating >> gptzfsboot should be sufficient. >> > > Thanks!  Another server I have (zoo) is EFI. I have not upgraded the > boot pool yet, but its a mirror (ada8 and ada9). Both are > p1=efi > p2=freebsd-boot > p3=swap > p4=zfs > > > root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt > root@zoo2:~ # ls -lR /mnt/EFI/ > total 2 > drwxr-xr-x  1 root wheel 512 Feb  1  2021 BOOT > drwxr-xr-x  1 root wheel 512 Nov 21  2020 freebsd > > /mnt/EFI/BOOT: > total 1747 > -rwxr-xr-x  1 root wheel 894464 Feb  1  2021 BOOTX64.efi > > /mnt/EFI/freebsd: > total 1747 > -rwxr-xr-x  1 root wheel 894464 Feb  1  2021 loader.efi > root@zoo2:~ # > > They appear to be the same.  Do I just replace both those files ? > > root@zoo2:~ # find /mnt -type f | xargs md5 > MD5 (/mnt/EFI/freebsd/loader.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee > MD5 (/mnt/EFI/BOOT/BOOTX64.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee > root@zoo2:~ # > > with > > root@zoo2:~ # ls -l /boot/loader.efi > -r-xr-xr-x  2 root wheel 659968 Oct 31 13:02 /boot/loader.efi > root@zoo2:~ # > >     ---Mike > -- Karl Denninger karl@denninger.net /The Market Ticker/ /[S/MIME encrypted email preferred]/ --------------v0XIeEiLnvF4M6oKaPLH0G4H Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit

Loader.efi, yes. 

On "modern" systems this is usually the same file (hard link) as loader_lua.efi.

On 11/2/2023 12:50, mike tancsa wrote:
On 11/2/2023 12:39 PM, Xin LI wrote:


On Thu, Nov 2, 2023 at 9:28 AM mike tancsa <mike@sentex.net> wrote:
On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot
to update the boot loader so now at bootup, I have
ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2

Can't find /boot/zfsloader

What is the best way to recover from this ? Its a raw vm image. gpart is
p1=freebsd-boot, p2=freebsd-swap,p3=freebsd-zfs

I was thinking perhaps start up a second vm thats RELENG_14, mdconfig
the image, and then what do I need to do ? Just

gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ?

Yes, note that if the host is running FreeBSD you can mdconfig the image on the host directly and do it on the host too.

BTW. pmbr is very simple and doesn't change that often, updating gptzfsboot should be sufficient.


Thanks!  Another server I have (zoo) is EFI. I have not upgraded the boot pool yet, but its a mirror (ada8 and ada9). Both are
p1=efi
p2=freebsd-boot
p3=swap
p4=zfs


root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt
root@zoo2:~ # ls -lR /mnt/EFI/
total 2
drwxr-xr-x  1 root wheel 512 Feb  1  2021 BOOT
drwxr-xr-x  1 root wheel 512 Nov 21  2020 freebsd

/mnt/EFI/BOOT:
total 1747
-rwxr-xr-x  1 root wheel 894464 Feb  1  2021 BOOTX64.efi

/mnt/EFI/freebsd:
total 1747
-rwxr-xr-x  1 root wheel 894464 Feb  1  2021 loader.efi
root@zoo2:~ #

They appear to be the same.  Do I just replace both those files ?

root@zoo2:~ # find /mnt -type f | xargs md5
MD5 (/mnt/EFI/freebsd/loader.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee
MD5 (/mnt/EFI/BOOT/BOOTX64.efi) = 5dcb1e7bc59e5ee7a9bd04faaa20b7ee
root@zoo2:~ #

with

root@zoo2:~ # ls -l /boot/loader.efi
-r-xr-xr-x  2 root wheel 659968 Oct 31 13:02 /boot/loader.efi
root@zoo2:~ #

    ---Mike

--
Karl Denninger
karl@denninger.net
The Market Ticker
[S/MIME encrypted email preferred]
--------------v0XIeEiLnvF4M6oKaPLH0G4H-- --------------ms050201030609030900030200 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgMFADCABgkqhkiG9w0BBwEAAKCC DbowggagMIIEiKADAgECAhMA5EiKghDOXrvfxYxjITXYDdhIMA0GCSqGSIb3DQEBCwUAMIGL MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkw FwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAf BgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQTAeFw0xNzA4MTcxNjQyMTdaFw0yNzA4 MTUxNjQyMTdaMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9yaWRhMRkwFwYDVQQKDBBD dWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExJTAjBgNVBAMMHEN1 ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK AoICAQC1aJotNUI+W4jP7xQDO8L/b4XiF4Rss9O0B+3vMH7Njk85fZ052QhZpMVlpaaO+sCI KqG3oNEbuOHzJB/NDJFnqh7ijBwhdWutdsq23Ux6TvxgakyMPpT6TRNEJzcBVQA0kpby1DVD 0EKSK/FrWWBiFmSxg7qUfmIq/mMzgE6epHktyRM3OGq3dbRdOUgfumWrqHXOrdJz06xE9NzY vc9toqZnd79FUtE/nSZVm1VS3Grq7RKV65onvX3QOW4W1ldEHwggaZxgWGNiR/D4eosAGFxn uYeWlKEC70c99Mp1giWux+7ur6hc2E+AaTGh+fGeijO5q40OGd+dNMgK8Es0nDRw81lRcl24 SWUEky9y8DArgIFlRd6d3ZYwgc1DMTWkTavx3ZpASp5TWih6yI8ACwboTvlUYeooMsPtNa9E 6UQ1nt7VEi5syjxnDltbEFoLYcXBcqhRhFETJe9CdenItAHAtOya3w5+fmC2j/xJz29og1KH YqWHlo3Kswi9G77an+zh6nWkMuHs+03DU8DaOEWzZEav3lVD4u76bKRDTbhh0bMAk4eXriGL h4MUoX3Imfcr6JoyheVrAdHDL/BixbMH1UUspeRuqQMQ5b2T6pabXP0oOB4FqldWiDgJBGRd zWLgCYG8wPGJGYgHibl5rFiI5Ix3FQncipc6SdUzOQIDAQABo4IBCjCCAQYwHQYDVR0OBBYE FF3AXsKnjdPND5+bxVECGKtc047PMIHABgNVHSMEgbgwgbWAFBu1oRhUMNEzjODolDka5k4Q EDBioYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJ TmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5 c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBDQYIJAKxAy1WBo2kY MBIGA1UdEwEB/wQIMAYBAf8CAQAwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4IC AQCB5686UCBVIT52jO3sz9pKuhxuC2npi8ZvoBwt/IH9piPA15/CGF1XeXUdu2qmhOjHkVLN gO7XB1G8CuluxofOIUce0aZGyB+vZ1ylHXlMeB0R82f5dz3/T7RQso55Y2Vog2Zb7PYTC5B9 oNy3ylsnNLzanYlcW3AAfzZcbxYuAdnuq0Im3EpGm8DoItUcf1pDezugKm/yKtNtY6sDyENj tExZ377cYA3IdIwqn1Mh4OAT/Rmh8au2rZAo0+bMYBy9C11Ex0hQ8zWcvPZBDn4v4RtO8g+K uQZQcJnO09LJNtw94W3d2mj4a7XrsKMnZKvm6W9BJIQ4Nmht4wXAtPQ1xA+QpxPTmsGAU0Cv HmqVC7XC3qxFhaOrD2dsvOAK6Sn3MEpH/YrfYCX7a7cz5zW3DsJQ6o3pYfnnQz+hnwLlz4MK 17NIA0WOdAF9IbtQqarf44+PEyUbKtz1r0KGeGLs+VGdd2FLA0e7yuzxJDYcaBTVwqaHhU2/ Fna/jGU7BhrKHtJbb/XlLeFJ24yvuiYKpYWQSSyZu1R/gvZjHeGb344jGBsZdCDrdxtQQcVA 6OxsMAPSUPMrlg9LWELEEYnVulQJerWxpUecGH92O06wwmPgykkz//UmmgjVSh7ErNvL0lUY UMfunYVO/O5hwhW+P4gviCXzBFeTtDZH259O7TCCBxIwggT6oAMCAQICEgLG8yH4PQFdbd9x Ugmpzl1jXzANBgkqhkiG9w0BAQsFADB7MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlk YTEZMBcGA1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3VkYSBTeXN0ZW1zIENB MSUwIwYDVQQDDBxDdWRhIFN5c3RlbXMgTExDIDIwMTcgSW50IENBMB4XDTIyMDYyOTE2MTYz NloXDTI3MDYyODE2MTYzNlowOjELMAkGA1UEBhMCVVMxEjAQBgNVBAgMCVRlbm5lc3NlZTEX MBUGA1UEAwwOS2FybCBEZW5uaW5nZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC AQC+HVSyxVtJhy3Ohs+PAGRuO//Dha9A16l5FPATr6wude9zjX5f2lrkRyU8vhCXTZW7WbvW ZKpcZ8r0dtZmiK9uF58Ec6hhvfkxJzbg96WHBw5Fumd5ahZzuCJDtCAWW8R7/KN+zwzQf1+B 3MVLmbaXAFBuKzySKhKMcHbK3/wjUYTgy+3UK6v2SBrowvkUBC+jxNg3Wy12GsTXcUS/8FYI XgVVPgfZZrbJJb5HWOQpvvhILpPCD3xsYJFNKEPltXKWHT7Qtc2HNqikgNwj8oqOb+PeZGMi WapsatKm8mxuOOGOEBhAoTVTwUHlMNTg6QUCJtuWFCK38qOCyk9Haj+86lUU8RG6FkRXWgMb NQm1mWREQhw3axgGLSntjjnznJr5vsvXSYR6c+XKLd5KQZcS6LL8FHYNjqVKHBYM+hDnrTZM qa20JLAF1YagutDiMRURU23iWS7bA9tMcXcqkclTSDtFtxahRifXRI7Epq2GSKuEXe/1Tfb5 CE8QsbCpGsfSwv2tZ/SpqVG08MdRiXxN5tmZiQWo15IyWoeKOXl/hKxA9KPuDHngXX022b1l y+5ZOZbxBAZZMod4y4b4FiRUhRI97r9lCxsP/EPHuuTIZ82BYhrhbtab8HuRo2ofne2TfAWY 2BlA7ExM8XShMd9bRPZrNTokPQPUCWCgCdIATQIDAQABo4IBzzCCAcswPAYIKwYBBQUHAQEE MDAuMCwGCCsGAQUFBzABhiBodHRwOi8vb2NzcC5jdWRhc3lzdGVtcy5uZXQ6ODg4ODAJBgNV HRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIFoDAOBgNVHQ8BAf8EBAMCBeAwHQYDVR0lBBYwFAYI KwYBBQUHAwIGCCsGAQUFBwMEMDMGCWCGSAGG+EIBDQQmFiRPcGVuU1NMIEdlbmVyYXRlZCBD bGllbnQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFLElmNWeVgsBPe7O8NiBzjvjYnpRMIHKBgNV HSMEgcIwgb+AFF3AXsKnjdPND5+bxVECGKtc047PoYGRpIGOMIGLMQswCQYDVQQGEwJVUzEQ MA4GA1UECAwHRmxvcmlkYTESMBAGA1UEBwwJTmljZXZpbGxlMRkwFwYDVQQKDBBDdWRhIFN5 c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMgQ0ExITAfBgNVBAMMGEN1ZGEgU3lz dGVtcyBMTEMgMjAxNyBDQYITAORIioIQzl6738WMYyE12A3YSDAdBgNVHREEFjAUgRJrYXJs QGRlbm5pbmdlci5uZXQwDQYJKoZIhvcNAQELBQADggIBAKquc7cu0xc8FNtAQauZvocDzWQj 7HG9YvMbWnMi+ckhiA3rdW5NwWg0HBhBho1YlnqV+ntCVE2L8ezohHWm+KAdfXgpraL86Vsn 3ywNlZu/3COMpo2ALuHln8YQtH3Y8ebvzKMdlf2b5WB+7mOFIxXIr4AnNOLKCkq5ZhzC6JW6 Jvw3P0csiGa3UrfatYID5NvPgkaQvEgimEjG3psZqwQTL2Wxohvw783PrDt3wS0XeNhvQ61g 3QJFZKuv+bmGH3YBSPo1t6NUGAr+JozX5lDihB8JGkBt/NwdYec49a08uL0BbPaAJ7NjuIPG 7Y0Ak7PXZT37yx/Zla9PzLMJFgbelOkaatdzbblMZPDEVZ27l4lGMmV83Lm3YP17sdAyS/Wp mav7WmJUkQ9iuIKzSpdc82i9Mfujl1vbBtwtkHNPPtKuulIFM4ZwrPKjlVdLqTSqD8m9yHEi Y0PuAooq63OpJWF6hvMaiIPBWEAVIaDW9uG0MshLl9DnHnMyrJTfuC33Z9mOGMz7dRBjJd5Y W02xAzYnUuEBOpj+LQv5R8XIFMHFXktqEKvQrXeM2RU+PcZqKOBkTktxBLn3NI5VfA15Jk0c 5V5XcOqo3p2hvrwvXrinrb2pEREnoqmfrkXT3zOq5Y6ryRH8u734lGEF0dILXzoV4PM7XFit oTePoEjmMYIFBDCCBQACAQEwgZEwezELMAkGA1UEBhMCVVMxEDAOBgNVBAgMB0Zsb3JpZGEx GTAXBgNVBAoMEEN1ZGEgU3lzdGVtcyBMTEMxGDAWBgNVBAsMD0N1ZGEgU3lzdGVtcyBDQTEl MCMGA1UEAwwcQ3VkYSBTeXN0ZW1zIExMQyAyMDE3IEludCBDQQISAsbzIfg9AV1t33FSCanO XWNfMA0GCWCGSAFlAwQCAwUAoIICQzAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqG SIb3DQEJBTEPFw0yMzExMDIxNzAzNTVaME8GCSqGSIb3DQEJBDFCBEC8XaJsnOkRScGQc+0w XGlVMXw/mCU1+x4qR16pUKrLaSdFk5RFOPoKQmehtaGgqQmchjnvPI0ioIvHvewuO0H1MGwG CSqGSIb3DQEJDzFfMF0wCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBAjAKBggqhkiG9w0DBzAO BggqhkiG9w0DAgICAIAwDQYIKoZIhvcNAwICAUAwBwYFKw4DAgcwDQYIKoZIhvcNAwICASgw gaIGCSsGAQQBgjcQBDGBlDCBkTB7MQswCQYDVQQGEwJVUzEQMA4GA1UECAwHRmxvcmlkYTEZ MBcGA1UECgwQQ3VkYSBTeXN0ZW1zIExMQzEYMBYGA1UECwwPQ3VkYSBTeXN0ZW1zIENBMSUw IwYDVQQDDBxDdWRhIFN5c3RlbXMgTExDIDIwMTcgSW50IENBAhICxvMh+D0BXW3fcVIJqc5d Y18wgaQGCyqGSIb3DQEJEAILMYGUoIGRMHsxCzAJBgNVBAYTAlVTMRAwDgYDVQQIDAdGbG9y aWRhMRkwFwYDVQQKDBBDdWRhIFN5c3RlbXMgTExDMRgwFgYDVQQLDA9DdWRhIFN5c3RlbXMg Q0ExJTAjBgNVBAMMHEN1ZGEgU3lzdGVtcyBMTEMgMjAxNyBJbnQgQ0ECEgLG8yH4PQFdbd9x Ugmpzl1jXzANBgkqhkiG9w0BAQEFAASCAgBZx3E0JKqp/pF6GwEI6PY62Zs2WU2mllvl0kz/ oEPufPX+O4l00Eai8h6y67QFSnBTW7eNHr9TRTGCGkMv3uQfGU/9uryxq209zBm+tYYENUkN iGIN1PQlfi993M6cNyTxfAdGpJDPbKtTqQIeA0t+XJ65Uyg5C4yyLM6htP8S4r+jvQYnxd17 ulgrHB6l7fAWKcLCqc4jMi4ylHE87WCwRtc9ZYLjaUanX3nFZr9y7Z4N7cichOCzm5QDli3S +WzC/avsZs+yHN02glI+9mTQRzYHZLYWifOAY4E98Qw4hW9Z06+1YX+ziTISOARvhmT5AYay S3LjdLSG5a7Ierys7+3g6jIBNBr+Z6NH/Cnhqo2Nv0r+RFplwuBiK7PTIy5uItfiotWxcz97 QyHRYQ0x+WRfGSTTGxfzBXTweRJIDeiP3Hz6bpAJPMa/W56mfsY3mKxt3RcgBSSkSTEXAQcb f5HRNlFvt8+pgiI6EzhtSkWtjTu6h1YFKhkpgtTSaoIAU3UgGLOF7Ek41NmjL+C+wZQ98TIP EWF2cweTSReRhUahZCpgP9P0cLbprCZNRYG06mYdPds2PrPVyeLoOLzdfeDLeOdoVDu2Ur84 bNm+zxH9XCMnR01Ts6b2by53I/aV9mU9HrtKpVJPjRfy8YT66sfgqkGj+k6oi9qSNn5EmwAA AAAAAA== --------------ms050201030609030900030200-- From nobody Thu Nov 2 17:12:03 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLr5t5kF1z4ytl5 for ; Thu, 2 Nov 2023 17:12:18 +0000 (UTC) (envelope-from delphij@gmail.com) Received: from mail-ej1-x62d.google.com (mail-ej1-x62d.google.com [IPv6:2a00:1450:4864:20::62d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLr5t3PnXz3LKj for ; Thu, 2 Nov 2023 17:12:18 +0000 (UTC) (envelope-from delphij@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-ej1-x62d.google.com with SMTP id a640c23a62f3a-9ae2cc4d17eso195368066b.1 for ; Thu, 02 Nov 2023 10:12:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1698945136; x=1699549936; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=kqEZ0zDmDOPJFN3KmkA7kE55UQBxuT/UyoaHAXsM+ps=; b=j4KHHjol7ZkgvsuAI+wOqt6Q7YQ1g3DYsqFOiXUJMUpNmiYBCFX2g9lpIzXD3067Ak 5d9NmGbrtAEHWzwjcTtPSlg8E6jT8pF8ZRqXiaNgPEwvtARyDR7vBjG4/s7SUPiXHLDx QH8MeMLEqamu62d6fXokKSyYfTra0Je6lX/IRqJRUnpZWLnHFhbplRofWD9WI+BlYBje suynojjEPPHDJ+keURUHS1ohW8sqwbRPL46ocAueVXUMag1RhOcmEcwHOsJf38m5d/t8 ta5FdNBYtckiIL8e4i1U/Ke0XSkP7dzfq/1teBksnn3oa65Vd8TgJPI6w4sp0ZJbb3Mf t9SQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698945136; x=1699549936; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=kqEZ0zDmDOPJFN3KmkA7kE55UQBxuT/UyoaHAXsM+ps=; b=NDVrclXHtg2j5DHCwo69JiAmPS3yGPoporfTJjK+pMIQzzKnGWpXXFHxfZ1MySx6AJ vubBN1daOPIqYl2NwOzSK9yBjuPdwZH37rzrsLxumIsMTa0ZqWpGcDM8BXLuXn1PvfI3 jI5ktV4xkWAllOEhbNSdaBI4S5wBHLe708Vd1xLO6AzrMvg0+NYMqawoTouc04Oh0p1k wkUtE8flcwqsbb1GddRxl9F1Bz085lT7KPxFPt+RXbm9kJkbdhR5UvS093rh734RXZuD 8mhr1mjXnTX2ERRMnUUyOIaPlH1bW5QY1GcivNhfaKe1Op5xYDVIhMVs8PmGNrcdjkZO Y0Qw== X-Gm-Message-State: AOJu0YzNmjCRfn877UMspfWyfr4uF8UoMIms76GW1LdRvZBoOFZekfzY ZJVvvDd60iggjIF7OMKw/qVFo/xMdnOZybeieiY= X-Google-Smtp-Source: AGHT+IGp+jiIMcojUvjVieY6Z+/sCPFXaOfofJsRKbdzzXLNIO1rTHJgMEmhOj/LuKWAV432A1FUaGPfUfUCFuBJ9tw= X-Received: by 2002:a17:907:7b99:b0:9be:30c2:b8fd with SMTP id ne25-20020a1709077b9900b009be30c2b8fdmr5742279ejc.66.1698945135486; Thu, 02 Nov 2023 10:12:15 -0700 (PDT) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> In-Reply-To: <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> From: Xin LI Date: Thu, 2 Nov 2023 10:12:03 -0700 Message-ID: Subject: Re: RELENG_13 to 14 upgrade fail To: mike tancsa Cc: FreeBSD-STABLE Mailing List Content-Type: multipart/alternative; boundary="0000000000004b2bde06092e7d5a" X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US] X-Rspamd-Queue-Id: 4SLr5t3PnXz3LKj --0000000000004b2bde06092e7d5a Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Nov 2, 2023 at 9:50=E2=80=AFAM mike tancsa wrote: > On 11/2/2023 12:39 PM, Xin LI wrote: > > > > On Thu, Nov 2, 2023 at 9:28=E2=80=AFAM mike tancsa wrot= e: > >> On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot >> to update the boot loader so now at bootup, I have >> ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 >> >> Can't find /boot/zfsloader >> >> What is the best way to recover from this ? Its a raw vm image. gpart is >> p1=3Dfreebsd-boot, p2=3Dfreebsd-swap,p3=3Dfreebsd-zfs >> >> I was thinking perhaps start up a second vm thats RELENG_14, mdconfig >> the image, and then what do I need to do ? Just >> >> gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? >> > > Yes, note that if the host is running FreeBSD you can mdconfig the image > on the host directly and do it on the host too. > > BTW. pmbr is very simple and doesn't change that often, updating > gptzfsboot should be sufficient. > > > Thanks! Another server I have (zoo) is EFI. I have not upgraded the boot > pool yet, but its a mirror (ada8 and ada9). Both are > p1=3Defi > p2=3Dfreebsd-boot > p3=3Dswap > p4=3Dzfs > > > root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt > root@zoo2:~ # ls -lR /mnt/EFI/ > total 2 > drwxr-xr-x 1 root wheel 512 Feb 1 2021 BOOT > drwxr-xr-x 1 root wheel 512 Nov 21 2020 freebsd > > /mnt/EFI/BOOT: > total 1747 > -rwxr-xr-x 1 root wheel 894464 Feb 1 2021 BOOTX64.efi > > /mnt/EFI/freebsd: > total 1747 > -rwxr-xr-x 1 root wheel 894464 Feb 1 2021 loader.efi > root@zoo2:~ # > > They appear to be the same. Do I just replace both those files ? > > root@zoo2:~ # find /mnt -type f | xargs md5 > MD5 (/mnt/EFI/freebsd/loader.efi) =3D 5dcb1e7bc59e5ee7a9bd04faaa20b7ee > MD5 (/mnt/EFI/BOOT/BOOTX64.efi) =3D 5dcb1e7bc59e5ee7a9bd04faaa20b7ee > root@zoo2:~ # > > with > > root@zoo2:~ # ls -l /boot/loader.efi > -r-xr-xr-x 2 root wheel 659968 Oct 31 13:02 /boot/loader.efi > root@zoo2:~ # > > Yes, for EFI you mount the EFI ESP (which is a msdosfs) and replace the BOOTX64.efi with latest /boot/loader.efi , then umount the EFI ESP. It's generally a good idea to have access to the physical system, or via a remote console that allows you to mount a .iso image, by the way. Cheers, --0000000000004b2bde06092e7d5a Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


On Thu, Nov 2, 2023 at 9:50=E2=80= =AFAM mike tancsa <mike@sentex.net> wrote:
= =20 =20 =20
On 11/2/2023 12:39 PM, Xin LI wrote:
=20


On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot
to update the boot loader so now at bootup, I have
ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2

Can't find /boot/zfsloader

What is the best way to recover from this ? Its a raw vm image. gpart is
p1=3Dfreebsd-boot, p2=3Dfreebsd-swap,p3=3Dfreebsd-zfs

I was thinking perhaps start up a second vm thats RELENG_14, mdconfig
the image, and then what do I need to do ? Just

gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ?

Yes, note that i= f the host is running FreeBSD you can mdconfig the image on the host directly and do it on the host too.

BTW. pmbr is very simple and doesn't change that often, updating gptzfsboot should be sufficient.


Thanks!=C2=A0 Another server I have (zoo) is EFI. I have not upgrade= d the boot pool yet, but its a mirror (ada8 and ada9). Both are
p1=3Defi
p2=3Dfreebsd-boot
p3=3Dswap
p4=3Dzfs


root@zoo2:~ # mount_msdosfs /dev/ada8p1 /mnt
root@zoo2:~ # ls -lR /mnt/EFI/
total 2
drwxr-xr-x=C2=A0 1 root wheel 512 Feb=C2=A0 1=C2=A0 2021 BOOT
drwxr-xr-x=C2=A0 1 root wheel 512 Nov 21=C2=A0 2020 freebsd

/mnt/EFI/BOOT:
total 1747
-rwxr-xr-x=C2=A0 1 root wheel 894464 Feb=C2=A0 1=C2=A0 2021 BOOTX64.e= fi

/mnt/EFI/freebsd:
total 1747
-rwxr-xr-x=C2=A0 1 root wheel 894464 Feb=C2=A0 1=C2=A0 2021 loader.ef= i
root@zoo2:~ #

They appear to be the same.=C2=A0 Do I just replace both those files = ?

root@zoo2:~ # find /mnt -type f | xargs md5
MD5 (/mnt/EFI/freebsd/loader.efi) =3D 5dcb1e7bc59e5ee7a9bd04faaa20b7ee
MD5 (/mnt/EFI/BOOT/BOOTX64.efi) =3D 5dcb1e7bc59e5ee7a9bd04faaa20b7ee<= br> root@zoo2:~ #

with

root@zoo2:~ # ls -l /boot/loader.efi
-r-xr-xr-x=C2=A0 2 root wheel 659968 Oct 31 13:02 /boot/loader.efi root@zoo2:~ #

Yes, for EFI you mount the EFI ESP (which is= a msdosfs) and replace the BOOTX64.efi with latest /boot/loader.efi , then= umount the EFI ESP.

It's generally a good idea to have access t= o the physical system, or via a remote console that allows you to mount a .= iso image, by the way.

Cheers,
--0000000000004b2bde06092e7d5a-- From nobody Thu Nov 2 17:35:35 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SLrcp74Wxz4ywPl for ; Thu, 2 Nov 2023 17:35:38 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from fc.opsec.eu (fc.opsec.eu [IPv6:2001:14f8:200:4::4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SLrcn6kmRz3P9h for ; Thu, 2 Nov 2023 17:35:37 +0000 (UTC) (envelope-from pi@freebsd.org) Authentication-Results: mx1.freebsd.org; dkim=none; spf=softfail (mx1.freebsd.org: 2001:14f8:200:4::4 is neither permitted nor denied by domain of pi@freebsd.org) smtp.mailfrom=pi@freebsd.org; dmarc=none Received: from pi by fc.opsec.eu with local (Exim 4.96.2 (FreeBSD)) (envelope-from ) id 1qybbT-000Dg7-2S for freebsd-stable@freebsd.org; Thu, 02 Nov 2023 18:35:35 +0100 Date: Thu, 2 Nov 2023 18:35:35 +0100 From: Kurt Jaeger To: FreeBSD-STABLE Mailing List Subject: Re: RELENG_13 to 14 upgrade fail Message-ID: References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <515d5ad4-9fc8-4f86-936b-b71d8f43d564@sentex.net> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spamd-Result: default: False [-0.75 / 15.00]; NEURAL_HAM_SHORT(-1.00)[-0.999]; NEURAL_SPAM_LONG(0.88)[0.877]; NEURAL_HAM_MEDIUM(-0.63)[-0.626]; ONCE_RECEIVED(0.10)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_ONE(0.00)[1]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:12502, ipnet:2001:14f8::/32, country:DE]; BLOCKLISTDE_FAIL(0.00)[2001:14f8:200:4::4:server fail]; TO_DN_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; FREEFALL_USER(0.00)[pi]; TO_DOM_EQ_FROM_DOM(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; DMARC_NA(0.00)[freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all:c]; ARC_NA(0.00)[] X-Rspamd-Queue-Id: 4SLrcn6kmRz3P9h X-Spamd-Bar: / Hi! [Xin LI wrote:] > It's generally a good idea to have access to the physical system, or via a > remote console that allows you to mount a .iso image, by the way. Depends on the application. If the box is at a remote site, and the cost of the box needs to be below 400 US$, the upgrade path should be possible without any of those requirements. It works like that right now, but I fear the day this is no longer possible. -- pi@FreeBSD.org +49 171 3101372 Now what ? From nobody Fri Nov 3 01:00:57 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SM2Vm66RDz506nh for ; Fri, 3 Nov 2023 01:01:04 +0000 (UTC) (envelope-from zlei@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SM2Vm32Tnz3Wr8; Fri, 3 Nov 2023 01:01:04 +0000 (UTC) (envelope-from zlei@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698973264; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=YBPQtRyy1yofBYBLQLkzvtldkRtGnW09YGGLbc/dAf0=; b=RL4hDQXy0l+VlsMZInCu/sYBp4navL5IIKe+0RfiVoH21eixis5mRLhe8CPW9XFKI2YA45 /9jiiDwGQZ2S/vMiNgOkC96Y4ardx0er59yID8AJdz1s2SX6WAkomCJbv8zMIJQx0VJgCd nHCvU8rmzfkWk4Q8HaOOCrIrRJO6E+vnle5JmjBCkarGWqQvNDKrRSufEUAbljj3jV6pRG 26peNt9VBt5VIW3ena6sZIQKRKd6ZLhS8aTD8z0ISiB3E7ANghMvSvmtOBSefMPotHknQP qCsHaNj8gUGtSPqXjtFwL/ygFNPeo0r9Aw3IYL14eoZ4rPUqrYD2dgkQRWOcjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1698973264; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=YBPQtRyy1yofBYBLQLkzvtldkRtGnW09YGGLbc/dAf0=; b=C8EgKgVmyEciykhQVg5UseN55V5DBOaEJkfhd51Qo3BkJTAer2F9duDrUb9RKcSlMf0DKw MnEo7+c7RWv/MiU2YAoThTXt+vQ5mB/9FyflxxY+WZsPygJegz8DWPyoNijIruL2XyqVCH 7cQ8UlTukNkhnnyuCdQAgzqJP3R5+y92n8v2CPSqYYpvh7v/vjRM4nhHrXQ+VJehXQ4Jcj 19IqXqw72VkaY6HovlDMEgl4b5DsVEXTri/oWwdluHuf1uQ6Kj3yS+7ILEGyHLzlfxR3xU 67+47obHd9vwMN0qnIh4NpEZi8pU9tAeq18981KL87GpEgojUNF2SkHnWW5vDw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1698973264; a=rsa-sha256; cv=none; b=pDOyeH2LmhbRYcu1GfAOGyP9WDBuOL5WLOkpAKDKEKagFxSsMFP61KH7v8BKHBLkSJDzCU aR5ICjqPJ5/1gl0zbHjjN1jJ+dE5T4FxhjHyQRREJ0/T5wwt5wGP8eBjaS0C7TwQweRwq3 qG7sRQI9a5vBwQTC1AdEg36Q10O1N8/yQMrR6U5W1q+7vFyXJqpZJ/3vryOwc79lmQNDM7 PZTUHClVzMdayCMJwwUtzfwBoKQ8ddhXaGkJE5k8y++0GDrX3fyq8dzvsnWm5GvrjD9P5J LTVP5P1gzNf/d3OEgZTDX0dwNXsY9kgIbnHnAIDaDM10eDl4CyNYLNfU6oa7uA== Received: from smtpclient.apple (ns1.oxydns.net [45.32.91.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: zlei/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4SM2Vl1slVz56q; Fri, 3 Nov 2023 01:01:02 +0000 (UTC) (envelope-from zlei@FreeBSD.org) From: Zhenlei Huang Message-Id: <0389C319-FF97-40F4-88E0-6B2E4DCB522C@FreeBSD.org> Content-Type: multipart/alternative; boundary="Apple-Mail=_51F3ABF6-9483-4AC0-BC84-5C55AE0BD772" List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.4\)) Subject: Re: RELENG_13 to 14 upgrade fail (resolved) Date: Fri, 3 Nov 2023 09:00:57 +0800 In-Reply-To: <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> Cc: FreeBSD-STABLE Mailing List To: mike tancsa References: <0c19b8a6-119c-4f5d-af26-d625afc7afec@sentex.net> <82e3580d-3d25-4cfc-8b18-e54a1fddbf12@sentex.net> X-Mailer: Apple Mail (2.3696.120.41.1.4) --Apple-Mail=_51F3ABF6-9483-4AC0-BC84-5C55AE0BD772 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii > On Nov 3, 2023, at 12:36 AM, mike tancsa wrote: >=20 > On 11/2/2023 12:28 PM, mike tancsa wrote: >> On one of my VMs that I upgraded from RELENG_13 to RELENG_14, I = forgot to update the boot loader so now at bootup, I have >> ZFS: unsupported feature: com.klarasystems:vdev_zaps_v2 >>=20 >> Can't find /boot/zfsloader >>=20 >> What is the best way to recover from this ? Its a raw vm image. gpart = is p1=3Dfreebsd-boot, p2=3Dfreebsd-swap,p3=3Dfreebsd-zfs >>=20 >> I was thinking perhaps start up a second vm thats RELENG_14, mdconfig = the image, and then what do I need to do ? Just >>=20 >> gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 ? >>=20 >>=20 >=20 > A little easier than I though. I just grabbed the 2 files from a = RELENG_14 image and put them in /tmp on my nfs server where the raw vm = image is. Then >=20 > mdconfig -f problem-vm-image.raw > gpart bootcode -b /tmp/pmbr -p /tmp/gptzfsboot -i 1 md0 For the UEFI boot, the process to upgrade the boot loader is different. I once made a mistake (I forgot the VM is UEFI bios), and overwrite the = total ESP partition, then the VM refused to boot (certainly). So probably we want a SMART hint when upgrading zfs pool is done. > mdconfig -d -u 0 >=20 > and its up and running again >=20 > ---Mike Best regards, Zhenlei --Apple-Mail=_51F3ABF6-9483-4AC0-BC84-5C55AE0BD772 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii

On Nov 3, 2023, at 12:36 AM, mike tancsa <mike@sentex.net> = wrote:

On 11/2/2023 12:28 PM, mike tancsa wrote:
On = one of my VMs that I upgraded from RELENG_13 to RELENG_14, I forgot to = update the boot loader so now at bootup, I have
ZFS: = unsupported feature: com.klarasystems:vdev_zaps_v2

Can't find /boot/zfsloader

What = is the best way to recover from this ? Its a raw vm image. gpart is = p1=3Dfreebsd-boot, p2=3Dfreebsd-swap,p3=3Dfreebsd-zfs

I was thinking perhaps start up a second vm thats RELENG_14, = mdconfig the image, and then what do I need to do ? Just
gpart bootcode -b /boot/pmbr -p /boot/gptzfsboot -i 1 md0 = ?



A little = easier than I though. I just grabbed the 2 files from a RELENG_14 image = and put them in /tmp on my nfs server where the raw vm image is. = Then

mdconfig -f = problem-vm-image.raw
gpart bootcode -b /tmp/pmbr -p /tmp/gptzfsboot -i 1 = md0

For = the UEFI boot, the process to upgrade the boot loader is = different.

I once made a mistake (I = forgot the VM is UEFI bios), and overwrite the total ESP partition, then = the VM refused to boot (certainly).
So probably we want a = SMART hint when upgrading zfs pool is done.

mdconfig -d = -u 0

and its up = and running again

    ---Mike

Best regards,
Zhenlei

= --Apple-Mail=_51F3ABF6-9483-4AC0-BC84-5C55AE0BD772-- From nobody Fri Nov 3 20:20:25 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMXDZ0Tw7z50F2t for ; Fri, 3 Nov 2023 20:20:30 +0000 (UTC) (envelope-from dean.weimer@outlook.com) Received: from NAM02-SN1-obe.outbound.protection.outlook.com (mail-sn1nam02olkn2080d.outbound.protection.outlook.com [IPv6:2a01:111:f400:7ea9::80d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "DigiCert Cloud Services CA-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMXDY1tCLz3GlM for ; Fri, 3 Nov 2023 20:20:29 +0000 (UTC) (envelope-from dean.weimer@outlook.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=outlook.com header.s=selector1 header.b=U8lscbyn; arc=pass ("microsoft.com:s=arcselector9901:i=1"); spf=pass (mx1.freebsd.org: domain of dean.weimer@outlook.com designates 2a01:111:f400:7ea9::80d as permitted sender) smtp.mailfrom=dean.weimer@outlook.com; dmarc=pass (policy=none) header.from=outlook.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Z6XBxsevZnXAc5Eun03iMhP066vXJW1l7EQeVWdMXmjGrlhRZhTuxIaN0QLs83TO5kZOynGvJb1Ih/3yMnrQ2clTle29Xml7jwsqUXQWEn8geWhspEFjZacsoohTdQmlrhGkTXuH8Rnlmo2HGBuZvDk6if0/QMmeVuoXrcCUoI5jd4vrKLO7F09cijo37EC0SrMcc4iSuq3LjY4q6GRAtEOzL6BpWTgRDEWerXeCjc6NvqqZSoJf5TwN3/mUC6TXtlFqnJDusHa1CCYd2NEHJeg54qRtDOLanC6fXNiidjyHpF72ZC43IWpX0AKosen/zrN1rGFvNgLul+EgnQj7LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dKiuHSUi4hTqTk4HslM79MwEGiyKHQBDO2djfBbwy2A=; b=hC1XH7zoyRK38Reu4RH8IzbW+LBkLJtbDyIej3p/2BMXDFD1xc1iCmJpir32hzGh0YSiC4xXdE7SgX/L0Y8dAfIrsnxUAYToK8orrgLR7xErOLiFRyQ4s7MFY56xW8A6zp/SLF2NfcKysTkyZr9tQR8sKah4BkvqX9KmutAhNcuo3MDkHE2JCFxFhNsZc33im2YTeKXffVoUCfWLg4FKwvcxTokkkNCZv+wbpJcQ+t+ABBdaKHzDx7nD31P3lZvjDoNZUV9OMklTujEpDpMgYyo4LjrXELgPCbCN3eUkwdUxEgokkKK9PCfme5NDsm+uscs8P/5lWkZLObhHqfUfLg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dKiuHSUi4hTqTk4HslM79MwEGiyKHQBDO2djfBbwy2A=; b=U8lscbynZ+wueuTWtHJrIK2UoJyN/EOA1PdcjWYMg0YZVnDNKcch3OQpZoDpzfapQk12pWc0EY8Kh7rAnJWzneF4+U0ObRfmL/TW6RXN9ZL3xcuyxvlCFDG4pOqDlviT0dAZZVfxlMIbO9AEqNqeUoWNoVcgpytvNNBmA7m9/gOcqd9GP58UE39l+05q8d6lC5fPN3OvQMJPrIslpfJ9T283b32bPVBB6vo5KyR1d9qAq5z346epZXN3qSGY8Pk63yTxS2RKWwOPxXSX0pJnOfENocpLQlGRYWbfU24K3YqF9HP9YAl/2eTj0OAvLB3lJUqH0mpzAnd1no61JEtEWA== Received: from CH0PR19MB7951.namprd19.prod.outlook.com (2603:10b6:610:182::7) by MW3PR19MB4314.namprd19.prod.outlook.com (2603:10b6:303:48::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6954.21; Fri, 3 Nov 2023 20:20:26 +0000 Received: from CH0PR19MB7951.namprd19.prod.outlook.com ([fe80::7c41:493e:c079:e392]) by CH0PR19MB7951.namprd19.prod.outlook.com ([fe80::7c41:493e:c079:e392%4]) with mapi id 15.20.6954.021; Fri, 3 Nov 2023 20:20:25 +0000 From: Dean Weimer To: "freebsd-stable@freebsd.org" Subject: Help with etcupdate when using alternate source and destination. Thread-Topic: Help with etcupdate when using alternate source and destination. Thread-Index: AQHaDpMnpXnbM4kvXESfjfEvb4cr1A== Date: Fri, 3 Nov 2023 20:20:25 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: x-ms-exchange-messagesentrepresentingtype: 1 x-tmn: [QXp7NKF/g0Rj9p0splpqng82Xu35j/b5] x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CH0PR19MB7951:EE_|MW3PR19MB4314:EE_ x-ms-office365-filtering-correlation-id: 93bbb296-5a27-415e-5284-08dbdcaa50a9 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 7ZltLZ6W8WhMWboDUkFpDT2fl7DboRlouw5BTZe39UtBep2bdUtMUMy438skqlLMaU2AAGzezd2eYjITLPoeMALO8ssrWXMB8klSlzTBYKpb/AeDmkM3EAp8Fm4VY6QSEPiNq0uxE6YUqnQTIoOnhlSssaldeNaDqHlgNkrsTo2KtJwEer7VEZFJxzWxkbq8sDZTjnG2Ah90//aKwJ0y6WmNfSvJOE7otMBU/fWQR0Bc+ciWRuGplXDAW20pAgtccSDly/Ng4BV9IFYghCjxIdzYhAgHdeMpgLYpVePYS8kW5m6egcTQfF0dNc5bgGse5fLW/lXcxlfe3bCuMpUzcf7iNUxpcVydd4tuBXM+2CekQXhGTn8wwZFMMcQGOTJ+psrBPfxAIsMHfuKdu6uEqU9499kekSn+2yFs3rnzDs9eW3aR+0lEDCBL4lRYtluvAPipSGsaFWrwUPg0YMmegSW6d/yBZ7GRvV3DTeChsqw4YC+yYcmjlp9wLr35eTVTdNoh0Fam7mVhV/4lq7RHTSQWwDYkUHscchFRyF6JfXBjhXSsa5HSQ5qijT1aKM/1 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?wT2wg7ufN/2556bdWGFi3ZcCPmL4tk9gq5uqKX8+MLsWyY/fa7ercE4ref?= =?iso-8859-1?Q?O+EvrFC5C7qRfGhwBqTZG2lrGe9e2CwndzDvHLGQogPN7g0ekDShl7Coz/?= =?iso-8859-1?Q?TZbExe8tT7WI/8NRpiDQ90V8YcHjusQJNW0YqBjZCwHXcItlQv5GTAO26c?= =?iso-8859-1?Q?Cp02Qh+FbT4VJ5coejXfx5sdhvSxxs0bHN+8IOwpyfM0PsxQidw0JxH5Dk?= =?iso-8859-1?Q?bnK1TNI9hVIxmbOXtVRjY0B+VD+gvcXCBITg9tsbohvNkl9hjHwuku1Qhc?= =?iso-8859-1?Q?/Dh3NRk3ts+gsRx0i8NbRaMQeknUceerNu1fVuvQtwFLN40Jzii60KXuFn?= =?iso-8859-1?Q?8eeHNqeMm1Ou6AeYnD+FbPyf4qjX3GprdH7vbV+dEwgAZi8vxoJGSrPULE?= =?iso-8859-1?Q?7t7SfO0/8tySP7EX9RQzrhoJLDxkODNxTDKPbURYxYdT5XmSvwo2DFhkR0?= =?iso-8859-1?Q?2R9wdFr6IXJd1OGS9wbSmdeFNvplI0zFgseTUDjqbjUGJzfKRCPFAc/LwB?= =?iso-8859-1?Q?Y51Dlv3YiJPMHiQaJPOJgD94nhTjNXJyk4jbrQIpijAo4mhdhpEX+mb7BJ?= =?iso-8859-1?Q?UYx+rHIP0k+7v0J2QtoG4VafrfM/JbzO79YmLy5QQYYjaA9m2uqcbZCrYj?= =?iso-8859-1?Q?2Z5AO8SQeJERwErHmd49pbLA3j8oioQe5hI9HPnOxfGgKZeK1BFn/wH0Ul?= =?iso-8859-1?Q?TwgZtulucZOPGmoAW0wkJEGeQIoncCJUbbYmagBVStMBtWuorrXnCH1TWs?= =?iso-8859-1?Q?VODQhQilurRjmJVWId3X9hK/5l2Ha40rcbYLanPHUdZ6MHM63MpynLtW8t?= =?iso-8859-1?Q?JRW6TogHOtOw2brzD4PEoe6gep8p/MqOrbISrJSKO5dEQacYkP+BHTwbv5?= =?iso-8859-1?Q?dtmEZYRRQ6Zlx747fSsbxhsyCvDfJv1zAkh9sQkb60ZdCJ5/GRXG8lsjBk?= =?iso-8859-1?Q?LGvr8eKEzLc2CCm3Agh+GCltkOPLoYxnJ34J8+szFJW17gqud8nAuvGLEy?= =?iso-8859-1?Q?uqqEIFpOmLwuiHf+yA0lGYl73aHhXL3hwmMDlGvqmibD07f5MnodmsNHHC?= =?iso-8859-1?Q?IVCmS+gIOqihSl+dXYaQSIDMDzLXdAjPl0TgeTMKAg0K1XWExCFBdmT6AR?= =?iso-8859-1?Q?yrc3jsE+1AiB9ghZBeDCEPwubAU9qDJBD7ZWD1RI0Q/9jYq1n2S0mEUTqu?= =?iso-8859-1?Q?v5eeMYxs4d2Q0toldJkizc956KV5CDlXntQuj7jI9Xuaaokfmx8SyCYotq?= =?iso-8859-1?Q?rOz/WyOoXx3Mn1xGsc4IGeFb4U+pNfItVGoq+fmgFFRvUIKDYp6YP4M02r?= =?iso-8859-1?Q?jERJ?= Content-Type: multipart/alternative; boundary="_000_CH0PR19MB7951474BCB3F0B8B6778705BB8A5ACH0PR19MB7951namp_" List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH0PR19MB7951.namprd19.prod.outlook.com X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-CrossTenant-Network-Message-Id: 93bbb296-5a27-415e-5284-08dbdcaa50a9 X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Nov 2023 20:20:25.8571 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-rms-persistedconsumerorg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW3PR19MB4314 X-Spamd-Result: default: False [-5.00 / 15.00]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector9901:i=1]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[outlook.com,none]; R_SPF_ALLOW(-0.20)[+ip6:2a01:111:f400::/48]; R_DKIM_ALLOW(-0.20)[outlook.com:s=selector1]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; TO_DN_EQ_ADDR_ALL(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FROM_EQ_ENVFROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[outlook.com]; ASN(0.00)[asn:8075, ipnet:2a01:111:f000::/36, country:US]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_HAS_DN(0.00)[]; DKIM_TRACE(0.00)[outlook.com:+]; FREEMAIL_FROM(0.00)[outlook.com]; RCPT_COUNT_ONE(0.00)[1]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[outlook.com:dkim] X-Rspamd-Queue-Id: 4SMXDY1tCLz3GlM X-Spamd-Bar: ---- --_000_CH0PR19MB7951474BCB3F0B8B6778705BB8A5ACH0PR19MB7951namp_ Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Can anybody point me to a howto, when using etcupdate with alternate source= and destinations. I have been using ZFS with snapshots mounted to alternat= e paths to do my updates from source since I believe around 9.2 release. Me= rgemaster has been working for me, but I am trying to switch my process to = etcupdate instead and I am failing spectacularly. I have a /etc/src-env.conf file containing. WITH_META_MODE=3Dyes MAKEOBJDIRPREFIX?=3D/usr/obj DESTDIR=3D/jails/devel/ROOT __MAKE_CONF=3D/jails/devel/ROOT/etc/make.conf SRCCONF=3D/jails/devel/ROOT/etc/src.conf SRC_ENV_CONF=3D/jails/devel/ROOT/etc/src-env.conf This is my old process. I mount my snapshot to /jails/devel/ROOT run the following mount -t nullfs -o ro /usr/src /jails/devel/ROOT/usr/src cd /jails/devel/ROOT/usr/src make buildworld && make buildkernel make installkernel && make installworld mergemaster -Ui -m /jails/devel/ROOT/usr/src -D /jails/devel/ROOT make -DBATCH_DELETE_OLD_FILES delete-old && make -DBATCH_DELETE_OLD_FILES d= elete-old-libs I would then start a jail from this, update any packages check configuratio= ns and then stop jail and switch main system over. I use same system for pa= tch level updates, but would build a VM from fresh install for new major ve= rsions and ship snapshots over to it, build and then back to primary system= for reboot. First attempt at new process. mount my snapshot to /jails/devel/ROOT mount -t nullfs -o ro /usr/src /jails/devel/ROOT/usr/src cd /jails/devel/ROOT/usr/src etcupdate extract -s /usr/src_13.2-RELEASE-p4 -D /jails/devel/ROOT etcupdate diff -s /usr/src_13.2-RELEASE-p4 -D /jails/devel/ROOT # Diff looks as expected make buildworld && make buildkernel && make installkernel etcupdate -p -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT # PANIC: merge failed with status 127 #Logs end with: Building tree at /jails/devel/ROOT/var/db/etcupdate/etcupdate-YyFRXe8 with = make -DNO_FILEMON /usr/sbin/etcupdate: diff3: not found # Get past this by running etcupdate extract -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT etcupdate diff -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT # Output looks as expected etcupdate -p -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT # returns with no errors make installworld etcupdate -B -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT # Returns with no errors, however nothing in system is updated I have trying added etcupdate resolve after the -p & -B runs, just returns = no errors, doesn't show any conflicts to resolve. I have been able to get system running on new version by falling back to ru= nning mergemaster command, but I have to edit some files manually as there = are a few changes that don't get merged correctly in the 13.2-RELEASE-p4 to= upgrade 14.0-RC. --_000_CH0PR19MB7951474BCB3F0B8B6778705BB8A5ACH0PR19MB7951namp_ Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
Can anybody point me to a howto, when using etcupdate with alternate source= and destinations. I have been using ZFS with snapshots mounted to alternat= e paths to do my updates from source since I believe around 9.2 release. Me= rgemaster has been working for me, but I am trying to switch my process to etcupdate instead and I am failing= spectacularly.

I have a /etc/src-env.conf file containing.
WITH_META_MODE=3Dyes
MAKEOBJDIRPREFIX?=3D/usr/obj
DESTDIR=3D/jails/devel/ROOT
__MAKE_CONF=3D/jails/devel/ROOT/etc/make.conf
SRCCONF=3D/jails/devel/ROOT/etc/src.conf
SRC_ENV_CONF=3D/jails/devel/ROOT/etc/src-env.conf

This is my old process.
I mount my snapshot to /jails/devel/ROOT
run the following
mount -t nullfs -o ro /usr/src /jails/devel/ROOT/usr/src
cd /jails/devel/ROOT/usr/src
make buildworld && make buildkernel
make installkernel && make installworld
mergemaster -Ui -m /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
make -DBATCH_DELETE_OLD_FILES delete-old && make -DBATCH_DELETE_OLD= _FILES delete-old-libs

I would then start a jail from this, update any packages check configuratio= ns and then stop jail and switch main system over. I use same system for pa= tch level updates, but would build a VM from fresh install for new major ve= rsions and ship snapshots over to it, build and then back to primary system for reboot.

First attempt at new process.
mount my snapshot to /jails/devel/ROOT
mount -t nullfs -o ro /usr/src /jails/devel/ROOT/usr/src
cd /jails/devel/ROOT/usr/src
etcupdate extract -s /usr/src_13.2-RELEASE-p4 -D /jails/devel/ROOT
etcupdate diff -s /usr/src_13.2-RELEASE-p4 -D /jails/devel/ROOT
# Diff looks as expected
make buildworld && make buildkernel && make installkernel etcupdate -p -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
# PANIC: merge failed with status 127
#Logs end with:
Building tree at /jails/devel/ROOT/var= /db/etcupdate/etcupdate-YyFRXe8 with make -DNO_FILEMON
/usr/sbin/etcupdate: diff3: not found
# Get past this by running
etcupdate extract -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
etcupdate diff -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
# Output looks as expected
etcupdate -p -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
# returns with no errors
make installworld
etcupdate -B -s /jails/devel/ROOT/usr/src -D /jails/devel/ROOT
# Returns with no errors, however nothing in system is updated

I have trying added etcupdate resolve after the -p & -B runs, just retu= rns no errors, doesn't show any conflicts to resolve.

I have been able to get system running on new version by falling back to ru= nning mergemaster command, but I have to edit some files manually as there = are a few changes that don't get merged correctly in the 13.2-RELEASE-p4 to= upgrade 14.0-RC.

--_000_CH0PR19MB7951474BCB3F0B8B6778705BB8A5ACH0PR19MB7951namp_-- From nobody Fri Nov 3 23:42:32 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMcjk5qq4z4yj29; Fri, 3 Nov 2023 23:42:34 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMcjk5d2wz4M4r; Fri, 3 Nov 2023 23:42:34 +0000 (UTC) (envelope-from gjb@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1699054954; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=24tg6VdPv80JrSuRvqgkOqst9njoTXOeEZ1xe8amkTE=; b=w0mZenDlMwevi1XNMyfFSgg9EtxVo6yh0hozcTZbiIZuOEuGKi7FR6aUs50J2StwhjuthF xhyMhuCF1UieL98DSS7MkA7vTKllUVh49g+EJ3vjVXNK9X2t0eLP0C6RPAYEaipqDTcteh Ax/RjvLgNZd4kiNQz0hoKJULKkjhRKMYMcRZT38SfkokvEFKtq5PiH1XvFR1k9rPonRIHn BmgW1FqU3RSSjxt13pRadQlqGOs2cuSxjhtHL4i+ixQMHINffIol6ahJxRhJXAV7ZgGaVZ Arel2YfC/eZtY+OOcMYn2CRTC4RqiSb2/PpJ7GxQR4jWkjkbH+Iuk88PBmD/MA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1699054954; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type; bh=24tg6VdPv80JrSuRvqgkOqst9njoTXOeEZ1xe8amkTE=; b=WQ8v52Fwjn+PalPWyMhrqXjcerwPjDdRMcWHnvK5hZSU9vAPADcUwPUSaHQt2gUhabxtFm DpeNDBj7Ol7UVVdSj001f9gpYGNFOb/liMybtuWKkQ3YZJY2LQuReE9aDbZNeO99uA3Efz EFvNSeOcoF1KTwNOTn7EtDVCXFfLIMcqdMIn7yiqp9TJxtJsSPlPYEr3tY+mHvFgqyh8z7 x/nOzqj866dDSCivRoHL8sjaLzGoYipnud9Vo4Vy+4D5xSrE8gahS7e1nwBFAkV2eZ1svQ hm7hn4afvIH7P3jex4oAgqWDTKyY6VBe0RTNjjEde2zQBmIJHYOnjIAp74/rBw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1699054954; a=rsa-sha256; cv=none; b=GKwjvYZ2AUL8fKZxL/DZnAnQdC+QajExobykDgLw3lqb7kk5lO6NZ25y+Qhc63SeSqGjMl kDawlESJiXVgVOZbbGGZLAsGtbvftlLrJJRwOT9//uLDJQ4ncyK9nr6KC6bnxMZW8tgZ8/ YiBNo8lmtSA7TO6+tJUDu4oLlxUUst1Ds9JhVUnQl234kPC2cdWcf2WS+ht+R9qWnIcCo/ jShiUIm4y+udWgkeZggqmBbMSHSsKNOkXNL4+4NJnZpDn5sWVsIe7FaxOMaw4+GzDeYROD r5wv+dhPrcgSsIhvG4zlczIXjbE66/5Aht7VX/wWB+gdJk/GMC1kY50aoHzAFA== Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id 433C0CC46; Fri, 3 Nov 2023 23:42:34 +0000 (UTC) (envelope-from gjb@freebsd.org) Date: Fri, 3 Nov 2023 23:42:32 +0000 From: Glen Barber To: freebsd-current@freebsd.org, freebsd-stable@freebsd.org, freebsd-snapshots@freebsd.org Cc: FreeBSD Release Engineering Team Subject: FreeBSD 14.0-RC4 Now Available Message-ID: <20231103234232.GK1289@FreeBSD.org> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; x-action=pgp-signed -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 The fourth RC build of the 14.0-RELEASE release cycle is now available. Installation images are available for: o 14.0-RC4 amd64 GENERIC o 14.0-RC4 i386 GENERIC o 14.0-RC4 powerpc GENERIC o 14.0-RC4 powerpc64 GENERIC64 o 14.0-RC4 powerpc64le GENERIC64LE o 14.0-RC4 powerpcspe MPC85XXSPE o 14.0-RC4 armv7 GENERICSD o 14.0-RC4 aarch64 GENERIC o 14.0-RC4 aarch64 RPI o 14.0-RC4 aarch64 PINE64 o 14.0-RC4 aarch64 PINE64-LTS o 14.0-RC4 aarch64 PINEBOOK o 14.0-RC4 aarch64 ROCK64 o 14.0-RC4 aarch64 ROCKPRO64 o 14.0-RC4 riscv64 GENERIC o 14.0-RC4 riscv64 GENERICSD Note regarding arm SD card images: For convenience for those without console access to the system, a freebsd user with a password of freebsd is available by default for ssh(1) access. Additionally, the root user password is set to root. It is strongly recommended to change the password for both users after gaining access to the system. Installer images and memory stick images are available here: https://download.freebsd.org/releases/ISO-IMAGES/14.0/ The image checksums follow at the end of this e-mail. If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use Git to do a source based update of an existing system, use the "releng/14.0" branch. A summary of changes since 14.0-RC3 includes: o ISA and GIANT-locked driver removal has been delayed to FreeBSD 15, and system messages have been updated to reflect such. o An update to OpenZFS correcting block cloning between encrypted and unencrypted datasets has been included. o A fix for Hyper-V emulation within QEMU resulting in system crashes has been addressed. A list of changes since 13.2-RELEASE is available in the releng/14.0 release notes: https://www.freebsd.org/releases/14.0R/relnotes/ Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 14.0-RELEASE cycle progresses. === Virtual Machine Disk Images === VM disk images are available for the amd64, i386, and aarch64 architectures. Disk images may be downloaded from the following URL (or any of the FreeBSD download mirrors): https://download.freebsd.org/releases/VM-IMAGES/14.0-RC4/ BASIC-CI images can be found at: https://download.freebsd.org/releases/CI-IMAGES/14.0-RC4/ The partition layout is: ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label) ~ 1 GB - freebsd-swap GPT partition type (swapfs GPT label) ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label) The disk images are available in QCOW2, VHD, VMDK, and raw disk image formats. The image download size is approximately 135 MB and 165 MB respectively (amd64/i386), decompressing to a 21 GB sparse image. Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI loader file is needed for qemu-system-aarch64 to be able to boot the virtual machine images. See this page for more information: https://wiki.freebsd.org/arm64/QEMU To boot the VM image, run: % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt \ -bios QEMU_EFI.fd -serial telnet::4444,server -nographic \ -drive if=none,file=VMDISK,id=hd0 \ -device virtio-blk-device,drive=hd0 \ -device virtio-net-device,netdev=net0 \ -netdev user,id=net0 Be sure to replace "VMDISK" with the path to the virtual machine image. === Amazon EC2 AMI Images === FreeBSD/amd64 EC2 AMI IDs can be retrieved from the Systems Manager Parameter Store in each region using the keys: /aws/service/freebsd/amd64/base/ufs/14.0/RC4 /aws/service/freebsd/amd64/base/zfs/14.0/RC4 /aws/service/freebsd/amd64/cloud-init/ufs/14.0/RC4 /aws/service/freebsd/amd64/cloud-init/zfs/14.0/RC4 FreeBSD/aarch64 EC2 AMI IDs can be retrieved from the Systems Manager Parameter Store in each region using the keys: /aws/service/freebsd/aarch64/base/ufs/14.0/RC4 /aws/service/freebsd/aarch64/base/zfs/14.0/RC4 /aws/service/freebsd/aarch64/cloud-init/ufs/14.0/RC4 /aws/service/freebsd/aarch64/cloud-init/zfs/14.0/RC4 === Vagrant Images === FreeBSD/amd64 images are available on the Hashicorp Atlas site, and can be installed by running: % vagrant init freebsd/FreeBSD-14.0-RC4 % vagrant up === Upgrading === The freebsd-update(8) utility supports binary upgrades of amd64, i386, and aarch64 systems running earlier FreeBSD releases. Systems running earlier FreeBSD releases can upgrade as follows: # freebsd-update upgrade -r 14.0-RC4 During this process, freebsd-update(8) may ask the user to help by merging some configuration files or by confirming that the automatically performed merging was done correctly. # freebsd-update install The system must be rebooted with the newly installed kernel before continuing. # shutdown -r now After rebooting, freebsd-update needs to be run again to install the new userland components: # freebsd-update install It is recommended to rebuild and install all applications if possible, especially if upgrading from an earlier FreeBSD release, for example, FreeBSD 12.x. Alternatively, the user can install misc/compat12x and other compatibility libraries, afterwards the system must be rebooted into the new userland: # shutdown -r now Finally, after rebooting, freebsd-update needs to be run again to remove stale files: # freebsd-update install == ISO CHECKSUMS == o 14.0-RC4 amd64 GENERIC: SHA512 (FreeBSD-14.0-RC4-amd64-bootonly.iso) = 2af53c6611eb67b184ba4c93c87ad5aba94911946da453428e38af385691c0a952126feff1be717bf67a3d8a227509449dd011364a9587eae41a204da7d18252 SHA512 (FreeBSD-14.0-RC4-amd64-bootonly.iso.xz) = fbfe4be553dc78d69981646673b66f9dd8f83d9f5fca3b1e50b11a816f4d47f5e5733e655adf0bb0a78ea0bfb6579ebee0c48157d69b00ec8a669b292eb0c16e SHA512 (FreeBSD-14.0-RC4-amd64-disc1.iso) = dac0f20ee98a2679647f1afdc8271b809d436182203e0b17601c69086e532ba73edf3872f67016d768e911164d7ecbc24770ce5b5546b2fe7a6fdabbc40fdc5d SHA512 (FreeBSD-14.0-RC4-amd64-disc1.iso.xz) = 662a5cf5c9f1c547f19c974d157b91c600d8e94cd57ff683d3a97a78e10d7675c538c55ad631d7b0c8aed7b4860e4453fce48714debd0b7ded787c533860b5c3 SHA512 (FreeBSD-14.0-RC4-amd64-dvd1.iso) = 6c25adce9d49bc9f168ef4048f4339ae70c1648c392b8f3f466335952f9eea5a05960b78bfee46acd38388195b12851e17d2cacf41be4b1fb22b10d5cb32404e SHA512 (FreeBSD-14.0-RC4-amd64-dvd1.iso.xz) = cd6201e3432d0fc2889c1612612582436e61d322533a05552650fdff2a48583ff7d399d709d85ef279a377f4afb85894cb7544e7b984cdcf48561de412eb18cf SHA512 (FreeBSD-14.0-RC4-amd64-memstick.img) = 02eb4fc41a595d9e78a1866b205d4301b502ec8deeb63414a01bbe61ff3ffecb503ad5a6cc75be4e0e5e11315f5875e141bead5ffe22fa69b111161d7c29c903 SHA512 (FreeBSD-14.0-RC4-amd64-memstick.img.xz) = 705c41197a6d354c6c086aa2feca36704808db0df423cdef8bd2bc59fe3f12931a4cdb7257631602e59d49862e31edddf0b4dc974a61ceb9dd6a59209874ee88 SHA512 (FreeBSD-14.0-RC4-amd64-mini-memstick.img) = 6988e9300baa0572d0801d9de289784c63b8f6aaab2c2cf37775458bc6828c79fcf3dc873b553346b0e470defc613a7ffdc4cf697e913e25f1cc8c3f95bd6c23 SHA512 (FreeBSD-14.0-RC4-amd64-mini-memstick.img.xz) = 9d597049a794d5f6474414d0146107bf4f2886b25a6b48e8cbadf00868ad63afd219550257991509a3969a0462cfa655229d5e6aded9cbb601b6b3508868fa6d SHA256 (FreeBSD-14.0-RC4-amd64-bootonly.iso) = 28674417c8da59ffe4d1c4fc4f325f49d3f627787bda5dd485a82c6080816260 SHA256 (FreeBSD-14.0-RC4-amd64-bootonly.iso.xz) = c9fe6bf7598446ddaaa181a503b559bb185e8f2acc63f5cd93d3caa77b49e762 SHA256 (FreeBSD-14.0-RC4-amd64-disc1.iso) = 213d610088db85392ca8a8b8c916c93fff9dc8f8d1c5a07cd2bba9df55ca9105 SHA256 (FreeBSD-14.0-RC4-amd64-disc1.iso.xz) = 74c460930aaedc994bb976579baee89df81b08dbacfe7668f004d9d45305b9e3 SHA256 (FreeBSD-14.0-RC4-amd64-dvd1.iso) = c2feb7808e4e34a32c3c309c1adb0bf8ed5cd0fa4b4ee98a44b1ebc7e48dc04c SHA256 (FreeBSD-14.0-RC4-amd64-dvd1.iso.xz) = a06045e90977e5d12c104daf7d96d9f0f452d3215d080dd27d072ab670ae981d SHA256 (FreeBSD-14.0-RC4-amd64-memstick.img) = d315c05038065f984c178829deeda47ac682c74c1bbe66a177873cdda7bc25b4 SHA256 (FreeBSD-14.0-RC4-amd64-memstick.img.xz) = a9068d9d04ac6b32f1d22b4ae803839a28f399fafe70e77d0a6aa7b3c89544e8 SHA256 (FreeBSD-14.0-RC4-amd64-mini-memstick.img) = 0035dd4d97b5243b0b8ddf9636bb39071013941d48fea9be0b92015cf74d4d5d SHA256 (FreeBSD-14.0-RC4-amd64-mini-memstick.img.xz) = d5e7b50fee0cfd5a8cce12fe0e86cc2539fe4d84345c5363b7ccfc08c59eb525 o 14.0-RC4 i386 GENERIC: SHA512 (FreeBSD-14.0-RC4-i386-bootonly.iso) = 8a9bc193a306328ec6fc17fe85a7333365a6f41560876ba6753623bff37a361b9e4e9417cf31f5913205c27e01b06f431553bff065efb4926d251229883e82f1 SHA512 (FreeBSD-14.0-RC4-i386-bootonly.iso.xz) = d4a21ada61e8f7157191c022ab30f0f17fabc3828ec75628fe18946a7b52f44d9f684fa07d61ea01ffc0a64a4fd7cfd1927985a4be1d264c7840131999ed87a2 SHA512 (FreeBSD-14.0-RC4-i386-disc1.iso) = 1b91762401259e9a0aab18499fa8270f8dad2b7651c5433d313850052af7e702a66f9408a7f274e379cbd86cfca184fb3e9181f33939a771dce1e683f0fb90e5 SHA512 (FreeBSD-14.0-RC4-i386-disc1.iso.xz) = e535de2443335277f43fc8de8e93fab85b452d8c67596d4b87bd6830f0bf6a09e0014600d2e984c69bf5e5bb600683441b87cf580fa3994a626a098e10cb3272 SHA512 (FreeBSD-14.0-RC4-i386-dvd1.iso) = 2b803000b10cb5d1fe324708193874dc52035ac6ed3442c6d6ce1668597da5f19c1bf920dc63a34b5cf599c52d2d423e5ea22402edaf084f219b755f7be99c24 SHA512 (FreeBSD-14.0-RC4-i386-dvd1.iso.xz) = d269054590c2f66217a7d500c28886fd80f105e343052a69b55576c2aea981e9745d10b49778d18af13f8b2b2e884eaeb90b1d0324f196dfca0779032ff479bd SHA512 (FreeBSD-14.0-RC4-i386-memstick.img) = 8a8c6488926099c04a78cf0ddeeececbf0c4d2372bf1ea00516d8bdad8ec31f0ac81333c06c3a78d1c883297fa584e53cc895f50a4cca620a9e20125c909d16f SHA512 (FreeBSD-14.0-RC4-i386-memstick.img.xz) = 68211b0d63ffab63a76e04001d9ed0960095a1e4effd24d38f7fcb7e73d3d1ad99ec1a94d555e5610375bae534d01ef925a7d08ef542a9a352a6a7330712baa6 SHA512 (FreeBSD-14.0-RC4-i386-mini-memstick.img) = 0571d8c32f493a908beda92bc92c597f9bd80a2474108ff743ad11dd463ef21c754294da5e993beb8944df03cd639d2d969318651d1fe1a1251b3f4f1f5eb66a SHA512 (FreeBSD-14.0-RC4-i386-mini-memstick.img.xz) = 83f3422ee6935f8b6994a1fc40c2f750ea27bab1c1b324e4b3300f87de47e8a29e7f127201a4eb03f713b6fe1d47ea81a05cbf8ce063286960c3e28ab2f17694 SHA256 (FreeBSD-14.0-RC4-i386-bootonly.iso) = bfeacfe8bbf429cd88e8ed4145de24f747e75c4e97c6bfd023d88d4752e5100a SHA256 (FreeBSD-14.0-RC4-i386-bootonly.iso.xz) = c11f09b11183105b5920753bbcf68427574d09ca7fb10d812b995999c04b2b0c SHA256 (FreeBSD-14.0-RC4-i386-disc1.iso) = e032e4300210f9aed57e5c820fc3c07c4d0b9cbba417d61458dba74d188f0214 SHA256 (FreeBSD-14.0-RC4-i386-disc1.iso.xz) = 53d6c96580d2a486b9da43169e4e4183cd125b06f3a1e7fa25e74487c20e50ea SHA256 (FreeBSD-14.0-RC4-i386-dvd1.iso) = 7e756d0ae13e9798601f45740ab7381c0e319efa3691ba1565ff203a613ea77a SHA256 (FreeBSD-14.0-RC4-i386-dvd1.iso.xz) = 90bbb28db964188988bbff402a677fe10cffaf9f620fc78a5883a1c381a969bb SHA256 (FreeBSD-14.0-RC4-i386-memstick.img) = e4699f5e7ffe6d9f38b000e324c896955c005324702e30477b529786a49e00b9 SHA256 (FreeBSD-14.0-RC4-i386-memstick.img.xz) = cd978403efd56248c655232b02dcf5e3b292faf691c98e72f1482707e2bc9db2 SHA256 (FreeBSD-14.0-RC4-i386-mini-memstick.img) = b80b37c2aa16c4166426e2f6f3ec9fdccd765ca965f75b855ef3dda619c7a02e SHA256 (FreeBSD-14.0-RC4-i386-mini-memstick.img.xz) = 5157bf384edbc8c4069e1360297a680e3540be85aad614f82c7bcc14d1ee1055 o 14.0-RC4 powerpc GENERIC: SHA512 (FreeBSD-14.0-RC4-powerpc-bootonly.iso) = 02ad34d6e7a3acdef46d3a6bb7abb44fe3e55fdf8f99b900a3aedd97520f409888db21e9ab359c641deabfebcce5360ec1d1d4ac90fe60c42b2ee8de27c9da89 SHA512 (FreeBSD-14.0-RC4-powerpc-bootonly.iso.xz) = 1a8b2b661cfbef4f1656c5185dbdbd37b751ff4862f951b30364d9d91bbe030e69c5ee98adac1be81a3a7fc0e209f530c57440c714c8e9e8b1a547e3cdbb6633 SHA512 (FreeBSD-14.0-RC4-powerpc-disc1.iso) = 783445a184562191cbaee132004de70502aac22001fc5aa1a10ae0d5d18eae5005dc630a2c3e72fe9b47e98c4625edef165fce21f1678deb1f8ad3e991ca8f3e SHA512 (FreeBSD-14.0-RC4-powerpc-disc1.iso.xz) = c28086587265cc80ecff0233ac6eb8b3e4a51232e5ab662c04df513e78fe996f051aefb668038190658805d18539c86f49e992540308ff35e4c47fd24a72e292 SHA256 (FreeBSD-14.0-RC4-powerpc-bootonly.iso) = a6c330740401487ca15097612acf08a1b8c933e94f6a1a104527062250f5d5f9 SHA256 (FreeBSD-14.0-RC4-powerpc-bootonly.iso.xz) = e7e5bfcd06bce96a10785bfe0b2aaba21f7cf0963af0744e1b064bc198c23811 SHA256 (FreeBSD-14.0-RC4-powerpc-disc1.iso) = d31ac53ca89a915c2a613343bd4bd5bf128d2e8f9f38afa789e232097c25ab5c SHA256 (FreeBSD-14.0-RC4-powerpc-disc1.iso.xz) = c85cbf09b76f66b6795b18214d06329694f392e06ffa9df52447cede5c0a9aec o 14.0-RC4 powerpc64 GENERIC64: SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64-bootonly.iso) = 6dab28bf1bb33d4f0b2f90eb3dd45c473e2ee446125f3597a43c5a69d5731a3bf52c402ea8d5df0871dc53e0689bd01dce279e36e9ebff64bd4a9a7988083795 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64-bootonly.iso.xz) = 3022076a2c7bd3c0b27775320267e232f61efc4469d84045f2732f0864a780641e8833de89b6a591a2a5302884588b956b64cf85c538467998f7e005af72be0d SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64-disc1.iso) = bf3c2a10a513ff281e77aa0cd41d0a5c8bee4d5be94936615e612dc3044dbb4e8077b0e5e1fa236479a0d48b72649871e5b1f5cb8d64cb484d09037ce3407f65 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64-disc1.iso.xz) = ac4ba53584e65b9ce94a6fe50139c4df10ba527647c170b4a37077e7bdd0d6abebb0954ba7b06f4b1d0aa27d74fec6f8cde2f214646d9c0ed4523790378bac96 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64-bootonly.iso) = 73c31144955ad8a63772dec8ee4be107ec9c290e966faf95f354c63c1b41ca14 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64-bootonly.iso.xz) = de0a4127dd7b7ea2bd4bbfb809094199e1f9135f1c9fd12fcc6e06fe7c818861 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64-disc1.iso) = 34a72ea31ae01ad57ced7e4ab6eac3b9714179003ecd0995996284c74a88ebb8 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64-disc1.iso.xz) = e3f82a17d9dddb20c6ca195340ddcf2d63eb82bbc6c381b4adcd864c1845386f o 14.0-RC4 powerpc64le GENERIC64LE: SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64le-bootonly.iso) = 14338fe5d76356713ee94f6b3ca293abbdaf380d0cd2b74ada14a4ef475f6c34c68e67dd13fcb69dbd9cbab1a951d4e71c81d5add7f3133d792e94311c8f262e SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64le-bootonly.iso.xz) = 399fdb443265566bd5e6ce1a3dc11ca41f005968a529a7535dd72622a3ae0fb2a93e66b7753c953fc5d35c63b58022ab4c223f914d3720a19490332b379156e3 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64le-disc1.iso) = acc729d7abd0f8474e1fdf3f22804aaa486c98e479dad813b83116036e0db16dce9ab956c1fd6fb80d69f462f43200f3220864e1901ae62903b717682838e5fe SHA512 (FreeBSD-14.0-RC4-powerpc-powerpc64le-disc1.iso.xz) = cb341d0eb64847a50ccb33170bbfca9c8855377e6883a4cc0c181967182700afc669b6112edb37275519cac5992765700f9eb16aef6d0bcfbc25cdb399839cab SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64le-bootonly.iso) = 2bff70b162f8f4711f9f2eb67fe10716166f4b8c062e4cbaca34fb8d521bfb09 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64le-bootonly.iso.xz) = 03c7bd799e52bb6e95428ce7809ba863f2c98e2ab71dbb45fcd67eddf79677ef SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64le-disc1.iso) = e2387661bb279c3cf6f904a858c2d87aed1ede49a29f1d1f8424d65bad38ccd6 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpc64le-disc1.iso.xz) = a3b4ca6af55b099100677685033328868d28cdd9322b1bcd12b4d5c0919d6652 o 14.0-RC4 powerpcspe MPC85XXSPE: SHA512 (FreeBSD-14.0-RC4-powerpc-powerpcspe-bootonly.iso) = 4417492d5d6ae001661252a465090d9d6daa50429cda5c069284c95095533e35e6b9bb94c4c5a24d8c51768a9732b960b3659f1e66577c4e0baf41c37cdb01e7 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpcspe-bootonly.iso.xz) = e9fb2333c5dea7048fbf289209bab16a8854de08847782acbcfe869d32d77aa5dc4089020baf53c4e88aa95c8dc696ff7bb770f8d14a823d2c0248c477cf78d1 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpcspe-disc1.iso) = 25ebf8167e090dd09647eff3f26c8313097de84b3038165018afa05f5dc5893b63286042a524fb53feeb323ee337c934616f47c6739e65cd89ffc3bc0e5076b7 SHA512 (FreeBSD-14.0-RC4-powerpc-powerpcspe-disc1.iso.xz) = f7199bda837bd15ad1c201962fcc31c88ef0134605092436f09fa1ee7027f440cd808deef20c34f63c6a80de1411d1eababfa0ed529af091dad7baef8c676a77 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpcspe-bootonly.iso) = b9b930c2e2d3a320befc46cd93eeeb8bb10d8c87db8864d00fc5438def022391 SHA256 (FreeBSD-14.0-RC4-powerpc-powerpcspe-bootonly.iso.xz) = 9281bceb101f97b9741bb0ca3407998db598a35c6117f472409d7dbc88c78f4b SHA256 (FreeBSD-14.0-RC4-powerpc-powerpcspe-disc1.iso) = 01b59d130bb608dfb012306472d24d9a46a25c329a2d86bb9396c5b26c9233be SHA256 (FreeBSD-14.0-RC4-powerpc-powerpcspe-disc1.iso.xz) = 721a3a28b3cebb358d5d93ba7cf7345325ea421d6fb1c6b624ba8d8a8244d23d o 14.0-RC4 armv7 GENERICSD: SHA512 (FreeBSD-14.0-RC4-arm-armv7-GENERICSD.img.xz) = 5d0592accd64318e81ab36b3f15cd828998734a6c781d9a267928550a5ae60ab3a2e36ddfdc6749b6851f96e06f57778aabb861c6f55cdc2476402eee1c8f8d2 SHA256 (FreeBSD-14.0-RC4-arm-armv7-GENERICSD.img.xz) = 858f153be5aa6312e14ae8b4109bd7bf3b221668cfacada991bcd22beec95342 o 14.0-RC4 aarch64 GENERIC: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-bootonly.iso) = 47b116b596167cbabed0cbe238b0265c79cfc9cd75be74ab690c465756145552e6c8d40f8a803d56afb4d7ef0106cce14581d342e31c92cf230b12ff5fe04324 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-bootonly.iso.xz) = 379bdb38548995866a5325b3fd4ff71b90887d2b97d9c5f41561d41c953cca271990a66b541b5625897ef4ce1359deae8fcf42f7efa4f19aa1b582793fb4e513 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-disc1.iso) = 105a6fe2f4b4b0669219adba0aecc4f056e27d3f380d1591a8bdb1cb60917b52242bd5ac9127a461bf3cdc85d323402977e617220c37129511149810e166c48e SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-disc1.iso.xz) = 413a2ce8523ab59acd70bc8e52c93ce65558cf0b57627683534267d5695977b1bcea85d754528251e1375b469f8f69b15e22476fb3cd8916cb59c4ca10a6217a SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-dvd1.iso) = ad536c842136232eafa8f27b57641212c3b13bbb8ad560cdc7d964dedbfa878b6f050876792c94a54c8caccc687c49fad1bfe5586e51f9001c2db5fc1e24651a SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-dvd1.iso.xz) = 74d78034d36f19f918e3c807ecb675b5d95bbe3d6fa517d6d2ceb10a29fcf7d89c9067ec1c78638af6cc8c5fba8eb91bb5445a4af1a66a447c03000433ee7ac4 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-memstick.img) = adea1b24641b05b1caccd806f224397421cf94d1105861d3d6485065027461f20809edee7f258fbf45a69cd82a1beae7afd0c48d025a8e4646232d9a634abf1d SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-memstick.img.xz) = 76c6733aea25b1c7130b0dd87056a40310caf5868afd592fb0239a882cd45f61c8975b3819a958d0dd42385d2c52dbe61dc910d7814a0c8514c804b52944da09 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-mini-memstick.img) = dab27511105faeeaccfaabb498682906ff2d61561e9f422eb26b20abc4ce2bbfa0a6d3cbfc5e26e06a737fffbb799559ebd3a659ad5a37f361937cdbf0f3c312 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-mini-memstick.img.xz) = 918d3452b5a4bc5873e781596d5bc119cde82b89f782094efc5e6913bc58774bf368ee178287fce22ff146526cbe17171e7db45acafdb94bc2818d45c475fcaf SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-bootonly.iso) = 84cedc4fcf0da7186f1289815276b7d6eb1cb9fd0058a8057bf130e00b7596e5 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-bootonly.iso.xz) = 080dc3e9d965ef4b5180b376e5c6623fb5d2fdb6b6e3ed151ca981eef6965675 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-disc1.iso) = 41a9163f4adaec848319f914f23879c608fe73ef3d498f1b402494d594e86fa8 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-disc1.iso.xz) = 621897f6d6f3631b0b830d08fa5b969a1a556e18aac637a05a6d9876885d440a SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-dvd1.iso) = f252763cecb39b3fa6f3d2a75dd593bd891f01c3dcd68f90436a53610b77fcb2 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-dvd1.iso.xz) = 7e9e9085ef8c4ec7f1bf7e493fb16f2101edd59342b05de7bd52c4e142aea812 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-memstick.img) = 145eda64f7a3e91f3ba253478a5d290fe141a0f6c2f8050e04625ec759f1e043 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-memstick.img.xz) = 7afc16842df83f0722e667eca07cdfcfbc9b2c35f8437b3397c195e6a9636c27 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-mini-memstick.img) = 9baa46356ae16a828e3e8ad3d9f1217bf4dd2d826392f18797d885600f7e814c SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-mini-memstick.img.xz) = 000ee91e812d04886d04d6e4f77516835caf1c372bb37eebbcd81a56f5dd83e3 o 14.0-RC4 aarch64 RPI: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-RPI.img.xz) = 7291b077b0338c5400af32eb6822d0139b953ad971cd9f44c5646ab5e3e502833fcda35005412a7b24203dd8dc9e3b2fe68bc3c737812b2255be624094013c47 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-RPI.img.xz) = 26d84974d64fc0fb10cc8f5f7afd9fd49a84b42392b3537fd8766bdcc0e0cd41 o 14.0-RC4 aarch64 PINE64: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-PINE64.img.xz) = 6aaa42b2f515e3847235001382683484a57790e9ba1da8b19fc318668ea6b0640f76e00d6a12b3daa1ea9ea09bd0afd0db1fa322ed236fa9e181c1ebaa19906f SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-PINE64.img.xz) = d242d0337fd76684ebfce4ff84641303da07502d51f33089219aa70c615eb4b2 o 14.0-RC4 aarch64 PINE64-LTS: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-PINE64-LTS.img.xz) = ce3deff3d02244359303331b0b3ed966bc503a42f1da0eee54f62984d2e8e54dc61f184c699cfb11aa3465fe31a89028799c0059185915d151da3be10301b8cd SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-PINE64-LTS.img.xz) = a6d398d616d2f9db3692f2c8118d9a5cde3960cdf2797497a7c155b9e8139b37 o 14.0-RC4 aarch64 PINEBOOK: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-PINEBOOK.img.xz) = f0a50d83fee5d113a95ab09c64c757243bb8874d8384c05f4bc14d6f5bd33075989ae0a73c13a46b9107f32c2834a74cde5481e970fb47d064544664a21f6abf SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-PINEBOOK.img.xz) = 42e38931bd4d527ca0753cf861f90e91d3df2f9e108c632656a77bcf16bf5068 o 14.0-RC4 aarch64 ROCK64: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ROCK64.img.xz) = 14888fe2af5cd4f1787b86cd49c61f353619761cbe43436beb12ca1207b5c15e682ec0446257dd0dc4876c9e0a9843b318e38f20f4b8f96f8aecfb2c7d8ee6d2 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ROCK64.img.xz) = 720687a8f2f7639d661dc21bd2176bad14c27f51d6fcdf6aa45fa976352332e6 o 14.0-RC4 aarch64 ROCKPRO64: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ROCKPRO64.img.xz) = 476f9bf3cf86aec65823eeeffe8b3caf3f8df3b599672137bc6cddacde16b5db28575e768206cb5d29baee09236a658a03f75efb5fdfb766adf49abcd698bee3 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ROCKPRO64.img.xz) = 66d44eb1c4745b80c928dc71fe4822b9adc213cd66dbb61f78f440d715c9cd82 o 14.0-RC4 riscv64 GENERIC: SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-bootonly.iso) = 524773593f3187ef7bacb7bcd49ad3422121b819ae34f51d79d6ce91f2754df7e52dd28df62c335bccfd987bd7af073a00d04beb866cfc83d710e6cdc8d33624 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-bootonly.iso.xz) = b1fa47bfe88a85dda0a7a92e76d65fd620a5c62a1c8fb5baa21183ff75614bf80c63424a9efd4a4a646e50c03e1dfb17c49c589dbdf7c8c78f915835115d1ce3 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-disc1.iso) = 2627889757b073413dfdf94118ae7d47a173a4a6f148d9552c7f77357ffdda54298a4ae59b0c5a36159076784a2f50ca1c24cd127616ade0945a953604d62935 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-disc1.iso.xz) = 756e79801584cf2366d8eb0365facd53e6fcd3ae1c753073f6389d4e16c4f839ddf8e5a26b27daf767b5b727dac3d2976e14b02231d52498de7ee4bc4dc34541 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-memstick.img) = d511a815a8ceef7bb3197dabecd4e59ba61078d008f96ec6c8990b9d0583569ac896d8739133feb7f13ea91635232d6dc3e6f9a8e5d546047ecef953b087cfd8 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-memstick.img.xz) = b33caeb29f10dda4bbffba3ab1cdd914777e1b0639a2264859741522f313f38bde8a9bfa24e6cdb64c02746257e7dabaa56c39b3824a66480063e8be91c79fb6 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-mini-memstick.img) = 68c638927e0e070e8ec7a704e763db9561a23b46d39288e55faa1ac8fde0b39853ebf9c36e2f51752a965d6940cbdbdcafdff2bffc33fad9866363988dabe337 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-mini-memstick.img.xz) = af0b304c13a6bb69eebc5e106caf60419a8d41d2da90ef935b76e7b39cacceba98c37a8237d7cd3d012fcd4658d71a36d7197f7e4ee2b9fa67c8d7bd4c33c830 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-bootonly.iso) = 3605436a2601aa992ab8f6b0ac238e13fd8fe14c11c42c6fe5ffd2395f0b5669 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-bootonly.iso.xz) = e9423f5452213d821720bb6497416741f678187d4c7eb885437661c7b13af955 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-disc1.iso) = 5f81e6deb3c98feca33ae5f5b409bb25b425b62279bcc1b40a36e756ad1ae1a9 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-disc1.iso.xz) = 8c6e348f874ef42aab7527fd118902862529e37a50e33e73ba700758262501c8 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-memstick.img) = 69153d6dc19fe08af410f23af3c2f95bd33500e9152e2f00a9489d47fa308faa SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-memstick.img.xz) = a1b97f38dd5f16c2c0fca710a6c296e5420388d2df887c66c31c7b152449cf47 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-mini-memstick.img) = e9a370a815ce652fa9851242b4beea28a41ee27ca3ccab87c2605fc491dc8fbb SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-mini-memstick.img.xz) = 93075f74008d544c843332ef792dbcae4cf26ba57b50842c39f299e8137d1da3 o 14.0-RC4 riscv64 GENERICSD: SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-GENERICSD.img.xz) = e61212d3bcb42858f080c0260fac4d0fcee80819de0ca6504bb0c9113cf598b43d11134ac26a9dc3b5fc142431370c3bec86debd94e02a2fa3114c7c7d9cc34f SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-GENERICSD.img.xz) = e1bb1522ebaeb9a8b0d218af007ba76542d87e6b0fd146fecc07bff7d2bbed90 == VM IMAGE CHECKSUMS == o 14.0-RC4 amd64: SHA512 (FreeBSD-14.0-RC4-amd64-ufs.qcow2.xz) = 166b0709efc63262b964c604ea746e1ac6743b2bead2efab5d5c4d6c9491a336e39d1a793b465eb751f6085ef7fa0988840e1dbcb47f67f0f5dd7ae3d48b57c4 SHA512 (FreeBSD-14.0-RC4-amd64-ufs.raw.xz) = b158c9369ecbb0178cc048990f855a71e6ffbff32f0bdbf2d5ff0255659b95e062ccc886cfdd7f91ad25fdb1d8d0f4bb78d3d097202bc6b8bd27cf13fde3220c SHA512 (FreeBSD-14.0-RC4-amd64-ufs.vhd.xz) = f860eeb1cd405bd074cca746542cff147c9331a5b64a50c43c95d686686db81b5d2e4b1f5ea8957f403b4425dfa156bf39ede7a98807d25828d7d9dc0232dd69 SHA512 (FreeBSD-14.0-RC4-amd64-ufs.vmdk.xz) = 3787cf9de0a5f4b8ae358f2316ddf62493aa6b30d70f6af2108a1730e9d79e07ef847932d7fa42b11f6f5b8b9eb3f33f41c701a67f2995005afdea053d6ef330 SHA512 (FreeBSD-14.0-RC4-amd64-zfs.qcow2.xz) = c3e7e36e5b19f3ee80011a035b047063deb64acc1409fccd3732f5639d0cc1ce0c0b1da0f60a99b3cd7c696243917ec580ef6d5319b52c1763676def92d34e86 SHA512 (FreeBSD-14.0-RC4-amd64-zfs.raw.xz) = 50c9a08d10d96f42c1669abf25a75d4115c6eb6b71241f1b8e321dcf2ac313627e6b449b941604150ecef652a7786dcd0b0be7c1b4221ae459c08e0bd5ceee91 SHA512 (FreeBSD-14.0-RC4-amd64-zfs.vhd.xz) = be44fe7f97ac044b00cc39554df4eca8a19dcacc03e936747822acbc091f0baa5b6f6ebd219fd34a1f3e86f8031cf132cdd7e12f9b498bef3b9a4c79cb60d3a8 SHA512 (FreeBSD-14.0-RC4-amd64-zfs.vmdk.xz) = 25a399e1165f7c77ab96daff57270cc5013fc3f2a1d777583fbde100a396211f46661f3fd9e675367e519b7be3cc29276529aaab062a821e8763496e8a628597 SHA512 (FreeBSD-14.0-RC4-amd64.qcow2.xz) = 166b0709efc63262b964c604ea746e1ac6743b2bead2efab5d5c4d6c9491a336e39d1a793b465eb751f6085ef7fa0988840e1dbcb47f67f0f5dd7ae3d48b57c4 SHA512 (FreeBSD-14.0-RC4-amd64.raw.xz) = b158c9369ecbb0178cc048990f855a71e6ffbff32f0bdbf2d5ff0255659b95e062ccc886cfdd7f91ad25fdb1d8d0f4bb78d3d097202bc6b8bd27cf13fde3220c SHA512 (FreeBSD-14.0-RC4-amd64.vhd.xz) = f860eeb1cd405bd074cca746542cff147c9331a5b64a50c43c95d686686db81b5d2e4b1f5ea8957f403b4425dfa156bf39ede7a98807d25828d7d9dc0232dd69 SHA512 (FreeBSD-14.0-RC4-amd64.vmdk.xz) = 3787cf9de0a5f4b8ae358f2316ddf62493aa6b30d70f6af2108a1730e9d79e07ef847932d7fa42b11f6f5b8b9eb3f33f41c701a67f2995005afdea053d6ef330 SHA256 (FreeBSD-14.0-RC4-amd64-ufs.qcow2.xz) = b79d9e82e3bf5081efb8159b66b3b3fa0472fefab9389f0ca8e18a469720a5eb SHA256 (FreeBSD-14.0-RC4-amd64-ufs.raw.xz) = c1718eff5c455afc9e689b97751ba577eeff880c1e02ae0ac758dd8452f18977 SHA256 (FreeBSD-14.0-RC4-amd64-ufs.vhd.xz) = f75b814422bfe88ae352d4342a6fce7a7059ae83210c20f3af30ef410bbc7a56 SHA256 (FreeBSD-14.0-RC4-amd64-ufs.vmdk.xz) = 4abcfc77bda9f04fdb83af19d66a3db908dc2eac3983f3169e01b59c7cce3055 SHA256 (FreeBSD-14.0-RC4-amd64-zfs.qcow2.xz) = f99a66864585598496cc43f73deed54f1a4c05552e5f02e8505c71bca743d573 SHA256 (FreeBSD-14.0-RC4-amd64-zfs.raw.xz) = bfcb87a82a02ed1f7ee3bd25885f3d8d51c1c384f56e4ab9ff959fbac600e6ae SHA256 (FreeBSD-14.0-RC4-amd64-zfs.vhd.xz) = 7c3c47e9abf98e406bb3c68dba55cab34a54e50fae5df79afdf9605dc768f0f1 SHA256 (FreeBSD-14.0-RC4-amd64-zfs.vmdk.xz) = 5b0c3e8941ab57d18a9c3bf611158812d413cc9f1191bafdc0874e3b858448d3 SHA256 (FreeBSD-14.0-RC4-amd64.qcow2.xz) = b79d9e82e3bf5081efb8159b66b3b3fa0472fefab9389f0ca8e18a469720a5eb SHA256 (FreeBSD-14.0-RC4-amd64.raw.xz) = c1718eff5c455afc9e689b97751ba577eeff880c1e02ae0ac758dd8452f18977 SHA256 (FreeBSD-14.0-RC4-amd64.vhd.xz) = f75b814422bfe88ae352d4342a6fce7a7059ae83210c20f3af30ef410bbc7a56 SHA256 (FreeBSD-14.0-RC4-amd64.vmdk.xz) = 4abcfc77bda9f04fdb83af19d66a3db908dc2eac3983f3169e01b59c7cce3055 o 14.0-RC4 i386: SHA512 (FreeBSD-14.0-RC4-i386-ufs.qcow2.xz) = 83e9052c4e7bb574ea9763309ddc952a9632cc8b2b8693cf84c3d405e91a2d5c0ce8c9b25947982661537a9fb64a3325449cfb9f18699741328f5f8f446d1407 SHA512 (FreeBSD-14.0-RC4-i386-ufs.raw.xz) = 66f9dca74d1e24869ea85f6ac10868b9197bdb508956168319f25db9ab1e7b13723b48cd544d0b25dc01d898eec127decb06329ca9c3ca9f3b333fd106eed49d SHA512 (FreeBSD-14.0-RC4-i386-ufs.vhd.xz) = 8b0152123fffd4ea9e38b7658eeddf7e6fb69525e68312f3ca0a57efdcc3716113703e94b03da0f6607ef87782599a1da74b588b3b17a934c4299f9b9d62f99a SHA512 (FreeBSD-14.0-RC4-i386-ufs.vmdk.xz) = a894383f188ad274130eb3c6d27d2e8810a502cf4f43544ecead17a61880b7b5a24f3a2709b6251c4139613a9d7e231f6d13b75b2c1413136e76b9ada1b04897 SHA512 (FreeBSD-14.0-RC4-i386-zfs.qcow2.xz) = b02e65d34149f2b21ea8f4d546764f16ad0c96c067f7c7afb685301cf4e4b1d5953f9fbaefdb6b8b2e1ab275d5c201ef1f1e3a2fdb4ce9a60078c133092f6911 SHA512 (FreeBSD-14.0-RC4-i386-zfs.raw.xz) = cfbe7aa6c8339daee268202e95d2c0c385f65debe53a22710c8314beae5a7f6e9cde02920920febf062a6613c84498e6659aa0878b112fb06af7c1a27843fd65 SHA512 (FreeBSD-14.0-RC4-i386-zfs.vhd.xz) = d72284dad778a11cf40be9a91ba1537f32118567e3dcefe40449d225f6f6280746a89b0d15e689db7ed60b54caa4cd69067b303791ab33b47b58ccc854e0c035 SHA512 (FreeBSD-14.0-RC4-i386-zfs.vmdk.xz) = 0e61517e4ff20edb0154bd68a7bff76f6095a4ef63bd1699f4665c39cf4a00d7eea1f9d562e4620c75c1ab982811409032033900e8fdcf892d228fcf49f3a335 SHA512 (FreeBSD-14.0-RC4-i386.qcow2.xz) = 83e9052c4e7bb574ea9763309ddc952a9632cc8b2b8693cf84c3d405e91a2d5c0ce8c9b25947982661537a9fb64a3325449cfb9f18699741328f5f8f446d1407 SHA512 (FreeBSD-14.0-RC4-i386.raw.xz) = 66f9dca74d1e24869ea85f6ac10868b9197bdb508956168319f25db9ab1e7b13723b48cd544d0b25dc01d898eec127decb06329ca9c3ca9f3b333fd106eed49d SHA512 (FreeBSD-14.0-RC4-i386.vhd.xz) = 8b0152123fffd4ea9e38b7658eeddf7e6fb69525e68312f3ca0a57efdcc3716113703e94b03da0f6607ef87782599a1da74b588b3b17a934c4299f9b9d62f99a SHA512 (FreeBSD-14.0-RC4-i386.vmdk.xz) = a894383f188ad274130eb3c6d27d2e8810a502cf4f43544ecead17a61880b7b5a24f3a2709b6251c4139613a9d7e231f6d13b75b2c1413136e76b9ada1b04897 SHA256 (FreeBSD-14.0-RC4-i386-ufs.qcow2.xz) = 6ef1dfcea80aa0687141c7917f0e8ab81c4241a62bee8043ac1dc23c82be05ed SHA256 (FreeBSD-14.0-RC4-i386-ufs.raw.xz) = 5eca8b0ffe97f7e6a485f496a61fad9c93a261c6c4e0d083f9fd1c500c2d4db4 SHA256 (FreeBSD-14.0-RC4-i386-ufs.vhd.xz) = 3997fd89984392f2ca2fc3b7df864dfd0dfc17be750aa78d61a31233e947fc0b SHA256 (FreeBSD-14.0-RC4-i386-ufs.vmdk.xz) = dda9a1962d1cd910465c1c91d36c2df5c923fe7353fffb172c04adaebb368505 SHA256 (FreeBSD-14.0-RC4-i386-zfs.qcow2.xz) = ab840c119d46ab49e2e33f7024f453ef872df908b47a8d9fdca0a8740b49c478 SHA256 (FreeBSD-14.0-RC4-i386-zfs.raw.xz) = 1d2635935bdd73de8e76b8815392a2f0399782aa9e41296bc4dfb9e2073a35aa SHA256 (FreeBSD-14.0-RC4-i386-zfs.vhd.xz) = 998a040e0849ed03a1cbf6da446672525c5ddee79ed225ff7cd8283164b484bf SHA256 (FreeBSD-14.0-RC4-i386-zfs.vmdk.xz) = db11801f993246135e3cd4b28b6c7457853668180ff7d11c4b0c7018e04a58c2 SHA256 (FreeBSD-14.0-RC4-i386.qcow2.xz) = 6ef1dfcea80aa0687141c7917f0e8ab81c4241a62bee8043ac1dc23c82be05ed SHA256 (FreeBSD-14.0-RC4-i386.raw.xz) = 5eca8b0ffe97f7e6a485f496a61fad9c93a261c6c4e0d083f9fd1c500c2d4db4 SHA256 (FreeBSD-14.0-RC4-i386.vhd.xz) = 3997fd89984392f2ca2fc3b7df864dfd0dfc17be750aa78d61a31233e947fc0b SHA256 (FreeBSD-14.0-RC4-i386.vmdk.xz) = dda9a1962d1cd910465c1c91d36c2df5c923fe7353fffb172c04adaebb368505 o 14.0-RC4 aarch64: SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.qcow2.xz) = 6f67f49ddf46bd4468394c985a2b34bc48f975f659de560a8ca1bd6935c3f27d02bc143632c088580aa440fae5f7f18932b5b335247c3aa328090ddbbc9c70b5 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.raw.xz) = ef0af5d2877eaa8e2a6c3ca9df9ac3b9a0e9f30035170eca3ceef1984d35b08ea422254583c08b45cda9453a3e09d7209d85b2093d69768e8c892be67ae5f975 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.vhd.xz) = 4b6bc513892b5ebd1cf2206014da0b548ddfbedb1a5fa8349fa5ddfd6363afb68f104bdc6d5447476f70ad61b27202a390cf6f5d7c5cf90c415edfe3ce0bc26d SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.vmdk.xz) = fece4ca62f30260beee2de4265f3c6559ba0a948e6dcf65658016ee10aa961136fbacc7238a6ea3b6e9afe334879cdfbcfe23f31d012a9abfca86c6783ea6a10 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.qcow2.xz) = cb21c41ad4e1e09e58bc00cc55c6e5decdf2d01e29ef7031e4497532bb33ced39473390141292d8819eb59f9f49b880c8d6d269d879c4f3b671e646968c83d32 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.raw.xz) = c33a58f30eb6f798cb353e11ad821ac9927852f6262617bb7340b963448ad83e4b4fe039676e1e48a5618db4e00ee6bc209b32809e3e70395114935189493e24 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.vhd.xz) = 4bb8cc4d313d14247701b7fa0bc920c2c5fd467126b961a5ecbc791c928730440c87dc452ecbc653db26fda482d86b0be87cd0f6ba272c2036ee3146096c70fc SHA512 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.vmdk.xz) = 5a49668bebd971fdc1145adb69edb5dd4aa521ca1a86d1532f43b58c1b3aed23c4187ce23366cc182fae296cc17a31b00858660522bb2897746f519ce5ddf3eb SHA512 (FreeBSD-14.0-RC4-arm64-aarch64.qcow2.xz) = 6f67f49ddf46bd4468394c985a2b34bc48f975f659de560a8ca1bd6935c3f27d02bc143632c088580aa440fae5f7f18932b5b335247c3aa328090ddbbc9c70b5 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64.raw.xz) = ef0af5d2877eaa8e2a6c3ca9df9ac3b9a0e9f30035170eca3ceef1984d35b08ea422254583c08b45cda9453a3e09d7209d85b2093d69768e8c892be67ae5f975 SHA512 (FreeBSD-14.0-RC4-arm64-aarch64.vhd.xz) = 4b6bc513892b5ebd1cf2206014da0b548ddfbedb1a5fa8349fa5ddfd6363afb68f104bdc6d5447476f70ad61b27202a390cf6f5d7c5cf90c415edfe3ce0bc26d SHA512 (FreeBSD-14.0-RC4-arm64-aarch64.vmdk.xz) = fece4ca62f30260beee2de4265f3c6559ba0a948e6dcf65658016ee10aa961136fbacc7238a6ea3b6e9afe334879cdfbcfe23f31d012a9abfca86c6783ea6a10 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.qcow2.xz) = afbc7e756418a70a28c77d3a50022fedbce08a2dc3861a1faf19273d75d8d893 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.raw.xz) = 100ddb13b6952293e9ea6678b6b4dacb350642036d95b3c6aa2b6d03f653e3b2 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.vhd.xz) = 3c6c44ffd9dbacce38e41ee2a3dbea86c2a1630c4e0f1e4157d6a9ae35045330 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-ufs.vmdk.xz) = 725b3e4f834f3aa296efef28524dca72e6e3a366afe9a70f66f872446d620417 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.qcow2.xz) = b064cb8feeee25caf7b87634ec2d2111dc8f264dbc433e41249d2620b06f5c6b SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.raw.xz) = ebb407772250fdfb179bad97483233378fc63cc72ccd3dbcf01163968bfbd68e SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.vhd.xz) = 406a87f32a192a00077c071d295c749c166b8ad110d28f509a1f163d8b1c9358 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64-zfs.vmdk.xz) = c8be970e5337d282b45c097bb30b2d2a9eb469402cc9ffa6b7f2ee9c3bbfdb65 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64.qcow2.xz) = afbc7e756418a70a28c77d3a50022fedbce08a2dc3861a1faf19273d75d8d893 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64.raw.xz) = 100ddb13b6952293e9ea6678b6b4dacb350642036d95b3c6aa2b6d03f653e3b2 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64.vhd.xz) = 3c6c44ffd9dbacce38e41ee2a3dbea86c2a1630c4e0f1e4157d6a9ae35045330 SHA256 (FreeBSD-14.0-RC4-arm64-aarch64.vmdk.xz) = 725b3e4f834f3aa296efef28524dca72e6e3a366afe9a70f66f872446d620417 o 14.0-RC4 riscv64: SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.qcow2.xz) = 2538e1fa6d9c975d0ab2b680e634441209f8c2fdc2ad95f3431ead256185397cf7f639e2523753d4cee1b4f677499815538486b20d3684f9210e492dd0675b1a SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.raw.xz) = 96a49721ba1428b8cddf65abed849ff3567e31773fc2446f021dd67f61b92a231939a1d5abea28995d1ec8af9d8ba891b881f7ec8b6530a2182e570cb5e78042 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.vhd.xz) = d2aacdcefecee3cd8456d7f371a2f5254ddebbd22277d978b00baa9c23304239df1fcec89531644db575f0481b19ccdbfeaa66aa85f17e8651ec164afc4842a2 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.vmdk.xz) = e6bacea877352f5ff3fc16f5717e3944927753a5c64e7d237bf5c6c253f85dfe3011314d286198ae7c62d921cc2d7b00398767e207793c4b968f7071ea706858 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.qcow2.xz) = 8681d7bee0b60bee27e113c9b0c6601b640a8d49218280511d55aa38b6bcf1d873911de3beedae61be1c2e11244c384239c9d06bd8ebf7f081c0975621af44aa SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.raw.xz) = 2812d912f583dc574074c4c49f2d6005d60dbf0515c310a49858788bdea2b3f016091937acf67a80d1bcc123133f1f4585fd9a90ebd10b3fd2cfa2954d2a7b0b SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.vhd.xz) = 8cc13a0ccc40262c99e0dd8b71965cf7150e5ddab6fb754a8e46bb448ed7f8fda63aa79b132502cf890be0bc1141dddfebf77c3cb2d20e2edee050428cf138e8 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.vmdk.xz) = e71bb6d4f17e709289f6cc853a72e18a5b61c99e747064bae0e356ab9b1893cb97183ff971892eba1658bcf50bbea40c55827c579643ef88b2799b4f13d5d364 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64.qcow2.xz) = 2538e1fa6d9c975d0ab2b680e634441209f8c2fdc2ad95f3431ead256185397cf7f639e2523753d4cee1b4f677499815538486b20d3684f9210e492dd0675b1a SHA512 (FreeBSD-14.0-RC4-riscv-riscv64.raw.xz) = 96a49721ba1428b8cddf65abed849ff3567e31773fc2446f021dd67f61b92a231939a1d5abea28995d1ec8af9d8ba891b881f7ec8b6530a2182e570cb5e78042 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64.vhd.xz) = d2aacdcefecee3cd8456d7f371a2f5254ddebbd22277d978b00baa9c23304239df1fcec89531644db575f0481b19ccdbfeaa66aa85f17e8651ec164afc4842a2 SHA512 (FreeBSD-14.0-RC4-riscv-riscv64.vmdk.xz) = e6bacea877352f5ff3fc16f5717e3944927753a5c64e7d237bf5c6c253f85dfe3011314d286198ae7c62d921cc2d7b00398767e207793c4b968f7071ea706858 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.qcow2.xz) = a20bb128dfcf977a8d8fcbe711287cde37204fed4656b015b55da484825207e3 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.raw.xz) = 9b8ceb27d0e67144c3e498f3c0d29857746147acf65262fbea319c5a8c7d038c SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.vhd.xz) = ee5dc591d890b717d5fef43081d0d9c7050a9d8ae8ce255d68b2a34ff123340b SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-ufs.vmdk.xz) = c37a5c0527a086fc52a81c4699ae0aea4b5a963fc71ce5836b0dc0cbe94fa152 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.qcow2.xz) = 23627ae8e397f0de495a0cbe75cec3d98053a0d450c1d8f95c400984f52d9add SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.raw.xz) = a38a35541f621e59404c32c8ec1f73f1f6a54f554a39230fcc82f963f365543f SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.vhd.xz) = be9c521b31c7443b46f99f24dab640b6c37da4cf2edee48fc6ecf815be0b8252 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64-zfs.vmdk.xz) = 43506386c53bb76ce5b5b67684a1f36da948fd31a92caa252fa492b3a94e9004 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64.qcow2.xz) = a20bb128dfcf977a8d8fcbe711287cde37204fed4656b015b55da484825207e3 SHA256 (FreeBSD-14.0-RC4-riscv-riscv64.raw.xz) = 9b8ceb27d0e67144c3e498f3c0d29857746147acf65262fbea319c5a8c7d038c SHA256 (FreeBSD-14.0-RC4-riscv-riscv64.vhd.xz) = ee5dc591d890b717d5fef43081d0d9c7050a9d8ae8ce255d68b2a34ff123340b SHA256 (FreeBSD-14.0-RC4-riscv-riscv64.vmdk.xz) = c37a5c0527a086fc52a81c4699ae0aea4b5a963fc71ce5836b0dc0cbe94fa152 o 14.0-RC4 amd64 BASIC-CI: SHA512 (FreeBSD-14.0-RC4-amd64-BASIC-CI.raw.xz) = f553ef24fe92025eee845e54f25c1410883367beba2293c3244516218d9d9f5e3957f1d95643c57e4f97d7a6dc46d6534354ba1284f6a909a532d80e0fc260c4 SHA256 (FreeBSD-14.0-RC4-amd64-BASIC-CI.raw.xz) = 3d0eea50499d49020b9510a26d8df36d0f63ad66b8befb35e42b32943a44a7fe Regards, Glen Please consider donating to help support my FreeBSD work: https://www.gofundme.com/f/gjbbsd https://paypal.me/gjbbsd Love FreeBSD? Support this and future releases with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEjRJAPC5sqwhs9k2jAxRYpUeP4pMFAmVFhWcACgkQAxRYpUeP 4pMdsQ/+LUr8muc5k7axBIAQdn+uGYkHgj6racCLiGO/aER2ggbH5u3K/P4bbFQ2 Bm4/qGM3ucr+GpdOgGTsfl06jKWtBoD5E969OkDIbRnftIGZwplx9QmpEILRqp22 Ff6J6raJG1SBjIj7sRZB/IhgXQiRlFVmoOFgOcUFIKBoYwffy0/Bh/2jHyBK/hAt FRczo6vn15x/Vom9hFfpu9/VAiGucqMjzLxuMg13YzCNDKyn/T9rhTDAA2Ede2/H E90qzv/er/V+DYRPy9i3/1db3tOrdB/8mKigkeZEEiaF4usVVEQVwlEh1+Cb3kSv ldZTpDEV53jqnp/FekuFjf2sqhSDuFEsYO8pZrcFdK+h8+fDHZBsU0o11TJHjORe G9+Xn8boZLexXKrQZHUNe/YTWpdpciRj9fRMRrf9UvuCyvsxW5qEa29WdZP7Umph ZzcANLTrXt7Uoq2WxmbYjT28aFPEWZ8kiJetSbXowqGxARx7TESexn/lNuHx/0gC MXqN95R2zqULfyFVHF9rFNA0G8QJYkBtAzvdoDiLjojfiL4oI0yDQfvXbshRGB9F YcRRCxc0yz8/mfGuYrvZgaWq4rloLB7ZCR4pF/bTCU23TPrWbHeCxRHohK0BSBqG c2BIT+YW7v/zQax+k5gs8gVNTLWEM3mOiGZbz8Itos+yquLJjkU= =Pcjo -----END PGP SIGNATURE----- From nobody Sat Nov 4 01:39:59 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMgKb1xxPz506Mq for ; Sat, 4 Nov 2023 01:40:19 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic308-8.consmr.mail.gq1.yahoo.com (sonic308-8.consmr.mail.gq1.yahoo.com [98.137.68.32]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMgKZ0FWHz4f1n for ; Sat, 4 Nov 2023 01:40:17 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=WSKJNJxQ; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.68.32 as permitted sender) smtp.mailfrom=marklmi@yahoo.com; dmarc=pass (policy=reject) header.from=yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1699062015; bh=ba8poC9s6Fnl/q2eO1rbPnTgOycRJ+F4KEgk6W7Tts0=; h=From:Subject:Date:To:References:From:Subject:Reply-To; b=WSKJNJxQPxP5JVkBKaxCQpvIeNuUZS6lpHR0GS3ekqI4SSOPPZByrl9K/3/UYb0gKkPSn5mnEpefk7/5umyEBZDW4bTl67FMtyhQD18kD66mF/M5Y/heFSa0+5Jj8A1DxEThyD9mkHDA+v5iBE6ji6xUpQiuCKpXjgYqnRjORjRi6/p+Y7KvGDJ40xypEIBl2J+yjFgVUBODg0WS+oA50mRiUB3tOLqdsOQ/7wUL//5NjutTTLkpVm448elrft6VdR2tZqHpxwvFcrrfyalL/2Ebypzt0BclGfygCw0cD31hwuuGGfCZXmYfxje7orIz0ch31N67Co08N2TwNZXTmw== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1699062015; bh=Re2OIdXFktA2GbA+KS5WHEXiwP+PLFLzUnaYq0UXU2m=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=BxTI4K5PSLdw31fN245wbgw8dLX7rIOGKIFNfDUUfRk/G3rUKWU6JEGwl76VQXL+nVgZi3cTsjqiGV6P6K64Mf905/2MUEDn5y672kxyL77VL19z8Ty98A6Y+aZku4DTTCB7ZiObOD7Tl3TyffknlSSrhjlsxGkajjlZqYhXBTxpjJACd2JrnJgsrvEOBDYGD07GiiLMYuzysOGkUdPsBScg5qyQDcEhY3aSP3jz/1xbKSHMr2ksHJBKBMsWSRssYp7Zumk8UJt57ougiN74tVEPXVn0tQ/tDbdTJcvT+8U/naAolNjMK+kKtV3ugA2odNw6LMDpeizN56wQNT0TUQ== X-YMail-OSG: DA3U1VkVM1n4_SxVerGyHQ9.H.abw4Ww3i6Z4aWmIfoxpeiLo9cScEw9NnW6Kjk KVOnHqBx8pEJ36MjMjM62FpOLzUG.RAkm_O3IpoqojKZmPha2_bdJJSFzfsJztspNgeAtcRI2T0T uMdiHnud8AmspW94Ztd4F1AGvkgeC3kDy6lHXT69pfVbO5pIKKG2XTGhy.Z3E862ycuHwS6io1Kz iWJbpGHAQzq04677tsadlpcK4w0LhzionbMuFaUn3z4ONm6xgnDDqlehGw8q7tQbTvcTQNoH5Doy 7OQ4kENVXidrQN7MY8enWfGbFEbgL1LKorxalq1CXnehGD2b8jd.ZIDH7xRLYrG5H.LAeAPXbo_e aZNs6dc5QEI.t4eO.7GD2P8P_m848tvTQ0EayctoKEzSsk.vzMkckHgCB7AGyPMtLYFogaxMfZdr I0e5p7tMJMWHdF_v8IiU0ngVBBLw4B9p6iQEiUr8htSiX_j7ERwyf7wB5K9C6.hIfQ8uqILRCU8t 3sMoLzMKJDrPF0apCBow.CREJRFCQuw7cpFqtVsO_XWaljfWdy_2BOSJ1gSrZBZ6WIC3M5jSxB20 GhWg7.N5V7ceot3Tse6XVOh7sf7oDX6C62ybTL9E1kI4QlCnkAQ9RxwN7Gf3JtZGKKuPDkgMqe59 wUmPluTIB87JfRM0qGL0P0S8vHWqnlOPGil97drxXipI4wat0Fbn57MeiW8B.zr6lgOEcAU7Wuf3 hUdA.g_T9cRDOIfH6TLX_fnz3UHQuPyCHk4g8tSj5.WMZC_hzTX4KEx5fCSM_bzrAuzS6WHMFse8 2FMQ9rd1_8bmL5t2aUhnn_k1991wR5iWYZef8JF.YoBoQUXfBSnW3uGGHO7OSKSPr3Wgu77oVMmd bZsd3duSnawz1bbV4ofvPmx7z.zHBc7m68NnCAenMcf0Yr.zgYHmzIRrpxnEbp5QhEBjE6hTlins cuu3zyfcTSqClq_P42xDF5ZV.Bk8QSbkloNeR7ZbB0SyWDXhQ9wGSvY0U8KqlBiOs5vqV9x9vUDy IjeSL2GdnNcs_Oc0ATf3UxKjW.usRmD.uIplEDwwNzb5WU4v7DE5DMfKpHggqgtHjAvQosHUhSmV FVkw_fQ7tJkaXtRqEGxzwnYHyWy589ja9UyW6jTiOFhKkWqmYjfEdnRWGnHD98ZUMqjZwq7iFDQD LGHLHAmuYZBJJS3yjmjgZxgcVXsJdZe1YKr3PNc28p0hoOZ4qcyBAmjrO4V52lNFBiXbpSzho.rI eZUE78rhRa9ya8GA8_m9eZzJFVSNjBwIwwc9VAfOnZPuRRHPqj30NX7ooAuRUq4G_zUSbSorLaq. EttPfVTBurGtsOXYSXwBk3STEx0mhFOWRBTi1IH0OZrCGjI3AkpVHpYFsYgAb5kI3zSUpWr9DiH2 3S5yK.v6rcBvbd_W.k8pvPkgezQVeBjLM59y_Ye0g5rfSZOGrWPydzgqq6Uex_w11nC7ejkQc6sd qPmkcRSeYX93HamKJep1VQlII5e7oyZZDU5wTSTpu3ibkCDN10IfB83YiJiUTr8BBtMtVjmhhU4D cTvNW089v18I.Y8CLSPaeBO0XXmNN5hZOonbAJAjL0jPriVgfeRkb5gEGSqzHqrFU_5UPYPcttHL ZnHoOZUxLItbm85xZtpoXLrCs7nFGTjw1KLiTeEJlYPgBPleM8Ef8ZwDvhBbf.SbzV.77DAcYdiS O7QZT1qXr9GERSbPLPxHIAaAfLUBzoVcMjtYJpS4FJW7tYdtLd.jjD5JwBys2O9rNcsqSqpaSHdy iHg.dhkD9fOKBuGdb9J.zEtppOIj5QmaHlPyfcp3kek7YYzLfaZoSdDR0jJ3mw43oZdwtj_QAprd Ud2Mfn1B4lV9YBgwtpdjv_MfLRSsc_XvZ9Z9zLjJbaq_y5T1A.C_8eWONt0NOkvWhfbk3SQ4wA4x PPlLs6nQVqUFvtT6ZlxcwcwNbu5_oI9b_TuMZav2UCX5TfgrVaJZUHTBEboZY629SVTI1heO.X62 pRxLQN2fafxPid4DhKyrkfBPe_eJXdaNGmeSpIlmSIdm7IAb4LzbsmD_Zxhrm4hT68_.XZePSWRT 8WvYt7gS_mCEOejh1GMC8U7fVrGdzahEEmq81kLm63E6LB8OS1l.686McXMXhTLp_rn89afuMdaO LMOmlJIcZtD3WJHlAAVyej23lP1Rlzxf3F67pH_5Kj5fxv.FWqrc7Zx14XzsTTm0cMnYSMBnB2qO yFCFaTEtkO9uqt2U4p0OSMUYS80MAnscSvViSEGZ3jEZamUbPVk2c5nqs X-Sonic-MF: X-Sonic-ID: 07899cb8-d913-49e1-86aa-50cca908490d Received: from sonic.gate.mail.ne1.yahoo.com by sonic308.consmr.mail.gq1.yahoo.com with HTTP; Sat, 4 Nov 2023 01:40:15 +0000 Received: by hermes--production-bf1-5b945b6d47-jx96d (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID 595093728d25dba67f629c8e145c7f31; Sat, 04 Nov 2023 01:40:12 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.200.91.1.1\)) Subject: Is 14.0 to released based on 0 for sysctl vfs.zfs.bclone_enabled ? Message-Id: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29@yahoo.com> Date: Fri, 3 Nov 2023 18:39:59 -0700 To: FreeBSD-STABLE Mailing List X-Mailer: Apple Mail (2.3774.200.91.1.1) References: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29.ref@yahoo.com> X-Spamd-Result: default: False [-2.50 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_SHORT(-1.00)[-1.000]; MV_CASE(0.50)[]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_NONE(0.00)[98.137.68.32:from]; BLOCKLISTDE_FAIL(0.00)[98.137.68.32:server fail]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; ARC_NA(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.68.32:from]; DKIM_TRACE(0.00)[yahoo.com:+]; TO_DN_ALL(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; MIME_TRACE(0.00)[0:+]; FROM_EQ_ENVFROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; RCVD_TLS_LAST(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Queue-Id: 4SMgKZ0FWHz4f1n X-Spamd-Bar: -- It looks to me like releng/14.0 (as of 14.0-RC4) still has: int zfs_bclone_enabled; SYSCTL_INT(_vfs_zfs, OID_AUTO, bclone_enabled, CTLFLAG_RWTUN, &zfs_bclone_enabled, 0, "Enable block cloning"); leaving block cloning effectively disabled by default, no matter what the pool has enabled. https://www.freebsd.org/releases/14.0R/relnotes/ also reports: QUOTE OpenZFS has been upgraded to version 2.2. New features include: =E2=80=A2=20 block cloning, which allows shallow copies of blocks in file copies. = This is optional, and disabled by default; it can be enabled with sysctl = vfs.zfs.bclone_enabled=3D1. END QUOTE Just curiousity on my part about the default completeness of openzfs-2.2 support, not an objection either way. =3D=3D=3D Mark Millard marklmi at yahoo.com From nobody Sat Nov 4 09:01:34 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMs6p2w90z50n4l for ; Sat, 4 Nov 2023 09:01:38 +0000 (UTC) (envelope-from ronald@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMs6p2NRYz4dnt; Sat, 4 Nov 2023 09:01:38 +0000 (UTC) (envelope-from ronald@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1699088498; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=XmwbxoPrF+LVLjabkXwk1bXxCsB94DTO6d+va/8nJs4=; b=jL9VNDi3YUTUsAdUm2fU2gmDweEJjE8W+icdux6J57qoZv6IHxxCGdSJ+/qmeWhd7IpSNg 4VBNG6EkMuuzEcDSoy3OoFkzzn7Wqkh+fiT1rMDxmSSjMYbQ13PPHwKdffzntBMzJVhBvq FpRH0I1W9dpTfENAUTxjsvES0j3YuHR1zMcKpsRTb6CsrEMOCzZgq8QFopu8+4TTW4FAI2 ybgR9yvNZkaxtYM8W+f+kU9tkaRWtuvRo/CdZON1X9WosN491zaG7/HCK5GvjnaNdtG4r3 a1/bZjBw+pgNMB7SuOE9dJ/z8JZuZQ2MVKTMP3VJZRI5qbIgUgiysTJ2aWx+eA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1699088498; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=XmwbxoPrF+LVLjabkXwk1bXxCsB94DTO6d+va/8nJs4=; b=lLh7RcYvnAFI24a9HjmPQ+joGMuEAF3tZgMoOUY1abk9iVpIb/RBAHZcL/Z0rot7nJj8bI 9HidNeWWIb/i/kA9lwQWRcjWtesyRx7X1+RAQklnEc/7Uc6d7KrG638owdZlcrM/RU3XTV GYgru7FfTb1WqdV++YlA/HtChmRsdKi3LP1fW2vP88H5wQr6lQuE8KjL8USD4JYQapSPbW XBsockWmmPSKuhWeZfPPGdlcXR9+F0K3kit0F3Mnu2BVrOxLbbEwisrjCae2gHnnCh0CSw I4io+aVzRHxGkPEXCQLEQue366HdVDQcwck73+fju5dnvHP6ThmXcjoPbkRCrg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1699088498; a=rsa-sha256; cv=none; b=xToy94oBG4YKtQie/JMRvG3U2T8Q0+ACiGlBCAU530yhV99XO+eHibvEVn3vTY9DhTi4He CsNiBW+7Ny7RLRmLwWkEjfFegSmMU5e/uoonJLbebcvgaUiPA44losU/CWx5+bcewboL1Z ZC3SfeTR8TuKM8Stjskr4mJKQvVbWYoyUkVYGiMmc2WAIZh0e2UGL0PtoYSReldtqsrxn3 +chZwhW8UT6vsq7tVcRqI9nyARj9TEKsTkML/V4fMzoeHuSbXRrl7iYNDZM1RWziCoYhUo c4YOjzrSfieH6tSE9YqDmENxpPxqyyLvH4o5/tiJ1uLexIXeJ+huaoVjXj81Eg== Received: from [192.168.1.109] (84-105-120-103.cable.dynamic.v4.ziggo.nl [84.105.120.103]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: ronald/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4SMs6n4gzlz1CdD; Sat, 4 Nov 2023 09:01:37 +0000 (UTC) (envelope-from ronald@FreeBSD.org) Message-ID: <7a906956-6836-421e-b25e-ff701369e3ed@FreeBSD.org> Date: Sat, 4 Nov 2023 10:01:34 +0100 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: Is 14.0 to released based on 0 for sysctl vfs.zfs.bclone_enabled ? To: Mark Millard , FreeBSD-STABLE Mailing List References: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29.ref@yahoo.com> <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29@yahoo.com> Content-Language: en-US From: Ronald Klop In-Reply-To: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29@yahoo.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 11/4/23 02:39, Mark Millard wrote: > It looks to me like releng/14.0 (as of 14.0-RC4) still has: > > int zfs_bclone_enabled; > SYSCTL_INT(_vfs_zfs, OID_AUTO, bclone_enabled, CTLFLAG_RWTUN, > &zfs_bclone_enabled, 0, "Enable block cloning"); > > leaving block cloning effectively disabled by default, no > matter what the pool has enabled. > > https://www.freebsd.org/releases/14.0R/relnotes/ also reports: > > QUOTE > OpenZFS has been upgraded to version 2.2. New features include: > • > block cloning, which allows shallow copies of blocks in file copies. This is optional, and disabled by default; it can be enabled with sysctl vfs.zfs.bclone_enabled=1. > END QUOTE > I think this answers your question in the subject. > Just curiousity on my part about the default completeness of > openzfs-2.2 support, not an objection either way. > I haven't seen new issues with block cloning in the last few weeks mentioned on the mailing lists. All known issues are fixed AFAIK. But I can imagine that the risk+effect ratio of data corruption is seen as a bit too high for a 14.0 release for this particular feature. That does not diminish the rest of the completeness of openzfs-2.2. NB: I'm not involved in developing openzfs or the decision making in the release. Just repeating what I read on the lists. Regards, Ronald. > > === > Mark Millard > marklmi at yahoo.com > > From nobody Sat Nov 4 11:38:42 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMwc44Ywyz505sp for ; Sat, 4 Nov 2023 11:38:44 +0000 (UTC) (envelope-from mike@karels.net) Received: from mail2.karels.net (mail2.karels.net [3.19.118.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "freebsd", Issuer "freebsd" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMwc42cBJz3Vp0; Sat, 4 Nov 2023 11:38:44 +0000 (UTC) (envelope-from mike@karels.net) Authentication-Results: mx1.freebsd.org; none Received: from mail2.karels.net (localhost [IPv6:0:0:0:0:0:0:0:1]) by mail2.karels.net (8.17.1/8.17.1) with ESMTP id 3A4Bcgpt098690; Sat, 4 Nov 2023 06:38:42 -0500 (CDT) (envelope-from mike@karels.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=karels.net; s=mail2; t=1699097923; bh=Vtz+kfXAvK171s6u3oM0XyAvuh/5aWx/ISLhUP9KgIs=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=afWVUUYao1aZJbNSC8DKD6DKQhbfRgSGSByVLD14Pfp3hWYt7SCR6tRl0VmjVnOY2 Z5DG8NO6y+vVZZZOwW+hfuQkd3ONI2u/ABmZvtRutKsTR0PeMywUYJf7BWXgE6CJ1z QBwKyugez245xbwaTwduj72DiJVMH2QGVFCcEm5sDcy3/1Va69SNpaeFNxZOo3iA3M r0pDgvKm2cQb7gmIU7HxvO5//GJi/vVJyDrOW7NwXH6KPAUE6xKsOwZ10qDoJaf6Kj fIKgEI+pJClan5wtU/ZokLjbC4clc8RialBKFYQ82Gxgnr/fJ84jo9agH81JpBGNMA IElJgjc2GIO3A== Received: from [10.0.2.130] ([73.62.165.147]) by mail2.karels.net with ESMTPSA id MTGXMkItRmWAgQEAs/W3XQ (envelope-from ); Sat, 04 Nov 2023 06:38:42 -0500 From: Mike Karels To: Ronald Klop Cc: Mark Millard , FreeBSD-STABLE Mailing List Subject: Re: Is 14.0 to released based on 0 for sysctl vfs.zfs.bclone_enabled ? Date: Sat, 04 Nov 2023 06:38:42 -0500 X-Mailer: MailMate (1.14r5964) Message-ID: In-Reply-To: <7a906956-6836-421e-b25e-ff701369e3ed@FreeBSD.org> References: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29.ref@yahoo.com> <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29@yahoo.com> <7a906956-6836-421e-b25e-ff701369e3ed@FreeBSD.org> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:16509, ipnet:3.16.0.0/14, country:US] X-Rspamd-Queue-Id: 4SMwc42cBJz3Vp0 On 4 Nov 2023, at 4:01, Ronald Klop wrote: > On 11/4/23 02:39, Mark Millard wrote: >> It looks to me like releng/14.0 (as of 14.0-RC4) still has: >> >> int zfs_bclone_enabled; >> SYSCTL_INT(_vfs_zfs, OID_AUTO, bclone_enabled, CTLFLAG_RWTUN, >> &zfs_bclone_enabled, 0, "Enable block cloning"); >> >> leaving block cloning effectively disabled by default, no >> matter what the pool has enabled. >> >> https://www.freebsd.org/releases/14.0R/relnotes/ also reports: >> >> QUOTE >> OpenZFS has been upgraded to version 2.2. New features include: >> =E2=80=A2 >> block cloning, which allows shallow copies of blocks in file copies. T= his is optional, and disabled by default; it can be enabled with sysctl v= fs.zfs.bclone_enabled=3D1. >> END QUOTE >> > > > I think this answers your question in the subject. I think so too (and I wrote that text). >> Just curiousity on my part about the default completeness of >> openzfs-2.2 support, not an objection either way. >> > > > I haven't seen new issues with block cloning in the last few weeks ment= ioned on the mailing lists. All known issues are fixed AFAIK. > But I can imagine that the risk+effect ratio of data corruption is seen= as a bit too high for a 14.0 release for this particular feature. That d= oes not diminish the rest of the completeness of openzfs-2.2. > > NB: I'm not involved in developing openzfs or the decision making in th= e release. Just repeating what I read on the lists. There was another block cloning fix in 14.0-RC4; see the commit log. Maybe there will be no more issues, but it seems that corner cases were still being found recently. Mike > > Regards, > Ronald. > > >> >> =3D=3D=3D >> Mark Millard >> marklmi at yahoo.com >> >> From nobody Sat Nov 4 12:35:28 2023 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SMxsv0ybDz50HBH for ; Sat, 4 Nov 2023 12:35:47 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic315-54.consmr.mail.gq1.yahoo.com (sonic315-54.consmr.mail.gq1.yahoo.com [98.137.65.30]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4SMxst5qRfz3gfL for ; Sat, 4 Nov 2023 12:35:46 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1699101344; bh=gyzcHUyoBera6u4UlTwpogt6Uyrj5Bcc/whH7L1Lof0=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=B1Pqjb6Uf+Ox0B2HgcGJgPjk++qsdi30gnV+pZBKwvRcUCzyELD7OkuQ1bdj3b5ACRE2imsN/zA3FKLOeXxVH0WjmSiVPBZRvD9aVfDm2KAlq/G5lKacXFwO+GQ4pYtCs6YuD0h0TZTZxfX7WWC6KLRJhyPbRPt3Wc4bHJlUQwGYoggwgOR+ncx58esFpWfwTziMfA14UCb8KGzavJyumpFiUHHfAXV4Ptlx3burmPELqO0yZ8nFgUlQQk7xgaLcSeeho8YIQU8uXoTYYH5oQ8yYK1OhCzI6MxXugQcZUAM4djGqduvUb3ldjvNEpr9v+2TmpwVolbzknbNtkSqyJw== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1699101344; bh=V4Q1zhtdm0ykLg3ALhnTij2axPHjh08JyU2MKgP6eXB=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=GZNHj4LWypiu7FbkzCWRJ8QcovFwdFMj2roXYLpZHueGnfCy/t4/BuEtt2+5GCxfV5U2Wd37kS+SqhsHfoSb500LPrEqjxRpViVd+A56KhSuWMOqUJJMlR2ZN0NizDj5pqlV2rpOkhSdTEEfwOLIeh3g231hbb7gBwp62x+e1nLfJ3nQUGkMFEua4QtCRj8ktjKMDNNnfLoxeyz4WxmCTLXUA8ODmKSCU2q87j6aWzfJNVXqncqN0COEIKvBg4sYDbBWkCKASbO5PDxufM/+egUrLQEcW6NrPqLDkNnzPHAuRozzp5m59x06xvaP+Fb6wyrc0lLS+jKoCwynvviLjw== X-YMail-OSG: scIgLM4VM1mveLq4T_E88xTsWQl5b2Z3O2Lylk27CqeZFv2bXncCs47XXLbYs2r PWKzR9EjbGRxtKwLYRBMdsw0A0GHH0hZebJ6Gx6KjVAaMIiuOdHQBAf2jnJCZ3Q1hKYgvdAU7W1q .1.rEWTdOeqV4qIgCi_vS.f2xDHrW4YtO0gNts654Ow5JSYetNGDCVS1PMIr3f5LhO4nQqqzIZZW 75METUXeubdawPDveHrL5WTng1OyR7Ykb1tLISfCfUP04DVdQJXaUFMH6u1ZITzAM4dmF7XLnabG i9b2o9MmXmwTopr.1oSCblLuldYbhuffHPSyGGwzmHZBM1ha3jmsQckkTlzEui67ZMS8XzMJYd6U IcE7eUP1GBhTvvK1rFVfN6z6Lw3rTRtq3XfEUI1UWm.5Y7ig.a6ViTbIXyUTz84o_D68eWilzR82 Aie4S_7SoIjXblO9nPobcF2ajqpYUY3LT.Rp10jhBIwPFKT.fJOsyGgK1VkySBKttOigdqXovHZy BXUY2F9E9pS5NViC_f_9t9qtkipFSK.QGByvJLc2lcTQ5C6C3MTGVxmdG.uytta_gy1olNdUX16J NXo1mwB44s2KihAIPpONZeDsx._XXx6rPtVWJ_y34ok5jTeddjmyzRzkhetNgp2bFXcqJPZdGF4Z 8HMM5eTkbNTeoLhzNZFHJ5MgOHsFzcUb1XtwatkQvt9i2oj4uk_FZbcMIqp1bPBVttgjtWBN5P7J vPIpMpWdJtQ9bUySobWifzTLG28KXhkMy4CYiI04dapnZQH2xjIMTg9v8iD86V_915fBGhp2DDXV aO99beMv2ulGwUAoQNzOLE2Y5RiSvOevOuevIucoKBibNUIc0ELdUWACaVwLfEwMyRMYLxp0Lv4_ uFDZfKFFFYT0fK5P6T1XNT53t80XbP.8T8wN1Y9469TxUC_zi6TSdZEgTwMUYTVBqs7HBlTcnbvV lwUsy5v0wR7dhUpMZTJG3XyhBogeQo1zACdyPEhBuybm5cfruwN2TwVxKoRvHoeJ7gsorONjuB6l G_Xqx8AAd3IwTV9726n3j78o6OtO4kgbY58DTu3RTnCud4gHmpawbBwt2NH..mPfW0f9N6KUwGp2 g3sBhRWdZIsC.9lzrGY7g.Ar07NXemsjYWBSCwrGR0qqW7bWOWVbyG9naW4HZndpl4IuVPqnVRi_ k3.98w4nlHB4qfwIxm0qGTMC3MJA7iD6NfzTId99wj_60W8723cMejv34EjzJqkWbxuZ6rg.iZSl w09pUYe6IrVM0iNi03CB7tKM6e68XRJWI.JmPiErhodQ.9VBBtWwrGRZriOldW4dUYN05jWfM1Q1 C4T9SpECVQYrAJjeA9lodKPZOBLsh2GrOldjUy3M0kqeWl_ikIZpy_Xl23WhKlOuPGsnYCBHdndV dNxWa4qDU4Dxo1oj4HDBD7jkHVtRMXEM0M3sFW8oIDynY0GlOypmxngKkl_3Us6HQb5Gq4gb5xJl LNo3L4Slvjc6exKY42EtLXVExSJCutwypQhLmFRYfeRzwKZC35_2s1_RrHRE6CQ0EetVA8VjH5hE SAkoT3ZRbopqnmuVudPvocPi3kO.2fU39fhJTu1eGVGcb2SwYvRKI3PWRjuNB.qlwFxOpTBVNqEu po9IbEE2uDSfX5rage5CInsv4lfn35BZc90qL6gjdD6KMGmT8HDu8_3NCYxiQDwqXV6aeIC4K_cD nuQA.44Zg7aKlG38p8sqVHSa1dl_ytb093z4khtUCRrPV7C2qpKqqmTKdmIwUa_K4_gBq1Xev02Y CcuxLv2_QEE8qlIYpk6enXXmKbBpZkxcHkouplJU32i8tHqHMIQaMF9KVdP4j3tUhUKLTDvcfwQI Ux9AtiDN0Q5kawoz_q1bTGz8FruGnhF6hbHRxRzfaSzUjCtaTneXaAZ9k2Hfyrojez57.1uROhSm UqhocUVZLGaRepBZMWodoyCUBivUkYvFzibzGnIdcwAF_dRoBhSMnsMHx3_aUxjmD7E1wE8RnT0y tt8VaFipMIqiUYFmJ1aeFmz621YtU4Cn7Q3ub4_U0RNlRT1br3SW4YXsRA4TGX3S0kLlhG.ip_zp qGyJeHTiMnEbf2cAnj9Ds3_0zmDLQMAwB4d.KpMl2OwnS4ncwOVyVMNZQwSNXZhQvWun9UNHNn1O sOia43ktzzqmKpP51t7I6n6maEmPaIGoZfPeSucGaOwV0q6hikKYUbkj7KgFSTe3DshQgGTm3HZQ tsaNXpwjJOYmfMNSwaU4eAayTCz469z0xJpEB_fhhM3TG60kTXgW5qFB8CPMEjqBfYBig7AWxVvk - X-Sonic-MF: X-Sonic-ID: 7f5a10d3-8499-49c2-acc4-cf4faf831c55 Received: from sonic.gate.mail.ne1.yahoo.com by sonic315.consmr.mail.gq1.yahoo.com with HTTP; Sat, 4 Nov 2023 12:35:44 +0000 Received: by hermes--production-gq1-59b5df67b6-gs8xt (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID 0f63790bda9789aa88a377cca8ff4dd2; Sat, 04 Nov 2023 12:35:39 +0000 (UTC) Content-Type: text/plain; charset=utf-8 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.200.91.1.1\)) Subject: Re: Is 14.0 to released based on 0 for sysctl vfs.zfs.bclone_enabled ? From: Mark Millard In-Reply-To: Date: Sat, 4 Nov 2023 05:35:28 -0700 Cc: Ronald Klop , FreeBSD-STABLE Mailing List Content-Transfer-Encoding: quoted-printable Message-Id: <830CD3A8-DB62-418D-A7F7-8DA6CB46B1F5@yahoo.com> References: <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29.ref@yahoo.com> <2F81D978-7DBD-42CE-8ECF-C020B0CB5C29@yahoo.com> <7a906956-6836-421e-b25e-ff701369e3ed@FreeBSD.org> To: Mike Karels X-Mailer: Apple Mail (2.3774.200.91.1.1) X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US] X-Rspamd-Queue-Id: 4SMxst5qRfz3gfL On Nov 4, 2023, at 04:38, Mike Karels wrote: > On 4 Nov 2023, at 4:01, Ronald Klop wrote: >=20 >> On 11/4/23 02:39, Mark Millard wrote: >>> It looks to me like releng/14.0 (as of 14.0-RC4) still has: >>>=20 >>> int zfs_bclone_enabled; >>> SYSCTL_INT(_vfs_zfs, OID_AUTO, bclone_enabled, CTLFLAG_RWTUN, >>> &zfs_bclone_enabled, 0, "Enable block cloning"); >>>=20 >>> leaving block cloning effectively disabled by default, no >>> matter what the pool has enabled. >>>=20 >>> https://www.freebsd.org/releases/14.0R/relnotes/ also reports: >>>=20 >>> QUOTE >>> OpenZFS has been upgraded to version 2.2. New features include: >>> =E2=80=A2 >>> block cloning, which allows shallow copies of blocks in file copies. = This is optional, and disabled by default; it can be enabled with sysctl = vfs.zfs.bclone_enabled=3D1. >>> END QUOTE >>>=20 >>=20 >>=20 >> I think this answers your question in the subject. >=20 > I think so too (and I wrote that text). Thanks for the confirmation of the final intent. I believe this makes: QUOTE author Brian Behlendorf 2023-05-25 20:53:08 +0000 committer GitHub 2023-05-25 20:53:08 +0000 commit 91a2325c4a0fbe01d0bf212e44fa9d85017837ce (patch) tree dd01dfce6aeef357ade1775acf18aade535c6271 . . . Update compatibility.d files Add an openzfs-2.2 compatibility file for the next release. Edon-R = support has been enabled for FreeBSD removing the need for different = FreeBSD and Linux files. Symlinks for the -linux and -freebsd names are = created for any scripts expecting that convention. Additionally, a = symlink for ubunutu-22.04 was added. Signed-off-by: Brian Behlendorf = Closes #14833 END QUOTE technically incorrect in that compatibility.d/openzfs-2.2-freebsd should be distinct in content from compatibility.d/openzfs-2.2 so that block cloning would not be enabled. >>> Just curiousity on my part about the default completeness of >>> openzfs-2.2 support, not an objection either way. >>>=20 >>=20 >>=20 >> I haven't seen new issues with block cloning in the last few weeks = mentioned on the mailing lists. All known issues are fixed AFAIK. >> But I can imagine that the risk+effect ratio of data corruption is = seen as a bit too high for a 14.0 release for this particular feature. = That does not diminish the rest of the completeness of openzfs-2.2. >>=20 >> NB: I'm not involved in developing openzfs or the decision making in = the release. Just repeating what I read on the lists. >=20 > There was another block cloning fix in 14.0-RC4; see the commit log. > Maybe there will be no more issues, but it seems that corner cases = were > still being found recently. >>=20 Looks like I'll stay at openzfs-2.1 pool features until there is a release that no longer has the default status: 0 for sysctl vfs.zfs.bclone_enabled I use main [so: 15 now] but only enable openzfs-2.* pool features supported by default on some FreeBSD release, that has an accurate compatibility.d/openzfs-2.*-freebsd file. =3D=3D=3D Mark Millard marklmi at yahoo.com