From nobody Mon Feb 12 07:21:23 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYG9270MXz59hr0 for ; Mon, 12 Feb 2024 07:21:26 +0000 (UTC) (envelope-from paulf2718@gmail.com) Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYG922X8dz41MB for ; Mon, 12 Feb 2024 07:21:26 +0000 (UTC) (envelope-from paulf2718@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20230601 header.b=hsmilrS6; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of paulf2718@gmail.com designates 2a00:1450:4864:20::42e as permitted sender) smtp.mailfrom=paulf2718@gmail.com Received: by mail-wr1-x42e.google.com with SMTP id ffacd0b85a97d-33b86bc8974so117902f8f.2 for ; Sun, 11 Feb 2024 23:21:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1707722485; x=1708327285; darn=freebsd.org; h=content-transfer-encoding:subject:from:content-language:to :user-agent:mime-version:date:message-id:from:to:cc:subject:date :message-id:reply-to; bh=gQvstCDu3LQyK1/ARgpMF1FnTrJnaorRE93LWiJuNeE=; b=hsmilrS6wUKNqRf3OeYVIBqq/NjiAGGBOGsYVgFdYiRqT+6pA8J/UCwqyhpszKk0Qi anu1uNP8SsR/bM45WIOupJd33HyVLnkk7cmlL6J77fh2vFpAs5k8iE0L3baX6zMFYbks C53eEFPx8rI5yvky5x4FCxbx4cKeqp3aTjfaqx0rXxmS35XyIIGd8A3PSYD+2wqYxeV1 xL1u6YYB9u2/2Li8on0Hlci5ymTIeCLksDs3haOB/CH7SoXabPsXqBHPS7JrlYu4Py4e 0Grtl9uyfXJ6J/DrEsUiWjvOkspe9TJzgLHr3p7wZR7FxHqClmKp2jTURqZBBbrHnzjj yoTQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707722485; x=1708327285; h=content-transfer-encoding:subject:from:content-language:to :user-agent:mime-version:date:message-id:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=gQvstCDu3LQyK1/ARgpMF1FnTrJnaorRE93LWiJuNeE=; b=fXbUmtq9tPGleef76WkZ95aNgyQJwgqgH2BbbMya3e0E+lxzNZ3k8+UFiJMLPE/HPq ocF0fMxi2W1IikS4zGRc7BzHJhlDLSM3KW5fRuUC0ywOVxbdFFzUVsv/ZJtHfEeyP4dC NzPmpBsPnVnAMJYEdO1qEXQ6j7fcivtwWdCBpXsr9AOqplTgvhBdQX8wgEzGgLL07ruo g895/69jgTk8/wa8rNL2vm94+HJ1lPpZcVCwJqdDWs8LW3oEbRTBWvrVaAq0tXV2BwE6 nXAcRAZOf7AI5URLtvHOqElsxGnY3a/RCo1TfBVRdx5AvvulWmd2Xb8Dn9nWtd9/dcf9 b+2A== X-Gm-Message-State: AOJu0YxI+rValaI7DKrJ0TKDtOCy4b9vlB+6JkIYyQyuqkykjvYrzhDJ 6m3dRI53AOoeBdYP6/0/P/4ml1E/UIWq1B4KkV3C/Wvpf6sEJ1R5tjnLNOD4 X-Google-Smtp-Source: AGHT+IEiITllRY9iE2ZMdbfVtJCzam75rXRT7ywRCqRJL6T2JotK5+dTCEUARAk+OZOyaHpV3d2Biw== X-Received: by 2002:a5d:554c:0:b0:33b:713e:b36b with SMTP id g12-20020a5d554c000000b0033b713eb36bmr3563253wrw.6.1707722484801; Sun, 11 Feb 2024 23:21:24 -0800 (PST) Received: from ?IPV6:2a01:cb15:8010:2f00:1aa9:5ff:fe16:2efb? ([2a01:cb15:8010:2f00:1aa9:5ff:fe16:2efb]) by smtp.gmail.com with ESMTPSA id p11-20020a5d68cb000000b0033b66c2d61esm5901642wrw.48.2024.02.11.23.21.24 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 11 Feb 2024 23:21:24 -0800 (PST) Message-ID: <09ba49cb-5abc-453b-a49b-75434a188554@gmail.com> Date: Mon, 12 Feb 2024 08:21:23 +0100 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird To: "freebsd-hackers@FreeBSD.org" Content-Language: en-US From: Paul Floyd Subject: Reconstructing mmaps from sysctl KERN_PROC_VMMAP Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.99 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.997]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20230601]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; RCPT_COUNT_ONE(0.00)[1]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; FREEMAIL_FROM(0.00)[gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; TO_DN_EQ_ADDR_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::42e:from] X-Rspamd-Queue-Id: 4TYG922X8dz41MB Hi I'm having difficulty with one of the Valgrind developer mode options, "--sanity-level=3". With this option every time that there is a change to things that are memory mapped Valgrind will do a check that its internal memory map model is consistent with what the OS reports. It gets the OS mappings via sysctl KERN_PROC_VMMAP. This breaks down for mappings done with MAP_STACK (which happens each time a thread is created). For mmap calls like this there will initially be two mappings, a 128k stack mapping and a 'length-128k' guard mapping. This first guard page is really the stack growth area, and the size of the stack growth chunks is controlled by sysctl KERN_SGROWSIZ. As the stack grows more sgrowsiz mappings get created, eating up the stack growth guard mapping. Is there any way to work out that the split growth guard and sgrowsiz stack mappings call come from a single mmap MAP_STACK? Indeed, is the kernel capable of telling that these mappings came from the same mmap? My only idea at the moment is to modify the checks so that if Valgrind sees an anon RW mapping in its model that matches a zero prot guard plus some number of sgrowsiz RW stack mappings that have the same size as the singkle anon RW mapping then it is probably OK. And if the size is THR_STACK_DEFAULT it's even more likely to be OK. Of course, users could change the thread stacksize and I suppose that if you try hard enough you can manually arrive at a mapping with multiple mmap calls that looks like a single mmap MAP_STACK. A+ Paul From nobody Mon Feb 12 07:54:36 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYGvS34LJz59lSm for ; Mon, 12 Feb 2024 07:54:44 +0000 (UTC) (envelope-from kib@freebsd.org) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYGvR6j7Hz44mS for ; Mon, 12 Feb 2024 07:54:43 +0000 (UTC) (envelope-from kib@freebsd.org) Authentication-Results: mx1.freebsd.org; none Received: from tom.home (kib@localhost [127.0.0.1] (may be forged)) by kib.kiev.ua (8.18.1/8.18.1) with ESMTP id 41C7saA3036651; Mon, 12 Feb 2024 09:54:39 +0200 (EET) (envelope-from kib@freebsd.org) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua 41C7saA3036651 Received: (from kostik@localhost) by tom.home (8.18.1/8.18.1/Submit) id 41C7saj6036650; Mon, 12 Feb 2024 09:54:36 +0200 (EET) (envelope-from kib@freebsd.org) X-Authentication-Warning: tom.home: kostik set sender to kib@freebsd.org using -f Date: Mon, 12 Feb 2024 09:54:36 +0200 From: Konstantin Belousov To: Paul Floyd Cc: "freebsd-hackers@FreeBSD.org" Subject: Re: Reconstructing mmaps from sysctl KERN_PROC_VMMAP Message-ID: References: <09ba49cb-5abc-453b-a49b-75434a188554@gmail.com> List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <09ba49cb-5abc-453b-a49b-75434a188554@gmail.com> X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on tom.home X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US] X-Rspamd-Queue-Id: 4TYGvR6j7Hz44mS X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated On Mon, Feb 12, 2024 at 08:21:23AM +0100, Paul Floyd wrote: > Hi > > I'm having difficulty with one of the Valgrind developer mode options, > "--sanity-level=3". With this option every time that there is a change to > things that are memory mapped Valgrind will do a check that its internal > memory map model is consistent with what the OS reports. It gets the OS > mappings via sysctl KERN_PROC_VMMAP. > > This breaks down for mappings done with MAP_STACK (which happens each time a > thread is created). For mmap calls like this there will initially be two > mappings, a 128k stack mapping and a 'length-128k' guard mapping. This first > guard page is really the stack growth area, and the size of the stack growth > chunks is controlled by sysctl KERN_SGROWSIZ. As the stack grows more > sgrowsiz mappings get created, eating up the stack growth guard mapping. > > Is there any way to work out that the split growth guard and sgrowsiz stack > mappings call come from a single mmap MAP_STACK? Indeed, is the kernel > capable of telling that these mappings came from the same mmap? > > My only idea at the moment is to modify the checks so that if Valgrind sees > an anon RW mapping in its model that matches a zero prot guard plus some > number of sgrowsiz RW stack mappings that have the same size as the singkle > anon RW mapping then it is probably OK. And if the size is THR_STACK_DEFAULT > it's even more likely to be OK. Of course, users could change the thread > stacksize and I suppose that if you try hard enough you can manually arrive > at a mapping with multiple mmap calls that looks like a single mmap > MAP_STACK. If you see a guard entry which is followed by a swap map entry with KVME_FLAG_GROWS_DOWN flag, then this is definitely the stack pair. From nobody Mon Feb 12 15:09:25 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYSYS6ftkz59ykd; Mon, 12 Feb 2024 15:09:48 +0000 (UTC) (envelope-from thj@freebsd.org) Received: from fout6-smtp.messagingengine.com (fout6-smtp.messagingengine.com [103.168.172.149]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYSYS0X0rz3wkD; Mon, 12 Feb 2024 15:09:48 +0000 (UTC) (envelope-from thj@freebsd.org) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=messagingengine.com header.s=fm3 header.b=rbCrJI0o; dmarc=fail reason="No valid SPF, DKIM not aligned (relaxed)" header.from=freebsd.org (policy=none); spf=softfail (mx1.freebsd.org: 103.168.172.149 is neither permitted nor denied by domain of thj@freebsd.org) smtp.mailfrom=thj@freebsd.org Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailfout.nyi.internal (Postfix) with ESMTP id 088FA13800A8; Mon, 12 Feb 2024 10:09:47 -0500 (EST) Received: from imap47 ([10.202.2.97]) by compute3.internal (MEProxy); Mon, 12 Feb 2024 10:09:47 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :content-type:date:date:feedback-id:feedback-id:from:from :in-reply-to:message-id:mime-version:reply-to:subject:subject:to :to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s= fm3; t=1707750587; x=1707836987; bh=fOj56UQFX0BcalbZ8QedpQiefIQt GA7vm2bO5XYbBe0=; b=rbCrJI0of5aIyxBShoyZPx7DtVFVTuF62RM2HBj0XBNJ diglMWNweHjjI/yN5L/8BMBkDf24kq/mDS+/ifwBlBvV5XsLvNgjCSHAUdq8Yc3g VWZ6RekLNapt6ZcLq3Pv9lHxhjCs4r7jMGQcZ5W167eiBfBajp3t42hq+CDpBlSR 55u6M0+KzVv942ZwDoAi1VUE+JELdLdG4eDdIQ1aMoTDL9phOWaHm8qrhx2TC6LT cw3BfOdsJQHLyISRj1YqgBpXs8E0xygD3+xjkXdEUXgSajbrIwJszhfzOVZ1QgqY vGS2T9nQ87aEVvcG9ImqDGII9SJ/jSk2VTCddjhCjw== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrudefgdejvdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkfffhvffutgfgsehtqhertd erreejnecuhfhrohhmpedfvfhomhculfhonhgvshdfuceothhhjhesfhhrvggvsghsugdr ohhrgheqnecuggftrfgrthhtvghrnhepgfeihedvueeiffefhfejlefggeehieejleegke efvdekhfduudeujedttdejjeejnecuffhomhgrihhnpehgihhthhhusgdrtghomhenucev lhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehthhhjsehfrh gvvggsshgurdhorhhg X-ME-Proxy: Feedback-ID: ib75146ab:Fastmail Received: by mailuser.nyi.internal (Postfix, from userid 501) id BB42BA6007E; Mon, 12 Feb 2024 10:09:46 -0500 (EST) X-Mailer: MessagingEngine.com Webmail Interface User-Agent: Cyrus-JMAP/3.11.0-alpha0-144-ge5821d614e-fm-20240125.002-ge5821d61 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Message-Id: <57da17db-360f-4da7-a003-87bf1550d94c@app.fastmail.com> Date: Mon, 12 Feb 2024 15:09:25 +0000 From: "Tom Jones" To: freebsd-net@freebsd.org, freebsd-hackers@freebsd.org Subject: CFT: VPP on FreeBSD Content-Type: text/plain;charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.79 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; SUBJECT_ENDS_SPACES(0.50)[]; R_DKIM_ALLOW(-0.20)[messagingengine.com:s=fm3]; DMARC_POLICY_SOFTFAIL(0.10)[freebsd.org : No valid SPF, DKIM not aligned (relaxed),none]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[103.168.172.149:from]; XM_UA_NO_VERSION(0.01)[]; ARC_NA(0.00)[]; ASN(0.00)[asn:209242, ipnet:103.168.172.0/24, country:US]; FROM_HAS_DN(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEFALL_USER(0.00)[thj]; DWL_DNSWL_NONE(0.00)[messagingengine.com:dkim]; RCVD_TLS_LAST(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org,freebsd-net@freebsd.org]; RCVD_COUNT_THREE(0.00)[3]; FROM_EQ_ENVFROM(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; R_SPF_SOFTFAIL(0.00)[~all:c]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; DKIM_TRACE(0.00)[messagingengine.com:+] X-Rspamd-Queue-Id: 4TYSYS0X0rz3wkD Hi freebsd-net, I have been working for the last few months of porting VPP to FreeBSD an= d this work is now ready for very early testing. This porting work is sp= onsored by the FreeBSD Foundation in partnership with RG Nets. If you would like to experiment with VPP on FreeBSD then you can work fr= om my freebsd-vpp branch available here: https://github.com/adventureloo= p/vpp/tree/freebsd-vpp The README.freebsd offers a walk through of build and configuration base= d on the configuration of my bhyve test machine. The port has been tested in bhyve with virtio interfaces and on real har= dware using Chelsio T62100-LP-CR 100Gbit NICs. With this branch you should be able to launch VPP and configure it to ru= n as a router on FreeBSD CURRENT and 14 using both DPDK and netmap. This branch represents my upstreaming queue of changes heading towards V= PP and some FreeBSD specific patches required to build and run right now= which I expect not to need in the future. If you test and encounter issues or want to get in touch I=E2=80=99m hap= py to receive bug reports via that issues on that github repo or directl= y via email to thj@freebsd.org. I=E2=80=99m looking forward to hearing the exciting ways this breaks and= the VPP configurations that FreeBSD users expect to be available. Thanks Tom From nobody Mon Feb 12 18:44:15 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYYK670Ylz5BLKM for ; Mon, 12 Feb 2024 18:44:26 +0000 (UTC) (envelope-from thierry@pompo.net) Received: from erza.lautre.net (erza.lautre.net [80.67.160.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "lautre.net", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYYK56pKYz4jy7; Mon, 12 Feb 2024 18:44:25 +0000 (UTC) (envelope-from thierry@pompo.net) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="SPF not aligned (relaxed), No valid DKIM" header.from=freebsd.org (policy=none); spf=pass (mx1.freebsd.org: domain of thierry@pompo.net designates 80.67.160.89 as permitted sender) smtp.mailfrom=thierry@pompo.net Received: from graf.pompo.net (graf.pompo.net [82.66.0.218]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by erza.lautre.net (Postfix) with ESMTPSA id A8172E7ACE; Mon, 12 Feb 2024 19:44:16 +0100 (CET) Received: by graf.pompo.net (Postfix, from userid 1001) id 1F0047995F; Mon, 12 Feb 2024 19:44:16 +0100 (CET) Date: Mon, 12 Feb 2024 19:44:15 +0100 From: Thierry Thomas To: freebsd-hackers@freebsd.org Cc: Alexander Leidinger , sgk@troutmask.apl.washington.edu, "B. E." , Jan Beich Subject: Re: GPU programming? Message-ID: Mail-Followup-To: freebsd-hackers@freebsd.org, Alexander Leidinger , sgk@troutmask.apl.washington.edu, "B. E." , Jan Beich References: <90ea0dd91b760b0b6f92065d09396545@Leidinger.net> List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="P9c6BGosGEq8DCfE" Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD 14.0-STABLE amd64 Organization: Kabbale Eros X-Face: (hRbQnK~Pt7$ct`!fupO(`y_WL4^-Iwn4@ly-.,[4xC4xc;y=\ipKMNm<1J>lv@PP~7Z<.tKjAnXLs: X-PGP: 0xF1C516B3C8359753 X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.37 / 15.00]; SIGNED_PGP(-2.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-0.99)[-0.995]; NEURAL_HAM_SHORT(-0.37)[-0.373]; FORGED_SENDER(0.30)[thierry@freebsd.org,thierry@pompo.net]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_POLICY_SOFTFAIL(0.10)[freebsd.org : SPF not aligned (relaxed), No valid DKIM,none]; FREEMAIL_CC(0.00)[leidinger.net,troutmask.apl.washington.edu,gmail.com,freebsd.org]; HAS_ORG_HEADER(0.00)[]; RCVD_TLS_LAST(0.00)[]; TO_DN_SOME(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; MISSING_XM_UA(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; ASN(0.00)[asn:20766, ipnet:80.67.160.0/19, country:FR]; RCVD_COUNT_TWO(0.00)[2]; FROM_NEQ_ENVFROM(0.00)[thierry@freebsd.org,thierry@pompo.net]; FREEFALL_USER(0.00)[thierry]; TO_MATCH_ENVRCPT_SOME(0.00)[]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; ARC_NA(0.00)[]; RCPT_COUNT_FIVE(0.00)[5] X-Rspamd-Queue-Id: 4TYYK56pKYz4jy7 --P9c6BGosGEq8DCfE Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Le lun. 5 f=E9vr. 24 =E0 12:17:57 +0100, Jan Beich =E9crivait=A0: > > ROCm: No idea. I have not seen any report about it working or even > > being tried. But there was at least some discussion about it: > > https://github.com/ROCm/ROCm/issues/138 > > https://github.com/ROCm/ROCm/issues/1913 >=20 > AFAIU (never owned an AMD GPU): > - ROCm requires amdkfd.ko which drm-kmod doesn't provide since > https://github.com/freebsd/drm-kmod/commit/a381f46adf8b > - ROCm has poor *consumer* GPU support thus unattractive for > volunteers/community to spend time porting I just read that it is now possible to run CUDA code on Radeon: AMD Quietly Funded A Drop-In CUDA Implementation Built On ROCm: It's Now Open-Source This should make it interesting! --=20 Th. Thomas. --P9c6BGosGEq8DCfE Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJlymb/XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFNTM2QkU4NTM4NTM5OUQwMEI2RkFBNzZG MUM1MTZCM0M4MzU5NzUzAAoJEPHFFrPINZdTCU0P/2m0ZJDLG9K1yrFh3kzrCwJ6 kjkIH/JBBlWvLza1hqdknnMz67D58rdn96DG+r8nvUxJ46YvQoti/ksiilmvA4X8 qUmp0t6y3mS2o62E94NHGUwsA2NrKghF3y1+JyPHnk0ogFfOZUZvGGhyv+gJfQr9 jxsKtSeKhSCb48JGqOHpA8rGrbed5qd5RarOtDfs4rK13bSjoHiNjO7gmXjKt7nD gUFG+f7AhrTOBCKkpE/UeImoTbiI4vnEL7ghV6/c3Vm2q6PykOOt9jWzGX4L1Cqw r00RphHqw9nyRl1JppSkiyvW0AX14d6T3FoFjOYYzr8maOlIKD29e4l5m94s+0RM ZAwyUUCB0HwbaWb5A+E/4J7ejFwjzTAkhpWmv8MJK4bGfVdrZ6SrreAEUTZ44mhB ZQNfUj1FGh1rcQ2m2i4GI72MtKU6P8XO2eiSuqVoG136QN2EBoKPNC4q5h6fUvXS QZ4b/pqC/kxfW8ek6fPQbTmzuiHfZ+fRO+TMb/5q6ZFbUzkm/4eFlWcJH91n2tvy XnaQiRraTYNw+NKSdNS8H4k1Q8ppIzhZ2A8Qhje+rpwTtbRaLPCaaP5KstnmHfWp tt9TLJtglDQi7COe9VAHvlkOxS2/FgnFeDLxNk8jJuPMTC+9scjtHnuo+qo/b0S8 +Qu5+tff2DQ0Obj+fZgT =PQKS -----END PGP SIGNATURE----- --P9c6BGosGEq8DCfE-- From nobody Tue Feb 13 06:32:30 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYs2J1vQCz5B0bj for ; Tue, 13 Feb 2024 06:32:40 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Received: from plan-b.pwste.edu.pl (plan-b.pwste.edu.pl [IPv6:2001:678:618::40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "plan-b.pwste.edu.pl", Issuer "GEANT OV RSA CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYs2G5LDzz4TRJ for ; Tue, 13 Feb 2024 06:32:38 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=plan-b.pwste.edu.pl header.s=plan-b-mailer header.b=G8iG91LK; dmarc=pass (policy=quarantine) header.from=plan-b.pwste.edu.pl; spf=pass (mx1.freebsd.org: domain of zarychtam@plan-b.pwste.edu.pl designates 2001:678:618::40 as permitted sender) smtp.mailfrom=zarychtam@plan-b.pwste.edu.pl Received: from [192.168.7.70] (dom.potoki.eu [62.133.140.50]) (authenticated bits=0) by plan-b.pwste.edu.pl (8.18.1/8.17.2) with ESMTPSA id 41D6WV1o005599 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Tue, 13 Feb 2024 07:32:31 +0100 (CET) (envelope-from zarychtam@plan-b.pwste.edu.pl) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=plan-b.pwste.edu.pl; s=plan-b-mailer; t=1707805953; bh=ZVVX6oA0Xtt+XkB2VakNGMuPoJlujVxdIOS38djTtGQ=; h=Date:To:From:Subject; b=G8iG91LK1qrcdalBP22v7Hu5cspP4AoWNMzjQZ3zl2MtrQ9Z5elBYavBD1M5C4rOz DQZHXuXxgYdMfnTW9E7cRIzyaGzajoTg7MHJw9GpOJM7pbZxKQearC2D/fGf8F2jmi 6WApnfC8ChYg8uvIXcYNH/JOUR7jVZ1VTeVrsmF8O96OqxKGPYZpwSAMmyFcbXxU5i qc6zf2r7/zbh7lzIaLQJ85ec8+J72J/BYg6GPIidmhWNnA0CXkBsEGLWUPG/fVoLBa BkJJtscmW7AWC01wwekF6By7NBEYMrmS2ox4v0cw3odeGZ5gq1kVdi2DzgX87tazTN T2G9kOpIKgC8g== X-Authentication-Warning: plan-b.pwste.edu.pl: Host dom.potoki.eu [62.133.140.50] claimed to be [192.168.7.70] Message-ID: Date: Tue, 13 Feb 2024 07:32:30 +0100 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: FreeBSD Hackers From: Marek Zarychta Subject: jails and CPU pinning Autocrypt: addr=zarychtam@plan-b.pwste.edu.pl; keydata= xsBNBFfi3cMBCADLecMTFXad4uDXqv3eRuB4qJJ8G9tzzFezeRnnwxOsPdytW5ES2z1ibSrR IsiImx6+PTqrAmXpTInxAi7yiZGdSiONRI4CCxKY9d1YFiNYT/2WyNXCekm9x29YeIU7x0JB Llbz0f/9HC+styBIu2H+PY/X98Clzm110CS+n/b9l1AtiGxTiVFj7/uavYAKxH6LNWnbkuc5 v8EVNc7NkEcl5h7Z9X5NEtzDxTOiBIFQ/kOT7LAtkYUPo1lqLeOM2DtWSXTXQgXl0zJI4iP1 OAu4qQYm2nXwq4b2AH9peknelvnt1mpfgDCGSKnhc26q6ibTfMwydp+tvUtQIQYpA6b9ABEB AAHNN01hcmVrIFphcnljaHRhIChQbGFuLWIpIDx6YXJ5Y2h0YW1AcGxhbi1iLnB3c3RlLmVk dS5wbD7CwHcEEwEIACEFAlfi4LkCGwMFCwkIBwIGFQgJCgsCBBYCAwECHgECF4AACgkQHZW8 vIFppoJXdgf8D9X3VRFSNaR9lthSx/+uqas17J3FJKBo1xMQsC2a+44vzNvYJSuPGLLJ+LW2 HPVazjP/BWZJbxOYpliY4zxNRU0YCp0BLIVLibc//yax+mE42FND/+NiIZhqJscl6MLPrSwo sIwXec4XYkldkyqW/xBbBYXoIkBqdKB9j5j42Npy1IV/RizOSdmvTWY27ir8e/yGMR1RLr4F 8P5K3OWTdlGy2H2F/3J8bIPBLG6FpaIyLQw4dHSx8V02PYqDxK1cNo2kAOnU8PnZL/AGuMOH iv3MN1VYL8ehcmpBBsrZGebQJxrjY2/5IaTSgp9xHYT70kshuU6Qb97vk1mOjNZxgc7ATQRX 4t3DAQgA10h6RCXuBLMHxq5B8X/ZIlj9sgLoeyfRdDZEc9rT2KUeUJVHDsbvOFf4/7F1ovWY hJbA6GK/LUZeHHTjnbZcH1uDYQeHly4UOLxeEvhGoz4JhS2C7JzN/uRnwbdOAUbJr8rUj/IY a7gk906rktsc/Ldrxrxh7O6WO0JCh2XO/p4pDfEwwB37g4xHprSab28ECYJ9JMbtA8Sy4M55 g3+GQ28FvSlGnx48OoGXU2BZdc1vZKSQmNOlikB+9/hDX8zdYWVfDaX1TLQ8Ib4+xTUmapza mV/bxIsaZRBw+jFjLQHhTbIMfPEU+4mxFDvTdbKPruKPqVf1ydgMnPZWngowdwARAQABwsBf BBgBCAAJBQJX4t3DAhsMAAoJEB2VvLyBaaaC6qkIAJs9sDPqrqW0bYoRfzY6XjDWQ59p9tJi v8aogxacQNCfAu+WkJ8PNVUtC1dlVcG5NnZ80gXzd1rc8ueIvXlvdanUt/jZd8jbb3gaDbK3 wh1yMCGBl/1fOJTyEGYv1CRojv97KK89KP5+r8x1P1iHcSrunlDNqGxTMydNCwBH23QcOM+m u4spKnJ/s0VRBkw3xoKBZfZza6fTQ4gTpAipjyk7ldOGBV+PvkKATdhK2yLwuWXhKbg/GRlD 1r5P0gxzSqfV4My+KJuc2EDcrqp1y0wOpE1m9iZqCcd0fup5f7HDsYlLWshr7NQl28f6+fQb sylq/j672BHXsdeqf/Ip9V4= Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.89 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; DMARC_POLICY_ALLOW(-0.50)[plan-b.pwste.edu.pl,quarantine]; R_SPF_ALLOW(-0.20)[+mx]; R_DKIM_ALLOW(-0.20)[plan-b.pwste.edu.pl:s=plan-b-mailer]; MIME_GOOD(-0.10)[text/plain]; ONCE_RECEIVED(0.10)[]; XM_UA_NO_VERSION(0.01)[]; RCVD_COUNT_ONE(0.00)[1]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:206006, ipnet:2001:678:618::/48, country:PL]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; HAS_XAW(0.00)[]; ARC_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; DKIM_TRACE(0.00)[plan-b.pwste.edu.pl:+] X-Rspamd-Queue-Id: 4TYs2G5LDzz4TRJ Dear Knowledgeable Hackers, is CPU pinning supposed to work from inside the jail if the jail CPU set is full? From my observations processes inside the jails don't walk over CPUs(?!) and can be pinned to specific CPUs neither from the host nor from the jail. Is this expected behavior? Cheers -- Marek Zarychta From nobody Tue Feb 13 11:19:37 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYzPd6Bslz5B46v for ; Tue, 13 Feb 2024 11:19:49 +0000 (UTC) (envelope-from freebsd-hackers@dino.sk) Received: from cm0.netlabit.sk (mailhost.netlabit.sk [84.245.65.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYzPc6rTQz40PT for ; Tue, 13 Feb 2024 11:19:48 +0000 (UTC) (envelope-from freebsd-hackers@dino.sk) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd-hackers@dino.sk designates 84.245.65.72 as permitted sender) smtp.mailfrom=freebsd-hackers@dino.sk Received: from zeta.dino.sk ([84.245.95.254]) (AUTH: LOGIN milan, TLS: TLSv1.3,256bits,TLS_AES_256_GCM_SHA384) by cm0.netlabit.sk with ESMTPSA id 0000000002B8CEAA.0000000065CB504B.00015564; Tue, 13 Feb 2024 12:19:39 +0100 Date: Tue, 13 Feb 2024 12:19:37 +0100 From: Milan Obuch To: freebsd-hackers@freebsd.org Subject: rcorder question Message-ID: <20240213121936.2c0fc4c0@zeta.dino.sk> X-Mailer: Claws Mail 3.20.0 (GTK+ 2.24.33; amd64-portbld-freebsd13.1) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.99 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-0.999]; NEURAL_HAM_SHORT(-0.69)[-0.689]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_ONE(0.00)[1]; ASN(0.00)[asn:5578, ipnet:84.245.64.0/18, country:SK]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; MID_RHS_MATCH_FROMTLD(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; R_DKIM_NA(0.00)[]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[dino.sk]; TO_MATCH_ENVRCPT_ALL(0.00)[]; ARC_NA(0.00)[] X-Rspamd-Queue-Id: 4TYzPc6rTQz40PT Hi, I am trying to solve an issue how to start local scripts in proper order (for my application). Basically, I use net/socat port to create virtual serial port used to read data from some device (just simple character stream, with CR LF terminating the record with fixed position items). I configured socat instance in /etc/rc.conf: socat_enable="YES" and /usr/local/etc/socat-instances.conf: [moxa] daemonuser=root flags="PTY,link=/dev/cuaV0,rawer,wait-slave TCP4:192.168.x.y:5000" It works - on boot, designated device is contacted and virtual serial port is created. For starting program consuming data, I put following in /etc/rc.local: /usr/local/xxx/yyy/zzz /dev/cuaV0 & If started manually after boot up, it works as intended, but here is the problem, it is started before socat, because # rcorder /etc/rc.d/* /usr/local/etc/rc.d/* | grep local /etc/rc.d/mountcritlocal /usr/local/etc/rc.d/dbus /etc/rc.d/local /usr/local/etc/rc.d/socat (some more entries edited out, not relevant to the issue). So the question is how could I alter boot order to start /etc/rc.local *after* socat instance. I tried, altering /etc/rc.d/local line (naively) # REQUIRE: DAEMON to # REQUIRE: DAEMON socat but this does not work, because then rcorder reports rcorder: Circular dependency on file `/usr/local/etc/rc.d/socat'. rcorder: Circular dependency on provision `LOGIN': /etc/rc.d/LOGIN -> /etc/rc.d/local -> /usr/local/etc/rc.d/socat -> /etc/rc.d/LOGIN. rcorder: `/usr/local/etc/rc.d/socat' was seen in circular dependencies for 1 times. rcorder: `/etc/rc.d/local' was seen in circular dependencies for 1 times. rcorder: `/etc/rc.d/LOGIN' was seen in circular dependencies for 1 times. rcorder: `/usr/local/etc/rc.d/socat' was seen in circular dependencies for 1 times. I did some more, but no success yet... Anybody to offer some hint I can try? Regards, Milan From nobody Tue Feb 13 11:27:44 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYzb14dBhz5B4hy for ; Tue, 13 Feb 2024 11:27:57 +0000 (UTC) (envelope-from theraven@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYzb13nm9z4257; Tue, 13 Feb 2024 11:27:57 +0000 (UTC) (envelope-from theraven@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707823677; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=gbfTKQR/achxYrMskodWLdXgmp+dG/o74lC8oTe77Y8=; b=vKv1rKVK46qNOIKvD2oCm8RPP1WEcrqlzF2OL5Q5GbEXOV+uTadkNFcNkQzatBmM92F776 J8Tjh46M4lO07DEBH7CS4Vq0eFjA6BVhE7cplzotq/A5521o1MPLCRYoslFfaQFpo4ybiQ jjMrJ0SN+n41zWDq+lyxielV7aAzsVyOWpXUxyTQ//BJYuNXEIjvJsmQ52lt2G8YPUaHuo sUd0s0EJgAc+CmW6nGne+StRDt/+L64C7EFQeTFBFXmePWV+YR6U0vomJSpL4oZ5F1OH8G RkA1UmUxSFZip43nLCsbt+Wqj8U5+CiuJ4US5YDd931LnseMYmQZLgF4Ycu9mA== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707823677; a=rsa-sha256; cv=none; b=ssdPGAE6TjedXgfmewfmM9vvs6DVhZnV0z+Ns+3rhAUjW3tqjnP9BJT0hrJkxmeZwXvGKl XkVMOTjC+6O0Rl+NTTo9NBP7I1d4L7R1O3vMNZenL/rVpnjwkNEW6fg6lGftNJSbBuOSTI OMcZLMGNxMOtMbkeGSADdEp/iRpBlAPcuoDWtYLRmrGsYjtYg0dwM7OQ5O4gZsJPCQlseT nqePjt3+aDSU3iABcpfEf3p6f0SvOL4jDfXmLc6gKwsW4ILCEWGXdV+5vmkWkY/rKG4Izf vooQ7DSPxdgO0SyTSSMMf27gslhMIDIMHpLNNWiQ46Tp4Xp2C3lVlED3M5GUZQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707823677; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=gbfTKQR/achxYrMskodWLdXgmp+dG/o74lC8oTe77Y8=; b=oQ6P4b8OR0OmLyTES3RXgb88BzIBEeUnfgzlglH5SvZqGLr/DxIBYr3iU4Ai87P/6xWLPF mrQ189b9059PPc5baB4gSJYLalXQ5W2dlnuiA/xZEnlVad2Krq8vx62HZB5gqkmj8uXzE1 87bQgxvp8MWIP1jBNszlZ09Qb+7GhW/g+8h6aWs+keMdD5T8W9+pCJlbihXcGseSgWZ0Mq z/6K37RzMK/I1WrCC8hsYIa56Ku6ExMKWMI0D8xn6zT4gzj/+EGGDYJGVwa3YZz8wiDOOu FwT694CX80USukCqXQU/gnVKSEatqAcVKhxT9ck20yFUUB+DIFKEUXmIqj0hxA== Received: from smtp.theravensnest.org (smtp.theravensnest.org [45.77.103.195]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: theraven) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TYzb12Y7gz14Vp; Tue, 13 Feb 2024 11:27:57 +0000 (UTC) (envelope-from theraven@FreeBSD.org) Received: from smtpclient.apple (host86-131-178-116.range86-131.btcentralplus.com [86.131.178.116]) by smtp.theravensnest.org (Postfix) with ESMTPSA id 04268105BF; Tue, 13 Feb 2024 11:27:55 +0000 (GMT) From: David Chisnall Message-Id: Content-Type: multipart/alternative; boundary="Apple-Mail=_33E71CC9-4F79-4880-9D96-7E87BBEBCE07" List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\)) Subject: Re: rcorder question Date: Tue, 13 Feb 2024 11:27:44 +0000 In-Reply-To: <20240213121936.2c0fc4c0@zeta.dino.sk> Cc: freebsd-hackers@freebsd.org To: Milan Obuch References: <20240213121936.2c0fc4c0@zeta.dino.sk> X-Mailer: Apple Mail (2.3774.400.31) --Apple-Mail=_33E71CC9-4F79-4880-9D96-7E87BBEBCE07 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 A quick look at teh socat RC script suggests that it contains this line: # PROVIDE: socat You should be able to simply add: # REQUIRE: socat And your service will start after socat. But to do that you need to not = use `rc.local` and instead provide a separate RC script. There are some = examples in the man page and the web site: https://man.freebsd.org/cgi/man.cgi?query=3Drc https://docs.freebsd.org/en/articles/rc-scripting/ In general, I wouldn=E2=80=99t use rc.local for anything that has = dependencies outside of rc.local (or, in fact, for anything). If you = have a service that needs to be started after something else, then put = it in etc/rc.d and enable it via rc.conf (or, ideally, something in = rc.conf.d). If you want to move it to a different machine, you now just = need to copy the files across rather than extract bits of config files = (this also makes it easier to create packages for it, if you wish to = automate installation). =20 David > On 13 Feb 2024, at 11:19, Milan Obuch wrote: >=20 > Hi, >=20 > I am trying to solve an issue how to start local scripts in proper > order (for my application). Basically, I use net/socat port to create > virtual serial port used to read data from some device (just simple > character stream, with CR LF terminating the record with fixed = position > items). >=20 > I configured socat instance in /etc/rc.conf: >=20 > socat_enable=3D"YES" >=20 > and /usr/local/etc/socat-instances.conf: >=20 > [moxa] > daemonuser=3Droot > flags=3D"PTY,link=3D/dev/cuaV0,rawer,wait-slave TCP4:192.168.x.y:5000" >=20 > It works - on boot, designated device is contacted and virtual serial > port is created. >=20 > For starting program consuming data, I put following in /etc/rc.local: >=20 > /usr/local/xxx/yyy/zzz /dev/cuaV0 & >=20 > If started manually after boot up, it works as intended, but here is > the problem, it is started before socat, because >=20 > # rcorder /etc/rc.d/* /usr/local/etc/rc.d/* | grep local > /etc/rc.d/mountcritlocal > /usr/local/etc/rc.d/dbus > /etc/rc.d/local > /usr/local/etc/rc.d/socat >=20 > (some more entries edited out, not relevant to the issue). >=20 > So the question is how could I alter boot order to start /etc/rc.local > *after* socat instance. I tried, altering /etc/rc.d/local line = (naively) >=20 > # REQUIRE: DAEMON >=20 > to >=20 > # REQUIRE: DAEMON socat >=20 > but this does not work, because then rcorder reports >=20 > rcorder: Circular dependency on file `/usr/local/etc/rc.d/socat'. > rcorder: Circular dependency on provision `LOGIN': /etc/rc.d/LOGIN -> = /etc/rc.d/local -> /usr/local/etc/rc.d/socat -> /etc/rc.d/LOGIN. > rcorder: `/usr/local/etc/rc.d/socat' was seen in circular dependencies = for 1 times. > rcorder: `/etc/rc.d/local' was seen in circular dependencies for 1 = times. > rcorder: `/etc/rc.d/LOGIN' was seen in circular dependencies for 1 = times. > rcorder: `/usr/local/etc/rc.d/socat' was seen in circular dependencies = for 1 times. >=20 > I did some more, but no success yet... Anybody to offer some hint I = can > try? >=20 > Regards, > Milan >=20 --Apple-Mail=_33E71CC9-4F79-4880-9D96-7E87BBEBCE07 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 A quick look = at teh socat RC script suggests that it contains this = line:

# PROVIDE: = socat

You should be able to simply = add:

REQUIRE: socat

And your = service will start after socat.  But to do that you need to not use = `rc.local` and instead provide a separate RC script.  There are = some examples in the man page and the web site:



In = general, I wouldn=E2=80=99t use rc.local for anything that has = dependencies outside of rc.local (or, in fact, for anything).  If = you have a service that needs to be started after something else, then = put it in etc/rc.d and enable it via rc.conf (or, ideally, something in = rc.conf.d).  If you want to move it to a different machine, you now = just need to copy the files across rather than extract bits of config = files (this also makes it easier to create packages for it, if you wish = to automate installation).  

David

On 13 = Feb 2024, at 11:19, Milan Obuch <freebsd-hackers@dino.sk> = wrote:

Hi,

I= am trying to solve an issue how to start local scripts in = proper
order (for my application). Basically, I use net/socat port to = create
virtual serial port used to read data from some device (just = simple
character stream, with CR LF terminating the record with fixed = position
items).

I configured socat instance in = /etc/rc.conf:

socat_enable=3D"YES"

and = /usr/local/etc/socat-instances.conf:

[moxa]
daemonuser=3Drootflags=3D"PTY,link=3D/dev/cuaV0,rawer,wait-slave = TCP4:192.168.x.y:5000"

It works - on boot, designated device is = contacted and virtual serial
port is created.

For starting = program consuming data, I put following in = /etc/rc.local:

/usr/local/xxx/yyy/zzz /dev/cuaV0 &

If = started manually after boot up, it works as intended, but here is
the = problem, it is started before socat, because

# rcorder = /etc/rc.d/* /usr/local/etc/rc.d/* | grep = local
/etc/rc.d/mountcritlocal
/usr/local/etc/rc.d/dbus
/etc/rc.d= /local
/usr/local/etc/rc.d/socat

(some more entries edited = out, not relevant to the issue).

So the question is how could I = alter boot order to start /etc/rc.local
*after* socat instance. I = tried, altering /etc/rc.d/local line (naively)

# REQUIRE: = DAEMON

to

# REQUIRE: DAEMON socat

but this does not = work, because then rcorder reports

rcorder: Circular dependency = on file `/usr/local/etc/rc.d/socat'.
rcorder: Circular dependency on = provision `LOGIN': /etc/rc.d/LOGIN -> /etc/rc.d/local -> = /usr/local/etc/rc.d/socat -> /etc/rc.d/LOGIN.
rcorder: = `/usr/local/etc/rc.d/socat' was seen in circular dependencies for 1 = times.
rcorder: `/etc/rc.d/local' was seen in circular dependencies = for 1 times.
rcorder: `/etc/rc.d/LOGIN' was seen in circular = dependencies for 1 times.
rcorder: `/usr/local/etc/rc.d/socat' was = seen in circular dependencies for 1 times.

I did some more, but = no success yet... Anybody to offer some hint I = can
try?

Regards,
Milan


= --Apple-Mail=_33E71CC9-4F79-4880-9D96-7E87BBEBCE07-- From nobody Tue Feb 13 20:45:40 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZCyc2rfjz59klV for ; Tue, 13 Feb 2024 20:45:44 +0000 (UTC) (envelope-from paulf2718@gmail.com) Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZCyb50Sgz4S6L for ; Tue, 13 Feb 2024 20:45:43 +0000 (UTC) (envelope-from paulf2718@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20230601 header.b=TV8jk5GN; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of paulf2718@gmail.com designates 2a00:1450:4864:20::42b as permitted sender) smtp.mailfrom=paulf2718@gmail.com Received: by mail-wr1-x42b.google.com with SMTP id ffacd0b85a97d-33ce2d6a243so332715f8f.1 for ; Tue, 13 Feb 2024 12:45:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1707857142; x=1708461942; darn=freebsd.org; h=in-reply-to:from:content-language:references:to:subject:user-agent :mime-version:date:message-id:from:to:cc:subject:date:message-id :reply-to; bh=PwR0Y1CUKeOCziaVhI94AB0jVzTWfhtpLt7cB6UlewU=; b=TV8jk5GNwU1XFXBoMheVddMJxK0DwemiRg8DRsRsp4ehGSkeuwHw1xtEORtrt4jMjX AfsdY3riGGjSaH9rLt4Kce6afJFHzP6AEmbuh78VR5GQb77FNYJBFhxCeI262Iuq3iRb N5AU5RXmcAf4uMhuJ603iQhj7Jv0f9SRamuYuI+Kod78yVSFpea+qkjArIFhLBu/qHBV syNeR1hYBo6hewL25IDBOB3O9XLuGuRLtneeaYMKHMzp2t4LwPlhr0tJJKc5nMSjZAH7 T2ZHxLu6FhNeoydvGUzb6h2xOj99TtMyXjO75bJJ26LY0XoLn6/dMGZ8NC+BFHeORdM4 vbgg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707857142; x=1708461942; h=in-reply-to:from:content-language:references:to:subject:user-agent :mime-version:date:message-id:x-gm-message-state:from:to:cc:subject :date:message-id:reply-to; bh=PwR0Y1CUKeOCziaVhI94AB0jVzTWfhtpLt7cB6UlewU=; b=gb/Np9S9T3cIEq5j11aE9WSvdPVoCoyMS15s5boXOK17S8lbDgEDFJfQf3M42F4z4a gpCSYiDePtsyzq3xzoJdhhgLtPoLtW6x1TkxYa3bGd+tMLOvsZGVXYNsXrJ20BYNs+8d yEqEIp5JCMc+jfjkrovd7t+/EMUuR8dKcXxYyNU38PcEK1pTgRjTQGQdtQmq0K9B8Jh0 Dd3+bmEmtzUEpuqR9767Q1tXgSWxAbIrvm0hO91lwtg1BFpYEYbbpzWIoeBLPeqml2Sm 13saAvRhOuqiA1N9oj4JbkkBDrJkzKUwT9YXqZfGkjdGs7BpQCq0tyCvFoxoczSaWFkW JY5Q== X-Gm-Message-State: AOJu0YzeYn+qKfdoxpggl8PTtQ6uA5pHxXhKHBimxhau/jLIeZiDV6bQ 4GgbtILJBtuIM6uXSnX0YIZF8VT26pVOIS1Bl1f92Dn2a9DsHkzC4CdsQRwc3vY= X-Google-Smtp-Source: AGHT+IGRt+jSg8trQ7KgiMnWeH/DR/PWGCxeUodttH7Lv6DF9nB83kaYsXBc4MTRtzgAOxx6f8GJbQ== X-Received: by 2002:a5d:67cf:0:b0:33c:e08d:8291 with SMTP id n15-20020a5d67cf000000b0033ce08d8291mr367274wrw.3.1707857141876; Tue, 13 Feb 2024 12:45:41 -0800 (PST) Received: from [192.168.1.19] ([147.161.183.29]) by smtp.gmail.com with ESMTPSA id o16-20020a5d58d0000000b0033afe816977sm10352554wrf.66.2024.02.13.12.45.41 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 13 Feb 2024 12:45:41 -0800 (PST) Content-Type: multipart/alternative; boundary="------------9er00jObBxEehLLlXLXUszTG" Message-ID: <1cf9d1fb-66c3-43e1-9bea-d4fc9772938c@gmail.com> Date: Tue, 13 Feb 2024 21:45:40 +0100 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: Reconstructing mmaps from sysctl KERN_PROC_VMMAP To: freebsd-hackers@freebsd.org References: <09ba49cb-5abc-453b-a49b-75434a188554@gmail.com> Content-Language: en-US From: Paul Floyd In-Reply-To: X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.99 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.996]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20230601]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; XM_UA_NO_VERSION(0.01)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; RCPT_COUNT_ONE(0.00)[1]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; TO_DN_NONE(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; MID_RHS_MATCH_FROM(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::42b:from] X-Rspamd-Queue-Id: 4TZCyb50Sgz4S6L This is a multi-part message in MIME format. --------------9er00jObBxEehLLlXLXUszTG Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 12/02/2024 08:54, Konstantin Belousov wrote: > If you see a guard entry which is followed by a swap map entry with > KVME_FLAG_GROWS_DOWN flag, then this is definitely the stack pair. OK thanks. I'll rewrite those functions to look for that kind of pattern. A+ Paul --------------9er00jObBxEehLLlXLXUszTG Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 7bit


On 12/02/2024 08:54, Konstantin Belousov wrote:
If you see a guard entry which is followed by a swap map entry with
KVME_FLAG_GROWS_DOWN flag, then this is definitely the stack pair.

OK thanks. I'll rewrite those functions to look for that kind of pattern.

A+

Paul

--------------9er00jObBxEehLLlXLXUszTG-- From nobody Wed Feb 14 21:28:11 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZrs92fNlz53SSx for ; Wed, 14 Feb 2024 21:28:13 +0000 (UTC) (envelope-from leres@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZrs924Hzz40Hy for ; Wed, 14 Feb 2024 21:28:13 +0000 (UTC) (envelope-from leres@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707946093; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mR1SpYmsarzna1ZICfghcwRQCYkhVrxJpHDUOk9n3so=; b=QLRu2faicWKwE3P1jqU2ez7nWclKt2fo8OkClsayhqm7HUCpoidKG3XUxJO43YDtDi9u/T 6DyqMq0V31T98EUeZXviVxFtbebuqE2L13QgSxp7pxdYt4sTTxXTPOen7Vvy6Wj+6B8KgV emeXZg3Zlz5WZ+fu+VeTRv6o/rjOobC5GEiLBGW+JIZahsKIPA+kfjsb49cRvcLOpbjnG7 mfvroNCzne29HliupC4sTnuz2kQPYiYS3nemL70y8ZrAimEiOvdbqnaN7w6eVA1vOImdTI CWKZj71UZ5xlKbAKlYkCndwD6k8xbWxLRleXth3ZnSQmUGBcDQpDm3XhRRyEpg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707946093; a=rsa-sha256; cv=none; b=TtUfJR6Vxi9IJei3W+PQfLFH+4vCuNit6LA9+NGnbf/lfdIHwKTQNbbez7hWcesTS3MDp/ 2DO7FIu3AVuOU+PH+GxgNKK8J8s7pDlgF8L7nOcHSKia8OP/opIWvZh1ZVK/fhTP0/fnqn 5mSNo8QfR4Cn4baeDMfgeWQpmrHUsDRkK/XjG486oI5/8UgOwzcLQ0ELFEdTFC883sylE1 nZT5sQs2wbUn2ct7U8aICWWEt8j/+KjfPn8l0fgDURhpsBw3d2XXt+w/YIRu5qNvnl8sCZ IJGh1T0D5Zk0w7UnsopDoSTER0MMSR93qd2cdhrz9PSM8Z5qsHISJYR0aFrwFg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707946093; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mR1SpYmsarzna1ZICfghcwRQCYkhVrxJpHDUOk9n3so=; b=FF0+5gTsIz5vBmd3nR/AFKs5rE5P+mVTzaDXYM1oIRIvtbeAGTuVIZnslQc9HwY5tRR/02 4I9lBj1sqKvKUZA0I8GvhyQqot7FdlRRZuVqqCBzi96XccIFR9aK0jUyNvWSoNIWGU8tXy fzloMp9wSBT1Xwl+a8mLICd1AfwtW/1mILW9BV1tBFfW9y3hv0N+jmFlS+xIaA1srwQone CzK3/rU9KV/huha0HVuFck37jBMVSLV2a5jSAC/MLi0RDsWSpJPVr5FyztQ2WNEUhwfhVI v4hr9so289hLdbgiJaAEuhlqbcNykwZR+7Y9HBUCepjBb/BHam0MiaLEo6MsEQ== Received: from [IPV6:fd:1965::2] (unknown [IPv6:2600:1700:ab1b:6800:2e0:edff:fece:8f27]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: leres) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TZrs900m7zWLG for ; Wed, 14 Feb 2024 21:28:12 +0000 (UTC) (envelope-from leres@freebsd.org) Message-ID: Date: Wed, 14 Feb 2024 13:28:11 -0800 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US From: Craig Leres To: freebsd-hackers@freebsd.org Subject: How to use an apache proxy+cache with pkg? Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Although I have gig fiber at home, when I do pkg updates I get at most 10 mbps from my custom build server (likely thanks to purposely bad at&t peering connections). I tried recently to configure apache on my home network to proxy and cache but haven't been able to make it work yet -- seems like pkg tries *really* hard to defeat caching. First I was hitting the CacheMaxFileSize default of 1000000 (which I would describe as ridiculously low). Then I figured out that pkg was appending '?' to make the downloads look like queries so I turned CacheIgnoreQueryString on. Next I saw that pkg was setting an If-Modified-Since to Jan 1970, CacheIgnoreCacheControl solved that. But it still doesn't cache and it feels like I'm missing some obvious knob (maybe in pkg.conf?) My config works for fetch and curl but not pkg. I think I saw some ngix configs to do this but I'm already using apache for other stuff and would prefer to not have to install ngix... Is anybody doing this with apache? For extra credit, I'd like to do the same for freebsd-update blobs. Craig ProxyRequests Off ProxyPreserveHost Off ProxyPass / http://pkg.example.com/ ProxyPassReverse / http://pkg.example.com/ ProxyHTMLURLMap http://pkg.example.com/ http://pkg.local.example.com/ CacheEnable disk / CacheRoot /var/cache/freebsd-pkg #CacheIgnoreNoLastMod On CacheDetailHeader On #CacheIgnoreHeaders Set-Cookie # Default is ridiculously small (1000000 or 0.95MB) CacheMaxFileSize 200000000 CacheMinFileSize 1024 CacheIgnoreQueryString On CacheIgnoreCacheControl On #LogLevel proxy:debug #LogLevel cache:debug #LogLevel cache_disk:debug From nobody Wed Feb 14 21:54:33 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZsRm6bjSz53XST for ; Wed, 14 Feb 2024 21:54:44 +0000 (UTC) (envelope-from freebsd-hackers@dino.sk) Received: from cm0.netlabit.sk (mailhost.netlabit.sk [84.245.65.72]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZsRl3vzYz43wb for ; Wed, 14 Feb 2024 21:54:43 +0000 (UTC) (envelope-from freebsd-hackers@dino.sk) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of freebsd-hackers@dino.sk designates 84.245.65.72 as permitted sender) smtp.mailfrom=freebsd-hackers@dino.sk Received: from zeta.dino.sk ([84.245.95.254]) (AUTH: LOGIN milan, TLS: TLSv1.3,256bits,TLS_AES_256_GCM_SHA384) by cm0.netlabit.sk with ESMTPSA id 0000000002B8D0F3.0000000065CD369B.0000F5E1; Wed, 14 Feb 2024 22:54:35 +0100 Date: Wed, 14 Feb 2024 22:54:33 +0100 From: Milan Obuch To: freebsd-hackers@freebsd.org Subject: Re: rcorder question Message-ID: <20240214225433.319d1c2d@zeta.dino.sk> In-Reply-To: References: <20240213121936.2c0fc4c0@zeta.dino.sk> X-Mailer: Claws Mail 3.20.0 (GTK+ 2.24.33; amd64-portbld-freebsd13.1) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.27 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.97)[-0.966]; R_SPF_ALLOW(-0.20)[+mx]; MIME_GOOD(-0.10)[text/plain]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_ONE(0.00)[1]; ASN(0.00)[asn:5578, ipnet:84.245.64.0/18, country:SK]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; MID_RHS_MATCH_FROMTLD(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; R_DKIM_NA(0.00)[]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[dino.sk]; TO_MATCH_ENVRCPT_ALL(0.00)[]; ARC_NA(0.00)[] X-Rspamd-Queue-Id: 4TZsRl3vzYz43wb On Tue, 13 Feb 2024 11:27:44 +0000 David Chisnall wrote: > A quick look at teh socat RC script suggests that it contains this > line: >=20 > # PROVIDE: socat >=20 > You should be able to simply add: >=20 > # REQUIRE: socat >=20 > And your service will start after socat. But to do that you need to > not use `rc.local` and instead provide a separate RC script. There > are some examples in the man page and the web site: >=20 > https://man.freebsd.org/cgi/man.cgi?query=3Drc >=20 > https://docs.freebsd.org/en/articles/rc-scripting/ >=20 > In general, I wouldn=E2=80=99t use rc.local for anything that has > dependencies outside of rc.local (or, in fact, for anything). If you > have a service that needs to be started after something else, then > put it in etc/rc.d and enable it via rc.conf (or, ideally, something > in rc.conf.d). If you want to move it to a different machine, you > now just need to copy the files across rather than extract bits of > config files (this also makes it easier to create packages for it, if > you wish to automate installation). =20 >=20 > David >=20 Thanks for pointer, I created simple script and it looks like it works as expected: --- 8< --------------------------------- #!/bin/sh # PROVIDE: scex # REQUIRE: socat . /etc/rc.subr name=3Dscex rcvar=3Dscex_enable=20 start_cmd=3D"${name}_start" stop_cmd=3D":" load_rc_config $name=20 : ${scex_enable:=3Dno}=20 scex_start() { /usr/local/bin/init_program /usr/local/bin/main_program /dev/cuaV0 & } run_rc_command "$1" --- 8< --------------------------------- For it to run, I added to /etc/rc.conf: scex_enable=3D"YES" There is no stop instruction, but it is just enough for my purpose at the moment. Is there anything which would be recommended to change? Regards, Milan From nobody Wed Feb 14 22:03:19 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZsdw48zYz53YbH for ; Wed, 14 Feb 2024 22:03:32 +0000 (UTC) (envelope-from otis@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZsdw3LNwz462G; Wed, 14 Feb 2024 22:03:32 +0000 (UTC) (envelope-from otis@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707948212; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=nhwNPDkqT7JQ+II/hCNugleu0FoQfKCVcGn8mY4XH2c=; b=jm2+VFUwfr3ZilyKF2Z2g5YbtUkfi5zS62RtWv+xTqhWWlDCTrLCZwuXToh8nxsKhVK59b w7eUiUwUXecoC2Ry54aJZ0wyiKHMkX9Fv6N3KYHIEVjmXWLqlws5SegIpF2ApxomgBw4PE yJx+ibjL0HlsCfwKcXvonWYWHst2py1+2SelBaqFwCtpl/TukSYDJTkmBh5cPewVSeV87p 40Aa6yS3ysZ6dhc0lRZIVLtKLXFTR9GzTusnuMH6+ABcviu9SJJnZj2WWZTk+xrazcXOsi 9zfeccFdcAHp//Bny3TobtuyLczQBwn8ppy+AXI9s40vYnoaI8IhE3U7/4k1pw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707948212; a=rsa-sha256; cv=none; b=qMOBA68lmEvKnpqYu8opMV9SLBqrj+UlLF9OjNOzX83lAMehVOGixNtwN1rGzVpXbbEVOU Po9GgmnuqnMlUArySv19dQjY+FL687z0c90pHG/Cfq2W58/5O43oijmOYlwp0l44b0Z2xC 3G1YWpo11jZ0e8vNiFzuuJbuS2LxvB1ozWAyccpmI6YM+yGnt3+P0kfw+hnuEynanFmuYQ v0uqUF4VfYixOFiBgPl0gU3RYJqQbF8IAGulqc4iPmFu6T++7PQaLpd0OST2xz0ptCqbkO XS2+7o+64qnP6jpnFtNWH8wxto61jtaCDvzVlNp+B1DihygC2BVCT19u4+vFXg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707948212; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=nhwNPDkqT7JQ+II/hCNugleu0FoQfKCVcGn8mY4XH2c=; b=VsoABvOxqFEeD5BJcWUIF+a6JfsIkDCl04w1toFr3R1nnIkRfvqrT2GaPLJ/xNGYFva+lS ibZKdljtsHxgv16nfe22hzqLoxWYm0LQGogwu2LAdHD//LI3E5THSV/Kd1w6jB3myYDpRh UyZoigxWJdNhFG1b+YiLL7rSTcH0WKJc+nEtyMB76VQt/0W45Cv7LSDSQXg8+TkEj62mlt vR+7T5bQjUQZCxNdRvc+LzZIU4zcwQR72jb3+zlZO6uWS30fOUuvlGEcwsiJeYLr0mYBD9 hfkI3NXHHInwuwv+LaLy9BYuaP8Eev/IhzPKLaCBzWwrpeZSczSnuR54Fxg19g== Received: from ns2.wilbury.net (ns2.wilbury.net [IPv6:2a01:b200:0:1:f816:3eff:fecd:13e6]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature ECDSA (P-256) client-digest SHA256) (Client CN "svc.wilbury.net", Issuer "R3" (verified OK)) (Authenticated sender: otis) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TZsdw1TPtzXBL; Wed, 14 Feb 2024 22:03:32 +0000 (UTC) (envelope-from otis@FreeBSD.org) Received: from smtpclient.apple (gw-upc.owhome.net [188.167.168.254]) (Authenticated sender: juraj@lutter.sk) by svc.wilbury.net (Postfix) with ESMTPSA id 1D7EF6219C; Wed, 14 Feb 2024 23:03:30 +0100 (CET) Content-Type: text/plain; charset=utf-8 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\)) Subject: Re: rcorder question From: Juraj Lutter In-Reply-To: <20240214225433.319d1c2d@zeta.dino.sk> Date: Wed, 14 Feb 2024 23:03:19 +0100 Cc: freebsd-hackers@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <31532F87-C719-4DE8-B9E4-D32FC50DF216@FreeBSD.org> References: <20240213121936.2c0fc4c0@zeta.dino.sk> <20240214225433.319d1c2d@zeta.dino.sk> To: Milan Obuch X-Mailer: Apple Mail (2.3774.400.31) Hi, > On 14 Feb 2024, at 22:54, Milan Obuch wrote: >=20 > scex_start() > { > /usr/local/bin/init_program > /usr/local/bin/main_program /dev/cuaV0 & I would consider wrapping by /usr/sbin/daemon instead of putting it into = background this way. otis =E2=80=94 Juraj Lutter otis@FreeBSD.org From nobody Thu Feb 15 00:50:46 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZxMh3520z551QZ; Thu, 15 Feb 2024 00:51:28 +0000 (UTC) (envelope-from marietto2008@gmail.com) Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZxMg4JNFz4VXd; Thu, 15 Feb 2024 00:51:27 +0000 (UTC) (envelope-from marietto2008@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20230601 header.b=ext1PDgp; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of marietto2008@gmail.com designates 2a00:1450:4864:20::532 as permitted sender) smtp.mailfrom=marietto2008@gmail.com Received: by mail-ed1-x532.google.com with SMTP id 4fb4d7f45d1cf-55f50cf2021so440017a12.1; Wed, 14 Feb 2024 16:51:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1707958283; x=1708563083; darn=freebsd.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=QBcRte46KoGQQwVd3ukluhewgGTVRssG7yLLgW/rGLg=; b=ext1PDgp4TiAJhh4r6TA9ZXgIznf2TDEoqEK8R+XKgHrkYjlMqLS2l35vCveHtzMn2 88yPdmRpNWlXZKWfZK43niwnfb7jXZETMmXlMhgCe+G/Vtk/V6WwHF0xPNYQFmEC+CAK Rbyv1aCdcRUYrBmI+NYjiYJGxKg3sL7CYwTxegch2RXVjyZfco1ehcbtnj4RLOZSSf1t w1rQn7DT9NM8WuEtEWOdRYtN2asXdpEgOKVJterq7IXNTWoJovbbBZ6KlE1l9u0HvnPH LGTDiCYQ+0TftxgoKjLvVBU5OWEJM5QBe43YbLlVb6MFoOUo1JiL/HrimcXK4gDTaobB 22+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707958283; x=1708563083; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=QBcRte46KoGQQwVd3ukluhewgGTVRssG7yLLgW/rGLg=; b=WS2pvddmEB/b90SQeUG+vAkMGqiCKOQd/hFty6/PAfZf3ytnDf7BkOLNRDjpAkeikm sdSOclv00jpwPy8OLc58TG7xquLFIb/SNQc5eqpPm4lWNj0clkKLYyq0OuFNs8EpbvWX UojBaVgZ6PKdz6ybd3tQXrIBXLfQgyqw1OM8vGf+aVUUZ0eNsOa99/B6yM8+l7m88qG+ cIeGO37ZdgQ7JMVe8RsS1G3fnfFBmXo4MZfkM41UFxPV7Qb0CCgsj4PJMkpdEKAwi3Yt Dq865Aa1YxS0nUHFPJ03wxwsqhXl8rVFIp2/RBv1mWgQreKFWXwd+tNi3q0pMzt+OYWo VHmw== X-Forwarded-Encrypted: i=1; AJvYcCXH9W4HGYu9gFvWGygVape5GoGyufn4WYmgeEEzanOK9pi2EQ7wS3hZr7A67YZ4imR9kfBI8usEBgxBKjuUk+QvCVS60omQ/GcovGydqPw6YqDFlhzEHJwDfn0E4KtxNB9xDouqtfdaZ0T+gcUZELfK51xSI3SYjKT5eHwsaKStKfAdbDRQkEg= X-Gm-Message-State: AOJu0YwENEJiEeG2DA0+eRpRLzGbDKhMn1zMOEshiAUCCR9r4APyI1PO x/Zm8hJw7uaelmdUfW/irM5Kam0lqwDn1BfR220VILS85pQliPup21ZX5sIlA+RJEAdHY/syjVV QoZzBfwJBk+NpUz8fjdPkkpC92pYMaGNTI8M= X-Google-Smtp-Source: AGHT+IGegySJdSfaQcO/IP17JBuRJiTnmxtDg3qr6CmOWLAP6V/et/F8fzzRLMKEF+bXuePZ3XnENeyE5KbAmBTgRlg= X-Received: by 2002:a17:906:b0d9:b0:a38:63d4:2273 with SMTP id bk25-20020a170906b0d900b00a3863d42273mr117728ejb.35.1707958282885; Wed, 14 Feb 2024 16:51:22 -0800 (PST) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 From: Mario Marietto Date: Thu, 15 Feb 2024 01:50:46 +0100 Message-ID: Subject: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. To: freebsd-arm , freebsd-hackers , FreeBSD Mailing List , FreeBSD Current Content-Type: multipart/alternative; boundary="000000000000be1e9f0611610622" X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.98 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.984]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20230601]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; MIME_TRACE(0.00)[0:+,1:+,2:~]; RCVD_COUNT_ONE(0.00)[1]; MISSING_XM_UA(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::532:from]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; FROM_HAS_DN(0.00)[]; MLMMJ_DEST(0.00)[freebsd-arm@freebsd.org,freebsd-hackers@freebsd.org,freebsd-questions@freebsd.org,freebsd-current@freebsd.org]; RCPT_COUNT_THREE(0.00)[4]; DKIM_TRACE(0.00)[gmail.com:+] X-Rspamd-Queue-Id: 4TZxMg4JNFz4VXd --000000000000be1e9f0611610622 Content-Type: text/plain; charset="UTF-8" Hello. After a lot of work I've been able to install FreeBSD 12.04 for armv7 on my ARM Chromebook. Now I would like to install some ports. This is what happens when I try to get a fresh ports tree : marietto@freebsd:/usr # sudo portsnap fetch extract ...... /usr/ports/databases/py-sqlalchemy10/ /usr/ports/databases/py-sqlalchemy11/ /usr/ports/databases/py-sqlalchemy12/ /usr/ports/databases/py-sqlalchemy13/ /usr/ports/databases/py-sqlalchemy14/ /usr/ports/databases/py-sqlalchemy20/ /usr/ports/databases/py-sqlcipher3/ files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. I repeated the "portsnap fetch extract" command,but I always get the same error. -- Mario. --000000000000be1e9f0611610622 Content-Type: text/html; charset="UTF-8"
Hello.

After a lot of work I've been able to install FreeBSD 12.04 for armv7 on my ARM Chromebook. Now I would like to install some ports. This is what happens when I try to get a fresh ports tree :

marietto@freebsd:/usr # sudo portsnap fetch extract
...... /usr/ports/databases/py-sqlalchemy10/ /usr/ports/databases/py-sqlalchemy11/ /usr/ports/databases/py-sqlalchemy12/ /usr/ports/databases/py-sqlalchemy13/ /usr/ports/databases/py-sqlalchemy14/ /usr/ports/databases/py-sqlalchemy20/ /usr/ports/databases/py-sqlcipher3/ files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt.

I repeated the "portsnap fetch extract" command,but I always get the same error.

--
Mario.
--000000000000be1e9f0611610622-- From nobody Thu Feb 15 02:23:52 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZzQb44j7z59jVY for ; Thu, 15 Feb 2024 02:24:07 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZzQb1NkNz4mWm for ; Thu, 15 Feb 2024 02:24:07 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-ed1-x530.google.com with SMTP id 4fb4d7f45d1cf-5639b00a25cso491805a12.0 for ; Wed, 14 Feb 2024 18:24:07 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20230601.gappssmtp.com; s=20230601; t=1707963844; x=1708568644; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=3vqM5+iVuqKR9W8y85S9lq6wDNYJwsWHb0tSin9+8jA=; b=lF6gRuvNySTwxgYo2GtwPUhzF6l9jdkyJMpxjdqm2yieJ7ScRVpjG6fq/0x0/0mS32 1bFseaSUprplpbJkdpDnkZ6sPnnLC1vl7JLntblhIin3tcmBi/XyKGzLR3r+VNbRNgQQ vjjavizl0wCfeU9Q3Vz6qPCh2L1zt8VZ87TqrwBS9224HPssVEJd59Vze8ENpabdlYfg qDOjTSZfXC8HAc5jeeosRPnZxvOCojUCHBXUCAQmHfNP0wtbRxOPHdIw3TGQkTd1LsC1 QZaDfFezXkq7XOAC14FQZr3uwa70h0rM6dzo5V6AOtwc4Es5O2ZeW+GVM6xAgO0fnrxY swnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1707963844; x=1708568644; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=3vqM5+iVuqKR9W8y85S9lq6wDNYJwsWHb0tSin9+8jA=; b=aIQoopNtwuLcsgmbOWWBePPNMciDoNZPz35vmiJGFmYoxE1Geb0BRWqZDB3w5ed0W8 3K6X77mLB8qM3zhGOJ6zoeQNdmub3MGPUo8RDs7SCZ67HyHqByi+DbFpm+TBadXUZs2x lto1+xs3ykdf9R/RRbxS6vQTf6g7CrJp2STso6gq+31Tb7Sn2oJf55raOvYAoZnpM6hK FSjThDZx+3Nuu0vhBDL9cdQIkEgVMKK/jAuOcc6+PGPxMgez+SrBEPpBPwqOh3doX4UN 6ABH9m9rSQx/yJnnb3Dv+TayU7VHREvBrWdQZ1en1dL18VC1nlhhoMtIKZLfVOOj6oee 6gUQ== X-Forwarded-Encrypted: i=1; AJvYcCWGQtW5ePv3PN3X7MD8s2kv+PB9/p2kiKkQFI1W/63V8G8mEiAVFYfXD0l6te/CaI56PJG2RvPdzr6hY9UrxryjaXVb2aydcJc1uX8= X-Gm-Message-State: AOJu0YyC+o/0PJ5Sv1If0G0IObt7eb+6Z06C9emZqEseN38QRiIqQBRp TG0IBchkqOQwT6evkMoQwCVbIGNkG0z2j8jvIPthZMUrQ4QbBHp7ZHKoADVHUTG0YSEv5M8bRtz AX6RnNMR3idRwjDqmLc/XKKeuGhek6CmYSGoQ0w== X-Google-Smtp-Source: AGHT+IGYARZBQp+Sdj6ZOLXG5q5fIrfvnssdZkPdgmQyi71+RQbaZklybelZxBSBPEgScXgfqfgitzddW/qZFkl6ifw= X-Received: by 2002:aa7:d7d1:0:b0:560:64e2:98a5 with SMTP id e17-20020aa7d7d1000000b0056064e298a5mr276205eds.21.1707963844349; Wed, 14 Feb 2024 18:24:04 -0800 (PST) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 References: In-Reply-To: From: Warner Losh Date: Wed, 14 Feb 2024 19:23:52 -0700 Message-ID: Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. To: Mario Marietto Cc: freebsd-arm , freebsd-hackers , FreeBSD Mailing List , FreeBSD Current Content-Type: multipart/alternative; boundary="0000000000003b6397061162521f" X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US] X-Rspamd-Queue-Id: 4TZzQb1NkNz4mWm X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated --0000000000003b6397061162521f Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable You may need to grab the repo. You may have to back up to December's ports tree... Warner On Wed, Feb 14, 2024, 5:51=E2=80=AFPM Mario Marietto wrote: > Hello. > > After a lot of work I've been able to install FreeBSD 12.04 for armv7 on > my ARM Chromebook. Now I would like to install some ports. This is what > happens when I try to get a fresh ports tree : > > marietto@freebsd:/usr # sudo portsnap fetch extract > > ..... > /usr/ports/databases/py-sqlalchemy10/ > /usr/ports/databases/py-sqlalchemy11/ > /usr/ports/databases/py-sqlalchemy12/ > /usr/ports/databases/py-sqlalchemy13/ > /usr/ports/databases/py-sqlalchemy14/ > /usr/ports/databases/py-sqlalchemy20/ > /usr/ports/databases/py-sqlcipher3/ > files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz= not found -- snapshot corrupt. > > > I repeated the "portsnap fetch extract" command,but I always get the same > error. > > -- > Mario. > --0000000000003b6397061162521f Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
You may need to grab the repo. You may have to back up to= December's ports tree...=C2=A0

Warner=C2=A0

On Wed, Feb 14, 2024, 5:51=E2=80=AFPM Mario Mariett= o <marietto2008@gmail.com&= gt; wrote:
Hello.<= br>
After a lot of work I've been able to install FreeBSD 12.04 for armv7 o= n my ARM Chromebook. Now I would like to install some ports. This is what happens when I try to get a fresh ports tree :

=09 =09
marietto@freebsd:/usr # sudo portsnap fetch extrac=
t
..... /usr/ports/databases/py-sqlalchemy10/ /usr/ports/databases/py-sqlalchemy11/ /usr/ports/databases/py-sqlalchemy12/ /usr/ports/databases/py-sqlalchemy13/ /usr/ports/databases/py-sqlalchemy14/ /usr/ports/databases/py-sqlalchemy20/ /usr/ports/databases/py-sqlcipher3/ files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz n= ot found -- snapshot corrupt.

I repeated the "portsnap fetch extract" command,but I always get = the same error.

--
Mario.
--0000000000003b6397061162521f-- From nobody Thu Feb 15 03:15:43 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Tb0ZS4g9cz59r28 for ; Thu, 15 Feb 2024 03:16:00 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic309-22.consmr.mail.gq1.yahoo.com (sonic309-22.consmr.mail.gq1.yahoo.com [98.137.65.148]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Tb0ZR4N2Pz4vpl for ; Thu, 15 Feb 2024 03:15:59 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707966956; bh=dnrTAgWr5MF+1i28AxpapS8xiHiCfQqEb/oNihHf1I0=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=CJiDYcVJbGaYGFV7FOwYmRBDj6bvyfSN2Sv8om0ZQapf6JYzVIq/gyKesVwnPCUHv/5LXpfNxcBU3Nm/mfp3gvTb3RzD2aXH9gF7oRJhSvFHu06LdfJgN/rm5NkKqCMCwz7IW1WmmoxNpmOSDce3ykCa4jzypSUUtoTqQ6ZiBOmRC/4AP+ar3w/Yk1oDPOyueO5RulAc/fX5PUgMToN/4xllpzx6jY/tR9ICWqtB4RGCRz2I778XEqUEOR7TQUEC5lHWv7uk6qBlh7FoT27DFFvGOKN4SCvpYUqgVhDdiTTEzFOO3qDKXwfEqIrD24DJAmchR3FIUe7FXHq4GZfE7Q== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707966956; bh=mVFwqiIzo8xoApvcdYqXQ9Wg+zQjvg9FrAwkNKDGp0f=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=U9PXdlS5D+nrWOVzsfmACUvB674bVNWhB95tkBwHlf/Qy94ypwvxBD+3X5zBXWr8rHM8vW2HEihsxuQ12NWDnpt/3htDkHJ+aC8BJSQRRGfNFMnDabs5y37Y3rtpLszkYxJF4YdyofK2hbyf8SrgAH2Nu2zFkwJsZMkz7Is9sHJ5S831Lc+E6M4G7gfKKOToxkSj2g9dG+hriY94rXnzSFiwjj6tm7O3PqV/y5Xr9RtY77npgyYqDTfhlEP+lOcg0UOmXSrQC045uLX3Ja8N6viPk6mEPb/GtVsoP4pRuh+3K3t6zwZlY0YfPHnrzPqtFL6nFRAKFxSSAlL58fDItA== X-YMail-OSG: VjSLtBwVM1nbvJ_nXWby1UTb08K36h2wdBD1L0e8ovsIF6SZozu6nzwlT0ow0J8 t0jP9KjqffAy5n0N3.TX1fdWGDwvAt2vwAXSFqSPGMl1QuN2LTJ0sjoF7IdtBWHC0Hl8Y699k5yp BvuZWmTtXMcxauWlM7HJ2dH0FSLe2oUO4vtE3g6VoMlIdPcmsOy72SIz8JqQjd6cadML3IpKihlO f5yGi6OY7ew19PUVjmIK8wKENMaviZKoln3YXkcGJr.s9EZJo2wSLO4G8JKYSJj70nLv3w8R2OJ9 erlUQ49ZtYTWh2uJg6gdbeMB.59bwa.xxmO7HgsbRJBoL62oIq5fO1L6032m6j_aP9bhPka9TYck NqI3B.gAXvfMHqYZz_5OvGvRb0CAnCkHzFaeJU0WzxF3raix5n16ro2fdgjTDK7aEEyzg2yO4Yg3 Snv2nl8PVGGdMXlPN7sR4zcNDCIL35UW8repwRLyrB0xZqCIjz4tu_Zmh6aRhuaHGOWpGaLyfBOh 1yT2E73GaztBtXppRulLo_96KkDNp6qyw3NPludr5nle.4W8k2Ptyif6JLxRc7SS.07kBqsqWAXk 7t4CMro_Qnn4tTNjEmEiGLB7FfY9U9t2qMCO7ijmEdelLOO3.nlq33VH2aah1DBc2AqDn7n_8FK7 TLx6qtSdAq4xWl.p0xSNH.n4fCNI.KKfS6fTUDpHpVTV6d85fH7h_V1UPLIgl.NjQv8czfNF0HFF BcCiUv_1l6fqWji1mUd28XDZkNL8MFeXWGy3tqEASays4DYm4Utwlfean7P23SzYwV_NWNK4gcix wHbxJdqE82gsn75mrWiCJvT29Ybrheb8Zmd_FBdGkEe.XMBr2IxI0E8tl2981VYZ1dai3ZgioqDo iQHaU649AQvB1i_.XJztzbjZz2oxDdsePN4Wegit41Um4EWI.1ztJkHuiPEj558u9qyo_WpZOr9i ZB2T0hkjN37Hl_BRr3W_YSol.h6L3DUB1wyVAIuoaFPueWr0a3wB5yN6kBn9KHsDoE_Wt1UxkPIz W6ySDbfqu2b5FjtjRrhrcPMWlf44xH6hyjCeItMh324.x1di1zXekzLL.RqZQa9z5Uk2CDR6340X HrQtb5CfqzDS88tgFJ0.kmtzMbJZ.uGtZiEzwWI0l7lnrOrVEFLurPgWGEBmoDVwBsIJr2qnUGjw xMCews6_1Keuw0Kru1WAruZEi3PR2Sb9nu5FDwXYj_lAjs6lYw95HfwZR2z09rN3uNFwLn0KqDBc c__XuvUdw_TZyItMkgoEcwu_j8xN.hKexUG9KHHb3k72UQm2VrTmY4knXNxxXeUlLutAPpOYSBBo 1.jOCrWiWT.knvjgI7novtHfykOLP70XLtHHjJuWm8X3woV.DbdRRdx5.FjeEi6tPbxcn8cEQhaN .rXVYJs8KeCZeCqc2e0WmonPY6apT3xqDAG0CJRzoGR6sMdOndz7HCnbDuLFrcbUh.fTtlPFYKSN knYh.ex_tNYybVm8OVG8pQQUARaL5AqXcYcCdwrn3ge80BeBFYPVIf7ldhSN_4conRyF39ddrCxX j7IpOQNTpzJXf2Au0grOvEPcIqjEcNx8QO9Rpj1pGcx9Zkb7BaXwq8g5LX5skvUfnFMEqMHAy4X1 rzWyUEcfTu3VyFPmGQaKxjFoX6cog0DU5gpPHdx9cX7L9Yw.GHV_4a.NPYuOTIssGrE2_MUCduA_ uCyBApLGWZ4txBVHH3fqr1FhCpu8Hx_9Iw9YmUAkl2bXoVaPQIxd5Jp9HaOt9Zk3lr4ZaPqhr_E0 graUE7VxG6TEY0ruKSI7g0nmWlAmAQSwL0c9eCaInyqpwio_.2Fv0Oaj6l_hUE0NAPW.SvEWpNHo uVJleCKZ2yAvmWs1XnHFMwC1Nqv7dQmDDB5T09JCH2vWs27ut1C1WKitSxJVOZ8rdmojz9KiIoTP CYbAv5_7z0t1x3ud1MutAl8elasjlyy5WF3T1JCu3Mad_1QNbVw2oXYTvKD6CbZZVGf2LKPhfCzq TvaX3GdWbmFMhETQmUOqyqOIeyqRmfuZZc87X.uJFIaMpolFe92hJ4FkNOkM91ytXD3RMlXzZ5_J KAgZZ6_GRTGNIxGMlJVANvHK5916RAiIakVAu5yGgj53vEyg_Q4wfFXt5.wdAu030MidXEti68nY mdDwyfNZOkqdfkZmaOwNMZhB80TqCESdRvV8J9VonkTKhZgfSNgNnXEHaHW_bNRzXzyxhp37poA1 AHLGZktzNky7OHxuKB0BDRztzo6CjuANQq08cOqZPEgxlhtJqr3AyH_xa3Cbw0xYUH23juKTpotH BVFPFdYBMyf20GdqA X-Sonic-MF: X-Sonic-ID: 2a795778-1bf0-4b24-8f5f-69fe7fb48c3a Received: from sonic.gate.mail.ne1.yahoo.com by sonic309.consmr.mail.gq1.yahoo.com with HTTP; Thu, 15 Feb 2024 03:15:56 +0000 Received: by hermes--production-gq1-5c57879fdf-8lthq (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID 21fc683c801ff0629383b7f8c993d52c; Thu, 15 Feb 2024 03:15:54 +0000 (UTC) Content-Type: text/plain; charset=utf-8 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\)) Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. From: Mark Millard In-Reply-To: Date: Wed, 14 Feb 2024 19:15:43 -0800 Cc: Mario Marietto , freebsd-arm , freebsd-hackers , FreeBSD Current Content-Transfer-Encoding: quoted-printable Message-Id: <7AA6A6B8-9BAE-4B03-9EF4-4A4D242582B4@yahoo.com> References: To: Warner Losh X-Mailer: Apple Mail (2.3774.400.31) X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US] X-Rspamd-Queue-Id: 4Tb0ZR4N2Pz4vpl X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated On Feb 14, 2024, at 18:23, Warner Losh wrote: > You may need to grab the repo. You may have to back up to December's = ports tree...=20 My understanding was that portsnap was staying installed on 13.*-RELEASE until the last version is EOL and that portsnap servers would be kept operational with valid content until then. I would have guessed that this would mean that 12.4-RELEASE or the like would also be able to use the portsnap it contains over that same time frame. Am I wrong? As stands, git use on 12.4-RELEASE would require bootstrapping git somehow, possibly via portsnap, building git, and then installing git (and the other stuff required). (Not that I use portsnap.) > Warner=20 >=20 > On Wed, Feb 14, 2024, 5:51=E2=80=AFPM Mario Marietto = wrote: > Hello. >=20 > After a lot of work I've been able to install FreeBSD 12.04 for armv7 = on my ARM Chromebook. Now I would like to install some ports. This is = what happens when I try to get a fresh ports tree : >=20 > marietto@freebsd:/usr # sudo portsnap fetch extract >=20 > .... > /usr/ports/databases/py-sqlalchemy10/ > /usr/ports/databases/py-sqlalchemy11/ > /usr/ports/databases/py-sqlalchemy12/ > /usr/ports/databases/py-sqlalchemy13/ > /usr/ports/databases/py-sqlalchemy14/ > /usr/ports/databases/py-sqlalchemy20/ > /usr/ports/databases/py-sqlcipher3/ > = files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz = not found -- snapshot corrupt. >=20 > I repeated the "portsnap fetch extract" command,but I always get the = same error. >=20 =3D=3D=3D Mark Millard marklmi at yahoo.com From nobody Thu Feb 15 07:45:03 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Tb6Y86pJWz50vJY for ; Thu, 15 Feb 2024 07:45:16 +0000 (UTC) (envelope-from theraven@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Tb6Y86HpWz4VJ0; Thu, 15 Feb 2024 07:45:16 +0000 (UTC) (envelope-from theraven@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707983116; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=YRgv7PrRNT2+JWKxcaO2ndWWojyJyy5hTc7pufFZPbQ=; b=FFglxqwRSF51NZezP3vLW9oQssi6wXZwiM5FJjomPBH+zKDRBPZzlEBPmYJC0//E2Hj8td l4z4eZZVT5p/qk1iGZf/vPjk50T1zLpx3MKHenVW6AcQuxJyBWzpVt6Fs8r72tmvaZa/+j ss7Y6tzNO9/o2BIbJEs45rKIeFyIUsbvdMmEVCS0QWZHPxST9Na0ZC92cZ/Jj0z0/3O0Dy 20vQ5WWSJqGSIReosTnlqFime36CGP3vx9sM/in7ujgxl9GcwhKrhziuKSmpiLFy0YbsuT iWNg/6VsiW64U4e720V6zJK/k3MfzuEYLyGpfzA/cvYwCQhWy4uqmwHrke9aog== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707983116; a=rsa-sha256; cv=none; b=f0WtQTUysFqCRnV++126E6huDPxIIHIRPp0jjy9ZvVAf+awPmcvh+lqaqmNkP+q0wW585x qGl95q3QStx9McoR0agnnwHSo2Vjr2t36MMUGYRcKOF6EfDjEdwi15NoHA1Go1vjjE8XrM +aP74VojQ7LULu8PCzy13f4iu2NfeoDYjIU0jSO56d7cxXCxLq7Pj48WTwb0MwD15WaG90 yrnmB/dEdMFkVwMN6gs15EjRSjK5CinFIvmkp/MoMC2xjxkS5hOjNK/BEkyo6CeGL8Xxzi QoHuPbHPyjtRIaxH7M+fTnwhI2p0Vo2WsxPrGHtjdNJyF2+11vf+Dw+YgEoYxw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707983116; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=YRgv7PrRNT2+JWKxcaO2ndWWojyJyy5hTc7pufFZPbQ=; b=IPxH3bmS6Lu//qVQ3Ohbj2OyvLuvM4FpwH8YPv5lVzTbLCke0BHSMgvaoFX/UQ6VuhDdQh fc4RdlI7VUCTU/sCjhqSRlhFuO4jBJkW10od7rFI3unki9SE6UTKhUcgxRM/GrnoiNqukU fftX8Ia4HMNqSogHIP83mmelM3D/asHHN6T5iw1feROl8JPHOoQ/UcObdm0rBiJlWBK6Mu q0gsu7wTiBAHTPX6sQTvuh0rJUJEnXhiJaw0muZI+smo/P/30tXTZv6k76RUUtvJrPMJw2 nfNSZhwIRAAV9NtA4BhtSWjgm1tzubOVYiI9fZa+ROamuzMOih913IKE10X0TQ== Received: from smtp.theravensnest.org (smtp.theravensnest.org [45.77.103.195]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: theraven) by smtp.freebsd.org (Postfix) with ESMTPSA id 4Tb6Y859sqzyWb; Thu, 15 Feb 2024 07:45:16 +0000 (UTC) (envelope-from theraven@freebsd.org) Received: from smtpclient.apple (host86-131-178-116.range86-131.btcentralplus.com [86.131.178.116]) by smtp.theravensnest.org (Postfix) with ESMTPSA id A8D7310830; Thu, 15 Feb 2024 07:45:15 +0000 (GMT) Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable From: David Chisnall List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (1.0) Subject: Re: rcorder question Date: Thu, 15 Feb 2024 07:45:03 +0000 Message-Id: References: <31532F87-C719-4DE8-B9E4-D32FC50DF216@FreeBSD.org> Cc: Milan Obuch , freebsd-hackers@freebsd.org In-Reply-To: <31532F87-C719-4DE8-B9E4-D32FC50DF216@FreeBSD.org> To: Juraj Lutter X-Mailer: iPad Mail (21C62) On 14 Feb 2024, at 22:03, Juraj Lutter wrote: >=20 > I would consider wrapping by /usr/sbin/daemon instead of putting it into b= ackground this way. In particular, that makes it trivial to write the stop command. This may be o= verkill, but I find it=E2=80=99s actually *more* useful when debugging my ow= n things than for production services. David From nobody Thu Feb 15 09:49:26 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Tb9Jj2h7Yz51lC2; Thu, 15 Feb 2024 09:49:41 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from www121.sakura.ne.jp (www121.sakura.ne.jp [153.125.133.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Tb9Jh4kVMz4jG4; Thu, 15 Feb 2024 09:49:40 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Authentication-Results: mx1.freebsd.org; none Received: from kalamity.joker.local (123-1-91-49.area1b.commufa.jp [123.1.91.49]) (authenticated bits=0) by www121.sakura.ne.jp (8.17.1/8.17.1/[SAKURA-WEB]/20201212) with ESMTPA id 41F9nQuG024416; Thu, 15 Feb 2024 18:49:26 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Thu, 15 Feb 2024 18:49:26 +0900 From: Tomoaki AOKI To: Mark Millard Cc: Warner Losh , Mario Marietto , freebsd-hackers , freebsd-ports@freebsd.org Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. Message-Id: <20240215184926.42aafbbdd5644be492f600fc@dec.sakura.ne.jp> In-Reply-To: <7AA6A6B8-9BAE-4B03-9EF4-4A4D242582B4@yahoo.com> References: <7AA6A6B8-9BAE-4B03-9EF4-4A4D242582B4@yahoo.com> Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; amd64-portbld-freebsd14.0) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:7684, ipnet:153.125.128.0/18, country:JP] X-Rspamd-Queue-Id: 4Tb9Jh4kVMz4jG4 X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated Hi. Dropping freebsd-current ML as this doesn't related current (main) but deprecated release (12.4). Dropping freebsd-arm ML as I'm not subscribed and surely be bounced, and the problem is ports specific. Adding freebsd-ports ML as this is ports related. Commented inline below. On Wed, 14 Feb 2024 19:15:43 -0800 Mark Millard wrote: > On Feb 14, 2024, at 18:23, Warner Losh wrote: > > > You may need to grab the repo. You may have to back up to December's ports tree... > > My understanding was that portsnap was staying installed > on 13.*-RELEASE until the last version is EOL and that > portsnap servers would be kept operational with valid > content until then. > > I would have guessed that this would mean that 12.4-RELEASE > or the like would also be able to use the portsnap it > contains over that same time frame. > > Am I wrong? > > As stands, git use on 12.4-RELEASE would require bootstrapping > git somehow, possibly via portsnap, building git, and then > installing git (and the other stuff required). > > (Not that I use portsnap.) Me too don't use portsnap, but if you want to switch to git, maybe installing git from pkg (as 12.x is already EoL'ed, extract git.pkg from disc1.iso for armv7, install it) and clone repo into clean /usr/ports would be better not to poisoning by different metadata. And check out the ports tree of which just befere 12.4 was obsoleted. After that, ports tree starts dropping support for 12.x. Additional note: I myseld don't even tried, but for portsnap users who needs (forced) to switch to git, net/gitup could be your friend. IIUC, it would be something like csup for cvs or svnup for subversion. > > Warner > > > > On Wed, Feb 14, 2024, 5:51β€―PM Mario Marietto wrote: > > Hello. > > > > After a lot of work I've been able to install FreeBSD 12.04 for armv7 on my ARM Chromebook. Now I would like to install some ports. This is what happens when I try to get a fresh ports tree : > > > > marietto@freebsd:/usr # sudo portsnap fetch extract > > > > .... > > /usr/ports/databases/py-sqlalchemy10/ > > /usr/ports/databases/py-sqlalchemy11/ > > /usr/ports/databases/py-sqlalchemy12/ > > /usr/ports/databases/py-sqlalchemy13/ > > /usr/ports/databases/py-sqlalchemy14/ > > /usr/ports/databases/py-sqlalchemy20/ > > /usr/ports/databases/py-sqlcipher3/ > > files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. > > > > I repeated the "portsnap fetch extract" command,but I always get the same error. > > > > > === > Mark Millard > marklmi at yahoo.com -- Tomoaki AOKI From nobody Thu Feb 15 17:22:08 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbMM7328Fz59gCH for ; Thu, 15 Feb 2024 17:22:27 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic313-20.consmr.mail.gq1.yahoo.com (sonic313-20.consmr.mail.gq1.yahoo.com [98.137.65.83]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbMM70cmWz4c6T for ; Thu, 15 Feb 2024 17:22:27 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1708017745; bh=f0E+dPZxJ4LIbhK31O5/EdDPUVJaMM/ojMPjqBmJvO4=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=Z/KzCjfzYLwY11gBOOt3FDt+4XKV3sxTsFeUejIGefx4Z2wBO741BChSMI8EkuhYzKisyFh6172N4+eh9nhETmjKyd5TpDkcRHAkRg9bKU8Lcki8lUVO3ENc6rhW9UCpWOGtqML7nYafL/JqGQzI9FrMqhIJBZGvkbjy1Cn73a8NIByDP5boOFBcALK8qp/CJtXAUHlIu5I6pgcGPWCoXoU9GmlG/iIEXzy4VrfCl5DnnbafLpDGHRq6F0OmqpwV3zSzLKqj2nB3YYyjs7PsEzCIM9Zr+++yBG6qQiYQN1GfwbKCdHkOe8iFQ2rrTiClpKBI5L9yW5QdEtLc8xljkw== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1708017745; bh=n2WR3q44EJ6Xmr7c+zjJsESbU1LY8XmNocB4fHvvR4Z=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=p2ORPR+fRuHNdr1c1lVry14ltrsxBhv1IuQqveN5nbLXqmXcF27sY4WZkbP0ZdEscxdGh3zqa7Kk8E3w5otXbGhl8vhXxPoaEJXIAq0IaSx+nrrSm2a8aDIX8VxCgTfmPGHVqnP5ORvx8yx6VPEe6fZQPdSJKxny2Hbh0RQTl2M2L19uomk24YGtsghVyICPOm7O75kAmSPCJtEWHPMbghOGFh8znwOyFsWM5G4svkVupfFdsP4oOnchzSMGTcFMXmt88KiTNgy/SGOwesr0BaU3YB+HPQqOeFF0OoebK3e6KeEK4q7HlLcNWZcn7UtFsiAm4ervDnY4ppFDc819sg== X-YMail-OSG: _oiPWeMVM1nBqpKcl_hWGY556N3.xas6.PFaRHcp0BkDdyv.MsRAHg.7Q3XFq8E 1q8Uw9p84ALLI.Zf78BJaAyLJCoSQ.kTWRf7BRJOGvHqX6JRi43hl7PUH3w34fEATGI9f6DEwDb9 RR_cwPGT7YAqGGYaojjsV6ERLf2MqzUbLUY0yGlOaTXcYGsPUoCh6GQOOQx7D9jezyzf4yvc32Yn tI5t3K_f.C6gQDTWe9fn240WiR45djOjokR.F8p1HKS_YPTIxYTQjjOcT3C6V2FH412eICxs6ZeV P10ntaQsMqjHVqoRNW4Bzvq13h6lKVitxcu3VzX5HMED59PND7zUArXslRAPthwcpzjG0hdYdXWO o8ufKVWsq7iQm5aCpQYBn_RYLDk.AinZ4ekAs_S.8qjd5Mj2yJx25emZeOVoQOyjdC1L01bCs8WY wEdp2MCwrOppCkA76YInxulN4VX.70PZSYdj2Qr0mXTC6Hjbu19AXBYWq6lbrMZizaJ5HxfnfX22 1yW7jz2an2zHrI7Ye1bOemYYSdu_rGDOXfYlsFSkfj3bIi96DirzDLJgEyTWdRL1DoyWCrGhauvQ PqrTTbXYkxHjlhYoEnXvjW9uFgRMZQ.SOqHLgGTo77M53VtTVLfQUCfImK5aUpAN.BnDKUp2oL8c odPe1An_DHr6bapUyo3rhuhPXct.ZO5fkQbIQSh9IoYoaA63qPH0gN0qZVL3k69ubknzbgTo8JXa IECB2aLVxXmqX1e_lvYXX9bz7LzRKxpBXZhq3HqzWeVwV32SE8KVx1M30fzGtYPmGuNiILmSp8_Y AJ9L_tGW8xwJfA5xWz44snRqcyt4j43VhfJvvU63do6KIG_0rur5cyfoJ3ELL_f5mcIkY8XjCktd P3smCS9uyWFpu0pVqQMbz0KgHnRqzwBDaKf8rz7GpQmm8AbwmiRjmlOUgl23yonDrjPwTxlISdaU dUkDXdNTLp7omMasyA9q_j95xbEAuEG6fu_uhb1wmm42I5iIrFv_b.GdZUsgB3oBhcZD5FR5qsZ4 Jh._dbmSI0sft2wt_aUWxNki5L0q11ET4fqApbh28ctuJgMlRa9KY84su_HO8681e2WdyantiQaE UCzFzYRWMvObTQ5ncO2zSY4a9eYCUmEwR69LZiY4Kyf_P7s9NL9gnWUOp8uk_bTpW9zkwQbT11ak Wxn_ejc2KgX_jnkLdz6f0PXRJ6tqCuQ70YzVZQ01r4vCWSt0ixhoHrjBl9XbOqD9pJDo_70OSOKt K5EKGj_na_WMEwWJ2UG8BhQce2dMA5GevTZl8lAIv5eGe5t.xiaTEak9ds1LUlCQUCJ.pnVPVDCD bvCKaocHyXlc1eTTXALVQUm8L_3QDk.9fJC0BeqFIF_nrv7EbrqOVGsSThNms.j_rUNA2T1WKl.D zDZoyfacOyzfdEZm3cUvjXf16HfuuVi.XxRbk.Zm50USif2Uvpy0hJDc4sj5BYZzmuh_kNxC49_N VlAaQ2bJ9SlIgXAbeNQ1wS1_6FdBzj.k1heH_02hJQwYGCRycpVvxyThcYYSgaIFugBlq_TYPltV NpkNYSy2Xq3_npTvH_BWyfz_tidxy5iqbZwy9Y4tEzdKzowj4qbE0C4bKxJWLdzER90tVydo541G pM0DifnPO9mWScp1f4Z5vOQ23_iXb3dJodCHKVkWrhyq_mTgGw8d7kk55d.xrRoMQN3iSjandx1u IbylKtUru8dDjGg8KPHB8MJtY7tvYM4LcfuQM3H8h0eGfniewZioLGtZ_G9cGWLuUUApzDSAcrIe 7iDT4VBkl83IxMrEFgBOK8wj882UKQhKvShoUyrBNzNRZ6em5kRk4QVFCGQDpY74jKtm91bG1kAt 0l_IETnUNEUS70VOomyrxH52Otul7e6lvnPCJNKMIhAFf.PiGlu8ZussHmvGVQf0J7zDdwjuuMYm 5jJJ0I0OmeFDF46OWCzUsz4uCiSKuInhMQ5hhxjN.jimbvR5cbltjzWpgPumA4o0KVmPqH5ax1gG 8r24Alrk7ZQrJeEy6phrqBBC.Q.YgCAo__G2pXsImbn5ssit2OXxRHUQk8kunAsMZffZnqffHife 2Xc3QTG.XBoDj9Mbn2UZF_vbsDWF1SMMEZXQPyGsV2Ob0Xie3Gw3WaJOcu8EhVIPI097txMLqVkb 5MHmIXhDHi87M2ofkrZZefnUglwSFGqS_ACICxnhx5J3HWEaFge2rVAHvbsdZaQrh3_sggUDIpJX .qTNFeiHRVaFDzWSbXld6RsYfSfXSyLKmS2vjFy.DnAhnarE4raElsgfz3Nmiq9Q475WU8H3Cl8. kEOXsQEl.HUCaFwTH X-Sonic-MF: X-Sonic-ID: 4c3facdc-6c81-4640-839f-6bc4acd27a90 Received: from sonic.gate.mail.ne1.yahoo.com by sonic313.consmr.mail.gq1.yahoo.com with HTTP; Thu, 15 Feb 2024 17:22:25 +0000 Received: by hermes--production-gq1-5c57879fdf-8lthq (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID fe6d5165863d77c61e70e858661fed68; Thu, 15 Feb 2024 17:22:19 +0000 (UTC) Content-Type: text/plain; charset=utf-8 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\)) Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. From: Mark Millard In-Reply-To: <20240215184926.42aafbbdd5644be492f600fc@dec.sakura.ne.jp> Date: Thu, 15 Feb 2024 09:22:08 -0800 Cc: Mario Marietto , freebsd-hackers , FreeBSD Mailing List Content-Transfer-Encoding: quoted-printable Message-Id: References: <7AA6A6B8-9BAE-4B03-9EF4-4A4D242582B4@yahoo.com> <20240215184926.42aafbbdd5644be492f600fc@dec.sakura.ne.jp> To: Tomoaki AOKI X-Mailer: Apple Mail (2.3774.400.31) X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US] X-Rspamd-Queue-Id: 4TbMM70cmWz4c6T X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated On Feb 15, 2024, at 01:49, Tomoaki AOKI = wrote: > Dropping freebsd-current ML as this doesn't related current (main) but > deprecated release (12.4). > Dropping freebsd-arm ML as I'm not subscribed and surely be bounced, > and the problem is ports specific. > Adding freebsd-ports ML as this is ports related. >=20 > Commented inline below. >=20 > On Wed, 14 Feb 2024 19:15:43 -0800 > Mark Millard wrote: >=20 >> On Feb 14, 2024, at 18:23, Warner Losh wrote: >>=20 >>> You may need to grab the repo. You may have to back up to December's = ports tree... >>=20 >> My understanding was that portsnap was staying installed >> on 13.*-RELEASE until the last version is EOL and that >> portsnap servers would be kept operational with valid >> content until then. >>=20 >> I would have guessed that this would mean that 12.4-RELEASE >> or the like would also be able to use the portsnap it >> contains over that same time frame. >>=20 >> Am I wrong? >>=20 >> As stands, git use on 12.4-RELEASE would require bootstrapping >> git somehow, possibly via portsnap, building git, and then >> installing git (and the other stuff required). >>=20 >> (Not that I use portsnap.) >=20 > Me too don't use portsnap, but if you want to switch to git, maybe > installing git from pkg (as 12.x is already EoL'ed, extract git.pkg > from disc1.iso for armv7, install it) There is/was no armv7 disc1.iso (or dvd1.iso) to do this with. = http://ftp-archive.freebsd.org/pub/FreeBSD-Archive/old-releases/ISO-IMAGES= /12.4/ has only the following for 12.4-RELEASE for armv7: FreeBSD-12.4-RELEASE-arm-armv7-BANANAPI.img.xz FreeBSD-12.4-RELEASE-arm-armv7-CUBIEBOARD.img.xz FreeBSD-12.4-RELEASE-arm-armv7-CUBIEBOARD2.img.xz FreeBSD-12.4-RELEASE-arm-armv7-CUBOX-HUMMINGBOARD.img.xz FreeBSD-12.4-RELEASE-arm-armv7-GENERICSD.img.xz FreeBSD-12.4-RELEASE-arm-armv7-RPI2.img.xz FreeBSD-12.4-RELEASE-arm-armv7-WANDBOARD.img.xz No dvd1/disc1/memstick material was ever produced for armv7 12.4-RELEASE (or for any other armv7 release as far as I know). None of the above *.img.xz files includes any installed port-packages, nor a populated /usr/ports/ tree. But the /usr/ports/ tree could be extracted from a *.iso or *.img that is not for the armv7 but happens to contain a /usr/ports/ : /usr/ports/ is not platform specific in its content. (Avoid powerpc* because of big endian file system issues?) > and clone repo into > clean /usr/ports would be better not to poisoning by different = metadata. > And check out the ports tree of which just befere 12.4 was obsoleted. > After that, ports tree starts dropping support for 12.x. >=20 > Additional note: > I myseld don't even tried, but for portsnap users who needs (forced) > to switch to git, net/gitup could be your friend. > IIUC, it would be something like csup for cvs or svnup for subversion. >=20 >=20 >>> Warner=20 >>>=20 >>> On Wed, Feb 14, 2024, 5:51=E2=80=AFPM Mario Marietto = wrote: >>> Hello. >>>=20 >>> After a lot of work I've been able to install FreeBSD 12.04 for = armv7 on my ARM Chromebook. Now I would like to install some ports. This = is what happens when I try to get a fresh ports tree : >>>=20 >>> marietto@freebsd:/usr # sudo portsnap fetch extract >>>=20 >>> .... >>> /usr/ports/databases/py-sqlalchemy10/ >>> /usr/ports/databases/py-sqlalchemy11/ >>> /usr/ports/databases/py-sqlalchemy12/ >>> /usr/ports/databases/py-sqlalchemy13/ >>> /usr/ports/databases/py-sqlalchemy14/ >>> /usr/ports/databases/py-sqlalchemy20/ >>> /usr/ports/databases/py-sqlcipher3/ >>> = files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz = not found -- snapshot corrupt. >>>=20 >>> I repeated the "portsnap fetch extract" command,but I always get the = same error. >>>=20 >=20 =3D=3D=3D Mark Millard marklmi at yahoo.com From nobody Thu Feb 15 17:34:23 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbMcw3fLZz59hmf; Thu, 15 Feb 2024 17:34:24 +0000 (UTC) (envelope-from jamie@catflap.org) Received: from donotpassgo.dyslexicfish.net (donotpassgo.dyslexicfish.net [IPv6:2001:19f0:7400:8808:123::1]) by mx1.freebsd.org (Postfix) with ESMTP id 4TbMcw2Nk9z4ffB; Thu, 15 Feb 2024 17:34:24 +0000 (UTC) (envelope-from jamie@catflap.org) Authentication-Results: mx1.freebsd.org; none X-Catflap-Envelope-From: X-Catflap-Envelope-To: freebsd-arm@FreeBSD.org Received: from donotpassgo.dyslexicfish.net (donotpassgo.dyslexicfish.net [209.250.224.51]) by donotpassgo.dyslexicfish.net (8.14.5/8.14.5) with ESMTP id 41FHYNf1061906; Thu, 15 Feb 2024 17:34:23 GMT (envelope-from jamie@donotpassgo.dyslexicfish.net) Received: (from jamie@localhost) by donotpassgo.dyslexicfish.net (8.14.5/8.14.5/Submit) id 41FHYNBj061905; Thu, 15 Feb 2024 17:34:23 GMT (envelope-from jamie) From: Jamie Landeg-Jones Message-Id: <202402151734.41FHYNBj061905@donotpassgo.dyslexicfish.net> Date: Thu, 15 Feb 2024 17:34:23 +0000 Organization: Dyslexic Fish To: marietto2008@gmail.com, freebsd-questions@FreeBSD.org, freebsd-hackers@FreeBSD.org, freebsd-current@FreeBSD.org, freebsd-arm@FreeBSD.org Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. References: In-Reply-To: User-Agent: Heirloom mailx 12.4 7/29/08 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.7 (donotpassgo.dyslexicfish.net [209.250.224.51]); Thu, 15 Feb 2024 17:34:24 +0000 (GMT) X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:20473, ipnet:2001:19f0:7400::/38, country:US] X-Rspamd-Queue-Id: 4TbMcw2Nk9z4ffB X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated Mario Marietto wrote: > After a lot of work I've been able to install FreeBSD 12.04 for armv7 on my > ARM Chromebook. Now I would like to install some ports. This is what > happens when I try to get a fresh ports tree : > files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz > not found -- snapshot corrupt. I'm not sure why the file isn't there - maybe because 12.X is EOL or portsnap is deprecated? Still, the solution is easy: Download the ports tree snapshot as a tar from https://cgit.freebsd.org/ports/ Choose a tag, and a format. I suggest 12.4-eol so just fetch https://cgit.freebsd.org/ports/snapshot/ports-12-eol.tar.gz rm -r /usr/ports then untar the downloaded tar file into place. Cheers, Jamie From nobody Thu Feb 15 20:32:19 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbRb01B8Cz5B7nG; Thu, 15 Feb 2024 20:33:00 +0000 (UTC) (envelope-from marietto2008@gmail.com) Received: from mail-ej1-x62a.google.com (mail-ej1-x62a.google.com [IPv6:2a00:1450:4864:20::62a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbRZz6cZ2z4DBF; Thu, 15 Feb 2024 20:32:59 +0000 (UTC) (envelope-from marietto2008@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-ej1-x62a.google.com with SMTP id a640c23a62f3a-a3566c0309fso161739466b.1; Thu, 15 Feb 2024 12:32:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1708029177; x=1708633977; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=CXyYJ+TWAhbtOKbEVx789CYk4pg44FBrve9Yg2bz8Pk=; b=V4Qsg2GV+teoxrgx2+n4huie0ydGEWoFinW8fu1anG4TQBkSLWz0dk9u18z46lL60y 0QF8IAlUdvZxHfItYrbW19iEJxdx+zNog0jcDFqh70upZKSO8EdZWQ3w2Yv57QHnhzZM +mqiyABkYhAG8n6NBIN3eX13C+jMt0IMTQe9dYyJXn8SLaCSz9K5G+ly3Uqm7NhEz7et TGDaVd+x+wwRNiV3EOYvnjLE4F5jzI1Idez5Ti64y9m56ZjUfdWVssRvjsS1K4b4Ovj5 flghYQjrP7PycrxqYbEMzywksGXLKNTt/wOCAfneKpadA1s+VigA5aehlCUOHhLx9mRa cXfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708029177; x=1708633977; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=CXyYJ+TWAhbtOKbEVx789CYk4pg44FBrve9Yg2bz8Pk=; b=Doart7apug+F+3UOqXupzGHLs3RhCQb00XIBFTcvXX2AQhhluw9VRaiR6gnHodi9sC zuJt9CCVmJ4rtwKxcWXr/9yVdkwRHwMr1HgexvmFK9lBoKazNjZhkOfW5Gt8sEWYxqOT NP8z71M/IiOtX7XmB/vlF5xmhIFQ/M7QIvkdgeKNBHEvwtS0dGaYMUvqd5Ghn2hgP3jl IgaxfOrt8cGS/0doM8wcrQ+JEjQumRPMhvRNFR6fJkYc30WG9h9YHLJ6qJVVCdg3zz6c GLCbUwBMaaT2MQ5dI9F2+jJk9M+ve7f3I3ojIGBNdzJHuIy0wHAKdVPiPmgmPOIwsijA RqDQ== X-Forwarded-Encrypted: i=1; AJvYcCUVA64ABdWQonzx5cGfT5RGClVwqNQNErgXZ2hyNgTFgzofuzbGP6jlzPdqVXAR6ye7z8h5xP3dwJm4/mdUH2IHMZBKHGCg9FoRQezJPagfckXmKLBP/mM/GxnkVCP6qPlRyAdU3fhjfFKRWV3BoLEoTz6BfUj57OifepMNvaIGa6A= X-Gm-Message-State: AOJu0YygUOUAwG0QAegEZjIF3mQyga1la1oM8LTNjJs0BfPbdl5oKIUc RnW1kaE84lkk+32fXeqMIFZTeF3FfnJ5DtKNgO5c9kfTWkVRlQ9+byllyhoLSorAdYqtga0KEix xhmo64q6744WCQPKJtVYqTEcEJm1lTqsgSrNszQ== X-Google-Smtp-Source: AGHT+IFxVOyOt+MW5cGBcXU2R9bd4/Z1qVS6DdTgArAe5DkmUnC/cyShdLFkXesnlGmw+tdDJPAdrG6T+sEXfPvVJ80= X-Received: by 2002:a17:906:4c58:b0:a3d:3be6:2a7e with SMTP id d24-20020a1709064c5800b00a3d3be62a7emr2370672ejw.38.1708029176577; Thu, 15 Feb 2024 12:32:56 -0800 (PST) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 References: <202402151734.41FHYNBj061905@donotpassgo.dyslexicfish.net> In-Reply-To: <202402151734.41FHYNBj061905@donotpassgo.dyslexicfish.net> From: Mario Marietto Date: Thu, 15 Feb 2024 21:32:19 +0100 Message-ID: Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. To: Jamie Landeg-Jones Cc: freebsd-questions@freebsd.org, freebsd-hackers@freebsd.org, freebsd-current@freebsd.org, freebsd-arm@freebsd.org Content-Type: multipart/alternative; boundary="00000000000056059806117188fc" X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4TbRZz6cZ2z4DBF X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US] --00000000000056059806117188fc Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hello. What's the correct port tree for FreeBSD 12.04 for arm 32 bit ? A or B ? A) https://cgit.freebsd.org/ports/snapshot/ports-12.4-eol.tar.gz B) https://cgit.freebsd.org/ports/snapshot/ports-release/12.4.0.tar.gz thanks. On Thu, Feb 15, 2024 at 6:34=E2=80=AFPM Jamie Landeg-Jones wrote: > Mario Marietto wrote: > > > After a lot of work I've been able to install FreeBSD 12.04 for armv7 o= n > my > > ARM Chromebook. Now I would like to install some ports. This is what > > happens when I try to get a fresh ports tree : > > files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.= gz > > not found -- snapshot corrupt. > > I'm not sure why the file isn't there - maybe because 12.X is EOL or > portsnap > is deprecated? > > Still, the solution is easy: > > Download the ports tree snapshot as a tar from > https://cgit.freebsd.org/ports/ > > Choose a tag, and a format. I suggest 12.4-eol so just fetch > > https://cgit.freebsd.org/ports/snapshot/ports-12-eol.tar.gz > > rm -r /usr/ports > then untar the downloaded tar file into place. > > Cheers, Jamie > > --=20 Mario. --00000000000056059806117188fc Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hello.

What's the correc= t port tree for FreeBSD 12.04 for arm 32 bit ? A or B ?

= On Thu, Feb 15, 2024 at 6:34=E2=80=AFPM Jamie Landeg-Jones <jamie@catflap.org> wrote:
Mario Marietto <marietto2008@gmail.com>= ; wrote:

> After a lot of work I've been able to install FreeBSD 12.04 for ar= mv7 on my
> ARM Chromebook. Now I would like to install some ports. This is what > happens when I try to get a fresh ports tree :
> files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401= .gz
> not found -- snapshot corrupt.

I'm not sure why the file isn't there - maybe because 12.X is EOL o= r portsnap
is deprecated?

Still, the solution is easy:

Download the ports tree snapshot as a tar from https://cgit.freebsd.o= rg/ports/

Choose a tag, and a format. I suggest 12.4-eol so just fetch

https://cgit.freebsd.org/ports/snapshot/p= orts-12-eol.tar.gz

rm -r /usr/ports
then untar the downloaded tar file into place.

Cheers, Jamie



--
Mario.
--00000000000056059806117188fc-- From nobody Thu Feb 15 20:47:44 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbRwK6KGZz5B9fg for ; Thu, 15 Feb 2024 20:48:01 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic314-20.consmr.mail.gq1.yahoo.com (sonic314-20.consmr.mail.gq1.yahoo.com [98.137.69.83]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbRwK3qXkz4J1D for ; Thu, 15 Feb 2024 20:48:01 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1708030079; bh=4qKGG+MSXbrIiD5DPqZlxtgJLWticdhZifwIwYbpPD4=; h=Subject:From:In-Reply-To:Date:Cc:References:To:From:Subject:Reply-To; b=LNnhJr46HkiKy5NmESDobTdPKQp1OEeNs+KEzaBHljZDkqfXkQ8r3eLwuF83LWVQnCwHw/7AuOv2fpLQnKp8BMmoJ/UReUDYrfH3y0onF6IqzmhplHz6nx8DCFm5Udlz9rDmVN/WZSsD5NNI2tevDabj5rDn0ovGLu0k8fWfNHH4f0dzqKLqd7voaEkpJNdnBAtcgLR70uDZnoQMO8BRFcrnB39S7JW00RNNZZdYSuBRaqgVnTIiUTaOv54yImWxAjGXLehPi3EYdmB9e7FfvlBdIPVjJSBQ4mw7hY1E6mSo2HmXD7aoyc9t/0d/9toLDLM8f1oQBjaEA4QTbSAPlA== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1708030079; bh=gY9uDz+JDyV1B2hPJeot1XXcJo8+PExKA3uusY03wno=; h=X-Sonic-MF:Subject:From:Date:To:From:Subject; b=kGENsrDFLV8Rg1saFDFwn5pR5BT5DDAWX75j0OLg0OHIptWYABpkTfAwo1iu/gKKLTAVJcBa9YnSxaxAP76ouU2nrW/O67YcrELeJtMTzhcqU7HvAZ8BhWvX7gp2dl320aex4KT+Qvzf8THPjISwOfsuAfChSXY/3hAogsi/49DhCTIqkxwUhQLmziT6TaZtS/+qjWGPSctIN+eyxQ/iEVPvjQQ/LSecGjPlweyWcAeUJgpmIFC0wzm4vdIe1ER3Ezl+zkGiG3VILly9cSbZT4fOCCnleJDsg6BjBk8XBEhv74CQZy++IoKOiOlMkbC3WeSfaNyrXjMaSSt5qs+Vow== X-YMail-OSG: RnFkW2YVM1kJm01VQ4r7IRrpHX8_R4YPDELZN0mM4zbW1.c7wOeHrDmBiVdYlBd 3gKztPHZXanfCoG5HltMhjvNNPbeFOAdhXEgduMZTh71AEi3RrIBq2EPIl.4OWczaCJNUS10Uz5J 2vbPT1b92rpRqNP7n31z64cLWvsDpJmtOM82luqg13ngiWsmdzN4UKUrOcxTA06.BkDh_Qkyc7OZ vobuGhZ.L44DluftmJuccT7pVyaIOFLJf5gAmMX_rSMixeT6Dm6n40DwsckGZIptJ3sWqSPAnYr0 vszW9dwUbvHi9TeMYFu2kxGD69X76e.xgDtt1q0R0NnnlqwgKr_whFMVwSvS0hiAGPpoxE1mJICN U6klG91WFRz3YYGpAA0M.GI6N16w8ucE69QeNfxgOAhI_4424ztKl2ZyPNcS7dmokVJGxwguaVgT iR6JSNKnoAQmtMG.KDSQnSllw9gARHsYMXO_zZJ6ZhhHLYlF3KP33EH8UzdP6clNC9FNGO8MAwfY VrvL1g.qNMysZ3SRORwk48gRxyCSLcC.ufQcH6WHododLUbzat.W3_oX4AIxbv58qhIXiJEDRySk BqEg6oJrZxS_taZlPoHcgv8YtE3NgkK8G0rRmi7JubRXNA_BNxobtwE6C_0GzMlfDGxY6KJplojO fNazSVRyTx0WkEy.JRn0iG0g7a4VtYiHWxPwO0GApj0rmeHxwTUPRl_bO6IuS.Z2y3BHozvZ7tGK vN7jsJPoHlO6Qb.m2JAjHoKshOnd0JTxvt3fZrtdPBQfa3Msny01rG1Dx7h77kUYB1RgbQNYMCCv umJ_lG9KaUSmFx5rST7UI2R9qBaAFASnjcQYQRZis0beFvkZxgzxu3OI2cZi9NxmzhPw2l1v_Xsj 7_0KpuJKFCsPOjA2ZoKgVZ1DRQO3cHPP1VLjFUYlUHnARghoONFC9bS26A.kZkcaBRaQlzo2IkJi HEP0.Q_BpN8nLTtvZJls5XeXoi6VXoefVKPWAonB8fIdXvHmqytnYk0wB52.BjkTL8Ug48gfUL_i g1cpRQwB97aYve69OtMPvAp2LwpkZrZ7BizOL6MjCPj.f8G.LJUXevhQWhiIotHOQ54X3r3Y9QYO gN4DDcbAPFxAUOyb0ZtVIl3uXZzCecpQQ8U0HI4DJO4i3L3qCbcSxJWWLc.l7j.7MaVSQ3LXewSS m.Uag8xr8p0kga8kil6NI_hsey9847tV1dt0beL_w_d3O1sHx54VGroWqKmL2UzlDndQfekO_scJ Ha6byJXGvBvtGHRaMOwl5AoA4Mu_N.R47KgFhJ_D9Hu8L8WUqA9Q.rFfHMDtq_JwhuzltIPubDHb EOVQpOCLO2bQLeYAPipVCVk3TgPOzoPbltljZwDhpKGJ_jiBfSFJCDExUnS8FPKTsxc4keDUo_5Y azSqKFYs.w_S6qF_rX5njL4s.lTnIYuCPZVhTiVF6CLYoJ.vldkwk_vAhzBRBvWBa9OO3uvyIRis 8OMZXWhtDnEe4ePy8xv4RCRDAVvFo._MO00YKjwwBb32_WKShH3E1llhLbtoY0hmcuzs5Cy2Fb_S s5eCoCIp.cP1iYnO5uxgqjmLgBBaULmPtXHwPW.235MNGcAGqEK_q.AW8_UVmv5xZK3BjeTWv_Bj 0FNvUTLpi3mefGKe2QETr26FICE.Fijte27P6.XlNWweatTMyA7PfyfvXNbGiswjQcKHzVwbYpe8 vloNYEdpeWV6_Z6H7VpXMJtgRLsPUd2nwnAMlP0bXPxMVyP31sg544o2VjVFT3roDRJsTi1vYgWJ J416b8IIeLBuk00aigJT.EUQbyq8p..choMk7Fb3tTVK29J03M_JRU.wQhtSR_p07D4bE.zHfAOs 3LNNRp2sILHe5rWNBo4ciOi6Nhw7tx617CPhMfSlSmxutofg_mqFV.3PjiaK8psM9nMM21HCkyxk et20fG.j9p_7HN8ms5sOO7DQWnHtqg8unmssp8Qyt8CEF39ALMe1AUJpT7vO55ulxOq7nNNKWzcf EwKxdm_wIl3U1KTaUXdxAiG.SZN8AoF16Z7jNv1U73FTzYN7lnfXKCZuyjLKROc7F3akMdPVTpWM d9R3lxuX54rfbsZaxS4ONG982eHtum9W0pF2USu6zICQNua7BsKbzGeIiRPiPBGrF0JGa5olZIRN k561OC6NCeysFaMFByE.GdhJf9Z86uS07JBjirrV6SptCzVS1wEfwCeGmMwVMmjVqwKt9tUirwJ4 o._0BTZoS028FIw2AD021WHDN.UhW45EcQJV.nFhxQKszwo.qFaxw2VkKdMbzdUHP8P3VnACREGS RGkv5DiWRecDrMm88qpM- X-Sonic-MF: X-Sonic-ID: b8863f13-c3bf-42a0-a0d4-1a850d6a52aa Received: from sonic.gate.mail.ne1.yahoo.com by sonic314.consmr.mail.gq1.yahoo.com with HTTP; Thu, 15 Feb 2024 20:47:59 +0000 Received: by hermes--production-gq1-5c57879fdf-jv4v7 (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID ab63eb978d9def609a59fb9b6b6b8a28; Thu, 15 Feb 2024 20:47:55 +0000 (UTC) Content-Type: text/plain; charset=utf-8 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.400.31\)) Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. From: Mark Millard In-Reply-To: Date: Thu, 15 Feb 2024 12:47:44 -0800 Cc: Jamie Landeg-Jones , freebsd-hackers , freebsd-arm Content-Transfer-Encoding: quoted-printable Message-Id: References: <202402151734.41FHYNBj061905@donotpassgo.dyslexicfish.net> To: Mario Marietto X-Mailer: Apple Mail (2.3774.400.31) X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4TbRwK3qXkz4J1D X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US] On Feb 15, 2024, at 12:32, Mario Marietto = wrote: > What's the correct port tree for FreeBSD 12.04 for arm 32 bit ? A or B = ? >=20 > A) https://cgit.freebsd.org/ports/snapshot/ports-12.4-eol.tar.gz The above is the newer one, with more security updates, updated ports, and such: it is from when 12.4-RELEASE went EOL. > B) https://cgit.freebsd.org/ports/snapshot/ports-release/12.4.0.tar.gz This is the older one from when 12.4-RELEASE was first built, long before it went EOL. > thanks. >=20 > On Thu, Feb 15, 2024 at 6:34=E2=80=AFPM Jamie Landeg-Jones = wrote: > Mario Marietto wrote: >=20 > > After a lot of work I've been able to install FreeBSD 12.04 for = armv7 on my > > ARM Chromebook. Now I would like to install some ports. This is what > > happens when I try to get a fresh ports tree : > > = files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401gz > > not found -- snapshot corrupt. >=20 > I'm not sure why the file isn't there - maybe because 12.X is EOL or = portsnap > is deprecated? >=20 > Still, the solution is easy: >=20 > Download the ports tree snapshot as a tar from = https://cgit.freebsd.org/ports/ Cool. I'd not explored there. > Choose a tag, and a format. I suggest 12.4-eol so just fetch >=20 > https://cgit.freebsd.org/ports/snapshot/ports-12-eol.tar.gz >=20 > rm -r /usr/ports > then untar the downloaded tar file into place. =3D=3D=3D Mark Millard marklmi at yahoo.com From nobody Thu Feb 15 21:27:18 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbSnw3Wx2z5BH0V for ; Thu, 15 Feb 2024 21:27:32 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbSnv6h0dz4P5v for ; Thu, 15 Feb 2024 21:27:31 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-ed1-x52d.google.com with SMTP id 4fb4d7f45d1cf-56394d0ee54so85494a12.3 for ; Thu, 15 Feb 2024 13:27:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20230601.gappssmtp.com; s=20230601; t=1708032450; x=1708637250; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=QMjxRvsl+qiM5W6RWrLajeCn8pHAymIm439C+l12YUA=; b=rDn/anZ/crL77WZ1kG5f731cIgzIQkN0y2vrjB3UM/gqJhjFTo8wPb5eJpTxnpkZfH aXsKkKrtoBxCRtOfB4Ax6XpQV2kac8cWgAtY5cvAyPJEYyer9EqFB//B80Q9uYpbn/9W AE+J0JvXihUpfZ+b82qCoztE7NzK2mCYd6uR8PkxZ/V8Gveg2YdVYKGCvK7EvO87yCl0 ye4oZ1SkSw+zHMGG/kvb4Ndl33Ppx5P54OHQHcoqllFJf54pYWeZ0fOFqdjcxFyBiZEX xEFxUZvtqWZHjxrhdKnSPeMUjZBbmK9TWzu6KjP8gglK/6/wZA+IVRPe7rNc/fZHWHO8 G3CQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708032450; x=1708637250; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=QMjxRvsl+qiM5W6RWrLajeCn8pHAymIm439C+l12YUA=; b=bTM7ItbcQLfCf4ucAFwgqSNDT2g2Hb4KDc69KCV8yXhBC7OeCbTqkr3VABsAh3deQL rhtRqAVIIWWRzHtqFNdicMxBc0/rNBkXsgfeLVnE7x+YN/sPd6NJx8GufMRBrFoBH4eL GZLGi6ET+2T/P0vBYJp/a2QZ2g58tex/kyy1DHfNYk6Wmm4gDe1O31aiFwA6Okzf1ndm GSZx7cVhvW9R78UQ00k5h03cHjGHDYWcR+uIdNVaDwURlEFX+vaPPFtt93rIFzX/GQc5 pPVG+fZrU14zyuUnLLmF9Y51CNMbXTOqbgt9t71cvJ5s37zw519nIa19LIyORgzYyh1C vA+A== X-Forwarded-Encrypted: i=1; AJvYcCV+nikbmztWUXM4LiF8M0EJSDWu2zo4mDKYcvcbss+rOJ01Au/6zBqXygBd5F0QLIAxbBDX+yN2qF/hVkKWmhgn0BTv0l4ddBlTz6o= X-Gm-Message-State: AOJu0YyZVWsNxi06vid7zjqWtPhQkUiT+0G09tqVdbpFrfdmwocIW9Dz aCpMAJIn+qh6oMZU5gYaxP7UUdIEvcn9XTJFRe9R1ZJTMIOHXC+xHQb7n0zWAziqZ1RvQlbcQyC x0AgA+nM/zlpFN1Z+L/h7ZZRcZDUnMt79ds9SX9Qw9aiBZIIZ X-Google-Smtp-Source: AGHT+IGO8LCIpFlEaM9QH4uFjQeU+TEAKF5YAe8f7aSZELnUW7LQ/Foi3IPkJvXCbi27d4s0rxlW1eTLurPZiIIPObk= X-Received: by 2002:a05:6402:646:b0:560:1652:e7cb with SMTP id u6-20020a056402064600b005601652e7cbmr2235970edx.16.1708032450496; Thu, 15 Feb 2024 13:27:30 -0800 (PST) List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 References: <202402151734.41FHYNBj061905@donotpassgo.dyslexicfish.net> In-Reply-To: From: Warner Losh Date: Thu, 15 Feb 2024 14:27:18 -0700 Message-ID: Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. To: Mario Marietto Cc: Jamie Landeg-Jones , FreeBSD questions , FreeBSD Hackers , FreeBSD Current , "freebsd-arm@freebsd.org" Content-Type: multipart/alternative; boundary="0000000000007a2e2d0611724b4b" X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4TbSnv6h0dz4P5v X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US] --0000000000007a2e2d0611724b4b Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Thu, Feb 15, 2024, 1:33=E2=80=AFPM Mario Marietto wrote: > Hello. > > What's the correct port tree for FreeBSD 12.04 for arm 32 bit ? A or B ? > > A) https://cgit.freebsd.org/ports/snapshot/ports-12.4-eol.tar.gz > > B) https://cgit.freebsd.org/ports/snapshot/ports-release/12.4.0.tar.gz > A is your best bet. Warner thanks. > > On Thu, Feb 15, 2024 at 6:34=E2=80=AFPM Jamie Landeg-Jones > wrote: > >> Mario Marietto wrote: >> >> > After a lot of work I've been able to install FreeBSD 12.04 for armv7 >> on my >> > ARM Chromebook. Now I would like to install some ports. This is what >> > happens when I try to get a fresh ports tree : >> > files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401= gz >> > not found -- snapshot corrupt. >> >> I'm not sure why the file isn't there - maybe because 12.X is EOL or >> portsnap >> is deprecated? >> >> Still, the solution is easy: >> >> Download the ports tree snapshot as a tar from >> https://cgit.freebsd.org/ports/ >> >> Choose a tag, and a format. I suggest 12.4-eol so just fetch >> >> https://cgit.freebsd.org/ports/snapshot/ports-12-eol.tar.gz >> >> rm -r /usr/ports >> then untar the downloaded tar file into place. >> >> Cheers, Jamie >> >> > > -- > Mario. > --0000000000007a2e2d0611724b4b Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


On Thu, Feb 15, 2024, 1:33=E2=80=AFPM Mario Marietto &= lt;marietto2008@gmail.com>= wrote:
Hello= .

What's the correct port tree for FreeBSD 12.= 04 for arm 32 bit ? A or B ?



A is your best bet.

Warner

th= anks.

On Thu, Feb 15, 2024 at 6:34=E2=80=AFPM Jamie Landeg-Jones = <jamie@catflap.org> wrote:
Mario Marietto <marietto2008@gmail.com> w= rote:

> After a lot of work I've been able to install FreeBSD 12.04 for ar= mv7 on my
> ARM Chromebook. Now I would like to install some ports. This is what > happens when I try to get a fresh ports tree :
> files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401= gz
> not found -- snapshot corrupt.

I'm not sure why the file isn't there - maybe because 12.X is EOL o= r portsnap
is deprecated?

Still, the solution is easy:

Download the ports tree snapshot as a tar from https://cgi= t.freebsd.org/ports/

Choose a tag, and a format. I suggest 12.4-eol so just fetch

https://cgit.freebsd.org/ports= /snapshot/ports-12-eol.tar.gz

rm -r /usr/ports
then untar the downloaded tar file into place.

Cheers, Jamie



--
Mario.
--0000000000007a2e2d0611724b4b-- From nobody Fri Feb 16 13:48:34 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbtZ41NGVz5Bx4k for ; Fri, 16 Feb 2024 13:48:44 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbtZ26z3Jz4d28 for ; Fri, 16 Feb 2024 13:48:42 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.17.1/8.15.2) with ESMTPSA id 41GDmYS8009690 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Fri, 16 Feb 2024 08:48:41 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: Date: Fri, 16 Feb 2024 08:48:34 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: FreeBSD Security Advisory FreeBSD-SA-24:01.bhyveload To: FreeBSD Hackers References: <20240214070706.C6CD226744@freefall.freebsd.org> Content-Language: en-US From: George Mitchell Autocrypt: addr=george+freebsd@m5p.com; keydata= xjMEZaHDbxYJKwYBBAHaRw8BAQdA2W6oBfS8haXY0/Ft4zS1OTLYfC8EBIADPTgMQdh85C3N KEdlb3JnZSBNaXRjaGVsbCA8Z2VvcmdlK2ZyZWVic2RAbTVwLmNvbT7CmQQTFgoAQRYhBDpv v9n4+UzMLAJ8EZocD3futmd9BQJlocSiAhsDBQkFo5qABQsJCAcCAiICBhUKCQgLAgQWAgMB Ah4HAheAAAoJEJocD3futmd9SxwBAJUi6DNdVhWCZBTv5XGy1g0JgApLWe/3S0M0zz9sn7/L AQCcJcV5k5s2rt9J5C1AUm6XVsuneVvIWXO5j1GKWk0NC844BGWhw28SCisGAQQBl1UBBQEB B0AaFz/6B95RRvjOdLZr5fSdhuIHvwr24H3ePDZSw6wlUwMBCAfCfgQYFgoAJhYhBDpvv9n4 +UzMLAJ8EZocD3futmd9BQJlocNvAhsMBQkFo5qAAAoJEJocD3futmd9RXsBANwRD9RE56F6 /jeZOrujHICLcgPiOt50Y6866v9OUTjUAP9GlC1aopfBpNwuPLJBam7oBaGqvY98VDhzOjoT 7DNbCQ== In-Reply-To: <20240214070706.C6CD226744@freefall.freebsd.org> Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------m7nCRVXuJLuQQgvds1gnKUFA" X-Spam-Status: No, score=0.2 required=10.0 tests=HELO_MISC_IP,HELO_NO_DOMAIN autolearn=no autolearn_force=no version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on mattapan.m5p.com X-Rspamd-Queue-Id: 4TbtZ26z3Jz4d28 X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.30 / 15.00]; SIGNED_PGP(-2.00)[]; MIME_BASE64_TEXT_BOGUS(1.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_SPAM_SHORT(0.99)[0.986]; R_SPF_ALLOW(-0.20)[+a:c]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; MIME_BASE64_TEXT(0.10)[]; XM_UA_NO_VERSION(0.01)[]; TAGGED_FROM(0.00)[freebsd]; TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; DMARC_NA(0.00)[m5p.com]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_ONE(0.00)[1]; RCPT_COUNT_ONE(0.00)[1]; MLMMJ_DEST(0.00)[freebsd-hackers@FreeBSD.org]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; HAS_ATTACHMENT(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~] This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------m7nCRVXuJLuQQgvds1gnKUFA Content-Type: multipart/mixed; boundary="------------jJ04nJO98GOCnaKMP2uY8l02"; protected-headers="v1" From: George Mitchell To: FreeBSD Hackers Message-ID: Subject: Re: FreeBSD Security Advisory FreeBSD-SA-24:01.bhyveload References: <20240214070706.C6CD226744@freefall.freebsd.org> In-Reply-To: <20240214070706.C6CD226744@freefall.freebsd.org> --------------jJ04nJO98GOCnaKMP2uY8l02 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 Rm9yIGEgY29tcGxpY2F0ZWQgcmVhc29uLCBJIGF2b2lkICJmcmVlYnNkLXVwZGF0ZSIgYW5k IHVwZGF0ZSB0aGUNCmtlcm5lbCBhbmQgdGhlIHdvcmxkIGZyb20gc291cmNlLg0KDQpHaXZl biB0aGF0IHBlcmhhcHMgSSBhbSBhbiBpZGlvdCwgbmV2ZXJ0aGVsZXNzIEkgYWRkcmVzc2Vk IHRoaXMNCnBhcnRpY3VsYXIgc2VjdXJpdHkgYWR2aXNvcnkgYnkgdXBkYXRpbmcgbXkgL3Vz ci9zcmMgdHJlZSwgYW5kDQooaGF2aW5nIG9ic2VydmVkIHdoYXQgZmlsZXMgd2VyZSB1cGRh dGVkKSBydW5uaW5nOg0KDQpjZCAvdXNyL3NyYy9saWIvbGlidXRpbA0KbWFrZQ0KbWFrZSBp bnN0YWxsDQpjZCAvdXNyL3NyYy91c3Iuc2Jpbi9iaHl2ZWxvYWQNCm1ha2UNCm1ha2UgaW5z dGFsbA0KY3AgLXAgL3Vzci9zcmMvdXNyLnNiaW4vcGVyaW9kaWMvZXRjL2RhaWx5LzQ4MC5s ZWFwZmlsZS1udHBkIFwNCiAgL2V0Yy9wZXJpb2RpYy9kYWlseS80ODAubGVhcGZpbGUtbnRw ZA0KDQpTbyBJIHRoaW5rIEkgaGF2ZSB0aGUgYXBwcm9wcmlhdGUgc3R1ZmYgaW5zdGFsbGVk IG5vdywgdGhvdWdoIG9mDQpjb3Vyc2UgZnJlZWJzZC12ZXJzaW9uIC11IHN0aWxsIHJlcG9y dHMgMTMuMi1SRUxFQVNFLXA5IGluc3RlYWQgb2YNCi1wMTAsIGFuZCB0aGUgZGFpbHkgc2Vj dXJpdHkgcnVuIHNheXM6DQoNCkZyZWVCU0QtMTMuMl85IGlzIHZ1bG5lcmFibGU6DQogICBG cmVlQlNEIC0tIGJoeXZlbG9hZCg4KSBob3N0IGZpbGUgYWNjZXNzDQogICBDVkU6IENWRS0y MDI0LTI1OTQwDQogICBXV1c6IA0KaHR0cHM6Ly92dXhtbC5GcmVlQlNELm9yZy9mcmVlYnNk L2M2MjI4NWNiLWNiNDYtMTFlZS1iNjA5LTAwMjU5MGMxZjI5Yy5odG1sDQoNCklzIHRoZXJl IGEgaGFjayB0aGF0IGxldHMgbWUgZm9vbCBmcmVlYnNkLXZlcnNpb24gaW50byByZXBvcnRp bmcgLXAxMA0KaW5zdGVhZCBvZiAtcDk/ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAg ICAgICAgICAgICAgICAtLSBHZW9yZ2UNCg0KUC5TLiBGZWVsIGZyZWUgdG8gc2NvbGQgbWUg Zm9yIHN0dXBpZGx5IHRyeWluZyB0byBkbyB0aGluZ3MgdGhlIHdyb25nDQp3YXkuDQo= --------------jJ04nJO98GOCnaKMP2uY8l02-- --------------m7nCRVXuJLuQQgvds1gnKUFA Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc" -----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQQ6b7/Z+PlMzCwCfBGaHA937rZnfQUCZc9nsgUDAAAAAAAKCRCaHA937rZnfQ6B AQC7i7dU5QSCfUp8BpsgqGQzSuk3hISaa/C9+loaf0bF/AEAzVBdxvvNG6FpeKyshsDfphX2otLy 7Ic4sITM1gzGzQU= =ab1P -----END PGP SIGNATURE----- --------------m7nCRVXuJLuQQgvds1gnKUFA-- From nobody Fri Feb 16 17:32:52 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbzXj2cGNz53sDl; Fri, 16 Feb 2024 17:32:53 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbzXj0rL2z541d; Fri, 16 Feb 2024 17:32:53 +0000 (UTC) (envelope-from salvadore@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708104773; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mYyiew30QBsOHJiZCYMQ0XiocH9JM632w1CzwUJA2A4=; b=KLYwfe4To68iGrH9ZLH9EcuBeivLB5dnMLMV1wyEfw7A9wD5+i20GvZvhveYf90AwaEg9k 42DYlNB5OF+hxQ1ZEkcilcPapiK5Cf0ipdo/ycpoDnfxJdUdRgMp2IJ7qHPq3QtFCDZpN5 vaTuVGplTL5Dapc1Mggop4uaEb6oFESbLhODBIEADq1DuOXNcTyujyoq4HHO2M/bgc7naj l/bx1G+fjsC+6yl6Vb0l8cbUsFoKJQMskri1p7kyckKYOfWH9otEH67aF4vk0X1vuvY8xT ic2CVJUw0pwHPq2y5NquamZgyrOoYS9O1exBSVh8lBoQ2fV/MDUVyNZawkuKCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708104773; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mYyiew30QBsOHJiZCYMQ0XiocH9JM632w1CzwUJA2A4=; b=XqagrHikxu9zeGqu0EuS/4vYni8rBt1XxN0mGhCoQuudR9Kdl8SMMPi0cWS9k7T4NXe8Fa qcfxu0fGWiY9TkVZtzZBD7vuWOZoYRQxJc/wPjTDwV/eDD7OQNCfPwDyHCkvPw8G1Yv8U9 7VB3TS3qhSN0YpJoGg+7snJsSjCr3BueuryI/nvgA2678U/GizKFAS53QrbIocscxzOWNv Lhc1sTFf8W0NrLDWAZPLmhIJ5IgnarNUczF6PSxUZ43vHxuW9fS7xfx6+/h2OmABrAVvzy FtqEs325pH/W8XrIljPF3mtU3rGiuJpz058kaDoTHV8xRZJ7xzzRgIm5QuVgwg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1708104773; a=rsa-sha256; cv=none; b=mXqD9m2BNfKejvQ+D6IvB0ZQgTsTL6LX8ZTzM3HfNlzC5NvrHzZE6F7Kt/QKoOhRh+F/CL Shz8dDfr3oi6GYm5K9GUxTF4ps8jt6b1SULDcLyycGLo4h0YVCVsjjuxG8tszD4OdT1yTx cw2kibafTSJ23bcA0zvHdMERlfb1PWreoZ9cmL6wG/6ARVLvhiVR8rSH1XxHdOo/sjUB0P pQU2z3Hdjl/6dAK+S4px15eAu2tJ63NfL7q3VODFCK+UUQJiX27cLd4r+FVKzTovwFTRNf V1dZUkaKcEODD28ytoaLCoN2PIUIcbNCBwiZs3n1JH1+48DGyO0EtE8R+CDUuQ== Received: by freefall.freebsd.org (Postfix, from userid 1472) id 0209063B6; Fri, 16 Feb 2024 17:32:52 +0000 (UTC) Date: Fri, 16 Feb 2024 17:32:52 +0000 From: Lorenzo Salvadore To: freebsd-hackers@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD Status Report - Fourth Quater 2023 Message-ID: List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit FreeBSD Status Report Fourth Quarter 2023 Here is the fourth 2023 status report, with 18 entries. This is the last 2023 quarter. As you have probably noticed, this status report comes later than usual and with fewer reports than the preceding quarter. Indeed, please keep in mind that the last quarter of every year is for many members of our community the quarter of the celebrations for Christmas and for the New Year, which implies that those members will spend more time with their families and will have less time for their favorite voluntary software projects. Thus there is less to report and reports tend to arrive later. But finally, here they are. Have a nice read. Lorenzo Salvadore, on behalf of the Status Team. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ A rendered version of this report is available here: https://www.freebsd.org/status/report-2023-10-2023-12/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Table of Contents β€’ FreeBSD Team Reports β–‘ FreeBSD Core Team β–‘ FreeBSD Foundation β–‘ FreeBSD Release Engineering Team β–‘ Cluster Administration Team β–‘ Continuous Integration β–‘ Ports Collection β–‘ Bugmeister Team and Bugzilla β€’ Userland β–‘ Service jails — Automatic jailing of rc.d services β€’ Kernel β–‘ Packrat - NFS client caching on non-volatile storage β€’ Architectures β–‘ armv7 Ports Quality Assurance β–‘ SIMD enhancements for amd64 β€’ Cloud β–‘ OpenStack on FreeBSD β–‘ FreeBSD on Microsoft HyperV and Azure β–‘ FreeBSD on EC2 β€’ Documentation β–‘ Documentation Engineering Team β–‘ FreeBSD Online Editor and Man Page Editor β–‘ FreeBSD Wiki β€’ Ports β–‘ KDE on FreeBSD β–‘ State of GNOME 44 β–‘ GCC on FreeBSD β€’ Third Party Projects β–‘ Containers and FreeBSD: Pot, Potluck and Potman ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Along the release engineering team, the project dedicates the 14.0-RELEASE to the memory of Hans Petter Selasky. 14.0-RELEASE FreeBSD 14.0 was released at the end of 2023Q4. The release notes can be found at https://www.freebsd.org/releases/14.0R/relnotes/ New Release Engineering Team After years of serving as the release engineer gjb@ stepped down. cperciva@ took over as the new release engineer. karels@ is serving as the new deputy release engineer. Core would like to thank gjb@ for his long tenure and the many timely releases he created. FreeBSD 2024 Community Survey In the end of 2023, Core Team works with the Foundation to do the 2024 community survey. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Foundation Links: FreeBSD Foundation URL: https://freebsdfoundation.org/ Technology Roadmap URL: https://freebsdfoundation.org/blog/technology-roadmap/ Donate URL: https://freebsdfoundation.org/donate/ Foundation Partnership Program URL: https://freebsdfoundation.org/our-donors/ freebsd-foundation-partnership-program/ FreeBSD Journal URL: https://freebsdfoundation.org/journal/ Foundation Events URL: https://freebsdfoundation.org/our-work/events/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and worldwide community, and helping to advance the state of FreeBSD. We do this in both technical and non-technical ways. We are 100% supported by donations from individuals and corporations and those investments help us fund the: β€’ Software development projects to implement features and functionality in FreeBSD β€’ Sponsor and organize conferences and developer summits to provide collaborative opportunities and promote FreeBSD β€’ Purchase and support of hardware to improve and maintain FreeBSD infrastructure, β€’ Resources to improve security, quality assurance, and continuous integration efforts. β€’ Materials and staff needed to promote, educate, and advocate for FreeBSD, β€’ Collaboration between commercial vendors and FreeBSD developers, β€’ Representation of the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. We supported FreeBSD in the following ways during the last quarter of 2023: OS Improvements During the fourth quarter of 2023, 236 src, 47 ports, and 33 doc tree commits identified The FreeBSD Foundation as a sponsor. Some of this Foundation-sponsored work is described in separate report entries: β€’ OpenStack on FreeBSD β€’ SIMD enhancements for amd64. Three new contractors started. Cheng Cui began working full-time on wireless networking. A main goal for Cheng’s project is to assist Bjoern Zeeb with 802.11ac support in iwlwifi. Tom Jones began work to port the Vector Packet Processor (VPP) to FreeBSD. VPP is an open-source, high-performance user space networking stack that provides fast packet processing suitable for software-defined networking and network function virtualization applications. Olivier Certner joined the FreeBSD Foundation as a general FreeBSD developer. Some of Olivier’s contributions so far include: β€’ reviewing, fixing, and hardening several security policies aimed at limiting process visibility, policies that are based on user identity, group membership, or sub-jail membership β€’ committing fixes in the login class code, including one that allowed unprivileged users to bypass resource limits β€’ implementing a secure hardware fix for the Zenbleed issue affecting AMD Zen2 processors. Here is a sampling of other Foundation-sponsored work completed over the last quarter of 2023: β€’ arm64: Add Armv8 rndr random number provider β€’ net80211, LinuxKPI, and iwlwifi fixes and improvements β€’ OpenSSL: updates to 3.0.11 and 3.0.12 β€’ Various freebsd-update fixes in preparation for 14.0 β€’ ssh: Update to OpenSSH 9.5p1 β€’ Various iommu fixes β€’ Various makefs/zfs fixes Learn more about our software development work for all of 2023 at https://freebsdfoundation.org/blog/2023-in-review-software-development/. FreeBSD Infrastructure We approved over $100,000 for a cluster refresh that began in late 2023 and will carry over into the new year by purchasing and shipping 15 new servers to 4 racks generously donated by NYI in their new Chicago facility. The systems specifications were determined by the Cluster Administration team and consist of: β€’ 5 package builders β€’ 3 web servers β€’ 2 package mirrors β€’ 2 CI servers β€’ 2 firewall/router β€’ 1 admin bastion More on our 2023 infrastructure support can be found at: https://freebsdfoundation.org/blog/2023-in-review-infrastructure/. Continuous Integration and Workflow Improvement As part of our continued support of the FreeBSD Project, the Foundation supports a full-time staff member dedicated to improving the Project’s continuous integration system and the test infrastructure. The full update can be found within the quarterly status report. Partnerships and Research In Q4 I connected with the following people, companies, and organizations: Phil Shafer, who works at Juniper Networks, and I met at All Things Open. He told me about the libxo library and his continuing work on related issues, like rewriting and filtering output to allow richer options that regular expressions provide. Sticking with Juniper, I also met Simon Gerraty at the Vendor Summit and heard his talk on SecureBoot. In alphabetical order, I also met with AMD, Ampere, Center for Internet Security (CIS), Innovate UK, Michael Dexter, Metify, Microsoft, several people at NetApp when I attended their annual conference (Thank you for the invitation!!), NetScaler, NIST, Nozomi Networks, NVIDIA, members of the Open Container Initiative community, OpenSSF, RG Nets, Doug Rabson. I greatly appreciated the opportunity to attend NetApp’s annual conference in October. I heard from and connected with experts at NetApp and their partners and customers on topics such as AI and seamless AI data pipelines, hybrid cloud, and green computing. I took the opportunity to hand out some FreeBSD lapel pins πŸ™‚ and I connected with a FreeBSD user and member of the Enterprise WG whose company is a NetApp Customer. In Q4 we announced the new FreeBSD SSDF Attestation program to help commercial users of FreeBSD comply with new US Government procurement regulations. This program was informed by valuable feedback from NetApp, Metify, and NIST, and the genesis of the idea came thanks to my involvement with open source policy experts, in particular via the OSI’s Open Policy Alliance. The Open Container Initiative Technical Oversight Board voted in December to approve Doug Rabson’s proposal to create a Working Group to extend the OCI runtime specification to support FreeBSD. Huge thanks to all involved! An OCI runtime extension for FreeBSD is one of the most frequently requested capabilities and I was happy to play a small role in helping to coordinate this effort so far. The Vendor Summit in November was a great event. Huge props to John Baldwin and Anne Dickison for all the work to organize and orchestrate. I got a lot out of the event. Personal highlights were conversations with a diversity of users, the CHERI talk, the end user panel, and Allan’s talk on being an upstream first company. For a full recap on our efforts to strengthen partnerships and increase funding in 2023, check out: https://freebsdfoundation.org/blog/2023-in-review-partnerships-and-research/. Advocacy >From organizing and attending events, to creating technical content that educates, and expanding the coverage of FreeBSD in the media, here is a sample of what we did last quarter to support FreeBSD. β€’ Helped organize and sponsor the November 2023 Vendor Summit held at NetApp in San Jose. Many consider this one of the best summits to date. Be sure to check out the videos. β€’ Introduced FreeBSD to new and returning folks at All Things Open in North Carolina. β€’ Provided an overview of FreeBSD 14: Security, Performance, and Interoperability; Introducing FreeBSD 14 β€’ In collaboration with the Core team, released the 2024 FreeBSD Community Survey β€’ Participated in an interview about FreeBSD: What the Dev Podcast: The Evolution of the FreeBSD Project β€’ Release the September/October 2023 issue of the FreeBSD Journal now with HTML versions of the articles. For a full recap of what we did to advocate for FreeBSD in 2023, please check out the Advocacy Year in Review: https://freebsdfoundation.org/blog/2023-in-review-advocacy/ or the monthly newsletters: https://freebsdfoundation.org/our-work/latest-updates/?filter=newsletter. Fundraising Thank you to everyone who gave us a financial contribution last quarter to help fund our work to support the Project. You brought us even closer to our goal and we are grateful for your investment in FreeBSD! We are still receiving donations in the mail and will post the final number in mid-February. Please consider supporting our efforts in 2024 by making a donation here: https://freebsdfoundation.org/donate/. Or, check out our Partnership opportunities here: https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to https://freebsdfoundation.org to find more about how we support FreeBSD and how we can help you! ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Release Engineering Team Links: FreeBSD 13.3-RELEASE schedule URL: https://www.freebsd.org/releases/13.3R/schedule/ FreeBSD releases URL: https://download.freebsd.org/releases/ISO-IMAGES/ FreeBSD development snapshots URL: https://download.freebsd.org/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team, The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the fourth quarter of the year, the Team continued work on 14.0-RELEASE, leading to the final RELEASE build and announcement in November. Planning has started for the upcoming 13.3-RELEASE and 14.1-RELEASE cycles. The Release Engineering Team continued providing weekly development snapshot builds for the main and stable/13 branches, and (after 14.0-RELEASE) started weekly builds for stable/14. After over a decade as Release Engineering Lead, Glen Barber has retired from the role; his Deputy, Colin Percival, has moved into the Lead role, while Mike Karels has assumed the position of Deputy Release Engineer. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cluster Administration Team Links: Cluster Administration Team members URL: https://www.freebsd.org/administration/#t-clusteradm Contact: Cluster Administration Team FreeBSD Cluster Administration Team members are responsible for managing the machines the Project relies on to synchronize its distributed work and communications. In this quarter, the team has worked on the following: β€’ Regular support for FreeBSD.org user accounts. β€’ Regular disk and parts support (and replacement) for all physical hosts and mirrors. β€’ Enable mirroring of https://www.FreeBSD.org and https://docs.FreeBSD.org in the FreeBSD project-managed mirrors. β€’ Cluster refresh, upgrading all hosts and jails to the most recent versions of 15-CURRENT, 14-STABLE, 13-STABLE, and 12-STABLE. β€’ Begin sunsetting 12-STABLE infrastructure as the branch approaches its end of life. In addition to these projects, with Modirum generously sponsoring Philip’s time for most of October, we were able to bring pkgbase into "preview" production in time for 14.0-RELEASE in November. We also installed a new European mirror site in SjΓΆbo, Sweden, sponsored by Teleservice SkΓ₯ne AB. Traffic in Europe is now directed roughly equally between our existing mirror in Frankfurt (sponsored by Equinix) and the new mirror in Sweden. After well over ten years in service, we plan to decommission our mirror site in the UK during first quarter of 2024. We would like to thank Bytemark Hosting for supporting this mirror for all this time. Next quarter, supported by the FreeBSD Foundation, we plan to bring up a new primary cluster site in Chicago. FreeBSD Official Mirrors Overview Current locations are Australia, Brazil, Germany, Japan (two full mirror sites), Malaysia, South Africa, Sweden, Taiwan, United Kingdom (full mirror site), United States of America — California, New Jersey (primary site), and Washington. The hardware and network connection have been generously provided by: β€’ Bytemark Hosting (decommissioned during 2024Q1) β€’ Cloud and SDN Laboratory at BroadBand Tower, Inc β€’ Department of Computer Science, National Yang Ming Chiao Tung University β€’ Equinix β€’ Internet Association of Australia β€’ Internet Systems Consortium β€’ INX-ZA β€’ KDDI Web Communications Inc β€’ Malaysian Research & Education Network β€’ Metapeer β€’ NIC.br β€’ Your.Org β€’ 365 Data Centers β€’ Teleservice SkΓ₯ne AB (new since 2023Q4) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Continuous Integration Links: FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI Tinderbox view URL: https://https://tinderbox.freebsd.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org Hosted CI wiki URL: https://wiki.FreeBSD.org/HostedCI 3rd Party Software CI URL: https://wiki.FreeBSD.org/3rdPartySoftwareCI Tickets related to freebsd-testing@ URL: https://bugs.freebsd.org/bugzilla/buglist.cgi?bug_status=open&email1=testing%40FreeBSD.org&emailassigned_to1=1&emailcc1=1&emailtype1=equals FreeBSD CI Repository URL: https://github.com/freebsd/freebsd-ci dev-ci Mailing List URL: https://lists.FreeBSD.org/subscription/dev-ci Contact: Jenkins Admin Contact: Li-Wen Hsu Contact: freebsd-testing Mailing List Contact: IRC #freebsd-ci channel on EFNet In the fourth quarter of 2023, we worked with the project contributors and developers to address their testing requirements. Concurrently, we collaborated with external projects and companies to enhance their products by testing more on FreeBSD. Important completed tasks: β€’ Adding job to build amd64 architecture with GCC 13. (Thanks jhb@) β€’ Adding powerpc64le jobs config for stable-14 (Thanks alfredo@) β€’ Updating the build env of jobs of main and stable/14 branches to 14.0-RELEASE Work in progress tasks: β€’ Designing and implementing pre-commit CI building and testing and pull/ merged-request based system (to support the workflow working group) β€’ Proof of concept system is in progress. β€’ Designing and implementing use of CI cluster to build release artifacts as release engineering does, starting with snapshot builds β€’ Simplifying CI/test environment setting up for contributors and developers β€’ Setting up the CI stage environment and putting the experimental jobs on it β€’ Redesigning the hardware test lab and adding more hardware for testing β€’ Merge https://reviews.freebsd.org/D38815 β€’ Merge https://reviews.freebsd.org/D36257 Open or queued tasks: β€’ Collecting and sorting CI tasks and ideas β€’ Setting up public network access for the VM guest running tests β€’ Implementing use of bare-metal hardware to run test suites β€’ Adding drm ports building tests against -CURRENT β€’ Planning to run ztest tests β€’ Helping more software get FreeBSD support in its CI pipeline (Wiki pages: 3rdPartySoftwareCI, HostedCI) β€’ Working with hosted CI providers to have better FreeBSD support Please see freebsd-testing@ related tickets for more WIP information, and do not hesitate to join the effort! Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Collection Links: About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://docs.freebsd.org/en/articles/contributing/#ports-contributing + Ports Management Team URL: https://www.freebsd.org/portmgr/ Ports Tarball URL: http://ftp.freebsd.org/pub/FreeBSD/ports/ports/ Contact: Tobias C. Berner Contact: FreeBSD Ports Management Team The Ports Management Team is responsible for overseeing the overall direction of the Ports Tree, building packages, and personnel matters. Below is what happened in the last quarter. β€’ According to INDEX, there are currently 31,942 ports in the Ports Collection. There are currently ~3,100 open ports PRs. The last quarter saw 9,424 commits by 157 committers on the main branch and 781 commits by 71 committers on the 2023Q4 branch. Compared to last quarter, this means a hefty decrease in the number of commits on the main branch (down from 11,454) and slightly fewer backports to the quarterly branch (down from 828). The number of ports also fell a bit (down from 34,600). In Q4 there were around 9424 commits to main. The most active committers where: sunpoet 2946 yuri 861 bofh 793 jbeich 419 fuz 324 eduardo 168 fernape 160 jhale 153 thierry 146 diizzy 123 During Q4 we welcomed Michael Osipov (michaelo) and Timothy Beyer (beyert) as new committers, but sadly also had to say goodbye to bland, sbruno, hselasky and gjb. We invited arrowd, flo and riggs to be part of portmgr-lurkers for the next months. Support for FreeBSD 12.x was removed at the end of the quarter. The end of Q4 also saw the introduction of subpackages to the ports tree. Similar to when flavors were introduced, new subpackages will require an approval by portmgr before being pushed to the tree. With subpackages it is possible to create multiple packages from a single build of a port. The following happened on the infrastructure side: * Packages for 14.0-RELEASE were built * Poudriere was updated to release-3.4 β€’ Support for FreeBSD 12.x was removed. β€’ The no-longer maintained www/qt5-webkit was removed. β€’ postgresql11, php80, mysql57, percona57, ghostscript9 were removed. β€’ The following default versions changed: β€’ perl to 5.36 β€’ ghostcript to 10 β€’ corosync to 3 β€’ Updates to major ports that happened were: β€’ ports-mgmt/pkg to 1.20.9 β€’ ports-mgmt/poudriere to 3.4.0 (subpackage support) β€’ KDE-bits to plasma-5.27.10, frameworks-5.112, gear-23.08.4, and beta-2 β€’ www/chromium to 120.0.6099.129 β€’ www/firefox to 121.0 (rc1) β€’ lang/rust to 1.74.1 β€’ …​ and many more …​ During the last quarter, pkgmgr@ ran 26 exp-runs to test various ports upgrades, updates to default versions of ports, subpackage support and base system changes. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Bugmeister Team and Bugzilla Links: Bugmeister team URL: https://www.freebsd.org/administration/#t-bugmeister FreeBSD Bugzilla URL: https://bugs.freebsd.org/bugzilla/ Contact: Bugmeister Some recent maintenance has been done on our Bugzilla instance: β€’ the weekly reminder emails now include the correct values for mfc-* Flags queries; β€’ the Dashboard page has had an obsolete query removed. (We no longer use the 'patch-ready' Keyword; it was too much paperwork. Thus, the query on that field was useless.); β€’ the limit that capped the maximum number of reported PRs at 10000 has been raised to 12500. In addition, the Wiki documentation on our Bugzilla has been updated: β€’ the page https://wiki.freebsd.org/Bugzilla/SearchQueries has been substantially reworked: β–‘ In particular, documentation about how to search on Flag values has been added. (This may not have been done before.) Example: search for PRs with Flag 'mfc-stable14' set; β–‘ This page may be of interest to all committers and contributors; β€’ the page https://wiki.freebsd.org/Bugmeister/BugmeisterQA has also been updated; While similar to the above, it is of more specific interest to bugmeister and triagers. As well, PRs that are specific to FreeBSD 12 are being culled, as 12 has gone out of support as of 20231231. A further effort is being made to document our setup of Bugzilla itself, especially with respect to our customizations. This is needed to bring our own repository up to date with what is running on production. The number of PRs over the past quarter (and year) has remained consistent. However, we do seem to be closing incoming PRs more quickly these days. For reference: https://bugs.freebsd.org/bugzilla/page.cgi?id=dashboard.html&days=90 . The overall number of PRs remains around 11,400. Bugmeister is also working towards restarting the Bugathons. See the updated page https://wiki.freebsd.org/Bugathons. Bugmeister would like to thank a number of people who have assisted with bugbusting, including Mina GaliΔ‡, Graham Perrin, Lorenzo Salvadore, and Fernando ApesteguΓ¬a, among others. In addition, bugmeister would like to thank all the FreeBSD committers who help process the PRs as they come in. Over the last few months we seem to be much closer to steady-state. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Userland Changes affecting the base system and programs in it. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Service jails — Automatic jailing of rc.d services Links: D40370: Infrastructure for automatic jailing of rc.d-services URL: https://reviews.freebsd.org/D40370 D40371: automatic service jails: some setup for full functionality of the services in automatic service jails URL: https://reviews.freebsd.org/D40371 D42779: Handbook / rc-article update for Service Jails URL: https://reviews.freebsd.org/D42779 Contact: Alexander Leidinger Service jails extend the rc(8) system to allow automatic jailing of rc.d services. A service jail inherits the filesystem of the parent host or jail, but uses all other limits of the jail (process visibility, restricted network access, filesystem mounting permissions, sysvipc, …​) by default. Additional configuration allows inheritance of the IPs of the parent, sysvipc, memory page locking, and use of the bhyve virtual machine monitor (vmm(4)). If you want to put e.g. local_unbound into a service jail and allow IPv4 and IPv6 access, simply change rc.conf(5) to have: local_unbound_svcj_options=net_basic local_unbound_svcj=YES Note: all base system services are covered in the patches with either name_svcj_options or a hard-coded disabling of the service jails feature where it does not make sense (e.g. pure services which change the runtime configuration but do not start daemons, or where things are run which can not be run in a sensible way inside a jail). As such the local_unbound_svcj_options line above is superfluous and serves just as an example about the amount of configuration needed in total. While this does not have the same security benefits as a manual jail setup with a separate filesystem and IP/VNET, it is much easier to set up, while providing some of the security benefits of a jail like hiding other processes of the same user. Since the previous service jails status report, the following were added: β€’ support for NFS inside jails in the service jails framework (untested), β€’ the possibility of jailing other service commands than start and stop, β€’ service jails options / config for all base system services in the patch in D40371, β€’ a first step at documenting the service jails in the Handbook. Not all services are tested, but all services are covered with a config. Any testing and feedback (even as simple as "service X works in a service jail") is welcome. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Kernel Updates to kernel subsystems/features, driver support, filesystems, and more. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Packrat - NFS client caching on non-volatile storage Contact: Rick Macklem NFSv4.1/4.2 provides support for a feature called delegations. When a NFSv4.1/ 4.2 client holds a delegation, the client has certain rights to a file, including a guarantee that no other client will make changes to the file unless the delegation is recalled. As such, when a client holds a delegation for a file, it can aggressively cache the file’s data, knowing that it will not be modified by other clients until it returns the delegation. This project is intended to allow the NFSv4.1/4.2 client to aggressively cache file data on client local non-volatile storage, when the client holds a delegation for the file. I created a patch long ago to try and do this for NFSv4.0, but it was never at a stage where it was worth using. This project is a complete rewrite of the patch, done in part because NFSv4.1/4.2 plus other recent NFSv4-related changes make doing this more feasible. I now have code running fairly well and hope to have a patch ready for others to test this winter. Early testing shows promise. For a test run of "make buildkernel", the test with and without packrat enabled performed as follows: Table 1. NFS operation counts NFS operation counts Getattr Lookup Read Write Total RPCs with packrats 433506 99254 0 0 371736 without packrats 2359913 97954 10748 0 2318810 Table 2. Elapsed Run Time Elapsed Run Time (sec) with packrat without packrat 5561 6203 As you can see, the packrat case ran a little faster and with fewer RPCs. Although this test was run on my little LAN, it is hoped that a NFSv4.1/4.2 mount over a WAN would show a larger difference in performance. I will note that the packrat cache was primed by unrolling a tarball of FreeBSD’s /usr/src into the NFSv4.1/4.2 mount. This will be very much an experimental feature, but it is hoped it will allow NFS mounts to be used more effectively, particularly in WAN situations, such as a mobile laptop. There is still work to be done, particularly with respect to recovery of delegations after a NFSv4.1/4.2 client restart. Hopefully, the next status report will include a URL that allows downloading of a patch for user testing. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Architectures Updating platform-specific features and bringing in support for new hardware platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ armv7 Ports Quality Assurance Contact: Robert Clausecker As part of a long term project to improve the quality of the FreeBSD ports collection for the armv7 architecture, a number of issues in the base system and in various ports have been fixed. Through this action, the number of binary packages that could be successfully built from the 2023Q4 branch of the ports collection was increased from 30018 (as of 2023-10-04) to 31118 (as of 2023-11-24). Two kernel bugs affecting package builds (PR 267788 and PR 274705) were identified and addressed, with these two alone being responsible for around 900 failed packages. The most common other causes for build failures include β€’ lack of FreeBSD-specific armv7 support code β€’ data alignment issues (armv7 being one of the few architectures for which we do not support unaligned memory accesses) β€’ address space exhaustion during the build processes (usually LTO related; PR 274705 addressed many cases) β€’ lack of OpenMP support on armv7 FreeBSD If you are a user of the FreeBSD ports collection on armv7, do not hesitate to file a bug report on our bug tracker should there be any issues. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SIMD enhancements for amd64 Links: FreeBSD Foundation blog post URL: https://freebsdfoundation.org/blog/a-sneak-peek-simd-enhanced-string-functions-for-amd64/ simd(7) URL: https://man.freebsd.org/cgi/man.cgi?query=simd&sektion=7&manpath=FreeBSD+15.0-CURRENT Work currently under acceptance testing URL: https://github.com/clausecker/freebsd-src/commits/acceptance-testing Contact: Robert Clausecker The project to enhance the libc with SIMD implementations of string functions for amd64 has now concluded. In total, SIMD implementations for 17 libc functions have been written, complemented by scalar implementations where needed. Through this rewrite, performance of these functions on strings with an average length of 64 characters was improved by an average factor of 5.54. In addition, 9 other library functions were rewritten to call into the SIMD-enhanced routines, conveying benefits without requiring additional assembly implementations. Please see the FreeBSD Foundation blog post linked above for more details. Parts of the SIMD work are already found in the CURRENT branch. The rest is currently undergoing acceptance testing and will be merged if no problems emerge. It is planned to back port all improvements to 14-STABLE for inclusion into FreeBSD 14.1. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cloud Updating cloud-specific features and bringing in support for new cloud platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ OpenStack on FreeBSD Links: OpenStack URL: https://www.openstack.org/ OpenStack on FreeBSD URL: https://github.com/openstack-on-freebsd Contact: Chih-Hsin Chang Contact: Li-Wen Hsu In the fourth quarter, we successfully migrated the originally virtualized OpenStack platform to physical machines running FreeBSD 14.0-STABLE. The ported OpenStack components include Keystone, Glance, Placement, Neutron, and Nova. As part of this process, we took the opportunity to update the installation documentation and the list of dependencies. Moving forward, we encourage users and developers interested in this project to effortlessly recreate the OpenStack platform in their FreeBSD environments following this documentation. Any issues or difficulties encountered are welcome to be reported on the GitHub project page. Your contributions will contribute to the refinement of our installation documentation and the overall porting efforts. In the upcoming quarter, our focus will shift towards incorporating various patches and workarounds generated during the migration process into the project in a more structured code form. Additionally, we plan to develop FreeBSD ports for each OpenStack component, further streamlining the installation process. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on Microsoft HyperV and Azure Links: Microsoft Azure article on FreeBSD wiki URL: https://wiki.freebsd.org/ MicrosoftAzure Microsoft HyperV article on FreeBSD wiki URL: https://wiki.freebsd.org/HyperV Contact: Microsoft FreeBSD Integration Services Team Contact: freebsd-cloud Mailing List Contact: The FreeBSD Azure Release Engineering Team Contact: Wei Hu Contact: Souradeep Chakrabarti Contact: Li-Wen Hsu In this quarter, we have solved all the blocking issues and published the 14.0-RELEASE on Azure Marketplace, with complete architecture (amd64, arm64) and VM generation (gen1, gen2) support, available in both UFS and ZFS as the root file system. Work in progress tasks: β€’ Automating the image building and publishing process and merging to src/ release/. β€’ Building and publishing snapshot builds to Azure community gallery. The above tasks are sponsored by The FreeBSD Foundation, with resources provided by Microsoft. Open tasks: β€’ Update FreeBSD related doc at Microsoft Learn β€’ Support FreeBSD in Azure Pipelines β€’ Update Azure agent port to the latest version β€’ Upstream local modifications of Azure agent β€’ Port Linux Virtual Machine Extensions for Azure Sponsor: Microsoft for people in Microsoft, and for resources for the rest Sponsor: The FreeBSD Foundation for everything else ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on EC2 Links: FreeBSD/EC2 Patreon URL: https://www.patreon.com/cperciva Contact: Colin Percival FreeBSD is available on both amd64 (Intel and AMD) and arm64 (Graviton) EC2 instances. Work continues to ensure that upcoming instance types will be supported; most recently, changes were needed to support "7th generation" Intel and AMD instances. FreeBSD 14.0-RELEASE shipped with experimental ZFS-root AMIs and "cloud-init" AMIs. Additional "flavored" FreeBSD AMIs are planned, including "AMI Builder" and "minimal" (no debug symbols). A bug in the release-building process which resulted in 14.0-RELEASE AMIs shipping with duplicate lines in /etc/rc.conf has been corrected and future releases should not be affected. A bug in the ec2-aws-imdsv2-get utility which resulted in 14.0-RELEASE AMIs not supporting binary user-data files has been corrected and future releases should not be affected. This work is supported by Colin’s FreeBSD/EC2 Patreon. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Noteworthy changes in the documentation tree, manual pages, or new external books/documents. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Engineering Team Link: FreeBSD Documentation Project URL: https://www.freebsd.org/docproj/ Link: FreeBSD Documentation Project Primer for New Contributors URL: https://docs.freebsd.org/en/books/fdp-primer/ Link: Documentation Engineering Team URL: https://www.freebsd.org/administration/#t-doceng Contact: FreeBSD Doceng Team The doceng@ team is a body to handle some of the meta-project issues associated with the FreeBSD Documentation Project; for more information, see FreeBSD Doceng Team Charter. During the last quarter: Glen Barber stepped down from doceng. doceng would like to thank gjb@ for his service. Ceri Davies' commit bit was taken for safekeeping as per his request. doceng would like to thank ceri@ for his contributions. mhorne@ to be mentored by carlavilla@ to obtain a documentation commit bit. FreeBSD Handbook: The Handbook was updated to show that FreeBSD 14.0 is the latest release. FreeBSD Translations on Weblate Link: Translate FreeBSD on Weblate URL: https://wiki.freebsd.org/Doc/Translation/Weblate Link: FreeBSD Weblate Instance URL: https://translate-dev.freebsd.org/ Q4 2023 Status β€’ 17 team languages β€’ 203 registered users Languages β€’ Chinese (Simplified) (zh-cn) (progress: 7%) β€’ Chinese (Traditional) (zh-tw) (progress: 3%) β€’ Dutch (nl) (progress: 1%) β€’ French (fr) (progress: 1%) β€’ German (de) (progress: 1%) β€’ Indonesian (id) (progress: 1%) β€’ Italian (it) (progress: 5%) β€’ Korean (ko) (progress: 33%) β€’ Norwegian (nb-no) (progress: 1%) β€’ Persian (fa-ir) (progress: 2%) β€’ Polish (progress: 1%) β€’ Portuguese (progress: 0%) β€’ Portuguese (pt-br) (progress: 22%) β€’ Spanish (es) (progress: 35%) β€’ Turkish (tr) (progress: 2%) We want to thank everyone that contributed, translating or reviewing documents. And please, help promote this effort on your local user group, we always need more volunteers. FreeBSD Handbook working group Contact: Sergio Carlavilla β€’ The Network chapter has been rewritten β€’ The Jails chapter has been rewritten β€’ The next section to work on will be the file systems part: UFS, ZFS, Other File Systems FAQ Working Group Contact: Sergio Carlavilla A new FAQ was released alongside FreeBSD 14.0. FreeBSD Website Revamp - WebApps working group Contact: Sergio Carlavilla Working group in charge of creating the new FreeBSD Documentation Portal and redesigning the FreeBSD main website and its components. FreeBSD developers can follow and join the working group on the FreeBSD Slack channel #wg-www21. The work will be divided into three phases: 1. Redesign of the Manual Pages on web Scripts to generate the HTML pages using mandoc. (Complete, Approved by Doceng, Deploy Date Not Decided Yet) Public instance on https://man-dev.FreeBSD.org 2. Redesign of the FreeBSD main website New design, responsive and dark theme. (Almost Complete, Presented at EuroBSDCon) 3. Redesign of the Ports page on web Ports scripts to create an applications portal. (Work in progress) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Online Editor and Man Page Editor Links: FreeBSD Online Document Editor URL: https://github.com/Wang-Yan-Hao/FreeBSD-Online-Document-Editor FreeBSD Online Man Page Editor URL: https://github.com/Wang-Yan-Hao/man_page_editor Contact: Yan-Hao Wang Contact: Li-Wen Hsu This report provides a continued overview of the FreeBSD online editor and man page editor project, outlining recent efforts to enhance the documentation and manual page editing processes. In order to optimize the project’s structural integrity, we enlisted the expertise of a professional front-end programmer. We plan to release the editor soon and currently have some tasks that require additional support. 1. We are actively seeking a qualified individual to conduct a comprehensive front-end security review of the project. 2. A meticulous inspection of the JavaScript code is imperative to ensure its robustness and efficiency. We are looking for someone with expertise to thoroughly examine the codebase, identify any issues, and propose enhancements for optimal performance. 3. Since there is currently no existing JavaScript library for rendering mandoc, I had to create my own. However, there are still some hidden errors that emerge during the editing process. We are seeking assistance to fix these rendering issues. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Wiki Links: Wiki URL: https://wiki.freebsd.org Contact: Wiki administration Plans are underway to familiarize our audience on Discord with the wiki (there are too many "silos" in our FreeBSD community). Contact Setesh on the FreeBSD Discord for more information. Preliminary work is being done on updating the wiki software itself. Continuing to run MoinMoin requires a jail with a downrev version of Python. The MoinMoin project itself seems to have stalled in the middle of a redesign; at a minimum, a complete upgrade of the backend database would be needed. Alternatives that are under consideration include MediaWiki and DocuWiki; see https://wiki.freebsd.org/Wiki/NextGeneration. Most of the discussion is occurring on Matrix; please contact wiki-admin@FreeBSD.org if you would like to participate. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ KDE on FreeBSD Links: KDE/FreeBSD initiative URL: https://freebsd.kde.org/ FreeBSD — KDE Community Wiki URL: https://community.kde.org/FreeBSD Contact: Adriaan de Groot The KDE on FreeBSD project packages CMake, Qt, and software from the KDE Community, for the FreeBSD ports tree. The software includes a full desktop environment called KDE Plasma (for both X11 and Wayland) and hundreds of applications that can be used on any FreeBSD machine. The KDE team is part of desktop@ and x11@, building the software stack to make FreeBSD beautiful and usable as a daily-driver graphical desktop workstation. The notes below describe mostly ports for KDE, but also include items that are important for the entire desktop stack. Infrastructure CMake was updated several times and is now version 3.28.1, the latest upstream release. FreeBSD ports are once again fully up-to-date. Qt5 is now on long-term support and updates only rarely. The KDE patch collection is a community-supported branch of Qt which pulls in upstream patches and fixes from the KDE community, and updated to 5.15.12. There were several deprecations (see below) in the Qt5 ports. Qt6 and KDE’s upcoming megarelease of KDE Plasma 6 (scheduled for 2024q1) are the next major milestone for the KDE team. Qt6 was updated to version 6.6.1 along with the Python bindings for Qt, PySide. An alpha-release of KDE Frameworks 6 was added to the ports tree. KDE Stack KDE Gear releases happen every quarter, KDE Plasma updates once a month, and KDE Frameworks have a new release every month as well. These (large) updates land shortly after their upstream release and are not listed separately. β€’ KDE Frameworks reached version 5.112. The KDE Frameworks 5 series is winding down, although it will a few months still until it enters long-term support upstream. β€’ KDE Plasma Desktop was updated to version KDE Plasma 5.27.10. β€’ KDE Gear updated to 23.08.4. β€’ KDE Frameworks 6 (alpha) 5.247 was updated in the ports tree. β€’ KDE Plasma Desktop 6 (beta 2) 5.91.0 was updated in the ports tree. Related Ports The KDE ecosystem includes a wide range of ports — most maintained by kde@, all building on a shared base of Qt and KDE Frameworks. The KDE team updates them all as needed. This quarter the KDE team would like to thank Tobias C. Berner, Gleb Popov and Jason E. Hale again for keeping things up-to-date. Many ports have been "flavorized" to support a Qt5 and a Qt6 flavor in the ports tree. Special mention to: β€’ New port x11/xwaylandvideobridge. By design, X11 applications can’t access window or screen contents for Wayland clients. The video bridge improves Wayland support for screen sharing tools like Discord, MS Teams, Skype, and more. Screen sharing is fully under the control of the Wayland user. β€’ Update for multimedia/mlt7 which was updated to 7.20.0. β€’ Update for sysutils/bsdisks which was updated to 0.33. β€’ Bugfix for devel/llvm15 to make devel/kdevelop work again. β€’ Security fixes for www/qt5-webengine and www/qt6-webengine. Deprecations Web browsers are huge, and have a considerable security surface. The venerable www/qt5-webkit WebKit port was removed on the last day of 2023. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ State of GNOME 44 Links: GNOME URL: https://www.gnome.org/ Development repository URL: https://codeberg.org/olivierd/freebsd-ports-gnome Contact: FreeBSD GNOME Team Contact: Olivier Duchateau < duchateau.olivier@gmail.com> GNOME is a full desktop environment which is mainly based on GLib, GTK3/GTK4, and libadwaita. It provides two window managers or compositors: x11-wm/mutter and x11-wm/metacity. Currently in the ports collection, x11/gnome-shell is not supported by upstream anymore. As it is a lot of work, in order to have GNOME 44 available for users, I decided to split this update, because it impacts several ports. As a maintainer of x11/budgie and Pantheon desktop (a window manager based on x11-wm/mutter, developed for elementary OS) I need more recent versions of some GNOME libraries. Firstly I worked on WebKitGTK. The 4.0 "legacy" API is almost not used by GNOME’s libraries. The bare minimum is the 4.1 API. I created webkit.mk for the Mk/Uses framework, in order to flavorize www/webkit2-gtk3. There is an ongoing effort, but currently it is too unstable. Often applications such as Epiphany, mail clients (Geary, Evolution), or the online accounts panel in package:sysutils/gnome-control-center dump core. Nonetheless, remainder of desktop is usable and the latest release (44.7) of GNOME Shell is functional. I have begun sending my first patches for review (as well as those in Bugzilla). β€’ D43183 β€’ D43230 β€’ D43244 β€’ D40489 I have also ported the GNOME Flashback session module. It depends on x11-wm/ metacity and x11-toolkits/libwnck3. I also maintain a documentation, and we can see various desktops available. GNOME 45 is almost finished, except for GNOME Shell extensions. For this release I will focus on Wayland support (bug #258042 and bug #271836). Tests and patches are welcomed, especially for WebKitGTK. Next months I plan to work on: β€’ Allowing selecting a session in display manager (gdm), it is regression with our patches. β€’ Fixing sharing network (VNC, SSH) panel in gnome-control-center and backport for bug #275900. β€’ Continuing to update applications and libraries for GNOME 45. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ GCC on FreeBSD Links: GCC Project URL: https://gcc.gnu.org/ GCC 10 release series URL: https://gcc.gnu.org/gcc-10/ GCC 11 release series URL: https://gcc.gnu.org/gcc-11/ GCC 12 release series URL: https://gcc.gnu.org/gcc-12/ GCC 13 release series URL: https://gcc.gnu.org/gcc-13/ Contact: Lorenzo Salvadore Updating GCC default version to 13 is moving ahead. Thanks to Antoine Brodin who ran the exp-runs and to all other developers and ports maintainers involved. As you might remember from last quarter, additional patches were tested together with the default version updates. Some of them have already been merged: β€’ lang/gcc11 has switched back to STANDARD_BOOTSTRAP and has been updated to 11.4.0; β€’ lang/gcc13 has been updated to version 13.2.0. About half of the open bugs have been fixed, but another half remains. If you maintain any of the affected ports, please try to fix your port(s) and/or get your port buildable with the compiler in base. This quarter many bug reports have also been opened about GCC. As soon as the default GCC version update is finished, all of those bugs will be addressed. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Third Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Containers and FreeBSD: Pot, Potluck and Potman Links: Pot organization on GitHub URL: https://github.com/bsdpot Contact: Luca Pizzamiglio (Pot) Contact: Bretton Vine (Potluck) Contact: Michael Gmelin (Potman) Pot is a jail management tool that also supports orchestration through Nomad. During this quarter, Pot 0.16.0 was released containing a number of features and fixes, including a new setting to prevent direct traffic between VNET pots and new attributes to configure pot stop behavior. There were also maintenance/ stability releases to potnet (0.5.0) and a nomad-pot-driver (0.10.0). Potluck aims to be to FreeBSD and Pot what Dockerhub is to Linux and Docker: a repository of Pot flavours and complete container images for usage with Pot and in many cases Nomad. One of the new container images that have been added during the last quarter is Zincsearch, a more light-weight alternative to Elasticsearch written in Go. The Mastodon container is meanwhile powering the public mastodon.africa instance. Also, we got some more publicity: BSD Now Episode 536 is titled "Pot-flavored Jails". As always, feedback and patches are welcome. Sponsors: Nikulipe UAB, Honeyguide Group From nobody Sat Feb 17 21:19:15 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TchWh4f0qz59jKm; Sat, 17 Feb 2024 21:19:28 +0000 (UTC) (envelope-from bofh@freebsd.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TchWh3rrDz4cjY; Sat, 17 Feb 2024 21:19:28 +0000 (UTC) (envelope-from bofh@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708204768; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=c+GNl0VmwcetZyuZz/SwP8w9s2HOI3QiPSKmfWJU0vU=; b=SvsaZydpnbbD9xsG/zlXwxeDczuCbZqNH1KHPluUPzsUf8fwW2OdUikUkkpKYL0u3LAFbS iF8ZJQJ0yI9vvLWBCtDCHO6neTk5kdq50hTpaqWEYfoM+1CEI5K3y2eoaWueKpuesdsrJk xLum6gzAjhvohqYrwD+boEz1g8x3DjBZSDTL4hZV6nLjUiw/u+8YXi7+tiOOyHZIR6lDeN iebfgQ0JnfuosnXtDuVn9Jg+L1cRx401qUHNwSURvIeU9oXwc/Fb6XPt+5GHFdQkqlyzVh JzV6emQDcFINlJCGGXrPP5odgLuqPDhHZ8nhty1IggGvegJILk2pDEMWkXp0Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708204768; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=c+GNl0VmwcetZyuZz/SwP8w9s2HOI3QiPSKmfWJU0vU=; b=GBA80WJU8jbuCZiFETbJKyMx4ChWJn12nAMUlgAWqratl4QSP+u7qPm4R/MtZ/z9vVTlBK d+Q1tbDeo0BJApSoY+67eg5lRVqwEmtwsvK4OPCVW+leiGkJHhAP62NC0ct0GP7iNGJh/V e2rnIsSvjoGdjemonkRytZtJg0jppMdP1qywmMt643MUjUryKKpg8gWpMI0f9KYpOHYhUB ak0f5iaE0BDm1CBAo6qit8Cg9yrFQWAmHXuIFeJrAC65AckACeWM/viR9u0Wpwnl2Ombyf lX7LJCyOoGEF0gcNSowir0fNhgqZIlrxulsSMqDAXZ9l8j7PKEyCbfbjSii+Rw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1708204768; a=rsa-sha256; cv=none; b=vMioES0Ex9F7iY0aecUEKzuKjyUPchOwgYO87Aycng2orlOEbA3RSR7ox4dlAwAxJSawzC 6u5OzMVHh5UlKOUh5RK2gUst4hk4823hpCAiEe9W4zQtVGzsVH5KxWRbNySgsonBVUYzUq 1VfKF/nWJB6MAtqRNIwaco6Tou0ZtOd3p9NxmHPju7Y+w9iqzhOtbkzhfoc/DkH6G8cKsL Y7P1X24QUDvC8CzacNiBjRJfZ2lpfb8jM2pPr1TeW6TDwqPqhsB2Gq0GWLZdBp7PZF0mv7 TxqeEA7w9vnAgUwgJmoEd0E5iZZK3Gmgli6z6Sqthp8Z7oGsdTkwTHD23zyaGA== Received: from mx.bofh.network (mx.bofh.network [5.9.249.227]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: bofh/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TchWg5llgz1Bbm; Sat, 17 Feb 2024 21:19:27 +0000 (UTC) (envelope-from bofh@freebsd.org) Received: from smtpclient.apple ( [217.117.226.147]) by mx.bofh.network (OpenSMTPD) with ESMTPSA id 8e95a7d4 (TLSv1.2:ECDHE-ECDSA-AES256-GCM-SHA384:256:NO); Sat, 17 Feb 2024 21:19:25 +0000 (UTC) Content-Type: multipart/signed; boundary="Apple-Mail=_40F3F8C3-7EDB-45F7-8588-9E05D4B4C634"; protocol="application/pgp-signature"; micalg=pgp-sha512 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\)) Subject: Re: files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz not found -- snapshot corrupt. From: Moin Rahman In-Reply-To: Date: Sat, 17 Feb 2024 22:19:15 +0100 Cc: Tomoaki AOKI , Mario Marietto , freebsd-hackers , Mark Millard Message-Id: References: <7AA6A6B8-9BAE-4B03-9EF4-4A4D242582B4@yahoo.com> <20240215184926.42aafbbdd5644be492f600fc@dec.sakura.ne.jp> To: FreeBSD Mailing List X-Mailer: Apple Mail (2.3731.700.6.1.1) --Apple-Mail=_40F3F8C3-7EDB-45F7-8588-9E05D4B4C634 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 > On Feb 15, 2024, at 6:22 PM, Mark Millard wrote: >=20 > On Feb 15, 2024, at 01:49, Tomoaki AOKI = wrote: >=20 >> Dropping freebsd-current ML as this doesn't related current (main) = but >> deprecated release (12.4). >> Dropping freebsd-arm ML as I'm not subscribed and surely be bounced, >> and the problem is ports specific. >> Adding freebsd-ports ML as this is ports related. >>=20 >> Commented inline below. >>=20 >> On Wed, 14 Feb 2024 19:15:43 -0800 >> Mark Millard wrote: >>=20 >>> On Feb 14, 2024, at 18:23, Warner Losh wrote: >>>=20 >>>> You may need to grab the repo. You may have to back up to = December's ports tree... >>>=20 >>> My understanding was that portsnap was staying installed >>> on 13.*-RELEASE until the last version is EOL and that >>> portsnap servers would be kept operational with valid >>> content until then. >>>=20 >>> I would have guessed that this would mean that 12.4-RELEASE >>> or the like would also be able to use the portsnap it >>> contains over that same time frame. >>>=20 >>> Am I wrong? >>>=20 >>> As stands, git use on 12.4-RELEASE would require bootstrapping >>> git somehow, possibly via portsnap, building git, and then >>> installing git (and the other stuff required). >>>=20 >>> (Not that I use portsnap.) >>=20 >> Me too don't use portsnap, but if you want to switch to git, maybe >> installing git from pkg (as 12.x is already EoL'ed, extract git.pkg >> from disc1.iso for armv7, install it) >=20 > There is/was no armv7 disc1.iso (or dvd1.iso) to do > this with. >=20 > = http://ftp-archive.freebsd.org/pub/FreeBSD-Archive/old-releases/ISO-IMAGES= /12.4/ >=20 > has only the following for 12.4-RELEASE for armv7: >=20 > FreeBSD-12.4-RELEASE-arm-armv7-BANANAPI.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-CUBIEBOARD.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-CUBIEBOARD2.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-CUBOX-HUMMINGBOARD.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-GENERICSD.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-RPI2.img.xz > FreeBSD-12.4-RELEASE-arm-armv7-WANDBOARD.img.xz >=20 > No dvd1/disc1/memstick material was ever produced for > armv7 12.4-RELEASE (or for any other armv7 release as > far as I know). None of the above *.img.xz files > includes any installed port-packages, nor a populated > /usr/ports/ tree. >=20 >=20 > But the /usr/ports/ tree could be extracted from a > *.iso or *.img that is not for the armv7 but happens > to contain a /usr/ports/ : /usr/ports/ is not platform > specific in its content. (Avoid powerpc* because of > big endian file system issues?) >=20 >> and clone repo into >> clean /usr/ports would be better not to poisoning by different = metadata. >> And check out the ports tree of which just befere 12.4 was obsoleted. >> After that, ports tree starts dropping support for 12.x. >>=20 >> Additional note: >> I myseld don't even tried, but for portsnap users who needs (forced) >> to switch to git, net/gitup could be your friend. >> IIUC, it would be something like csup for cvs or svnup for = subversion. >>=20 >>=20 >>>> Warner >>>>=20 >>>> On Wed, Feb 14, 2024, 5:51=E2=80=AFPM Mario Marietto = wrote: >>>> Hello. >>>>=20 >>>> After a lot of work I've been able to install FreeBSD 12.04 for = armv7 on my ARM Chromebook. Now I would like to install some ports. This = is what happens when I try to get a fresh ports tree : >>>>=20 >>>> marietto@freebsd:/usr # sudo portsnap fetch extract >>>>=20 >>>> .... >>>> /usr/ports/databases/py-sqlalchemy10/ >>>> /usr/ports/databases/py-sqlalchemy11/ >>>> /usr/ports/databases/py-sqlalchemy12/ >>>> /usr/ports/databases/py-sqlalchemy13/ >>>> /usr/ports/databases/py-sqlalchemy14/ >>>> /usr/ports/databases/py-sqlalchemy20/ >>>> /usr/ports/databases/py-sqlcipher3/ >>>> = files/edd962f76ea4b5869f3c6f8ee5438fb9750b802d02bb8035fe1b7bd0a8ba7401.gz = not found -- snapshot corrupt. >>>>=20 >>>> I repeated the "portsnap fetch extract" command,but I always get = the same error. >>>>=20 >>=20 >=20 > =3D=3D=3D > Mark Millard > marklmi at yahoo.com >=20 >=20 Hi Everyone, It has comeup multiple times in discussion about howto bootstrap a ports tree without portsnap in base when the decision was made to cut the chord for portsnap. Or even discussion came up about having gitup in the base or using a git pkg to bootstrap. =46rom my perspective it's as simple as the following for this specific case: # fetch https://cgit.freebsd.org/ports/snapshot/ports-12-eol.tar.gz # tar -zxf ports-12-eol.tar.gz --strip-components 1 -C /usr/ports Other users who need a more recent snapshot can definitely find their way. Snapshot archive of every git commit is available for download without the need of git checkout. Although this does not create or include the git meta information to easily update again using git but once the portstree has been bootstrapped and git installed; sky is the limit. Kind regards, Moin --Apple-Mail=_40F3F8C3-7EDB-45F7-8588-9E05D4B4C634 Content-Transfer-Encoding: 7bit Content-Disposition: attachment; filename=signature.asc Content-Type: application/pgp-signature; name=signature.asc Content-Description: Message signed with OpenPGP -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEETfdREoUGjQZKBS+fvbm1phfAvJEFAmXRItNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDRE Rjc1MTEyODUwNjhEMDY0QTA1MkY5RkJEQjlCNUE2MTdDMEJDOTEACgkQvbm1phfA vJGI+Q//VAGTUb3fLkAJQN5HgiK2NiJ/BoTFT677qgRqZgwjxxZ4R/yMki7MnhCf yWLZH3oa39GmRPF8gaS9SdHjzX7w2L30jfnMiIrYUlKUEYcbDmDsIoDq04kY+1IP dOhRrKMKnkK7RJXazmHsZIEmpHJLg3iNPoweyU31J15/ldvr3Jqv5+XfGmvIN3Ba uqbAYMjccOn4W1cmBHyQjJ972UAudE+ZkdPRPJdk9rW6iIwUHLnGRTJ5EawAehAR U+6/mO8l0vsBb7kkxHdBFFPIwAEinUgwji1SvUaKafvp64Zy0AaLRbaItXvJq65h 5hFY49i7T3859Wrmi4rbWbm4GkDQg4kRxlrU/2IPDE2T8860t0sRWI2OnCj4/cHO 92JR5P7CtOrJAiyv5Amr6C70/m64Mc87vsASDW1qpbFGFBij4zC9VUf5tWols2yB UPOXeqgcx4CmafUgu7W5vQliV02wREFuqAiPhxVT0RXNYergNv/C1Hqx1GkxAlem gkUuWEOhoivyXWzpLobRhKB1/XAc+Xb3wa8EdkZBfVY4RWO4HCW3fFxMCidCKPgZ YTMFq61Fmol4n5xNU2gadFevaX06o+Y8FhyjmVPkBl62YGV//ECzJwGzpFaCAwi6 qLZTGP0FxP0gSulHlnL6lUICDrQOZE2s8ItaPM4DkExfm53fvBQ= =HDww -----END PGP SIGNATURE----- --Apple-Mail=_40F3F8C3-7EDB-45F7-8588-9E05D4B4C634-- From nobody Sun Feb 18 14:38:52 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Td7bJ1PvYz59qnL for ; Sun, 18 Feb 2024 14:39:08 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "m5p.com", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Td7bH2CMtz40PD for ; Sun, 18 Feb 2024 14:39:07 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of george+freebsd@m5p.com designates 74.104.188.4 as permitted sender) smtp.mailfrom=george+freebsd@m5p.com; dmarc=none Received: from [IPV6:2001:470:1f07:15ff::26] (court.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:26]) (authenticated bits=0) by mailhost.m5p.com (8.17.1/8.15.2) with ESMTPSA id 41IEcqU8019352 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO) for ; Sun, 18 Feb 2024 09:38:58 -0500 (EST) (envelope-from george+freebsd@m5p.com) Message-ID: Date: Sun, 18 Feb 2024 09:38:52 -0500 List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: FreeBSD Security Advisory FreeBSD-SA-24:01.bhyveload From: George Mitchell To: FreeBSD Hackers References: <20240214070706.C6CD226744@freefall.freebsd.org> Content-Language: en-US Autocrypt: addr=george+freebsd@m5p.com; keydata= xjMEZaHDbxYJKwYBBAHaRw8BAQdA2W6oBfS8haXY0/Ft4zS1OTLYfC8EBIADPTgMQdh85C3N KEdlb3JnZSBNaXRjaGVsbCA8Z2VvcmdlK2ZyZWVic2RAbTVwLmNvbT7CmQQTFgoAQRYhBDpv v9n4+UzMLAJ8EZocD3futmd9BQJlocSiAhsDBQkFo5qABQsJCAcCAiICBhUKCQgLAgQWAgMB Ah4HAheAAAoJEJocD3futmd9SxwBAJUi6DNdVhWCZBTv5XGy1g0JgApLWe/3S0M0zz9sn7/L AQCcJcV5k5s2rt9J5C1AUm6XVsuneVvIWXO5j1GKWk0NC844BGWhw28SCisGAQQBl1UBBQEB B0AaFz/6B95RRvjOdLZr5fSdhuIHvwr24H3ePDZSw6wlUwMBCAfCfgQYFgoAJhYhBDpvv9n4 +UzMLAJ8EZocD3futmd9BQJlocNvAhsMBQkFo5qAAAoJEJocD3futmd9RXsBANwRD9RE56F6 /jeZOrujHICLcgPiOt50Y6866v9OUTjUAP9GlC1aopfBpNwuPLJBam7oBaGqvY98VDhzOjoT 7DNbCQ== In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------SYu0Wj0EWWYGOznBOJufhuSZ" X-Spam-Status: No, score=0.2 required=10.0 tests=HELO_MISC_IP,HELO_NO_DOMAIN autolearn=no autolearn_force=no version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on mattapan.m5p.com X-Rspamd-Queue-Id: 4Td7bH2CMtz40PD X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.27 / 15.00]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_LONG(-0.99)[-0.987]; NEURAL_HAM_MEDIUM(-0.74)[-0.742]; NEURAL_HAM_SHORT(-0.25)[-0.246]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; MIME_BASE64_TEXT(0.10)[]; XM_UA_NO_VERSION(0.01)[]; FROM_HAS_DN(0.00)[]; RCVD_TLS_ALL(0.00)[]; TAGGED_FROM(0.00)[freebsd]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DMARC_NA(0.00)[m5p.com]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_ALL(0.00)[]; HAS_ATTACHMENT(0.00)[]; ASN(0.00)[asn:701, ipnet:74.104.0.0/16, country:US]; ARC_NA(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; RCVD_COUNT_ONE(0.00)[1]; MLMMJ_DEST(0.00)[freebsd-hackers@FreeBSD.org]; MID_RHS_MATCH_FROM(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~] This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------SYu0Wj0EWWYGOznBOJufhuSZ Content-Type: multipart/mixed; boundary="------------KUuOeHTt59VEepqK1fDyLsxv"; protected-headers="v1" From: George Mitchell To: FreeBSD Hackers Message-ID: Subject: Re: FreeBSD Security Advisory FreeBSD-SA-24:01.bhyveload References: <20240214070706.C6CD226744@freefall.freebsd.org> In-Reply-To: --------------KUuOeHTt59VEepqK1fDyLsxv Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64 T24gMi8xNi8yNCAwODo0OCwgR2VvcmdlIE1pdGNoZWxsIHdyb3RlOg0KPiBGb3IgYSBjb21w bGljYXRlZCByZWFzb24sIEkgYXZvaWQgImZyZWVic2QtdXBkYXRlIiBhbmQgdXBkYXRlIHRo ZQ0KPiBrZXJuZWwgYW5kIHRoZSB3b3JsZCBmcm9tIHNvdXJjZS4NCj4gWy4uLiBkaXNjdXNz aW9uIHByb3ZpbmcgSSBhbSBhbiBpZGlvdCAuLi5dDQo+IElzIHRoZXJlIGEgaGFjayB0aGF0 IGxldHMgbWUgZm9vbCBmcmVlYnNkLXZlcnNpb24gaW50byByZXBvcnRpbmcgLXAxMA0KPiBp bnN0ZWFkIG9mIC1wOT/CoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKg wqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoMKgwqDCoCAtLSBHZW9y Z2UNCj4gWy4uLl0NCg0KVGhlIGhhY2sgKGFuZCBpdCdzIHJpZGljdWxvdXNseSB1Z2x5KSBp cyB0byBlZGl0IC9iaW4vZnJlZWJzZC12ZXJzaW9uDQphbmQgY2hhbmdlOg0KVVNFUkxBTkRf VkVSU0lPTj0iMTMuMi1SRUxFQVNFLXA5Ig0KdG86DQpVU0VSTEFORF9WRVJTSU9OPSIxMy4y LVJFTEVBU0UtcDEwIg0KDQpTb3JyeSBmb3IgaW5mbGljdGluZyB0aGlzIG9uIGFsbCBvZiB5 b3UgLi4uICAgICAgICAgICAgICAtLSBHZW9yZ2UNCg== --------------KUuOeHTt59VEepqK1fDyLsxv-- --------------SYu0Wj0EWWYGOznBOJufhuSZ Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc" -----BEGIN PGP SIGNATURE----- wnsEABYIACMWIQQ6b7/Z+PlMzCwCfBGaHA937rZnfQUCZdIWfAUDAAAAAAAKCRCaHA937rZnfYZB AQDR+lHGxyoQKz6UBhEwn11zdqLZJQemSL1bivClgP1RKwD9HnocDztA0uq1zBv7L5C8BjLpjyU0 muf3mACS8Mbk5g8= =UL3x -----END PGP SIGNATURE----- --------------SYu0Wj0EWWYGOznBOJufhuSZ--