From nobody Mon Feb 12 21:04:29 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYcQt1KMDz58t9d for ; Mon, 12 Feb 2024 21:04:38 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYcQs2CnFz4DZh for ; Mon, 12 Feb 2024 21:04:37 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates 2607:f3e0:0:1::12 as permitted sender) smtp.mailfrom=mike@sentex.net Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 41CL4VPN079398 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL) for ; Mon, 12 Feb 2024 16:04:31 -0500 (EST) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:3980:d2bd:9109:7114] ([IPv6:2607:f3e0:0:4:3980:d2bd:9109:7114]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 41CL4SkN068158 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Mon, 12 Feb 2024 16:04:30 -0500 (EST) (envelope-from mike@sentex.net) Message-ID: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> Date: Mon, 12 Feb 2024 16:04:29 -0500 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: FreeBSD-STABLE Mailing List From: mike tancsa Subject: src upgrade locally vs nfs from RELENG_12 to RELENG_13 Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 64.7.153.18 X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.19 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.80)[-0.804]; R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[199.212.134.19:received]; XM_UA_NO_VERSION(0.01)[]; TO_DN_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; FREEFALL_USER(0.00)[mike]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA]; MIME_TRACE(0.00)[0:+]; MID_RHS_MATCH_FROM(0.00)[]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DMARC_NA(0.00)[sentex.net]; RCVD_TLS_ALL(0.00)[] X-Rspamd-Queue-Id: 4TYcQs2CnFz4DZh Hi All, Starting to plan to upgrade a few remaining RELENG_12 servers to 13.  Was hoping I could just do an nfs mount of /usr/src and /usr/obj of a 13 build server, but it does not seem to work when going from RELENG_12 to RELENG_13. root@proxytest:/usr/src # make installkernel -------------------------------------------------------------- >>> Install check kernel -------------------------------------------------------------- -------------------------------------------------------------- >>> Installing kernel GENERIC on Mon Feb 12 20:58:06 UTC 2024 -------------------------------------------------------------- cd /usr/obj/usr/src/amd64.amd64/sys/GENERIC;  MACHINE_ARCH=amd64 MACHINE=amd64  CPUTYPE= CC="cc -target x86_64-unknown-freebsd13.3 --sysroot=/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX="c++  -target x86_64-unknown-freebsd13.3 --sysroot=/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"  CPP="cpp -target x86_64-unknown-freebsd13.3 --sysroot=/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"  AS="as" AR="ar" ELFCTL="elfctl" LD="ld"  LLVM_LINK="" NM=nm OBJCOPY="objcopy" RANLIB=ranlib STRINGS=  SIZE="size" STRIPBIN="strip" PATH=/usr/obj/usr/src/amd64.amd64/tmp/bin:/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/libexec::/sbin:/bin:/usr/sbin:/usr/bin make  KERNEL=kernel install ld-elf.so.1: /usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin/make: Undefined symbol "regcomp@FBSD_1.6" *** Error code 1 Stop. make[1]: stopped in /usr/src *** Error code 1 root@proxytest:/usr/src # But if I clone the releng13 source locally and then do a make buildworld/buildkernel, doing a make installkernel works.  Is there a way to get it to work over nfs ? What do I need to build on the buildserver so I dont have to build locally each time on the RELENG_12 boxes I want to upgrade ?     ---Mike From nobody Mon Feb 12 21:52:15 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYdTx2VCWz590db for ; Mon, 12 Feb 2024 21:52:21 +0000 (UTC) (envelope-from robert@rrbrussell.com) Received: from wfhigh7-smtp.messagingengine.com (wfhigh7-smtp.messagingengine.com [64.147.123.158]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYdTw45Trz4Kkh for ; Mon, 12 Feb 2024 21:52:20 +0000 (UTC) (envelope-from robert@rrbrussell.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=rrbrussell.com header.s=fm3 header.b="JB/MUcRG"; dkim=pass header.d=messagingengine.com header.s=fm3 header.b="h /TBmph"; dmarc=pass (policy=quarantine) header.from=rrbrussell.com; spf=pass (mx1.freebsd.org: domain of robert@rrbrussell.com designates 64.147.123.158 as permitted sender) smtp.mailfrom=robert@rrbrussell.com Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailfhigh.west.internal (Postfix) with ESMTP id 30BDB180007C for ; Mon, 12 Feb 2024 16:52:19 -0500 (EST) Received: from mailfrontend2 ([10.202.2.163]) by compute3.internal (MEProxy); Mon, 12 Feb 2024 16:52:19 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rrbrussell.com; h=cc:content-transfer-encoding:content-type:content-type:date :date:from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to; s=fm3; t=1707774738; x=1707861138; bh=DTqb53JgOouegdH6Uptrng+5gzFiUVol0qmYWBhlsCM=; b= JB/MUcRGXTPvxgEFTo6bBeV5iQmwqcvKoHhKguZ/nJK3DDpPVDBf8M8YDUSdw/AR ceCb/a19V0HAJNyXxYAJinTpAjv8HoySjVpb8AsFJHf3+wdDv497SmRAh0NLuXSw 4yDXBbYTZKmi+vGbdGH1jvwk4Y8VOkxqeeGIcrgKxexv4meVJsgSD9hbj64FyIQj +EHFMk4T8eUoKECJ0whs4VtchHEKKFa2jBMu8Z8XbyaI2N7naa2E+HsvyKqnzJdM hTBa/z3wDDTIX5YINbD8JKhqov900y/MzZ6cPVOcMb8fg5VHpYNTfPPBtVPJJ6aj Er4zQZXPabdOB/jmzbI57Q== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :content-type:date:date:feedback-id:feedback-id:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm3; t=1707774738; x= 1707861138; bh=DTqb53JgOouegdH6Uptrng+5gzFiUVol0qmYWBhlsCM=; b=h /TBmphpg44tTa0q66XW7uESGHw3smJoE2V0p3IP0gNO6JJLpFwvHuKhxt9DuzgV3 MqgAhj+bCM0F7OHbIft18LMmR0vUfJ3VxpVvAs13/92Lbwv8LwlLkpaIGFOelRVe PFrzkwojyK+DoCo5VoCx5bMrUJ4+ul/oi2latRhU7MmqfH5kWAK15JpnI+dSm2vL sEQdV+atmPEC/WS0g/fVAAC98Z4dXfbhoY88Jfy47E8/K7NHgHs2wUIsX5k/v0Qn 4zcKFdeSOPWjX1XF9+2ZUTP/kppK3gcuIQXw64uQNkl5L2yoUWuUhApWAiCnLd7Y nyzqD35FLpYidxqKmnJXg== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrudefgdduhedvucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpeffhffvuffkjghfofggtgfgsehtqh ertdertdejnecuhfhrohhmpedftfhosggvrhhtucftrdcutfhushhsvghllhdfuceorhho sggvrhhtsehrrhgsrhhushhsvghllhdrtghomheqnecuggftrfgrthhtvghrnhephfehfe ffieeihfdutdeugfffjeeiffeuhedtgfejfeeugeegheekgfdvvedtffeknecuvehluhhs thgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrhhomheprhhosggvrhhtsehrrh gsrhhushhsvghllhdrtghomh X-ME-Proxy: Feedback-ID: ie421460a:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA for ; Mon, 12 Feb 2024 16:52:18 -0500 (EST) Date: Mon, 12 Feb 2024 15:52:15 -0600 From: "Robert R. Russell" To: stable@freebsd.org Subject: Re: src upgrade locally vs nfs from RELENG_12 to RELENG_13 Message-ID: <20240212155215.5c95bb51@venus.private.rrbrussell.com> In-Reply-To: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> References: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> X-Mailer: Claws Mail 3.19.1 (GTK+ 2.24.33; amd64-portbld-freebsd14.0) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Bar: --- X-Spamd-Result: default: False [-4.00 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.996]; DMARC_POLICY_ALLOW(-0.50)[rrbrussell.com,quarantine]; R_DKIM_ALLOW(-0.20)[rrbrussell.com:s=fm3,messagingengine.com:s=fm3]; R_SPF_ALLOW(-0.20)[+ip4:64.147.123.128/27]; MIME_GOOD(-0.10)[text/plain]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; DWL_DNSWL_NONE(0.00)[messagingengine.com:dkim]; RCPT_COUNT_ONE(0.00)[1]; FREEFALL_USER(0.00)[robert]; ASN(0.00)[asn:29838, ipnet:64.147.123.0/24, country:US]; MID_RHS_MATCH_FROMTLD(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[64.147.123.158:from]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[rrbrussell.com:+,messagingengine.com:+] X-Rspamd-Queue-Id: 4TYdTw45Trz4Kkh On Mon, 12 Feb 2024 16:04:29 -0500 mike tancsa wrote: > Hi All, >=20 > Starting to plan to upgrade a few remaining RELENG_12 servers to 13.=C2= =A0=20 > Was hoping I could just do an nfs mount of /usr/src and /usr/obj of a > 13 build server, but it does not seem to work when going from > RELENG_12 to RELENG_13. >=20 > root@proxytest:/usr/src # make installkernel > -------------------------------------------------------------- > >>> Install check kernel =20 > -------------------------------------------------------------- > -------------------------------------------------------------- > >>> Installing kernel GENERIC on Mon Feb 12 20:58:06 UTC 2024 =20 > -------------------------------------------------------------- > cd /usr/obj/usr/src/amd64.amd64/sys/GENERIC;=C2=A0 MACHINE_ARCH=3Damd64=20 > MACHINE=3Damd64=C2=A0 CPUTYPE=3D CC=3D"cc -target x86_64-unknown-freebsd1= 3.3=20 > --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp=20 > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX=3D"c++=C2=A0 -target=20 > x86_64-unknown-freebsd13.3 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp=20 > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"=C2=A0 CPP=3D"cpp -target=20 > x86_64-unknown-freebsd13.3 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp=20 > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"=C2=A0 AS=3D"as" AR=3D"ar"=20 > ELFCTL=3D"elfctl" LD=3D"ld"=C2=A0 LLVM_LINK=3D"" NM=3Dnm OBJCOPY=3D"objco= py"=20 > RANLIB=3Dranlib STRINGS=3D=C2=A0 SIZE=3D"size" STRIPBIN=3D"strip"=20 > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/bin:/usr/obj/usr/src/amd64.amd64/= tmp/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/usr/bin:/usr/obj/usr/src/amd6= 4.amd64/tmp/legacy/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/bin= :/usr/obj/usr/src/amd64.amd64/tmp/legacy/bin:/usr/obj/usr/src/amd64.amd64/t= mp/legacy/usr/libexec::/sbin:/bin:/usr/sbin:/usr/bin=20 > make=C2=A0 KERNEL=3Dkernel install > ld-elf.so.1: /usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin/make:=20 > Undefined symbol "regcomp@FBSD_1.6" > *** Error code 1 >=20 > Stop. > make[1]: stopped in /usr/src > *** Error code 1 >=20 > root@proxytest:/usr/src # >=20 >=20 > But if I clone the releng13 source locally and then do a make=20 > buildworld/buildkernel, doing a make installkernel works.=C2=A0 Is there = a=20 > way to get it to work over nfs ? What do I need to build on the=20 > buildserver so I dont have to build locally each time on the > RELENG_12 boxes I want to upgrade ? >=20 > =C2=A0=C2=A0=C2=A0 ---Mike >=20 >=20 The most likely problem: - Toolchain ABI compatibility How to fix the problem: - Create a 12-RELEASE jail with a clean /etc/make.conf and /usr/src and build inside that. - Share the resulting /usr/obj with the host needing to be upgraded. The problem in more detail: The toolchain stages of building FreeBSD link to the libraries on the build host. Since your build host is from FreeBSD 13-* the toolchain programs are linked to a slightly newer ABI than the FreeBSD 12-* targets support. From nobody Mon Feb 12 22:11:07 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYdvt6Z93z592LH for ; Mon, 12 Feb 2024 22:11:22 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Received: from plan-b.pwste.edu.pl (plan-b.pwste.edu.pl [IPv6:2001:678:618::40]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "plan-b.pwste.edu.pl", Issuer "GEANT OV RSA CA 4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYdvs3cRrz4Mhy for ; Mon, 12 Feb 2024 22:11:21 +0000 (UTC) (envelope-from zarychtam@plan-b.pwste.edu.pl) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=plan-b.pwste.edu.pl header.s=plan-b-mailer header.b="hZwibj9/"; dmarc=pass (policy=quarantine) header.from=plan-b.pwste.edu.pl; spf=pass (mx1.freebsd.org: domain of zarychtam@plan-b.pwste.edu.pl designates 2001:678:618::40 as permitted sender) smtp.mailfrom=zarychtam@plan-b.pwste.edu.pl Received: from [IPV6:2a02:22e0:cf00:1ff:988:18d:fcee:575b] ([IPv6:2a02:22e0:cf00:1ff:988:18d:fcee:575b]) (authenticated bits=0) by plan-b.pwste.edu.pl (8.18.1/8.17.2) with ESMTPSA id 41CMB8bN002661 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO) for ; Mon, 12 Feb 2024 23:11:09 +0100 (CET) (envelope-from zarychtam@plan-b.pwste.edu.pl) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=plan-b.pwste.edu.pl; s=plan-b-mailer; t=1707775869; bh=9IQNlnl+hHvSQz5RSuROnhGNktuBzOnTmgEAMdb0h7E=; h=Date:Subject:To:References:From:In-Reply-To; b=hZwibj9/k5cZo1KTxTKMdUyqLGIlAnnGSfYV2nZZDC9LZZ9Q1Dci1hiwF/+yuNzj1 OKjqjSX2fyT3nhGLLcqbqoGOXjWs2dKc2tlU68XfMb3en3/wSwCVCFMQaMkBdLQUmX gthmQidnHfFx+vYQSFfFdBfy+n79RYYl9DLiN+Yx8Exm4uFzvUdQt2vUiqJIeqe2x2 +NghfgPGOzNYCrUhNbEjOEIhSk4ZzinWTC/EZW9RWCvQ2rsYE5rGFnyauxPCbJavjq zHEgccvKt5INW5lHBr5Ezi4ABDIJk1yuJr7erCRYt29zIQzfTqST9nb7tgSXoUnjyU 29a4AWifY8aMA== Message-ID: Date: Mon, 12 Feb 2024 23:11:07 +0100 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: src upgrade locally vs nfs from RELENG_12 to RELENG_13 To: stable@freebsd.org References: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> Content-Language: en-US From: Marek Zarychta In-Reply-To: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.89 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; DMARC_POLICY_ALLOW(-0.50)[plan-b.pwste.edu.pl,quarantine]; R_SPF_ALLOW(-0.20)[+mx]; R_DKIM_ALLOW(-0.20)[plan-b.pwste.edu.pl:s=plan-b-mailer]; ONCE_RECEIVED(0.10)[]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_VIA_SMTP_AUTH(0.00)[]; ASN(0.00)[asn:206006, ipnet:2001:678:618::/48, country:PL]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_ONE(0.00)[1]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; ARC_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[plan-b.pwste.edu.pl:+] X-Rspamd-Queue-Id: 4TYdvs3cRrz4Mhy W dniu 12.02.2024 o 22:04, mike tancsa pisze: > Hi All, > > Starting to plan to upgrade a few remaining RELENG_12 servers to 13.  > Was hoping I could just do an nfs mount of /usr/src and /usr/obj of a > 13 build server, but it does not seem to work when going from > RELENG_12 to RELENG_13. > > root@proxytest:/usr/src # make installkernel > -------------------------------------------------------------- > >>> Install check kernel > -------------------------------------------------------------- > -------------------------------------------------------------- > >>> Installing kernel GENERIC on Mon Feb 12 20:58:06 UTC 2024 > -------------------------------------------------------------- > cd /usr/obj/usr/src/amd64.amd64/sys/GENERIC;  MACHINE_ARCH=amd64 > MACHINE=amd64  CPUTYPE= CC="cc -target x86_64-unknown-freebsd13.3 > --sysroot=/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX="c++  -target > x86_64-unknown-freebsd13.3 --sysroot=/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"  CPP="cpp -target > x86_64-unknown-freebsd13.3 --sysroot=/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin"  AS="as" AR="ar" > ELFCTL="elfctl" LD="ld"  LLVM_LINK="" NM=nm OBJCOPY="objcopy" > RANLIB=ranlib STRINGS=  SIZE="size" STRIPBIN="strip" > PATH=/usr/obj/usr/src/amd64.amd64/tmp/bin:/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/libexec::/sbin:/bin:/usr/sbin:/usr/bin > make  KERNEL=kernel install > ld-elf.so.1: /usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin/make: > Undefined symbol "regcomp@FBSD_1.6" > *** Error code 1 > > Stop. > make[1]: stopped in /usr/src > *** Error code 1 > > root@proxytest:/usr/src # > > > But if I clone the releng13 source locally and then do a make > buildworld/buildkernel, doing a make installkernel works.  Is there a > way to get it to work over nfs ? What do I need to build on the > buildserver so I dont have to build locally each time on the RELENG_12 > boxes I want to upgrade ? > >     ---Mike > Dear Mike and , This tutorial is completely inconsistent with the handbook, violating all the good upgrade practices,  designated for quick major version upgrades, but only for systems where you have / on ZFS and boot environments working. If it's fulfilled, you can do a major version upgrade in an expedited way easily as described below step by step: 1. Create a new BE on the target system and mount new BE under /mnt 2. Mount /usr/{src,obj} read only over NFS 3. On the build server hide toolchain (cd /usr/obj/usr/src/amd64.amd64/ && mv  tmp tmp.hidden) 4. Install kernel and world into DESTDIR=/mnt, sometimes make -i installworld could help 5. Unmount /usr/obj and update /mnt/etc (mergemaster, etcupdate), if something fails you have figure out how to update /mnt/etc or eventually skip this step if failure is not critical. 6. Activate temporary only new BE 7. Reboot into new BE 8. Expose the hidden toolchain directory on the builder again 9. If there were any errors during phase 4 or 5, especially when make -i installword was used, repeat 4 and 5. 10. Upgrade packages 11. Delete old files and libraries (make delete...) 12. Update boot loader 13. Activate new BE (make it default BE) 14. Reboot into new BE 15. Evaluate the new version for some time and if you are satisfied upgrade jails, upgrade zpool, and optionally delete the old BE The tutorial from the above is only for people who want to save resources like energy, time and CPU cycles but it's definitely _not_ _recommended_ to follow it. Cheers -- Marek Zarychta From nobody Tue Feb 13 10:36:14 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYySP0tBWz59yLC for ; Tue, 13 Feb 2024 10:37:09 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from sonic305-20.consmr.mail.ne1.yahoo.com (sonic305-20.consmr.mail.ne1.yahoo.com [66.163.185.146]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYySM6WYFz55Fv for ; Tue, 13 Feb 2024 10:37:07 +0000 (UTC) (envelope-from filippomore@yahoo.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=Eym9rZTc; dmarc=pass (policy=reject) header.from=yahoo.com; spf=pass (mx1.freebsd.org: domain of filippomore@yahoo.com designates 66.163.185.146 as permitted sender) smtp.mailfrom=filippomore@yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707820626; bh=822J/tyZeYCXRy9KD8Mj+R35nfrNbHX0JrWFNFaoSEY=; h=Date:From:To:Subject:References:From:Subject:Reply-To; b=Eym9rZTcAN3/q23eZvwJGMUuBp+Vi/we/MBXT2R4HhfOtqCTexNy3nQdDTYw+J7IqU+H3PqEPDgrP1Ly0qBFRSmRN0LPgMKhmAGCg9c4llFb5rVifDkO765mlzPXCcDqLO2k7FlNajztSYdWXNLBky2JOe1AUUS6ywdSbWaqBIPLAl+fPivHiUqgrulTm4icGhnbZYSx5C8Kv3pco0LswRBuLbD2LhLwljcGP8gYqSPtjlpSNHab5KhnG4wqZGFoLRAohF60q/QSj86YiEBy6CvCBzWJOy1FWyMpXA6mC7b2MOCp6iNzUGdTEJVVCmUojJmCCnaxcmJlD03NYEXtOg== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707820626; bh=sKMt6V0jaMGXYoxHgmKde6QiE66ryluMSnEynm3WXdk=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=SRoqskzs8LDfUUk3wZ3cSXrEK5nBum1AESW1+cuQHaPpPufGKhEXqx6qXXnwwvtc+iB75/Jk05eq5JM1o3y42rpH26pN28E14TnquyTDklh2HOD/1lmc8bPiN2O7a+PIP52IFRPplCu/IOJXDgn+KB3Ib/LraYAEMmQOWV519EXSWg05wVfzCuP8n/SISFyzXCvmr1d5OH/yoMjwcFRL8CgbqgV359bJvs502WLFvKi+SjiPq3OgFZm5EMa0lC4+q/fNcVPdH/d3auBhKjiqx/WynRZL9mIBBFrkr61hDsgBehewGjXNr8Hlkaa2NVND8w7ZBoZktRLB/6AuCFevJQ== X-YMail-OSG: y_D_jT8VM1l8qeJhAwRvZaJFiU2Jky.YTEpRsP0qqMHDO1Pl6jmtsqWGaYvMVBw qIKB.u7f55ITa3TKGJ57VDSrBl_A3C6S3aq2abpdY8ibO.kAbRCz_l.IxDWXxXFZsFb_yqLLdBoK Yw9ohf6SRvu9HWmUqSZW1kwfvrG_Wj4pNqDKKBIJIJZRTBIEjeCNK0cIyzIVuqYyNFIVE1XDf29v GL9q4Wq3pRrbl7nPCWnHdf4gSXoyzfO1bRar_ZDe.G2DI.FJ_EUVghpJsGVPbNYUFCCdal7UL8xZ eBRz2Q4jpvksmK5ZBqTYq35JMgRqewU4X_y_B7ncD4ycqGARPzA6IqDxFZfUAsCSUGggeyhPxH_C BaPuOpbERMlsEk1oqQiwV5vAt7Gs8ovvEBhvNyttCCFBzkCRVufOC4lbbX2K4k8lUday4XqZfJmj N6PWBMsSenSPRAKcu_E4L59oHx2uYS.QrSEGMgvGAtG8FhOqcXqL7Ib_ht6eVYXx0k1ZnVaMDAin GpnlQ.AtbdZZKTREfneLq3CUGW90R6xvpFB1Ed8fijQsGSALrUS.KTk5MITuTHY43VM0luaBX7_O idTOmc806.t1ABq2VdLLpNmWSgP6o_c1RIan0Xw8ahXZqdHeWpnQA6qiwPF8y8f.lBNsw697bf41 C98DZ439LPJcdN9MkdSKZkhszqohZm3V9i8wpG9DKeaxZe0mjoLL45lMso0r4jwucw8OKhV9cUuy A5ZPk9s6WIn1JMU1VdX6pXO2iQMt.u7.gzPIZCkffbDS5oJukGxetYejin04SpTeeiMfJV70zxPV 5Y0xYnkrGrZJXOhE5jvikjJ_OvVxGZTiZTUuEwOwfhU6lM8WvdftJY.zZa8JJL0eZ.P1JApN2v1J vvwc9iBfmJzArERu4SBfIC9zyhMi3Z.EcUUeuVK72KyI52A0ieuX3x1fqB5sJgjz4MEhatOI5rOy _i62e827viR6FcXiSk8CQcgM5hJNh0QxKbNGqpZKRpN1XikttafSjXsglklUH9qLnoXhvQ5RTjXp MqwqMQBFOFE6hUnSfLFZn1AhFjNsWllL38_sQXGbMTtxVqrzKanBaW00CftlYdqVd.7Ciwu2U0ev 0MqjEGN_cnCVoe6MqGCVOVWpLMkZ1dtbXy8tWWkmcHUBq_oiX4Il44Z432oID42uwGhTorkXZa8q 0ueEu1UTvKKl681Zg5tGiNdsyajNjyIfGvF7MKSux3nhKzNPnHoH4SNg_RITeTaDKa0p.x9nMnOC 8HGfFOLCbnBristEAnHnhby1HDrAvNVR6KXodwPeZSHhlj3lkJsymdvi6FHGmlJU_46aehcOnpTa kaW2BMdJMq1HFwq8g7BmY.87d7NeNJ15Eo1zXQcZSrqDW0m1gDEwVM44eAZCH9PvX3F3Mune1WZR 6ImO4nBCQRyyX5dKUIcLs2cVMsWRekhNNhVo2Zt9V7EcgfQU6Io6AcjEto4acK_8tz4uuAUQ3j29 bnly8WjQp8z4J6pNWymoGAMlD4CEyPnS6dIsXSxLJUIRTWvFthiNKsLvccM2j8u0fv2iKQPO83fQ O5Wy62swaYPH5CZKNEKLKsjkMVeVKAkQISKnIr0IuGRJmppHc_nIWZWTlIfaaoSFOWR5mU4xS9Ix __sVbi8Xn0a.miA4DAMHvmEoIAnKMji2BHo2Yd5WDPgemTcpnfzXn1QQG6fSnR7qpPpao5jEyo69 KXo27bzAoGu0IPELarBDYhiX54q1KHUHSTqwUffoCY_DLe8I9wc1MV.P6hYoNOQUtU1Gnp_mJL7T LP4Dl_lJDTjfu5xqe_X4BaTw7bWc3qaoTh.om4NzDgmlEcf8_4MWftLmN0sa87lhND5exFghA1Lx 6HPMmwwn6HSYB6aMQ6hNnTGVPF.ZUwnkx42KGbZtrR3fH9UL_SDRa2YP0GADI6BDRrF3Co6zV.bg VvURjD2EiloUnra..IMg4NZBdGW5vG20QNjEOen_KsJn7kFhi59PKxF.Bk6jXpUwKYpS61.Nbuvd Kmzjfj0L2gnh.tZMk13xX6LFw51wBe5fM.P84Cg1gzKNqnEXjSq9eSsXz24JqJ7rxJIrhjxLIP_l fquviG7j2VVFVCeJVYrl8fM2SiRcUe6wtmNTYE7YbnNHCLVYgokt5qGmqrKDnAK1RaYp38f2S2Pn 5CngZQLPcsEXaoPTlx2ICaEKrsZ6aSRnjWD0- X-Sonic-MF: X-Sonic-ID: 5af865db-7a34-4f03-ae54-9cf584f4d427 Received: from sonic.gate.mail.ne1.yahoo.com by sonic305.consmr.mail.ne1.yahoo.com with HTTP; Tue, 13 Feb 2024 10:37:06 +0000 Date: Tue, 13 Feb 2024 10:36:14 +0000 (UTC) From: Filippo Moretti To: Freebsd-stable List Message-ID: <1906611657.1741048.1707820574377@mail.yahoo.com> Subject: Error compiling GCC12 in STABLE14 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_1741047_1157080236.1707820574376" References: <1906611657.1741048.1707820574377.ref@mail.yahoo.com> X-Mailer: WebService/1.1.22077 YMailNorrin X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-0.999]; NEURAL_HAM_SHORT(-0.99)[-0.990]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; ASN(0.00)[asn:36646, ipnet:66.163.184.0/21, country:US]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_ONE(0.00)[1]; FREEMAIL_FROM(0.00)[yahoo.com]; MIME_TRACE(0.00)[0:+,1:+,2:~]; RCVD_IN_DNSWL_NONE(0.00)[66.163.185.146:from]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[66.163.185.146:from]; ARC_NA(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+] X-Rspamd-Queue-Id: 4TYySM6WYFz55Fv ------=_Part_1741047_1157080236.1707820574376 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable This is the error that I keep on getting while compiling GCC12 [root@ROXY /usr/ports]# uname -a FreeBSD ROXY 14.0-STABLE FreeBSD 14.0-STABLE #22 stable/14-n266661-a727d8d7= f50f: Fri Feb=C2=A0 9 22:57:13 CET 2024=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0filipp= o@ROXY:/usr/obj/usr/src/amd64.amd64/sys/ROXY amd64 checking whether we are cross compiling... configure: error: in `/usr/ports= /lang/gcc12/work/.build/x86_64-portbld-freebsd14.0/32/libgcc': configure: error: cannot run C compiled programs. If you meant to cross compile, use `--host'. See `config.log' for more details gmake[3]: *** [Makefile:19435: configure-stage1-target-libgcc] Error 1 gmake[3]: Leaving directory '/usr/ports/lang/gcc12/work/.build' gmake[2]: *** [Makefile:25580: stage1-bubble] Error 2 gmake[2]: Leaving directory '/usr/ports/lang/gcc12/work/.build' gmake[1]: *** [Makefile:25928: bootstrap-lean] Error 2 gmake[1]: Leaving directory '/usr/ports/lang/gcc12/work/.build' =3D=3D=3D> Compilation failed unexpectedly. Try to set MAKE_JOBS_UNSAFE=3Dyes and rebuild before reporting the failure = to the maintainer. *** Error code 1 Stop. make: stopped in /usr/ports/lang/gcc12 =3D=3D=3D>>> make build failed for lang/gcc12 =3D=3D=3D>>> Aborting update =3D=3D=3D>>> Update for lang/gcc12 failed =3D=3D=3D>>> Aborting update ------=_Part_1741047_1157080236.1707820574376 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
This is the error that I keep = on getting while compiling GCC12





[root@ROXY /usr/ports]# unam= e -a
FreeBSD ROXY 14.0-STABLE FreeBSD 14.0-STABLE #22 stable/14-n266661-= a727d8d7f50f: Fri Feb  9 22:57:13 CET 2024    &nbs= p;
filippo@ROXY:/usr/obj/usr/src/amd64.amd64/sys/ROXY amd64

checking whether we are cross compiling... configure= : error: in `/usr/ports/lang/gcc12/work/.build/x86_64-portbld-freebsd14.0/3= 2/libgcc':
configure: error: cannot run C compiled programs.
If you m= eant to cross compile, use `--host'.
See `config.log' for more detailsgmake[3]: *** [Makefile:19435: configure-stage1-target-libgcc] Error 1gmake[3]: Leaving directory '/usr/ports/lang/gcc12/work/.build'
gmake[2= ]: *** [Makefile:25580: stage1-bubble] Error 2
gmake[2]: Leaving directo= ry '/usr/ports/lang/gcc12/work/.build'
gmake[1]: *** [Makefile:25928: bo= otstrap-lean] Error 2
gmake[1]: Leaving directory '/usr/ports/lang/gcc12= /work/.build'
=3D=3D=3D> Compilation failed unexpectedly.
Try to s= et MAKE_JOBS_UNSAFE=3Dyes and rebuild before reporting the failure to
th= e maintainer.
*** Error code 1

Stop.
make: stopped in /usr/por= ts/lang/gcc12

=3D=3D=3D>>> make build failed for lang/gcc12=
=3D=3D=3D>>> Aborting update

=3D=3D=3D>>> Upda= te for lang/gcc12 failed
=3D=3D=3D>>> Aborting update


------=_Part_1741047_1157080236.1707820574376-- From nobody Tue Feb 13 10:43:28 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TYyg63XWYz5B0Sg for ; Tue, 13 Feb 2024 10:46:26 +0000 (UTC) (envelope-from developer@lorenzosalvadore.it) Received: from mail-4323.proton.ch (mail-4323.proton.ch [185.70.43.23]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "protonmail.com", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TYyg60rBJz56sW for ; Tue, 13 Feb 2024 10:46:25 +0000 (UTC) (envelope-from developer@lorenzosalvadore.it) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lorenzosalvadore.it; s=protonmail; t=1707821181; x=1708080381; bh=To0C5tfmQImJ+mRKdtwPXM5QAPvFaTW2lgL6QDOdSeI=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector; b=tq74LRDjPXfXOq2r1l0PL3Jlz35k48ozG4864boXL9SKSOQecdjDPjtsXT18Zy90H AOEmpRoXeV9vXBt/dTLvvguwB2imMPKjeJv0dcOU6JvTeqDsODeQby7iB8zx5QGFp/ EUVkFIl8jb71H/OF+R8NTs8dmvF/pwgu55I8QJfF1uNBFaZ5l6ehTe5nNUFO5j2Bah XVYEgKQysdCSmaRGL+OqfZ0WlGhoftu4MEklZIBN9jx/DS79Mi5lrTQCySd6ID+Ux1 u7OQXFLFferLsQykag70/RiaAPtG1D0gUbXL0uYFUxjYEwKD9y1RbJw0PQMzt/WL5W 7oioGcHXEzwNA== Date: Tue, 13 Feb 2024 10:43:28 +0000 To: Filippo Moretti From: Lorenzo Salvadore Cc: Freebsd-stable List Subject: Re: Error compiling GCC12 in STABLE14 Message-ID: In-Reply-To: <1906611657.1741048.1707820574377@mail.yahoo.com> References: <1906611657.1741048.1707820574377.ref@mail.yahoo.com> <1906611657.1741048.1707820574377@mail.yahoo.com> Feedback-ID: 53711648:user:proton List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:62371, ipnet:185.70.43.0/24, country:CH] X-Rspamd-Queue-Id: 4TYyg60rBJz56sW X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated On Tuesday, February 13th, 2024 at 11:36, Filippo Moretti wrote: > This is the error that I keep on getting while compiling GCC12 >=20 >=20 >=20 >=20 >=20 > [root@ROXY /usr/ports]# uname -a > FreeBSD ROXY 14.0-STABLE FreeBSD 14.0-STABLE #22 stable/14-n266661-a727d8= d7f50f: Fri Feb=C2=A0 9 22:57:13 CET 2024=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 > filippo@ROXY:/usr/obj/usr/src/amd64.amd64/sys/ROXY amd64 > checking whether we are cross compiling... configure: error: in `/usr/por= ts/lang/gcc12/work/.build/x86_64-portbld-freebsd14.0/32/libgcc': > configure: error: cannot run C compiled programs. > If you meant to cross compile, use `--host'. > See `config.log' for more details > gmake[3]: *** [Makefile:19435: configure-stage1-target-libgcc] Error 1 > gmake[3]: Leaving directory '/usr/ports/lang/gcc12/work/.build' > gmake[2]: *** [Makefile:25580: stage1-bubble] Error 2 > gmake[2]: Leaving directory '/usr/ports/lang/gcc12/work/.build' > gmake[1]: *** [Makefile:25928: bootstrap-lean] Error 2 > gmake[1]: Leaving directory '/usr/ports/lang/gcc12/work/.build' > =3D=3D=3D> Compilation failed unexpectedly. > Try to set MAKE_JOBS_UNSAFE=3Dyes and rebuild before reporting the failur= e to > the maintainer. > *** Error code 1 >=20 > Stop. > make: stopped in /usr/ports/lang/gcc12 >=20 > =3D=3D=3D>>> make build failed for lang/gcc12 > =3D=3D=3D>>> Aborting update >=20 > =3D=3D=3D>>> Update for lang/gcc12 failed > =3D=3D=3D>>> Aborting update >=20 Are you trying to build the port with MULTILIB option enabled on a self-compiled host with WITHOUT_LIB32 enabled? Try disabling MULTILIB. Cheers, Lorenzo Salvadore From nobody Tue Feb 13 11:52:13 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZ0775ZPgz5B767 for ; Tue, 13 Feb 2024 11:52:19 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZ07724fxz45gf; Tue, 13 Feb 2024 11:52:19 +0000 (UTC) (envelope-from dim@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707825139; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=YHV8Devaz57wPzz++KXGjuUiK2TKFQncf4aWDir2IYE=; b=RZvf2BJZ562U9GRtPshKsEmxOFZczeQr9hsrqWW7cHvJqDJwfw1nelogzcE2q9RKcz3GQp m89+eMd54MM+tZc9CMRE27HCAiO3T8BFS224svNvtEA9Og8RMvmeH/eVlg44z0FseJ/9pX ZBqZlnw3M9YpSepQKv3zApVKILCSRBYBdt1kILPS0gFr6zdW+7ZODHfBOtdCKH+9wf+r3m 95ZScnahkEqp1Jzo5gsGnUBT7p155M7dSEdydfjE0xVJ6g6shKefM+tGqhvMDO+ELu0Phl UzcVzPiu6vuKAJhBUAVScL9ulMDIkQllXCS1Oz/0IPIsTuvN7By806Xddmxm9A== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1707825139; a=rsa-sha256; cv=none; b=vTtnaMxi3sQ/Mqjjxc3zNrJM2JcPtxUZICYMzdeeX8LXShoDtPY8tw38dA4Zc2tqwfwbI6 AOzceNPAuhvLC/ZWDmaqYuh96kV+B/BLvICdbWL2yN6NMWhVO3QIgbmTRqTf1TSQHCXo4t 6dQChURH08GLzu5CFcZYIc4bvtHMJW4xF4UcWfI+ePQETkokUUceB83N2H7So48KL+kRMk vg41c73HA9A75lFk/yIvfDDlfWWf6EGaJmqUPf3cFMk5HA2TlPOb+xb8Y891rcx/bNceUX cZy0ny/2B46GhVKmqCoHvk7322zx1HLxkhlLXHNRBps+XX0dLFWQ6XLmkGfxnw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1707825139; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=YHV8Devaz57wPzz++KXGjuUiK2TKFQncf4aWDir2IYE=; b=LrCnU4LpUcNCajFV2YWrymEPKJ2mgdFtNJ6yT5HQpMi+khZlu1Y6zdpcE9OhmZewPoTp8U usebMi67UtGGj8kTWYSIHWf5SdH0spfF3Y3NZ9icoZGFMMm3W2nLq63GW5YlR1MJkZx6sd 8U6CFK4M7KWq5uWF81XM7LdBzZ8jEne92YMnPlRdSs3Ojjn+zxMiBsRan0423d+vY3mdu0 so8jpLCedyKRe93CxYFbFUNCKie/G1wx9m416seQcVq7p1DiVNdaIUXqKjSgyhQP+Y7oke 1VOt/ihlEjvgl/wL74jhaiK6eLXHXLGUI5fSMDnQNbvfGtAFEutiyEjfakhaSQ== Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "tensor.andric.com", Issuer "R3" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 4TZ0770Zsqz13tm; Tue, 13 Feb 2024 11:52:19 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtpclient.apple (92-111-45-100.static.v4.ziggozakelijk.nl [92.111.45.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 3AF8A645C6; Tue, 13 Feb 2024 12:52:16 +0100 (CET) Content-Type: text/plain; charset=us-ascii List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\)) Subject: Re: Error compiling GCC12 in STABLE14 From: Dimitry Andric In-Reply-To: <1906611657.1741048.1707820574377@mail.yahoo.com> Date: Tue, 13 Feb 2024 12:52:13 +0100 Cc: Freebsd-stable List Content-Transfer-Encoding: quoted-printable Message-Id: References: <1906611657.1741048.1707820574377.ref@mail.yahoo.com> <1906611657.1741048.1707820574377@mail.yahoo.com> To: Filippo Moretti X-Mailer: Apple Mail (2.3731.700.6.1.1) On 13 Feb 2024, at 11:36, Filippo Moretti wrote: >=20 > This is the error that I keep on getting while compiling GCC12 >=20 >=20 >=20 >=20 >=20 > [root@ROXY /usr/ports]# uname -a > FreeBSD ROXY 14.0-STABLE FreeBSD 14.0-STABLE #22 = stable/14-n266661-a727d8d7f50f: Fri Feb 9 22:57:13 CET 2024 =20 > filippo@ROXY:/usr/obj/usr/src/amd64.amd64/sys/ROXY amd64 >=20 >=20 > checking whether we are cross compiling... configure: error: in = `/usr/ports/lang/gcc12/work/.build/x86_64-portbld-freebsd14.0/32/libgcc': > configure: error: cannot run C compiled programs. > If you meant to cross compile, use `--host'. > See `config.log' for more details > gmake[3]: *** [Makefile:19435: configure-stage1-target-libgcc] Error 1 I would suggest looking in the config.log file. :) -Dimitry From nobody Tue Feb 13 16:52:01 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZ6n03jzRz59FQZ for ; Tue, 13 Feb 2024 16:52:04 +0000 (UTC) (envelope-from filippomore@yahoo.com) Received: from sonic312-24.consmr.mail.ne1.yahoo.com (sonic312-24.consmr.mail.ne1.yahoo.com [66.163.191.205]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZ6n01qSWz4rGk for ; Tue, 13 Feb 2024 16:52:04 +0000 (UTC) (envelope-from filippomore@yahoo.com) Authentication-Results: mx1.freebsd.org; none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707843121; bh=RfNc/yXqvnYicX8gVNm76JIoVwdPtRUOZG4DJX59bXQ=; h=Date:From:To:In-Reply-To:References:Subject:From:Subject:Reply-To; b=q8FBwtYlqbxP2BPMaphNGEyfUvQ2HqDcHa/OAsSPtw6k1SmVMEnK28DLuuvrS4/YN2V/m8VivatM9nPHwW/aSG5r/K2Z5q+BAKlVI4IFdE6oDDAYMrGD3gJD7mpMh5fRs5DDws9qYA7zDTriY+tVKX3gNX5gjI9pyjqSCQ4I11Zs/iukJ1h88WQIPwE5oT/Do99MiEGjvIbwYJYTKGuIlOVSo47Cmba7OATsnNXTgo6220nS/8TsoZoKbfBz3gtx+iRs+cXHCzuJiZ1mTaKZ3i4gFLLB2o7nHGxQrUladHTGEPrO28UXgTxQnBJHP+SnxjoaCXhM7/1+95+FjkCpfw== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1707843121; bh=YhZAE4Kxtq1h5EdKGkVAj+4lLccAg+A4tg6/r9fbX8Q=; h=X-Sonic-MF:Date:From:To:Subject:From:Subject; b=hPdNRoKEO005Y7eoYpwLCYsC0KDPgtMwT211iPH3c4P7BMqudQffCzcUXLpSXHhiqr8wdRLOEKankh0vXciIZu0Ahl078vTtmX1ReWnD/uVXdQp/HFShNlSkKwIxhUfxHHgfsEsL1n0P6lmarnxn47SrDkCs9cGtxOCUUzrbL0iDLyUC4zYKg0fXayQe0bHbQxkdfo58nXPvhxjeqYBwl/UCCXihxZ85AEqtK1NIODgk1MYy2uoIqbtYD4+I/fyIHzChzss6bgoJHrSa6zs+AYNmH3jKwzvcMrubEXSfU9irHwYdxXXhpBqlHrMeyL90U2MBoprkEozSntenCNJ4Iw== X-YMail-OSG: PYhwt40VM1lVpHmkFmH5oxJ54Zm.R8nKqPB8choYLNFI43U6xWVUjDx7JzyhKhB R.n7lmgrDZ50h8YROunzX3CC7rZ0LwH2lGaKkFzkPXhtHnXKyrg_Cg92FAzf14L5..ov9Hnf3EuZ NqcerZRTyAKZh6CFqiJ_kxOAvTQ.BAUPCS2bwvMPZ6UNfr.eu9x9Pf0kbYxXUpEnb8rH8TOntagJ wwkmex.CL_nJYfig2OHzo4kYBNXDb2L1qTDTnGMdhgLrFwCbtHt3ecXreRQ8wevWOicWmLSuTM3G 5jVFy_xaOlNUegncaBRT.8YvLmJyIJSzxY0xgLFqAjduVVxVt3rLMC.8BRbCimyBEOZA1BgetL8_ hKFm_83ta_0DoF7C7EoCFTSITlRCT.d1IYmnY42Cg_qFMyKFxM3Vsorx9bKJUGYH36IZ43El3d2W Y5EaFuYebNK1PYh4AtpCDJ3FsiSlrLHkhURgrwC__FlWUBWuDoMqmWCvvKK8p2RDP72Ja9TbQOez W3LZNl1aX2rD7CSt2WqGI1L.ArZZNAQQLEo4fRRku72xlZQvKOFttGvoHx5ZkBl2F7yMC3tCEB0o qJYZ3xlvUnOQrsD0xKW45s8PWPaAjIzDjLDbgIuR7jloAKvbubOjQcadLVx99N1AZDR45RfkZMkS klHEFvby3xf6QG_Rn_NeEDQlNOwLp67ykYMhGL1xVbcPBTFc9bvs2ngdGsUptPisTiPqDM7IoDZX A4CBtxHYMEAEABJiHy97gYdbOcKZcVbaeTJ2enChZvNf7qJoEMk.qa4XKMhrgsPgp4_4a7c4tojk Kw2AY16oyfMYMfMnwSqyq2.kd0euJWB9_8dcyYTfgNxBO_QRjiBfqdD4H_MAg61ZvluliflTsEKI zg7PzP83wVyzKk.4_J_NK5gVCOVTkuu4OSrrighqPbMVNmXlFxAZMN.GbI_g6.YA0g5g1yFKzagm SZpmpdT_K330LjX7XAl7IwFMsOWwBKm.kia3BuqhuZwNqqBjhaJWaTEN_5h4PTWFuKc99X2xSr_2 AHkYXQDJGKllmW970_oXaPz10zycYADHmDsVw9SOJCRKOxSGaZ4lK1wDtORoLfJ6CAFaTzWwxfpv xkiR3hGceQAaxo9W93EPAmqfgVWT1bjx1CWZtlh0CgCCwYnyHAhsaTAHlLfO244pN7sJ3iTMzn8. TbvQDYUEDkaFGewP5EK.3UAHdOt5JcU9_y4FyiT4wHQ_0Lal6loCt8lzT1Cq3h9Rt61Rn_Djmo2g sqoAP7iHIFqwGAPLyiMnbsokbT.L6KivRYWelogJtf7EQgXW6nHlyqr1JS5aWezrwrvp32QXQ5cy ACZWmfQoZSLP7uZgpbLZVo.uXtpuYJt4YPhokQhhyg3uE65C0HCC4ZXR2m7gLzV8bL4WLIXcijoU fZBRgVXMl7VuoLc9zqUdajf40ED2VQuamA8GMtBVS6KYZUFsf5aoHvSWHd4UQL0sdxXbD1bHwhU2 BA7JLYtMuJYbPNSzamqahseJbzvtPiZUJuuGpxi4hMInQ_2_dpzDdFDnWRjPvnbJunZ.DF9Y_Sj. Yjas05acihrqLmew8Ot2e3DFvDyveNjygM1axcTxBP1MW2lX_ZLYk90WtcUHlf95hoqpa4uE16uM cfF.6ZwnuASf6io3wRMgXUnBmOWs5Laz4C3aSrqpCz6kSqFCVtRPAT.2eZj00MU6czGFdVVApRcB 3MC0nommz2PjJP8kjImgtea4qNhEoAp6LJqUsIDpy.LwKTA7mexn0Pd_LAW1oyA5YgqQYxL2gKrF F61pL.D9PrDh4ffBj4mQ85QpKM7lwSd8zNs1xPB49hGPzeJUzaSawI_lcA9U7rhrFZcdY3WqUruk i6Yl1oOJVceDC0nq39ovrbUB1dG_jFHeRnK_ndRs3f_10I7kvRYUdRpcbCc.JuVbB77M6r6yjer0 dR.XRVgF0gXivtvZD6L5TeMhb6YL8aY_ocYzWaP3qZwhm4wEf7uaG8xfPifN7Y1x1TRcULATi6VZ HXsoaguBPgw3MFNlfLPWIczyKL964ViwiwSJVHA96S78Oihjls72zR9m7bnMABZT4sTGFTqxGdUt XnrkSKo2Rt6gmMnMGe5pDrWS0QOSauoKAsG06wHu3K.igLAA39BpvsnlJTt9dnKA2Shd3oia1986 peNdC3.x1fUJnudis.Rv5ky.UEKWWLftf85bknoTL19Kv4_r.xGPEufwrBWzhVUppnP5tOAbqNCt QnMjDbA_PpA-- X-Sonic-MF: X-Sonic-ID: 4d010996-692b-4424-b2fa-951ddfd005a2 Received: from sonic.gate.mail.ne1.yahoo.com by sonic312.consmr.mail.ne1.yahoo.com with HTTP; Tue, 13 Feb 2024 16:52:01 +0000 Date: Tue, 13 Feb 2024 16:52:01 +0000 (UTC) From: Filippo Moretti To: Dimitry Andric , Freebsd-stable List Message-ID: <1144369459.1896929.1707843121087@mail.yahoo.com> In-Reply-To: References: <1906611657.1741048.1707820574377.ref@mail.yahoo.com> <1906611657.1741048.1707820574377@mail.yahoo.com> Subject: Re: Error compiling GCC12 in STABLE14 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_1896928_1272014850.1707843121086" X-Mailer: WebService/1.1.22077 YMailNorrin X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:36646, ipnet:66.163.184.0/21, country:US] X-Rspamd-Queue-Id: 4TZ6n01qSWz4rGk X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated ------=_Part_1896928_1272014850.1707843121086 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Disabling MULTILIB solved the problemthank youFilippo On Tuesday, February 13, 2024 at 12:53:11 PM GMT+1, Dimitry Andric wrote: =20 =20 On 13 Feb 2024, at 11:36, Filippo Moretti wrote: >=20 > This is the error that I keep on getting while compiling GCC12 >=20 >=20 >=20 >=20 >=20 > [root@ROXY /usr/ports]# uname -a > FreeBSD ROXY 14.0-STABLE FreeBSD 14.0-STABLE #22 stable/14-n266661-a727d8= d7f50f: Fri Feb=C2=A0 9 22:57:13 CET 2024=C2=A0 =C2=A0=20 > filippo@ROXY:/usr/obj/usr/src/amd64.amd64/sys/ROXY amd64 >=20 >=20 > checking whether we are cross compiling... configure: error: in `/usr/por= ts/lang/gcc12/work/.build/x86_64-portbld-freebsd14.0/32/libgcc': > configure: error: cannot run C compiled programs. > If you meant to cross compile, use `--host'. > See `config.log' for more details > gmake[3]: *** [Makefile:19435: configure-stage1-target-libgcc] Error 1 I would suggest looking in the config.log file. :) -Dimitry =20 ------=_Part_1896928_1272014850.1707843121086 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
Disabling MULTILIB solved th= e problem
thank you
Filippo

=20
=20
On Tuesday, February 13, 2024 at 12:53:11 PM GMT+1, Dim= itry Andric <dim@freebsd.org> wrote:


On 13 Feb 2024, at 11:36, Filippo Mor= etti <filippomore@yahoo.com> wrote:

>
> This is the error that I keep on getting while compiling GCC12<= br clear=3D"none">>
>
>
>
>
> [root@R= OXY /usr/ports]# uname -a
> FreeBSD ROXY 14.0-STABLE F= reeBSD 14.0-STABLE #22 stable/14-n266661-a727d8d7f50f: Fri Feb  9 22:5= 7:13 CET 2024   
> filippo@ROXY:/usr/obj/u= sr/src/amd64.amd64/sys/ROXY amd64
>
>
> checking whether we are cross compiling... co= nfigure: error: in `/usr/ports/lang/gcc12/work/.build/x86_64-portbld-freebs= d14.0/32/libgcc':
> configure: error: cannot run C com= piled programs.
> If you meant to cross compile, use `= --host'.
> See `config.log' for more details
> gmake[3]: *** [Makefile:19435: configure-stage1-target-libgc= c] Error 1


I would suggest looki= ng in the config.log file. :)

-Dimitry=



------=_Part_1896928_1272014850.1707843121086-- From nobody Tue Feb 13 17:10:32 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TZ7Bb4FtWz59Gy7 for ; Tue, 13 Feb 2024 17:10:47 +0000 (UTC) (envelope-from gshapiro@freebsd.org) Received: from z.gshapiro.net (z.gshapiro.net [IPv6:2600:1f18:408a:c610::100]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.gshapiro.net", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TZ7BZ6tvxz4vgj for ; Tue, 13 Feb 2024 17:10:46 +0000 (UTC) (envelope-from gshapiro@freebsd.org) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=freebsd.org (policy=none); spf=softfail (mx1.freebsd.org: 2600:1f18:408a:c610::100 is neither permitted nor denied by domain of gshapiro@freebsd.org) smtp.mailfrom=gshapiro@freebsd.org Received: from zim.gshapiro.net (zim.gshapiro.net [IPv6:2001:bc8:2e97:100:0:0:0:100]) by z.gshapiro.net (8.17.1/8.17.1) with ESMTPS id 41DHAcB6007355 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL); Tue, 13 Feb 2024 17:10:39 GMT (envelope-from gshapiro@freebsd.org) Received: from thornystick.local ([104.220.49.199]) (authenticated bits=0) by zim.gshapiro.net (8.18.1/8.18.1) with ESMTPSA id 41DHAX4D046554 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 13 Feb 2024 17:10:36 GMT Date: Tue, 13 Feb 2024 09:10:32 -0800 From: Gregory Shapiro To: Helge Oldach Cc: Ruben van Staveren , mike@sentex.net, 000.fbsd@quip.cz, freebsd-stable@freebsd.org Subject: Re: sendmail 8.18.1 MFC'ed to stable/13 and stable/14 Message-ID: References: <4CEF6CCD-2BB5-4677-9D81-55F23E9FA89A@verweg.com> <202402081532.418FW0cU097961@nuc.oldach.net> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202402081532.418FW0cU097961@nuc.oldach.net> X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.49 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.99)[-0.994]; MID_RHS_NOT_FQDN(0.50)[]; MIME_GOOD(-0.10)[text/plain]; DMARC_POLICY_SOFTFAIL(0.10)[freebsd.org : No valid SPF, No valid DKIM,none]; ARC_NA(0.00)[]; ASN(0.00)[asn:14618, ipnet:2600:1f18:4000::/35, country:US]; FREEFALL_USER(0.00)[gshapiro]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; MISSING_XM_UA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; R_DKIM_NA(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all:c]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCPT_COUNT_FIVE(0.00)[5] X-Rspamd-Queue-Id: 4TZ7BZ6tvxz4vgj > > As for the dhparams file, lets use the ffdhe4096 as per RFC7919 one and stop continuing generating these ourselves. > > The file can be grabbed from e.g. https://raw.githubusercontent.com/internetstandards/dhe_groups/master/ffdhe4096.pem > > I seem to recall that sendmail is doing someting along these lines anyhow if the DHParameters file is missing or empty. Yes, from the documentation: If the file is not readable or contains unusable data, the default ``i'' is used instead. ``i'' which selects a precomputed, fixed 2048 bit prime. From nobody Thu Feb 15 18:57:21 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbPSn3Y9vz59vCq for ; Thu, 15 Feb 2024 18:57:29 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbPSm4symz3wpW for ; Thu, 15 Feb 2024 18:57:28 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of mike@sentex.net designates 2607:f3e0:0:1::12 as permitted sender) smtp.mailfrom=mike@sentex.net; dmarc=none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 41FIvLcD053232 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL); Thu, 15 Feb 2024 13:57:22 -0500 (EST) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4:5f6:514d:7bc5:88bf] ([IPv6:2607:f3e0:0:4:5f6:514d:7bc5:88bf]) by pyroxene2a.sentex.ca (8.17.1/8.15.2) with ESMTPS id 41FIvK1W066986 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Thu, 15 Feb 2024 13:57:20 -0500 (EST) (envelope-from mike@sentex.net) Content-Type: multipart/alternative; boundary="------------YXpufrv7ry5DpdKOcyPxn7gw" Message-ID: Date: Thu, 15 Feb 2024 13:57:21 -0500 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: src upgrade locally vs nfs from RELENG_12 to RELENG_13 Content-Language: en-US To: "Robert R. Russell" , stable@freebsd.org References: <7864b693-ac71-41f4-b19e-96f6941858d0@sentex.net> <20240212155215.5c95bb51@venus.private.rrbrussell.com> From: mike tancsa Autocrypt: addr=mike@sentex.net; keydata= xsBNBFywzOMBCACoNFpwi5MeyEREiCeHtbm6pZJI/HnO+wXdCAWtZkS49weOoVyUj5BEXRZP xflV2ib2hflX4nXqhenaNiia4iaZ9ft3I1ebd7GEbGnsWCvAnob5MvDZyStDAuRxPJK1ya/s +6rOvr+eQiXYNVvfBhrCfrtR/esSkitBGxhUkBjOti8QwzD71JVF5YaOjBAs7jZUKyLGj0kW yDg4jUndudWU7G2yc9GwpHJ9aRSUN8e/mWdIogK0v+QBHfv/dsI6zVB7YuxCC9Fx8WPwfhDH VZC4kdYCQWKXrm7yb4TiVdBh5kgvlO9q3js1yYdfR1x8mjK2bH2RSv4bV3zkNmsDCIxjABEB AAHNHW1pa2UgdGFuY3NhIDxtaWtlQHNlbnRleC5uZXQ+wsCOBBMBCAA4FiEEmuvCXT0aY6hs 4SbWeVOEFl5WrMgFAl+pQfkCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQeVOEFl5W rMiN6ggAk3H5vk8QnbvGbb4sinxZt/wDetgk0AOR9NRmtTnPaW+sIJEfGBOz47Xih+f7uWJS j+uvc9Ewn2Z7n8z3ZHJlLAByLVLtcNXGoRIGJ27tevfOaNqgJHBPbFOcXCBBFTx4MYMM4iAZ cDT5vsBTSaM36JZFtHZBKkuFEItbA/N8ZQSHKdTYMIA7A3OCLGbJBqloQ8SlW4MkTzKX4u7R yefAYQ0h20x9IqC5Ju8IsYRFacVZconT16KS81IBceO42vXTN0VexbVF2rZIx3v/NT75r6Vw 0FlXVB1lXOHKydRA2NeleS4NEG2vWqy/9Boj0itMfNDlOhkrA/0DcCurMpnpbM7ATQRcsMzk AQgA1Dpo/xWS66MaOJLwA28sKNMwkEk1Yjs+okOXDOu1F+0qvgE8sVmrOOPvvWr4axtKRSG1 t2QUiZ/ZkW/x/+t0nrM39EANV1VncuQZ1ceIiwTJFqGZQ8kb0+BNkwuNVFHRgXm1qzAJweEt RdsCMohB+H7BL5LGCVG5JaU0lqFU9pFP40HxEbyzxjsZgSE8LwkI6wcu0BLv6K6cLm0EiHPO l5G8kgRi38PS7/6s3R8QDsEtbGsYy6O82k3zSLIjuDBwA9GRaeigGppTxzAHVjf5o9KKu4O7 gC2KKVHPegbXS+GK7DU0fjzX57H5bZ6komE5eY4p3oWT/CwVPSGfPs8jOwARAQABwsB2BBgB CAAgFiEEmuvCXT0aY6hs4SbWeVOEFl5WrMgFAl+pQfkCGwwACgkQeVOEFl5WrMiVqwf9GwU8 c6cylknZX8QwlsVudTC8xr/L17JA84wf03k3d4wxP7bqy5AYy7jboZMbgWXngAE/HPQU95NM aukysSnknzoIpC96XZJ0okLBXVS6Y0ylZQ+HrbIhMpuQPoDweoF5F9wKrsHRoDaUK1VR706X rwm4HUzh7Jk+auuMYfuCh0FVlFBEuiJWMLhg/5WCmcRfiuB6F59ZcUQrwLEZeNhF2XJV4KwB Tlg7HCWO/sy1foE5noaMyACjAtAQE9p5kGYaj+DuRhPdWUTsHNuqrhikzIZd2rrcMid+ktb0 NvtvswzMO059z1YGMtGSqQ4srCArju+XHIdTFdiIYbd7+jeehg== In-Reply-To: <20240212155215.5c95bb51@venus.private.rrbrussell.com> X-Scanned-By: MIMEDefang 2.86 on 64.7.153.18 X-Rspamd-Queue-Id: 4TbPSm4symz3wpW X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.74 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-0.998]; NEURAL_HAM_SHORT(-0.35)[-0.353]; R_SPF_ALLOW(-0.20)[+ip6:2607:f3e0::/32]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[199.212.134.19:received]; XM_UA_NO_VERSION(0.01)[]; ARC_NA(0.00)[]; TO_DN_SOME(0.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEFALL_USER(0.00)[mike]; RCPT_COUNT_TWO(0.00)[2]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; DMARC_NA(0.00)[sentex.net]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_TLS_ALL(0.00)[] This is a multi-part message in MIME format. --------------YXpufrv7ry5DpdKOcyPxn7gw Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 2/12/2024 4:52 PM, Robert R. Russell wrote: > On Mon, 12 Feb 2024 16:04:29 -0500 > mike tancsa wrote: > >> Hi All, >> >> Starting to plan to upgrade a few remaining RELENG_12 servers to 13. >> Was hoping I could just do an nfs mount of /usr/src and /usr/obj of a >> 13 build server, but it does not seem to work when going from >> RELENG_12 to RELENG_13. >> >> root@proxytest:/usr/src # make installkernel >> -------------------------------------------------------------- >> >>> Install check kernel >> -------------------------------------------------------------- >> -------------------------------------------------------------- >> >> >> The problem in more detail: >> >> The toolchain stages of building FreeBSD link to the libraries on the >> build host. Since your build host is from FreeBSD 13-* the toolchain >> programs are linked to a slightly newer ABI than the FreeBSD 12-* >> targets support. >> Great idea! I just tested this process and it worked. On my RELENG_12 buildbox I just built RELENG_13 and exported its src and obj to the RELENG_12 VM I wanted to upgrade. The only error/warning I got was at installworld where sysctl: unknown oid 'user.localbase' popped up.  However, it seems to be just a warning     ---Mike --------------YXpufrv7ry5DpdKOcyPxn7gw Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit
On 2/12/2024 4:52 PM, Robert R. Russell wrote:
On Mon, 12 Feb 2024 16:04:29 -0500
mike tancsa <mike@sentex.net> wrote:

Hi All,

Starting to plan to upgrade a few remaining RELENG_12 servers to 13.  
Was hoping I could just do an nfs mount of /usr/src and /usr/obj of a
13 build server, but it does not seem to work when going from
RELENG_12 to RELENG_13.

root@proxytest:/usr/src # make installkernel
--------------------------------------------------------------
 >>> Install check kernel  
--------------------------------------------------------------
--------------------------------------------------------------


The problem in more detail:

The toolchain stages of building FreeBSD link to the libraries on the
build host. Since your build host is from FreeBSD 13-* the toolchain
programs are linked to a slightly newer ABI than the FreeBSD 12-*
targets support.


Great idea! I just tested this process and it worked. 

On my RELENG_12 buildbox I just built RELENG_13 and exported its src and obj to the RELENG_12 VM I wanted to upgrade.

The only error/warning I got was at installworld where

sysctl: unknown oid 'user.localbase'

popped up.  However, it seems to be just a warning

    ---Mike

--------------YXpufrv7ry5DpdKOcyPxn7gw-- From nobody Fri Feb 16 17:32:52 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TbzXj2cGNz53sDl; Fri, 16 Feb 2024 17:32:53 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TbzXj0rL2z541d; Fri, 16 Feb 2024 17:32:53 +0000 (UTC) (envelope-from salvadore@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708104773; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mYyiew30QBsOHJiZCYMQ0XiocH9JM632w1CzwUJA2A4=; b=KLYwfe4To68iGrH9ZLH9EcuBeivLB5dnMLMV1wyEfw7A9wD5+i20GvZvhveYf90AwaEg9k 42DYlNB5OF+hxQ1ZEkcilcPapiK5Cf0ipdo/ycpoDnfxJdUdRgMp2IJ7qHPq3QtFCDZpN5 vaTuVGplTL5Dapc1Mggop4uaEb6oFESbLhODBIEADq1DuOXNcTyujyoq4HHO2M/bgc7naj l/bx1G+fjsC+6yl6Vb0l8cbUsFoKJQMskri1p7kyckKYOfWH9otEH67aF4vk0X1vuvY8xT ic2CVJUw0pwHPq2y5NquamZgyrOoYS9O1exBSVh8lBoQ2fV/MDUVyNZawkuKCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708104773; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=mYyiew30QBsOHJiZCYMQ0XiocH9JM632w1CzwUJA2A4=; b=XqagrHikxu9zeGqu0EuS/4vYni8rBt1XxN0mGhCoQuudR9Kdl8SMMPi0cWS9k7T4NXe8Fa qcfxu0fGWiY9TkVZtzZBD7vuWOZoYRQxJc/wPjTDwV/eDD7OQNCfPwDyHCkvPw8G1Yv8U9 7VB3TS3qhSN0YpJoGg+7snJsSjCr3BueuryI/nvgA2678U/GizKFAS53QrbIocscxzOWNv Lhc1sTFf8W0NrLDWAZPLmhIJ5IgnarNUczF6PSxUZ43vHxuW9fS7xfx6+/h2OmABrAVvzy FtqEs325pH/W8XrIljPF3mtU3rGiuJpz058kaDoTHV8xRZJ7xzzRgIm5QuVgwg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1708104773; a=rsa-sha256; cv=none; b=mXqD9m2BNfKejvQ+D6IvB0ZQgTsTL6LX8ZTzM3HfNlzC5NvrHzZE6F7Kt/QKoOhRh+F/CL Shz8dDfr3oi6GYm5K9GUxTF4ps8jt6b1SULDcLyycGLo4h0YVCVsjjuxG8tszD4OdT1yTx cw2kibafTSJ23bcA0zvHdMERlfb1PWreoZ9cmL6wG/6ARVLvhiVR8rSH1XxHdOo/sjUB0P pQU2z3Hdjl/6dAK+S4px15eAu2tJ63NfL7q3VODFCK+UUQJiX27cLd4r+FVKzTovwFTRNf V1dZUkaKcEODD28ytoaLCoN2PIUIcbNCBwiZs3n1JH1+48DGyO0EtE8R+CDUuQ== Received: by freefall.freebsd.org (Postfix, from userid 1472) id 0209063B6; Fri, 16 Feb 2024 17:32:52 +0000 (UTC) Date: Fri, 16 Feb 2024 17:32:52 +0000 From: Lorenzo Salvadore To: freebsd-hackers@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD Status Report - Fourth Quater 2023 Message-ID: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit FreeBSD Status Report Fourth Quarter 2023 Here is the fourth 2023 status report, with 18 entries. This is the last 2023 quarter. As you have probably noticed, this status report comes later than usual and with fewer reports than the preceding quarter. Indeed, please keep in mind that the last quarter of every year is for many members of our community the quarter of the celebrations for Christmas and for the New Year, which implies that those members will spend more time with their families and will have less time for their favorite voluntary software projects. Thus there is less to report and reports tend to arrive later. But finally, here they are. Have a nice read. Lorenzo Salvadore, on behalf of the Status Team. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ A rendered version of this report is available here: https://www.freebsd.org/status/report-2023-10-2023-12/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Table of Contents • FreeBSD Team Reports □ FreeBSD Core Team □ FreeBSD Foundation □ FreeBSD Release Engineering Team □ Cluster Administration Team □ Continuous Integration □ Ports Collection □ Bugmeister Team and Bugzilla • Userland □ Service jails — Automatic jailing of rc.d services • Kernel □ Packrat - NFS client caching on non-volatile storage • Architectures □ armv7 Ports Quality Assurance □ SIMD enhancements for amd64 • Cloud □ OpenStack on FreeBSD □ FreeBSD on Microsoft HyperV and Azure □ FreeBSD on EC2 • Documentation □ Documentation Engineering Team □ FreeBSD Online Editor and Man Page Editor □ FreeBSD Wiki • Ports □ KDE on FreeBSD □ State of GNOME 44 □ GCC on FreeBSD • Third Party Projects □ Containers and FreeBSD: Pot, Potluck and Potman ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Along the release engineering team, the project dedicates the 14.0-RELEASE to the memory of Hans Petter Selasky. 14.0-RELEASE FreeBSD 14.0 was released at the end of 2023Q4. The release notes can be found at https://www.freebsd.org/releases/14.0R/relnotes/ New Release Engineering Team After years of serving as the release engineer gjb@ stepped down. cperciva@ took over as the new release engineer. karels@ is serving as the new deputy release engineer. Core would like to thank gjb@ for his long tenure and the many timely releases he created. FreeBSD 2024 Community Survey In the end of 2023, Core Team works with the Foundation to do the 2024 community survey. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Foundation Links: FreeBSD Foundation URL: https://freebsdfoundation.org/ Technology Roadmap URL: https://freebsdfoundation.org/blog/technology-roadmap/ Donate URL: https://freebsdfoundation.org/donate/ Foundation Partnership Program URL: https://freebsdfoundation.org/our-donors/ freebsd-foundation-partnership-program/ FreeBSD Journal URL: https://freebsdfoundation.org/journal/ Foundation Events URL: https://freebsdfoundation.org/our-work/events/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and worldwide community, and helping to advance the state of FreeBSD. We do this in both technical and non-technical ways. We are 100% supported by donations from individuals and corporations and those investments help us fund the: • Software development projects to implement features and functionality in FreeBSD • Sponsor and organize conferences and developer summits to provide collaborative opportunities and promote FreeBSD • Purchase and support of hardware to improve and maintain FreeBSD infrastructure, • Resources to improve security, quality assurance, and continuous integration efforts. • Materials and staff needed to promote, educate, and advocate for FreeBSD, • Collaboration between commercial vendors and FreeBSD developers, • Representation of the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. We supported FreeBSD in the following ways during the last quarter of 2023: OS Improvements During the fourth quarter of 2023, 236 src, 47 ports, and 33 doc tree commits identified The FreeBSD Foundation as a sponsor. Some of this Foundation-sponsored work is described in separate report entries: • OpenStack on FreeBSD • SIMD enhancements for amd64. Three new contractors started. Cheng Cui began working full-time on wireless networking. A main goal for Cheng’s project is to assist Bjoern Zeeb with 802.11ac support in iwlwifi. Tom Jones began work to port the Vector Packet Processor (VPP) to FreeBSD. VPP is an open-source, high-performance user space networking stack that provides fast packet processing suitable for software-defined networking and network function virtualization applications. Olivier Certner joined the FreeBSD Foundation as a general FreeBSD developer. Some of Olivier’s contributions so far include: • reviewing, fixing, and hardening several security policies aimed at limiting process visibility, policies that are based on user identity, group membership, or sub-jail membership • committing fixes in the login class code, including one that allowed unprivileged users to bypass resource limits • implementing a secure hardware fix for the Zenbleed issue affecting AMD Zen2 processors. Here is a sampling of other Foundation-sponsored work completed over the last quarter of 2023: • arm64: Add Armv8 rndr random number provider • net80211, LinuxKPI, and iwlwifi fixes and improvements • OpenSSL: updates to 3.0.11 and 3.0.12 • Various freebsd-update fixes in preparation for 14.0 • ssh: Update to OpenSSH 9.5p1 • Various iommu fixes • Various makefs/zfs fixes Learn more about our software development work for all of 2023 at https://freebsdfoundation.org/blog/2023-in-review-software-development/. FreeBSD Infrastructure We approved over $100,000 for a cluster refresh that began in late 2023 and will carry over into the new year by purchasing and shipping 15 new servers to 4 racks generously donated by NYI in their new Chicago facility. The systems specifications were determined by the Cluster Administration team and consist of: • 5 package builders • 3 web servers • 2 package mirrors • 2 CI servers • 2 firewall/router • 1 admin bastion More on our 2023 infrastructure support can be found at: https://freebsdfoundation.org/blog/2023-in-review-infrastructure/. Continuous Integration and Workflow Improvement As part of our continued support of the FreeBSD Project, the Foundation supports a full-time staff member dedicated to improving the Project’s continuous integration system and the test infrastructure. The full update can be found within the quarterly status report. Partnerships and Research In Q4 I connected with the following people, companies, and organizations: Phil Shafer, who works at Juniper Networks, and I met at All Things Open. He told me about the libxo library and his continuing work on related issues, like rewriting and filtering output to allow richer options that regular expressions provide. Sticking with Juniper, I also met Simon Gerraty at the Vendor Summit and heard his talk on SecureBoot. In alphabetical order, I also met with AMD, Ampere, Center for Internet Security (CIS), Innovate UK, Michael Dexter, Metify, Microsoft, several people at NetApp when I attended their annual conference (Thank you for the invitation!!), NetScaler, NIST, Nozomi Networks, NVIDIA, members of the Open Container Initiative community, OpenSSF, RG Nets, Doug Rabson. I greatly appreciated the opportunity to attend NetApp’s annual conference in October. I heard from and connected with experts at NetApp and their partners and customers on topics such as AI and seamless AI data pipelines, hybrid cloud, and green computing. I took the opportunity to hand out some FreeBSD lapel pins 🙂 and I connected with a FreeBSD user and member of the Enterprise WG whose company is a NetApp Customer. In Q4 we announced the new FreeBSD SSDF Attestation program to help commercial users of FreeBSD comply with new US Government procurement regulations. This program was informed by valuable feedback from NetApp, Metify, and NIST, and the genesis of the idea came thanks to my involvement with open source policy experts, in particular via the OSI’s Open Policy Alliance. The Open Container Initiative Technical Oversight Board voted in December to approve Doug Rabson’s proposal to create a Working Group to extend the OCI runtime specification to support FreeBSD. Huge thanks to all involved! An OCI runtime extension for FreeBSD is one of the most frequently requested capabilities and I was happy to play a small role in helping to coordinate this effort so far. The Vendor Summit in November was a great event. Huge props to John Baldwin and Anne Dickison for all the work to organize and orchestrate. I got a lot out of the event. Personal highlights were conversations with a diversity of users, the CHERI talk, the end user panel, and Allan’s talk on being an upstream first company. For a full recap on our efforts to strengthen partnerships and increase funding in 2023, check out: https://freebsdfoundation.org/blog/2023-in-review-partnerships-and-research/. Advocacy >From organizing and attending events, to creating technical content that educates, and expanding the coverage of FreeBSD in the media, here is a sample of what we did last quarter to support FreeBSD. • Helped organize and sponsor the November 2023 Vendor Summit held at NetApp in San Jose. Many consider this one of the best summits to date. Be sure to check out the videos. • Introduced FreeBSD to new and returning folks at All Things Open in North Carolina. • Provided an overview of FreeBSD 14: Security, Performance, and Interoperability; Introducing FreeBSD 14 • In collaboration with the Core team, released the 2024 FreeBSD Community Survey • Participated in an interview about FreeBSD: What the Dev Podcast: The Evolution of the FreeBSD Project • Release the September/October 2023 issue of the FreeBSD Journal now with HTML versions of the articles. For a full recap of what we did to advocate for FreeBSD in 2023, please check out the Advocacy Year in Review: https://freebsdfoundation.org/blog/2023-in-review-advocacy/ or the monthly newsletters: https://freebsdfoundation.org/our-work/latest-updates/?filter=newsletter. Fundraising Thank you to everyone who gave us a financial contribution last quarter to help fund our work to support the Project. You brought us even closer to our goal and we are grateful for your investment in FreeBSD! We are still receiving donations in the mail and will post the final number in mid-February. Please consider supporting our efforts in 2024 by making a donation here: https://freebsdfoundation.org/donate/. Or, check out our Partnership opportunities here: https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to https://freebsdfoundation.org to find more about how we support FreeBSD and how we can help you! ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Release Engineering Team Links: FreeBSD 13.3-RELEASE schedule URL: https://www.freebsd.org/releases/13.3R/schedule/ FreeBSD releases URL: https://download.freebsd.org/releases/ISO-IMAGES/ FreeBSD development snapshots URL: https://download.freebsd.org/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team, The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the fourth quarter of the year, the Team continued work on 14.0-RELEASE, leading to the final RELEASE build and announcement in November. Planning has started for the upcoming 13.3-RELEASE and 14.1-RELEASE cycles. The Release Engineering Team continued providing weekly development snapshot builds for the main and stable/13 branches, and (after 14.0-RELEASE) started weekly builds for stable/14. After over a decade as Release Engineering Lead, Glen Barber has retired from the role; his Deputy, Colin Percival, has moved into the Lead role, while Mike Karels has assumed the position of Deputy Release Engineer. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cluster Administration Team Links: Cluster Administration Team members URL: https://www.freebsd.org/administration/#t-clusteradm Contact: Cluster Administration Team FreeBSD Cluster Administration Team members are responsible for managing the machines the Project relies on to synchronize its distributed work and communications. In this quarter, the team has worked on the following: • Regular support for FreeBSD.org user accounts. • Regular disk and parts support (and replacement) for all physical hosts and mirrors. • Enable mirroring of https://www.FreeBSD.org and https://docs.FreeBSD.org in the FreeBSD project-managed mirrors. • Cluster refresh, upgrading all hosts and jails to the most recent versions of 15-CURRENT, 14-STABLE, 13-STABLE, and 12-STABLE. • Begin sunsetting 12-STABLE infrastructure as the branch approaches its end of life. In addition to these projects, with Modirum generously sponsoring Philip’s time for most of October, we were able to bring pkgbase into "preview" production in time for 14.0-RELEASE in November. We also installed a new European mirror site in Sjöbo, Sweden, sponsored by Teleservice Skåne AB. Traffic in Europe is now directed roughly equally between our existing mirror in Frankfurt (sponsored by Equinix) and the new mirror in Sweden. After well over ten years in service, we plan to decommission our mirror site in the UK during first quarter of 2024. We would like to thank Bytemark Hosting for supporting this mirror for all this time. Next quarter, supported by the FreeBSD Foundation, we plan to bring up a new primary cluster site in Chicago. FreeBSD Official Mirrors Overview Current locations are Australia, Brazil, Germany, Japan (two full mirror sites), Malaysia, South Africa, Sweden, Taiwan, United Kingdom (full mirror site), United States of America — California, New Jersey (primary site), and Washington. The hardware and network connection have been generously provided by: • Bytemark Hosting (decommissioned during 2024Q1) • Cloud and SDN Laboratory at BroadBand Tower, Inc • Department of Computer Science, National Yang Ming Chiao Tung University • Equinix • Internet Association of Australia • Internet Systems Consortium • INX-ZA • KDDI Web Communications Inc • Malaysian Research & Education Network • Metapeer • NIC.br • Your.Org • 365 Data Centers • Teleservice Skåne AB (new since 2023Q4) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Continuous Integration Links: FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI Tinderbox view URL: https://https://tinderbox.freebsd.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org Hosted CI wiki URL: https://wiki.FreeBSD.org/HostedCI 3rd Party Software CI URL: https://wiki.FreeBSD.org/3rdPartySoftwareCI Tickets related to freebsd-testing@ URL: https://bugs.freebsd.org/bugzilla/buglist.cgi?bug_status=open&email1=testing%40FreeBSD.org&emailassigned_to1=1&emailcc1=1&emailtype1=equals FreeBSD CI Repository URL: https://github.com/freebsd/freebsd-ci dev-ci Mailing List URL: https://lists.FreeBSD.org/subscription/dev-ci Contact: Jenkins Admin Contact: Li-Wen Hsu Contact: freebsd-testing Mailing List Contact: IRC #freebsd-ci channel on EFNet In the fourth quarter of 2023, we worked with the project contributors and developers to address their testing requirements. Concurrently, we collaborated with external projects and companies to enhance their products by testing more on FreeBSD. Important completed tasks: • Adding job to build amd64 architecture with GCC 13. (Thanks jhb@) • Adding powerpc64le jobs config for stable-14 (Thanks alfredo@) • Updating the build env of jobs of main and stable/14 branches to 14.0-RELEASE Work in progress tasks: • Designing and implementing pre-commit CI building and testing and pull/ merged-request based system (to support the workflow working group) • Proof of concept system is in progress. • Designing and implementing use of CI cluster to build release artifacts as release engineering does, starting with snapshot builds • Simplifying CI/test environment setting up for contributors and developers • Setting up the CI stage environment and putting the experimental jobs on it • Redesigning the hardware test lab and adding more hardware for testing • Merge https://reviews.freebsd.org/D38815 • Merge https://reviews.freebsd.org/D36257 Open or queued tasks: • Collecting and sorting CI tasks and ideas • Setting up public network access for the VM guest running tests • Implementing use of bare-metal hardware to run test suites • Adding drm ports building tests against -CURRENT • Planning to run ztest tests • Helping more software get FreeBSD support in its CI pipeline (Wiki pages: 3rdPartySoftwareCI, HostedCI) • Working with hosted CI providers to have better FreeBSD support Please see freebsd-testing@ related tickets for more WIP information, and do not hesitate to join the effort! Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Collection Links: About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://docs.freebsd.org/en/articles/contributing/#ports-contributing + Ports Management Team URL: https://www.freebsd.org/portmgr/ Ports Tarball URL: http://ftp.freebsd.org/pub/FreeBSD/ports/ports/ Contact: Tobias C. Berner Contact: FreeBSD Ports Management Team The Ports Management Team is responsible for overseeing the overall direction of the Ports Tree, building packages, and personnel matters. Below is what happened in the last quarter. • According to INDEX, there are currently 31,942 ports in the Ports Collection. There are currently ~3,100 open ports PRs. The last quarter saw 9,424 commits by 157 committers on the main branch and 781 commits by 71 committers on the 2023Q4 branch. Compared to last quarter, this means a hefty decrease in the number of commits on the main branch (down from 11,454) and slightly fewer backports to the quarterly branch (down from 828). The number of ports also fell a bit (down from 34,600). In Q4 there were around 9424 commits to main. The most active committers where: sunpoet 2946 yuri 861 bofh 793 jbeich 419 fuz 324 eduardo 168 fernape 160 jhale 153 thierry 146 diizzy 123 During Q4 we welcomed Michael Osipov (michaelo) and Timothy Beyer (beyert) as new committers, but sadly also had to say goodbye to bland, sbruno, hselasky and gjb. We invited arrowd, flo and riggs to be part of portmgr-lurkers for the next months. Support for FreeBSD 12.x was removed at the end of the quarter. The end of Q4 also saw the introduction of subpackages to the ports tree. Similar to when flavors were introduced, new subpackages will require an approval by portmgr before being pushed to the tree. With subpackages it is possible to create multiple packages from a single build of a port. The following happened on the infrastructure side: * Packages for 14.0-RELEASE were built * Poudriere was updated to release-3.4 • Support for FreeBSD 12.x was removed. • The no-longer maintained www/qt5-webkit was removed. • postgresql11, php80, mysql57, percona57, ghostscript9 were removed. • The following default versions changed: • perl to 5.36 • ghostcript to 10 • corosync to 3 • Updates to major ports that happened were: • ports-mgmt/pkg to 1.20.9 • ports-mgmt/poudriere to 3.4.0 (subpackage support) • KDE-bits to plasma-5.27.10, frameworks-5.112, gear-23.08.4, and beta-2 • www/chromium to 120.0.6099.129 • www/firefox to 121.0 (rc1) • lang/rust to 1.74.1 • …​ and many more …​ During the last quarter, pkgmgr@ ran 26 exp-runs to test various ports upgrades, updates to default versions of ports, subpackage support and base system changes. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Bugmeister Team and Bugzilla Links: Bugmeister team URL: https://www.freebsd.org/administration/#t-bugmeister FreeBSD Bugzilla URL: https://bugs.freebsd.org/bugzilla/ Contact: Bugmeister Some recent maintenance has been done on our Bugzilla instance: • the weekly reminder emails now include the correct values for mfc-* Flags queries; • the Dashboard page has had an obsolete query removed. (We no longer use the 'patch-ready' Keyword; it was too much paperwork. Thus, the query on that field was useless.); • the limit that capped the maximum number of reported PRs at 10000 has been raised to 12500. In addition, the Wiki documentation on our Bugzilla has been updated: • the page https://wiki.freebsd.org/Bugzilla/SearchQueries has been substantially reworked: □ In particular, documentation about how to search on Flag values has been added. (This may not have been done before.) Example: search for PRs with Flag 'mfc-stable14' set; □ This page may be of interest to all committers and contributors; • the page https://wiki.freebsd.org/Bugmeister/BugmeisterQA has also been updated; While similar to the above, it is of more specific interest to bugmeister and triagers. As well, PRs that are specific to FreeBSD 12 are being culled, as 12 has gone out of support as of 20231231. A further effort is being made to document our setup of Bugzilla itself, especially with respect to our customizations. This is needed to bring our own repository up to date with what is running on production. The number of PRs over the past quarter (and year) has remained consistent. However, we do seem to be closing incoming PRs more quickly these days. For reference: https://bugs.freebsd.org/bugzilla/page.cgi?id=dashboard.html&days=90 . The overall number of PRs remains around 11,400. Bugmeister is also working towards restarting the Bugathons. See the updated page https://wiki.freebsd.org/Bugathons. Bugmeister would like to thank a number of people who have assisted with bugbusting, including Mina Galić, Graham Perrin, Lorenzo Salvadore, and Fernando Apesteguìa, among others. In addition, bugmeister would like to thank all the FreeBSD committers who help process the PRs as they come in. Over the last few months we seem to be much closer to steady-state. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Userland Changes affecting the base system and programs in it. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Service jails — Automatic jailing of rc.d services Links: D40370: Infrastructure for automatic jailing of rc.d-services URL: https://reviews.freebsd.org/D40370 D40371: automatic service jails: some setup for full functionality of the services in automatic service jails URL: https://reviews.freebsd.org/D40371 D42779: Handbook / rc-article update for Service Jails URL: https://reviews.freebsd.org/D42779 Contact: Alexander Leidinger Service jails extend the rc(8) system to allow automatic jailing of rc.d services. A service jail inherits the filesystem of the parent host or jail, but uses all other limits of the jail (process visibility, restricted network access, filesystem mounting permissions, sysvipc, …​) by default. Additional configuration allows inheritance of the IPs of the parent, sysvipc, memory page locking, and use of the bhyve virtual machine monitor (vmm(4)). If you want to put e.g. local_unbound into a service jail and allow IPv4 and IPv6 access, simply change rc.conf(5) to have: local_unbound_svcj_options=net_basic local_unbound_svcj=YES Note: all base system services are covered in the patches with either name_svcj_options or a hard-coded disabling of the service jails feature where it does not make sense (e.g. pure services which change the runtime configuration but do not start daemons, or where things are run which can not be run in a sensible way inside a jail). As such the local_unbound_svcj_options line above is superfluous and serves just as an example about the amount of configuration needed in total. While this does not have the same security benefits as a manual jail setup with a separate filesystem and IP/VNET, it is much easier to set up, while providing some of the security benefits of a jail like hiding other processes of the same user. Since the previous service jails status report, the following were added: • support for NFS inside jails in the service jails framework (untested), • the possibility of jailing other service commands than start and stop, • service jails options / config for all base system services in the patch in D40371, • a first step at documenting the service jails in the Handbook. Not all services are tested, but all services are covered with a config. Any testing and feedback (even as simple as "service X works in a service jail") is welcome. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Kernel Updates to kernel subsystems/features, driver support, filesystems, and more. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Packrat - NFS client caching on non-volatile storage Contact: Rick Macklem NFSv4.1/4.2 provides support for a feature called delegations. When a NFSv4.1/ 4.2 client holds a delegation, the client has certain rights to a file, including a guarantee that no other client will make changes to the file unless the delegation is recalled. As such, when a client holds a delegation for a file, it can aggressively cache the file’s data, knowing that it will not be modified by other clients until it returns the delegation. This project is intended to allow the NFSv4.1/4.2 client to aggressively cache file data on client local non-volatile storage, when the client holds a delegation for the file. I created a patch long ago to try and do this for NFSv4.0, but it was never at a stage where it was worth using. This project is a complete rewrite of the patch, done in part because NFSv4.1/4.2 plus other recent NFSv4-related changes make doing this more feasible. I now have code running fairly well and hope to have a patch ready for others to test this winter. Early testing shows promise. For a test run of "make buildkernel", the test with and without packrat enabled performed as follows: Table 1. NFS operation counts NFS operation counts Getattr Lookup Read Write Total RPCs with packrats 433506 99254 0 0 371736 without packrats 2359913 97954 10748 0 2318810 Table 2. Elapsed Run Time Elapsed Run Time (sec) with packrat without packrat 5561 6203 As you can see, the packrat case ran a little faster and with fewer RPCs. Although this test was run on my little LAN, it is hoped that a NFSv4.1/4.2 mount over a WAN would show a larger difference in performance. I will note that the packrat cache was primed by unrolling a tarball of FreeBSD’s /usr/src into the NFSv4.1/4.2 mount. This will be very much an experimental feature, but it is hoped it will allow NFS mounts to be used more effectively, particularly in WAN situations, such as a mobile laptop. There is still work to be done, particularly with respect to recovery of delegations after a NFSv4.1/4.2 client restart. Hopefully, the next status report will include a URL that allows downloading of a patch for user testing. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Architectures Updating platform-specific features and bringing in support for new hardware platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ armv7 Ports Quality Assurance Contact: Robert Clausecker As part of a long term project to improve the quality of the FreeBSD ports collection for the armv7 architecture, a number of issues in the base system and in various ports have been fixed. Through this action, the number of binary packages that could be successfully built from the 2023Q4 branch of the ports collection was increased from 30018 (as of 2023-10-04) to 31118 (as of 2023-11-24). Two kernel bugs affecting package builds (PR 267788 and PR 274705) were identified and addressed, with these two alone being responsible for around 900 failed packages. The most common other causes for build failures include • lack of FreeBSD-specific armv7 support code • data alignment issues (armv7 being one of the few architectures for which we do not support unaligned memory accesses) • address space exhaustion during the build processes (usually LTO related; PR 274705 addressed many cases) • lack of OpenMP support on armv7 FreeBSD If you are a user of the FreeBSD ports collection on armv7, do not hesitate to file a bug report on our bug tracker should there be any issues. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SIMD enhancements for amd64 Links: FreeBSD Foundation blog post URL: https://freebsdfoundation.org/blog/a-sneak-peek-simd-enhanced-string-functions-for-amd64/ simd(7) URL: https://man.freebsd.org/cgi/man.cgi?query=simd&sektion=7&manpath=FreeBSD+15.0-CURRENT Work currently under acceptance testing URL: https://github.com/clausecker/freebsd-src/commits/acceptance-testing Contact: Robert Clausecker The project to enhance the libc with SIMD implementations of string functions for amd64 has now concluded. In total, SIMD implementations for 17 libc functions have been written, complemented by scalar implementations where needed. Through this rewrite, performance of these functions on strings with an average length of 64 characters was improved by an average factor of 5.54. In addition, 9 other library functions were rewritten to call into the SIMD-enhanced routines, conveying benefits without requiring additional assembly implementations. Please see the FreeBSD Foundation blog post linked above for more details. Parts of the SIMD work are already found in the CURRENT branch. The rest is currently undergoing acceptance testing and will be merged if no problems emerge. It is planned to back port all improvements to 14-STABLE for inclusion into FreeBSD 14.1. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cloud Updating cloud-specific features and bringing in support for new cloud platforms. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ OpenStack on FreeBSD Links: OpenStack URL: https://www.openstack.org/ OpenStack on FreeBSD URL: https://github.com/openstack-on-freebsd Contact: Chih-Hsin Chang Contact: Li-Wen Hsu In the fourth quarter, we successfully migrated the originally virtualized OpenStack platform to physical machines running FreeBSD 14.0-STABLE. The ported OpenStack components include Keystone, Glance, Placement, Neutron, and Nova. As part of this process, we took the opportunity to update the installation documentation and the list of dependencies. Moving forward, we encourage users and developers interested in this project to effortlessly recreate the OpenStack platform in their FreeBSD environments following this documentation. Any issues or difficulties encountered are welcome to be reported on the GitHub project page. Your contributions will contribute to the refinement of our installation documentation and the overall porting efforts. In the upcoming quarter, our focus will shift towards incorporating various patches and workarounds generated during the migration process into the project in a more structured code form. Additionally, we plan to develop FreeBSD ports for each OpenStack component, further streamlining the installation process. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on Microsoft HyperV and Azure Links: Microsoft Azure article on FreeBSD wiki URL: https://wiki.freebsd.org/ MicrosoftAzure Microsoft HyperV article on FreeBSD wiki URL: https://wiki.freebsd.org/HyperV Contact: Microsoft FreeBSD Integration Services Team Contact: freebsd-cloud Mailing List Contact: The FreeBSD Azure Release Engineering Team Contact: Wei Hu Contact: Souradeep Chakrabarti Contact: Li-Wen Hsu In this quarter, we have solved all the blocking issues and published the 14.0-RELEASE on Azure Marketplace, with complete architecture (amd64, arm64) and VM generation (gen1, gen2) support, available in both UFS and ZFS as the root file system. Work in progress tasks: • Automating the image building and publishing process and merging to src/ release/. • Building and publishing snapshot builds to Azure community gallery. The above tasks are sponsored by The FreeBSD Foundation, with resources provided by Microsoft. Open tasks: • Update FreeBSD related doc at Microsoft Learn • Support FreeBSD in Azure Pipelines • Update Azure agent port to the latest version • Upstream local modifications of Azure agent • Port Linux Virtual Machine Extensions for Azure Sponsor: Microsoft for people in Microsoft, and for resources for the rest Sponsor: The FreeBSD Foundation for everything else ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on EC2 Links: FreeBSD/EC2 Patreon URL: https://www.patreon.com/cperciva Contact: Colin Percival FreeBSD is available on both amd64 (Intel and AMD) and arm64 (Graviton) EC2 instances. Work continues to ensure that upcoming instance types will be supported; most recently, changes were needed to support "7th generation" Intel and AMD instances. FreeBSD 14.0-RELEASE shipped with experimental ZFS-root AMIs and "cloud-init" AMIs. Additional "flavored" FreeBSD AMIs are planned, including "AMI Builder" and "minimal" (no debug symbols). A bug in the release-building process which resulted in 14.0-RELEASE AMIs shipping with duplicate lines in /etc/rc.conf has been corrected and future releases should not be affected. A bug in the ec2-aws-imdsv2-get utility which resulted in 14.0-RELEASE AMIs not supporting binary user-data files has been corrected and future releases should not be affected. This work is supported by Colin’s FreeBSD/EC2 Patreon. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Noteworthy changes in the documentation tree, manual pages, or new external books/documents. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Engineering Team Link: FreeBSD Documentation Project URL: https://www.freebsd.org/docproj/ Link: FreeBSD Documentation Project Primer for New Contributors URL: https://docs.freebsd.org/en/books/fdp-primer/ Link: Documentation Engineering Team URL: https://www.freebsd.org/administration/#t-doceng Contact: FreeBSD Doceng Team The doceng@ team is a body to handle some of the meta-project issues associated with the FreeBSD Documentation Project; for more information, see FreeBSD Doceng Team Charter. During the last quarter: Glen Barber stepped down from doceng. doceng would like to thank gjb@ for his service. Ceri Davies' commit bit was taken for safekeeping as per his request. doceng would like to thank ceri@ for his contributions. mhorne@ to be mentored by carlavilla@ to obtain a documentation commit bit. FreeBSD Handbook: The Handbook was updated to show that FreeBSD 14.0 is the latest release. FreeBSD Translations on Weblate Link: Translate FreeBSD on Weblate URL: https://wiki.freebsd.org/Doc/Translation/Weblate Link: FreeBSD Weblate Instance URL: https://translate-dev.freebsd.org/ Q4 2023 Status • 17 team languages • 203 registered users Languages • Chinese (Simplified) (zh-cn) (progress: 7%) • Chinese (Traditional) (zh-tw) (progress: 3%) • Dutch (nl) (progress: 1%) • French (fr) (progress: 1%) • German (de) (progress: 1%) • Indonesian (id) (progress: 1%) • Italian (it) (progress: 5%) • Korean (ko) (progress: 33%) • Norwegian (nb-no) (progress: 1%) • Persian (fa-ir) (progress: 2%) • Polish (progress: 1%) • Portuguese (progress: 0%) • Portuguese (pt-br) (progress: 22%) • Spanish (es) (progress: 35%) • Turkish (tr) (progress: 2%) We want to thank everyone that contributed, translating or reviewing documents. And please, help promote this effort on your local user group, we always need more volunteers. FreeBSD Handbook working group Contact: Sergio Carlavilla • The Network chapter has been rewritten • The Jails chapter has been rewritten • The next section to work on will be the file systems part: UFS, ZFS, Other File Systems FAQ Working Group Contact: Sergio Carlavilla A new FAQ was released alongside FreeBSD 14.0. FreeBSD Website Revamp - WebApps working group Contact: Sergio Carlavilla Working group in charge of creating the new FreeBSD Documentation Portal and redesigning the FreeBSD main website and its components. FreeBSD developers can follow and join the working group on the FreeBSD Slack channel #wg-www21. The work will be divided into three phases: 1. Redesign of the Manual Pages on web Scripts to generate the HTML pages using mandoc. (Complete, Approved by Doceng, Deploy Date Not Decided Yet) Public instance on https://man-dev.FreeBSD.org 2. Redesign of the FreeBSD main website New design, responsive and dark theme. (Almost Complete, Presented at EuroBSDCon) 3. Redesign of the Ports page on web Ports scripts to create an applications portal. (Work in progress) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Online Editor and Man Page Editor Links: FreeBSD Online Document Editor URL: https://github.com/Wang-Yan-Hao/FreeBSD-Online-Document-Editor FreeBSD Online Man Page Editor URL: https://github.com/Wang-Yan-Hao/man_page_editor Contact: Yan-Hao Wang Contact: Li-Wen Hsu This report provides a continued overview of the FreeBSD online editor and man page editor project, outlining recent efforts to enhance the documentation and manual page editing processes. In order to optimize the project’s structural integrity, we enlisted the expertise of a professional front-end programmer. We plan to release the editor soon and currently have some tasks that require additional support. 1. We are actively seeking a qualified individual to conduct a comprehensive front-end security review of the project. 2. A meticulous inspection of the JavaScript code is imperative to ensure its robustness and efficiency. We are looking for someone with expertise to thoroughly examine the codebase, identify any issues, and propose enhancements for optimal performance. 3. Since there is currently no existing JavaScript library for rendering mandoc, I had to create my own. However, there are still some hidden errors that emerge during the editing process. We are seeking assistance to fix these rendering issues. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Wiki Links: Wiki URL: https://wiki.freebsd.org Contact: Wiki administration Plans are underway to familiarize our audience on Discord with the wiki (there are too many "silos" in our FreeBSD community). Contact Setesh on the FreeBSD Discord for more information. Preliminary work is being done on updating the wiki software itself. Continuing to run MoinMoin requires a jail with a downrev version of Python. The MoinMoin project itself seems to have stalled in the middle of a redesign; at a minimum, a complete upgrade of the backend database would be needed. Alternatives that are under consideration include MediaWiki and DocuWiki; see https://wiki.freebsd.org/Wiki/NextGeneration. Most of the discussion is occurring on Matrix; please contact wiki-admin@FreeBSD.org if you would like to participate. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ KDE on FreeBSD Links: KDE/FreeBSD initiative URL: https://freebsd.kde.org/ FreeBSD — KDE Community Wiki URL: https://community.kde.org/FreeBSD Contact: Adriaan de Groot The KDE on FreeBSD project packages CMake, Qt, and software from the KDE Community, for the FreeBSD ports tree. The software includes a full desktop environment called KDE Plasma (for both X11 and Wayland) and hundreds of applications that can be used on any FreeBSD machine. The KDE team is part of desktop@ and x11@, building the software stack to make FreeBSD beautiful and usable as a daily-driver graphical desktop workstation. The notes below describe mostly ports for KDE, but also include items that are important for the entire desktop stack. Infrastructure CMake was updated several times and is now version 3.28.1, the latest upstream release. FreeBSD ports are once again fully up-to-date. Qt5 is now on long-term support and updates only rarely. The KDE patch collection is a community-supported branch of Qt which pulls in upstream patches and fixes from the KDE community, and updated to 5.15.12. There were several deprecations (see below) in the Qt5 ports. Qt6 and KDE’s upcoming megarelease of KDE Plasma 6 (scheduled for 2024q1) are the next major milestone for the KDE team. Qt6 was updated to version 6.6.1 along with the Python bindings for Qt, PySide. An alpha-release of KDE Frameworks 6 was added to the ports tree. KDE Stack KDE Gear releases happen every quarter, KDE Plasma updates once a month, and KDE Frameworks have a new release every month as well. These (large) updates land shortly after their upstream release and are not listed separately. • KDE Frameworks reached version 5.112. The KDE Frameworks 5 series is winding down, although it will a few months still until it enters long-term support upstream. • KDE Plasma Desktop was updated to version KDE Plasma 5.27.10. • KDE Gear updated to 23.08.4. • KDE Frameworks 6 (alpha) 5.247 was updated in the ports tree. • KDE Plasma Desktop 6 (beta 2) 5.91.0 was updated in the ports tree. Related Ports The KDE ecosystem includes a wide range of ports — most maintained by kde@, all building on a shared base of Qt and KDE Frameworks. The KDE team updates them all as needed. This quarter the KDE team would like to thank Tobias C. Berner, Gleb Popov and Jason E. Hale again for keeping things up-to-date. Many ports have been "flavorized" to support a Qt5 and a Qt6 flavor in the ports tree. Special mention to: • New port x11/xwaylandvideobridge. By design, X11 applications can’t access window or screen contents for Wayland clients. The video bridge improves Wayland support for screen sharing tools like Discord, MS Teams, Skype, and more. Screen sharing is fully under the control of the Wayland user. • Update for multimedia/mlt7 which was updated to 7.20.0. • Update for sysutils/bsdisks which was updated to 0.33. • Bugfix for devel/llvm15 to make devel/kdevelop work again. • Security fixes for www/qt5-webengine and www/qt6-webengine. Deprecations Web browsers are huge, and have a considerable security surface. The venerable www/qt5-webkit WebKit port was removed on the last day of 2023. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ State of GNOME 44 Links: GNOME URL: https://www.gnome.org/ Development repository URL: https://codeberg.org/olivierd/freebsd-ports-gnome Contact: FreeBSD GNOME Team Contact: Olivier Duchateau < duchateau.olivier@gmail.com> GNOME is a full desktop environment which is mainly based on GLib, GTK3/GTK4, and libadwaita. It provides two window managers or compositors: x11-wm/mutter and x11-wm/metacity. Currently in the ports collection, x11/gnome-shell is not supported by upstream anymore. As it is a lot of work, in order to have GNOME 44 available for users, I decided to split this update, because it impacts several ports. As a maintainer of x11/budgie and Pantheon desktop (a window manager based on x11-wm/mutter, developed for elementary OS) I need more recent versions of some GNOME libraries. Firstly I worked on WebKitGTK. The 4.0 "legacy" API is almost not used by GNOME’s libraries. The bare minimum is the 4.1 API. I created webkit.mk for the Mk/Uses framework, in order to flavorize www/webkit2-gtk3. There is an ongoing effort, but currently it is too unstable. Often applications such as Epiphany, mail clients (Geary, Evolution), or the online accounts panel in package:sysutils/gnome-control-center dump core. Nonetheless, remainder of desktop is usable and the latest release (44.7) of GNOME Shell is functional. I have begun sending my first patches for review (as well as those in Bugzilla). • D43183 • D43230 • D43244 • D40489 I have also ported the GNOME Flashback session module. It depends on x11-wm/ metacity and x11-toolkits/libwnck3. I also maintain a documentation, and we can see various desktops available. GNOME 45 is almost finished, except for GNOME Shell extensions. For this release I will focus on Wayland support (bug #258042 and bug #271836). Tests and patches are welcomed, especially for WebKitGTK. Next months I plan to work on: • Allowing selecting a session in display manager (gdm), it is regression with our patches. • Fixing sharing network (VNC, SSH) panel in gnome-control-center and backport for bug #275900. • Continuing to update applications and libraries for GNOME 45. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ GCC on FreeBSD Links: GCC Project URL: https://gcc.gnu.org/ GCC 10 release series URL: https://gcc.gnu.org/gcc-10/ GCC 11 release series URL: https://gcc.gnu.org/gcc-11/ GCC 12 release series URL: https://gcc.gnu.org/gcc-12/ GCC 13 release series URL: https://gcc.gnu.org/gcc-13/ Contact: Lorenzo Salvadore Updating GCC default version to 13 is moving ahead. Thanks to Antoine Brodin who ran the exp-runs and to all other developers and ports maintainers involved. As you might remember from last quarter, additional patches were tested together with the default version updates. Some of them have already been merged: • lang/gcc11 has switched back to STANDARD_BOOTSTRAP and has been updated to 11.4.0; • lang/gcc13 has been updated to version 13.2.0. About half of the open bugs have been fixed, but another half remains. If you maintain any of the affected ports, please try to fix your port(s) and/or get your port buildable with the compiler in base. This quarter many bug reports have also been opened about GCC. As soon as the default GCC version update is finished, all of those bugs will be addressed. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Third Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Containers and FreeBSD: Pot, Potluck and Potman Links: Pot organization on GitHub URL: https://github.com/bsdpot Contact: Luca Pizzamiglio (Pot) Contact: Bretton Vine (Potluck) Contact: Michael Gmelin (Potman) Pot is a jail management tool that also supports orchestration through Nomad. During this quarter, Pot 0.16.0 was released containing a number of features and fixes, including a new setting to prevent direct traffic between VNET pots and new attributes to configure pot stop behavior. There were also maintenance/ stability releases to potnet (0.5.0) and a nomad-pot-driver (0.10.0). Potluck aims to be to FreeBSD and Pot what Dockerhub is to Linux and Docker: a repository of Pot flavours and complete container images for usage with Pot and in many cases Nomad. One of the new container images that have been added during the last quarter is Zincsearch, a more light-weight alternative to Elasticsearch written in Go. The Mastodon container is meanwhile powering the public mastodon.africa instance. Also, we got some more publicity: BSD Now Episode 536 is titled "Pot-flavored Jails". As always, feedback and patches are welcome. Sponsors: Nikulipe UAB, Honeyguide Group From nobody Sat Feb 17 17:20:46 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TcbDG3rGKz5BYyy; Sat, 17 Feb 2024 17:20:46 +0000 (UTC) (envelope-from cperciva@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TcbDG3Yvxz4vZl; Sat, 17 Feb 2024 17:20:46 +0000 (UTC) (envelope-from cperciva@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708190446; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc; bh=pczTwqYsT3JtSI1ovesM+akvtyb2Imqb38CAa+IS8wM=; b=F4UUeKb/Nr2oiK5q0ZOep00DcKQN3SbW8XfEsbnPyqu2oaQStSXO3dS2G3+E1UI+W32h/x 4+4KJ50kgYJkpA+ADRcO9HJe8brS6qcrBVEVTLo1+gM2dMFkUT2fXHTUHtoZ1D/xC1QxFe 7ALPz4CMcu79byTXJM1TYmJRtJ014uOesgiwJA8goKpCfzQ2mmARnOEsha4BOGvQB1SbII wjcCE1IUSsekQhVAFjVi8J3efKAgdl474KCCF+m3RlS5sqwymaVxUhKYVR8Wmrf6RAOxw7 tL9d+r0vSVUj8/w50+P5R2jP4UfrfO5tXOa4Sp0QA9UQ2RZNMz5X7F2VHrEQVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708190446; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc; bh=pczTwqYsT3JtSI1ovesM+akvtyb2Imqb38CAa+IS8wM=; b=v4zi8nkCP8MnBHyeF4NDYcDQfyZd+5IlzkH/w0bv3WiTqZfPUkqG2Vzhfg7Uye23xKuMZL 8Tzu8/3sA3uzdsfaKcuqDIBLi/rC3wBnGXFBAdVl9Wc7f+md8MdB8+oWmN77ho+FiFYmY0 uOpcnmgkGs07e/L4L+Jen4oy7Pgils6hHkZlKmZ9Pm1yXzH2k/QmBZl7aZievCHmnVfh2l uudqEiz+llSKrVqirbqYl6TZNONSbSo95kod1gc0c/jOfLT7lmdtAh+dJmYBLU+t041UiL 5CLpWdRqfJWcV+BT6Xojm5xT3sDKHeU6DrNSxOdtElpj0NxSAhRNIvfRYw/3dw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1708190446; a=rsa-sha256; cv=none; b=hpcbMHSZgvfbcqYNqZMdHvGtdAKyD1CAH9Cq7zdhs99MVmDLwaNpCPiJZA0Pdx9kf3Z+V1 s7ni7lUoFaLuYt6nm38UIhE5Q8ol8DJi0YNf6847xj8JR2/dr/AVXMlM3mH1/7oxJRpBdX HgkRbdKeBA7k/khFUxgINiyz/h1KS3bd1Q91JsEj9C0yYp8IWp4YuIX82qQ4lJHp2KLm7v mGUiBaJZySFX6lYFEbkLYXNNrdsiHADwVl5JJrUvmM/xT27yY6Y3oNn6HRtfbjpPKa/UpR /Db8J/wd1UmQI5MLy6AKpV8/NsH6njzTk3D4QT4wGfv1RQ0tB7AB9AQEs0ZYHw== Received: by freefall.freebsd.org (Postfix, from userid 1002) id 4E9A19797; Sat, 17 Feb 2024 17:20:46 +0000 (UTC) To: freebsd-snapshots@FreeBSD.org, freebsd-stable@FreeBSD.org Cc: FreeBSD Release Engineering Team Reply-To: FreeBSD Release Engineering Team Subject: FreeBSD 13.3-BETA3 Now Available Message-Id: <20240217172046.4E9A19797@freefall.freebsd.org> Date: Sat, 17 Feb 2024 17:20:46 +0000 (UTC) From: Colin Percival List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 The third BETA build of the 13.3-RELEASE release cycle is now available. Installation images are available for: o 13.3-BETA3 amd64 GENERIC o 13.3-BETA3 i386 GENERIC o 13.3-BETA3 powerpc GENERIC o 13.3-BETA3 powerpc64 GENERIC64 o 13.3-BETA3 powerpc64le GENERIC64LE o 13.3-BETA3 powerpcspe MPC85XXSPE o 13.3-BETA3 armv6 RPI-B o 13.3-BETA3 armv7 GENERICSD o 13.3-BETA3 aarch64 GENERIC o 13.3-BETA3 aarch64 RPI o 13.3-BETA3 aarch64 PINE64 o 13.3-BETA3 aarch64 PINE64-LTS o 13.3-BETA3 aarch64 PINEBOOK o 13.3-BETA3 aarch64 ROCK64 o 13.3-BETA3 aarch64 ROCKPRO64 o 13.3-BETA3 riscv64 GENERIC o 13.3-BETA3 riscv64 GENERICSD Note regarding arm SD card images: For convenience for those without console access to the system, a freebsd user with a password of freebsd is available by default for ssh(1) access. Additionally, the root user password is set to root. It is strongly recommended to change the password for both users after gaining access to the system. Installer images and memory stick images are available here: https://download.freebsd.org/releases/ISO-IMAGES/13.3/ The image checksums follow at the end of this e-mail. If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use Git to do a source based update of an existing system, use the "releng/13.3" branch. A summary of changes since 13.3-BETA2 includes: o A kernel panic fix affecting the net-mgmt/ng_ipacct port. o A fix to invalid birthtime values generated by fusefs. o An update to the TLS root certificate bundle. o Sendmail update to 8.18.1. o Allowing mac_priority's authorized users to set realtime priority. o An update to the source for the leap seconds database. o A workaround for an elftoolchain bug which yielded boated RISCV binaries. A list of changes since 13.2 will be available in the releng/13.3 release notes: https://www.freebsd.org/releases/13.3R/relnotes/ Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 13.3-RELEASE cycle progresses. === Virtual Machine Disk Images === VM disk images are available for the amd64, i386, aarch64, and riscv64 architectures. Disk images may be downloaded from the following URL (or any of the FreeBSD download mirrors): https://download.freebsd.org/releases/VM-IMAGES/13.3-BETA3/ BASIC-CI images can be found at: https://download.freebsd.org/releases/CI-IMAGES/13.3-BETA3/ The partition layout is: ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label) ~ 1 GB - freebsd-swap GPT partition type (swapfs GPT label) ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label) The disk images are available in QCOW2, VHD, VMDK, and raw disk image formats. The image download size is approximately 135 MB and 165 MB respectively (amd64/i386), decompressing to a 21 GB sparse image. Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI loader file is needed for qemu-system-aarch64 to be able to boot the virtual machine images. See this page for more information: https://wiki.freebsd.org/arm64/QEMU To boot the VM image, run: % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt \ -bios QEMU_EFI.fd -serial telnet::4444,server -nographic \ -drive if=none,file=VMDISK,id=hd0 \ -device virtio-blk-device,drive=hd0 \ -device virtio-net-device,netdev=net0 \ -netdev user,id=net0 Be sure to replace "VMDISK" with the path to the virtual machine image. === Amazon EC2 AMI Images === FreeBSD/amd64 EC2 AMI IDs can be retrieved from the Systems Manager Parameter Store in each region using the keys: /aws/service/freebsd/amd64/base/ufs/13.3/BETA3 FreeBSD/aarch64 EC2 AMI IDs can be retrieved from the Systems Manager Parameter Store in each region using the keys: /aws/service/freebsd/arm64/base/ufs/13.3/BETA3 === Vagrant Images === FreeBSD/amd64 images are available on the Hashicorp Atlas site, and can be installed by running: % vagrant init freebsd/FreeBSD-13.3-BETA3 % vagrant up === Upgrading === The freebsd-update(8) utility supports binary upgrades of amd64, i386, and aarch64 systems running earlier FreeBSD releases. Systems running earlier FreeBSD releases can upgrade by first installing any updates for the currently running release: # freebsd-update fetch # freebsd-update install and then downloading the new release: # freebsd-update upgrade -r 13.3-BETA3 During this process, freebsd-update(8) may ask the user to help by merging some configuration files or by confirming that the automatically performed merging was done correctly. # freebsd-update install The system must be rebooted with the newly installed kernel before continuing. # shutdown -r now After rebooting, freebsd-update needs to be run again to install the new userland components: # freebsd-update install It is recommended to rebuild and install all applications if possible, especially if upgrading from an earlier FreeBSD release, for example, FreeBSD 12.x. Alternatively, the user can install misc/compat12x and other compatibility libraries, afterwards the system must be rebooted into the new userland: # shutdown -r now Finally, after rebooting, freebsd-update needs to be run again to remove stale files: # freebsd-update install == ISO CHECKSUMS == o 13.3-BETA3 amd64 GENERIC: SHA512 (FreeBSD-13.3-BETA3-amd64-bootonly.iso) = a2a2bd18b90eb04e23a158a52d7411ec68e2d5c290c009202035c76658f409fab095b7938426ffb372c2fe0f3d495132c8fc745b9b2fe3dc376a3d4b16546203 SHA512 (FreeBSD-13.3-BETA3-amd64-bootonly.iso.xz) = 35c3d609a3963d8882a247626a3decfb57cd4b13b1bf894215f4092f3336ee15d48e04a6e270cadd4d2bf3234233b8f0be1b62de15c1f04064276ae85d81bb0c SHA512 (FreeBSD-13.3-BETA3-amd64-disc1.iso) = 2a17088eebf473b469eb868c246cc24201e9a3c8d9611ab1d64b459762d88021ecc8259dad102e5934782972d8d98e379a97f435fc13dce648097237ad382e22 SHA512 (FreeBSD-13.3-BETA3-amd64-disc1.iso.xz) = f1438c3daa4d7f3abfe934fde89bdd02f2f8e45d1a6f31d4ef6b11c47ee3187cf0ecfc28ad544c0485e02af9a270c643cf5819fc5d00aa01407867bac42c5684 SHA512 (FreeBSD-13.3-BETA3-amd64-dvd1.iso) = 3aa61a979c3184bab283eb8190d8a9b3bf66455376f149d534ae77dd9e1a9e29e93da9866d49993e47a7ac3213dd2f261162fddb52a90769a44a519f48733026 SHA512 (FreeBSD-13.3-BETA3-amd64-dvd1.iso.xz) = 0e7396b1d23bc57d795614033c0023ee6d5ebd7579582e2b5de613e9e95cdaa02512ae2120e3ce9a208624d24d18026b424b1de16ef97e4bf4a744a19742e9a3 SHA512 (FreeBSD-13.3-BETA3-amd64-memstick.img) = 1ce6245b04b39cb8f909a9f402bae0dd62b74673f9a843637a7724fcd32205d33368f748a28324aebb375b7d40945e9313f2b6b785877c6aeefe090db90582b4 SHA512 (FreeBSD-13.3-BETA3-amd64-memstick.img.xz) = fd3bcf796a4bc5355d62e373c5aac9514aee69f00b17492c010701a1de211abbb72feaf2266fca9e4fcecfbb8dd03c788d3e774c6eca569ae213ba59dccbd4bb SHA512 (FreeBSD-13.3-BETA3-amd64-mini-memstick.img) = c6ea1574be80bbfc455bc8ab2549379834a8a09ce3d4c7432425ea3496aed73629223c7fa6641eb369f5419a243f2de361d56e3697d442547e643bc914620782 SHA512 (FreeBSD-13.3-BETA3-amd64-mini-memstick.img.xz) = d5a1cbb82502925135c7a64b42d93e3f9930805c02066e22101eaf91d84f4f30bf225653e2e9b359490b8d1a563fb8a1976b93ee006a5b5568f465148e685d39 SHA256 (FreeBSD-13.3-BETA3-amd64-bootonly.iso) = 7382a751d895896387b5e7228c352d6a958f09977391a5186a1dd2632f9eee42 SHA256 (FreeBSD-13.3-BETA3-amd64-bootonly.iso.xz) = 0d18d4a6569d67cbabe6816121da714ac632568fa519128ed6399b307f9d1562 SHA256 (FreeBSD-13.3-BETA3-amd64-disc1.iso) = 832ca1651b7718441b656f0a101d4bfb46d5e2b70a564c5a6166f2d0f60ebbd9 SHA256 (FreeBSD-13.3-BETA3-amd64-disc1.iso.xz) = f72145c0726f9f0cfa7db9071edc58a2a3f45100aedfccb52ed23294bf60fd38 SHA256 (FreeBSD-13.3-BETA3-amd64-dvd1.iso) = e4dd527bacde777609b52b27859a8bb770ae215f8dbb7921027fcdd5db4e1b55 SHA256 (FreeBSD-13.3-BETA3-amd64-dvd1.iso.xz) = 0fafcc66567d80a7287fd71a7f90289b0ec120986335c0748c27e2994088ef21 SHA256 (FreeBSD-13.3-BETA3-amd64-memstick.img) = aa85e06e203094a35541899b27003266635f03717cbcb3151304a3bfba21f49f SHA256 (FreeBSD-13.3-BETA3-amd64-memstick.img.xz) = 9760ec20c68ee75c2ad1121462d0a71e26d7832726b0edc1db0192fcdd9ab480 SHA256 (FreeBSD-13.3-BETA3-amd64-mini-memstick.img) = 76cbfa1131108ddebf9432ffa96434dc7f4e9508a82fae24917dbf55edc1b4ef SHA256 (FreeBSD-13.3-BETA3-amd64-mini-memstick.img.xz) = ced860563a42cefc60a85c701b54e1eb95efdceeeb14568268b0bb827f0711f0 o 13.3-BETA3 i386 GENERIC: SHA512 (FreeBSD-13.3-BETA3-i386-bootonly.iso) = 3ca08be7ee0d8c8532d70bba1bf2365f4fc00db11db2e5428c52c5fe2f3acb8e87a033173f6e315f49bdfd80c0c2e9420b998b9441e57bd15212b0c49cba22a8 SHA512 (FreeBSD-13.3-BETA3-i386-bootonly.iso.xz) = 56f134d6daeb8aefb89f7dff2a33f4efd2dcbb2e58bf21219c8191f170e2356a946aba3e4b72a0f3d63a92f2a0b1c24c120878a92a48eafe4295ffd4166cd47c SHA512 (FreeBSD-13.3-BETA3-i386-disc1.iso) = 229b901529231e44b6b0af53a5dffb0a579e26788bdacdefdfd18f5ca6c4fa15aa28785ed56cade185ca6de22f41f76f25bb1f9c3aa6961b8fa42ea39b716d02 SHA512 (FreeBSD-13.3-BETA3-i386-disc1.iso.xz) = bfa0df2763d7389ebdbf8768adb375636a02817266493b289e4539ef80a471cb594e61c3e9f068e3e392bdb6ed64ac8a2c8eb369b527a8256928dfa7f48fb9ff SHA512 (FreeBSD-13.3-BETA3-i386-dvd1.iso) = 683df53c37fc0cd333c9cb22b72715a78711b692293074c1baf2c75db381aaf3e0dd668d96d136376526911570ab51d3dcd57f168b3fe4ab30b4dfcf532cf04e SHA512 (FreeBSD-13.3-BETA3-i386-dvd1.iso.xz) = 51c1132220e9eb8bb6e63e4640c57d4fb34237e5def536247fc33560fe3a659ea0e72cfcc5e644ce4ecf61a0d05c1e157906f37e3f2690c6d0c2b4b32d778ca9 SHA512 (FreeBSD-13.3-BETA3-i386-memstick.img) = bb5b0ba298b3fad17261307a8fc2502b3df879fa5591ed531c3290474d0a2d721cc47a4c43a211a85c3d7ba9926864477972ac6d3ae74f1ed5c0c14caf6afd54 SHA512 (FreeBSD-13.3-BETA3-i386-memstick.img.xz) = 1ad25d6347c246f755987788d5a1cec3330263e33f265a1463e416a200e5b46dbddf30a017dea2cf5cf0a1a010c8f6b30d94175bf0814dcfc109a8dbfdd9d60c SHA512 (FreeBSD-13.3-BETA3-i386-mini-memstick.img) = 4cc37df5f56e3af5b80ede5e755bde02df4297eda6388a413e032029b813a3dbf2ac79fc38fcf3a4c56856cdd2fe4cb69c5da8419ee619d9cc3e5d9f8b7213ff SHA512 (FreeBSD-13.3-BETA3-i386-mini-memstick.img.xz) = 025a518cb9dbeeaf4bad4415f69039e12f425f4827b6206710f9a7594576de48bdeb8fe835a496476107205cce480eb3ec292fa5ed1f1bc459af8293ff4b6b5e SHA256 (FreeBSD-13.3-BETA3-i386-bootonly.iso) = b294787c25ba09050a423aa67b2dae9fcf1acc0c0039f2ef4d65ca36e1888802 SHA256 (FreeBSD-13.3-BETA3-i386-bootonly.iso.xz) = b9672f3cfed8ecc84d33d2f54817ddd67981a9e2fdee741bf2349829a46d97d5 SHA256 (FreeBSD-13.3-BETA3-i386-disc1.iso) = 2178a4883837176980e6210383c426b0bd2760c0b73f23080e767025aef18ba0 SHA256 (FreeBSD-13.3-BETA3-i386-disc1.iso.xz) = fbca871b2dd49ffdd6640fbdb955035b9fd32057f02fa069d7e5c53088785979 SHA256 (FreeBSD-13.3-BETA3-i386-dvd1.iso) = d83a1dac4e177c211e849e290fdb4c63cfc4cf5f1995330a1c0cc80f69d0574d SHA256 (FreeBSD-13.3-BETA3-i386-dvd1.iso.xz) = d49c40f37627eddc9066cb120840d124a441d0b6a5774dbe9c00700c00653c27 SHA256 (FreeBSD-13.3-BETA3-i386-memstick.img) = ddd22a43a3675505286f7f552ba8552b3976666a340dd8002563fc67929a6c23 SHA256 (FreeBSD-13.3-BETA3-i386-memstick.img.xz) = b01d5a6fc782a050a36b81e4e84484fe364f450edd68fa26e8ed09b78ff311e7 SHA256 (FreeBSD-13.3-BETA3-i386-mini-memstick.img) = 26df37b6a7aa7d88a865bea53632ca1fd04277593b0c2c6f9fad25721e76619f SHA256 (FreeBSD-13.3-BETA3-i386-mini-memstick.img.xz) = 9721921b850716f501c80eb6af2c7d9b4b584ed2e1f37aca9376b18a16236b33 o 13.3-BETA3 powerpc GENERIC: SHA512 (FreeBSD-13.3-BETA3-powerpc-bootonly.iso) = 373647c3e2a16dca2dda9944333e0a0a61c877cafc12384dba7e436976e1c97f73ef451a1d06b5f892c32338a5d1daec1d25e239229d41b7dcc00213c847dc02 SHA512 (FreeBSD-13.3-BETA3-powerpc-bootonly.iso.xz) = 9b3948b0a7239418036a8e9430db2c6ac3fa0cd071b01a396b3efb170884be3c09cf524564cd54b7c3a641e5fae9f3918318aa186e13fabc6ebb83a952e0cc88 SHA512 (FreeBSD-13.3-BETA3-powerpc-disc1.iso) = 85d56dfb91c4b0203d99c52b8aaef0279320bf48b465ee06fdd48e54c21b5d3f2638207bf6666243f901346f14f784ab7ada923f22e9e266da96f61ed4104970 SHA512 (FreeBSD-13.3-BETA3-powerpc-disc1.iso.xz) = 936eba1def04132c8e039c8a5b8fca5d68f675eb400fd0c6675169db59b3c279b8be6980074245ca84734160420afcbb01237ad7c068c83fb5a7c26ecb5a5ae8 SHA512 (FreeBSD-13.3-BETA3-powerpc-dvd1.iso) = c1056dadc73727ad2996613477591554ebba72daf7f014f19ef6d62e6018c03f98d35a7f469a4148a4317d3e913aef5f308acccf85bb1387b98b8a96de7c15ab SHA512 (FreeBSD-13.3-BETA3-powerpc-dvd1.iso.xz) = 2c1c5a1042ea961bb0b2da71f84f01e1dcad57c8d19d26f1c5175e9f196b7ebfa64b2d178a14b785b56e6cf200bd4eb4fe19ab087982f5799c09ebb527dd370b SHA256 (FreeBSD-13.3-BETA3-powerpc-bootonly.iso) = d0691cf9d10d6482544834484bc0b41420075415753d152714d003208213b07a SHA256 (FreeBSD-13.3-BETA3-powerpc-bootonly.iso.xz) = dd69116932b9dad4348f3817f550193190060d74990dd16f4b0b2b4f30a23993 SHA256 (FreeBSD-13.3-BETA3-powerpc-disc1.iso) = 34cb1c96975a6532148444534249c81f56fabe342e3023337c4cecadcb9562b4 SHA256 (FreeBSD-13.3-BETA3-powerpc-disc1.iso.xz) = e33b5692ec31606047a9bc450c9896fab634b6653ff1b8a8fe2610c1af56e915 SHA256 (FreeBSD-13.3-BETA3-powerpc-dvd1.iso) = 31fd7bad12c59f2c7ccbeb523a8cbe08763e8b4abc7dcfd46ae3fb51a0ee1565 SHA256 (FreeBSD-13.3-BETA3-powerpc-dvd1.iso.xz) = b168ff727f250f95cf889c26737e72304fededc6716bade49ed961f78875d1f5 o 13.3-BETA3 powerpc64 GENERIC64: SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-bootonly.iso) = 34fc788c4b1df8c0d219203f77206f6ebb40e8ad78a71057ca32d1bb15d3ae712614c109cc93c2f3f3a2b1abadc09699d992041e909b8241e016b47d31198da7 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-bootonly.iso.xz) = 3316170adcbd7cedf717a7e2484d5f614730e084f98076ca92bd8e3a01f2b1d67d88f8c687712221ef0e521b995216ae79aec52c21d96f8450e17028505542f2 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-disc1.iso) = c3a8c69bf0b35202c2ee0b6ac418fc233148d96a4afa522c4940072c34f9b7bcec92966d20985d6ba04f6991a0c13d1bf9e4fd34f6771a71c0beab32780c4f52 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-disc1.iso.xz) = 9ad92e1e3058f94ad5be4b7b5e8e7ac4219d29e75dfe98c1bd9162e9a69dbb641e8dcddfe88494dc06d4984b3f8a4e5cdf9bbf9d0dff59b8a07a7f488eba887c SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-dvd1.iso) = d242156de87576464c622ddcb282dd35945dde8bbbfec84011144d3bf4dff865af2beacb1e628954e109354c10d127e8c013b5a61c61c61bc7aa53455f2bd4f7 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64-dvd1.iso.xz) = acf82c67974a6fd5abbbc3cf397b3e6f0d78b95aced3f219890c03def605948a7ac3508119c6d4d338f0667efbf2b767f8b99635c9926bd136dc06d823771c96 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-bootonly.iso) = ee345f469622fbae6a95b390cad9140ce5d1f5f3816c9c8dd93c3c6e26acf6e9 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-bootonly.iso.xz) = 5e31c43b89f4f1f91ba0614bb7b9fdcaf50c96bd8ebfdc77dc0ce9280a030e0f SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-disc1.iso) = db3ee3381bb074239120849e48e4c218cfc3ac53da570796c4a9d0550f61c28c SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-disc1.iso.xz) = e9bef13703ef958a6e32d2f07414f435d529545132319f5e28b916e6e4f726b6 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-dvd1.iso) = a3fdb4f1168e4341b48704c980a9e34b94b95f804f93da552f4dc8376b928d09 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64-dvd1.iso.xz) = dae8ff3a244a1772396fa8b67911d42514a7d9c7256bbf3d67ed2e6bbebc6ec5 o 13.3-BETA3 powerpc64le GENERIC64LE: SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-bootonly.iso) = 92ac1bfadac927187fce1211238b62c738a61069897dfc5e7cab6fafb6cf53c81611c55329bdb20b969d39c881778920b302436ed06d9195e7f0b084ef0d9d40 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-bootonly.iso.xz) = 5a57374d4204464d02df97cfd11065fe0a1af9c9d8fa3793e492400cb985a69c36adbd1454fa251eda88b7092a7257b6c2ae5432c8235a7a2c1b5d16262b6262 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-disc1.iso) = e9dd243736c9387b920aa6eb687ec3b89a9de1a20d1a925c49ac3553a54290050ed1a7bcabcdc32c1509494c06add2d4d7dfd0e96ccbd06632110b6bc8a35f73 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-disc1.iso.xz) = 671632b43d09c3bcac74e89252eec6cb887e23ddff9eb513a7cbba8248cad3f9dfdad723c9aeca6b0e318d7b9df7448eb57d8b1dede0bf8488e1f52de9fa8d98 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-dvd1.iso) = c45b5ab48532d54aef12255ac56a7d15ae39a6a44986f05aa392f68a0394a3444803bedf1e45d01f3d72d8c8ad5292ecc224342bfc26ff712e3c194f58bdca4b SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-dvd1.iso.xz) = 5f69dbb05e438af09a449159838e9199dbefeda186b2b14c3345a36d7f9699403ec01d6ce2b52152ff94bad84e70c8297b947fcb66647b64517d7979c87af5f9 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-bootonly.iso) = 98608f76576872f3601c8d714de1808d15da5dd53b5b9188bd5fd47b9b97ab91 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-bootonly.iso.xz) = 2dde4ec1c834c6bbddc190f7b0ff401b9ffce7eb702862962e80102702c582af SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-disc1.iso) = f348bd272690c32be36bac97f26f1fc2fa224db899011a0efd06846c2f98ba35 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-disc1.iso.xz) = a00e089a6369211462cdb3f83e15cae46c1b0e69cc71ff0cc4910616f8fc599b SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-dvd1.iso) = 10f5d5b201d1c1a122c165e742c986bc6bbfd4a3075109225a312ab276c11614 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpc64le-dvd1.iso.xz) = 90083011d8664f3ccc623e4ff1b71ba2520eff8b2a198bb1a644e1cd26eb6fd6 o 13.3-BETA3 powerpcspe MPC85XXSPE: SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-bootonly.iso) = f93f19613050558e3ff6ef8a13d29cf7ea9404d5a9b37c5310360042a30d8d70edd0fe47bea16452ca325f172797604915242799d3c0218e415abd6930eaeaa2 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-bootonly.iso.xz) = 0a0d8ca030d7de5374418dab93ea62ad9f4fd2f68ab37c0f4712b5a193f9ab8a085e74a2940cdda49c4e720ba0a2f3463d86957dde6ab141ad9f01d12309bf40 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-disc1.iso) = 5ce86f916f362fb88984dc8a24c7afc9ad3bb873d89f1830f0b47025cdc3fbe04f1aade5c1e895d42f5d6717fbbcf0b2ca116d8d8f52880dca2d46bcc94bc908 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-disc1.iso.xz) = ec5ebea77246e27eabe80fc79beac96a2847b4abd7da22f8a47cef6954b52a57c1514931e83fc842dc03be49ea6c2eab2cc6cd938197077c2f84622d2c081a27 SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-dvd1.iso) = c27804c64546e6e01b1c78ce87a863811ef29e8da1eb5fdc08b8d6d1e4199cd7ac5a5c1966d1b7068da8632d4b19c145ef3d28bbc18e5ab3ac50d9e9157b06ae SHA512 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-dvd1.iso.xz) = 75f05581c765f89f9ee2563e66b5b75f332cb701bb368ec0591701c1b7580b912e3dd25576aca2a44bd3e93cfd06117147abbbfc43bab3845531909c93f12895 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-bootonly.iso) = 4880d8c19c7520b5509b70a94616e5c8f4655ecea620efed1193f3db8d361584 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-bootonly.iso.xz) = 8d56ff7ab34c41421492601a31d9c256faa9bbd406e167d661b1ad95ce729006 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-disc1.iso) = 967b730f71a06ad4dc0fa5437d8fbe3cab4459498e449b66237f81f5151ccdb4 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-disc1.iso.xz) = 44500ab7c08c69aa697d45bf7ae735a43ed6fed1ae4c6a9844f42cb19399c633 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-dvd1.iso) = 64593e938d99bc552c41eaa31ee30899d4b68e2ded749a4438f478333cd38684 SHA256 (FreeBSD-13.3-BETA3-powerpc-powerpcspe-dvd1.iso.xz) = cd46547b8ef81621c783ed8a018f1f02b01844338633235b134019c38b8142bc o 13.3-BETA3 armv6 RPI-B: SHA512 (FreeBSD-13.3-BETA3-arm-armv6-RPI-B.img.xz) = 611e1b930df241a840ffee17d69a57bdea406b5277085a91236cf5a116c287f575660525c78724c40d57efc95623941db1a80346f00ce8c8b108194a0c891fdc SHA256 (FreeBSD-13.3-BETA3-arm-armv6-RPI-B.img.xz) = 2aea0e315a5b425c2a0f7becf93039fa4875ae99eb871e189a7cd2ffe5ec5229 o 13.3-BETA3 armv7 GENERICSD: SHA512 (FreeBSD-13.3-BETA3-arm-armv7-GENERICSD.img.xz) = 7f0cb301a98da7ee051f5a69aa1cfcc5f73aeb4d26c5d8a391b0795e0bcbe5448a226da074c430b0dbd30cfa98ec8ff2465893a8de8a1f410c4c0b5077331a75 SHA256 (FreeBSD-13.3-BETA3-arm-armv7-GENERICSD.img.xz) = 75ded9c569c5c19dd5d10f5bbff289b5d6339dd70f3fa325bf3dba11855f162d o 13.3-BETA3 aarch64 GENERIC: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-bootonly.iso) = 50209fd719b30c2a1e1b7eef35d2599c1ceaad79899cc7bb46f5bb5ccd1d560ee580f045207c2fb5bfd275752190f0146c95e6300c65482feaeb90e6efba5d4c SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-bootonly.iso.xz) = 20dd01c008988ca75fedb6640f1297cc016278c54e23972d9a06cf8a8601713b68a46074e1c8d75f938bd2167afa8effadfba81650a20fb7186f962719b8714f SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-disc1.iso) = c95f0d77437fd7b1e6b4dcc2ef7fc595b425c3705ab9a0a50865d6dc44fd1dcce5135d41bc5ba0ce29a56710c802a8f1c832186b859b15c323d27db3882c7131 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-disc1.iso.xz) = 8cf8e52b0f98c9a31640ef5bda7bbb4e495317b06b57392b38507301da224fff31afa6631fb79f08a6db81208a59893c38547cc42c77b847c156726fb9a07ca9 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-dvd1.iso) = 2ca0f8f5639b3e8879d3a0491d126e6c3b22da57daef2815f9a87fe5b3711508950bc469a7051a00a26fcdd4423c68b1784c7e941362f2c257a3075ac8f87d1a SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-dvd1.iso.xz) = c4a65792b727557653309faf3250a132dc9d3e096c57004accd7df2fd7a881d6199783806f252218fe83749c7c638d68ae482476ad812ef440fe9724feb893bf SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-memstick.img) = 463526b3ad42533fd5e70baf022a4ce11392c22d59fd1a70cb3c5ec82b3a49c8ca7fc9e83aa121f9ffa122cd5ff7cd176402ac3f4410d32fc6841b26057fe90d SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-memstick.img.xz) = 44bbef97f8bb5320070a4c8f11c6a7b05b3adfced9ea5c0c0a8cae44790619429f5356e4aa0774a2b1f1eae2ca5c85e8377933492f2c862f38c62d4198fb8c98 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-mini-memstick.img) = a561028204b0495430d9e3618fbdd24399e975d9ddd4721d2659300ebbe61423e1a92dd6c481586b8295480b2b7a0fa432212bd7831a91a4682a84bfdbe33662 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-mini-memstick.img.xz) = b23abdfd5688cc497e2307fdd695f2d019269547f9feb28590303cc762fa85f62da8e11f4ef9437c3558021c246a0a948e65c4e6995ddae30a1ce725c5b2c5ca SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-bootonly.iso) = b899dd423468ac142911ba23482d8d47f8ea0607193d7419613851ef27ce351b SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-bootonly.iso.xz) = 3b48122c8feee2cf2f8aa36b611817adacc43c4d0619d005cd5ce6b61c5d1718 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-disc1.iso) = 87bede0472a100fda59f59dfe35fc20b25ab15d17f2a24ca60def4f0e091cf79 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-disc1.iso.xz) = 66ddca88f81a84a5901156f2b1f13edac7b815f18812c7479109e66edfc1e34e SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-dvd1.iso) = ac6fa9609348d14edcab37bf36dc9c8d5becc41595a514d1f3a54faed959a8f5 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-dvd1.iso.xz) = 9556c1a1f71ef14f97ffd6557cef777f4593443277a207b64560f89d25a4026e SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-memstick.img) = 5f60002935ef12aa8f1534e64cba08f6bc2aa2b32fd215c210b2faa8a48369d3 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-memstick.img.xz) = e4030df8d36b518b6d8dd016be70027c97cccfce0b727520929c844754b9b89d SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-mini-memstick.img) = 6b86cbeab527e06f38e014995347e9efa688dbfa233efd7045a5f4624db10bb3 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-mini-memstick.img.xz) = 33e021b276dafd79b9ab10b6da90cbbd0a412365b743183a7d919bef38d5c460 o 13.3-BETA3 aarch64 RPI: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-RPI.img.xz) = b94030b1092bd62f7a9b8098ae3a99dedd0eb689f75c91f11bc5090a5b6894111b1f74fa47bafce0e99dcdd7feac40a274b345a71801e9fd450de0fb8e363bd6 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-RPI.img.xz) = 2578e2ce02dc418700e5f42a55f6fd02e2977183018c0142e498da322cbe1f3e o 13.3-BETA3 aarch64 PINE64: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-PINE64.img.xz) = caeff0e7b6997c1fabe5c50eb0ea2b327b58ff821593b2aa6679104be5caca8b68ee3c2805075e4807b3cfb6bcc1208bcd1d76d96a3bb9b2b499bedb488d3137 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-PINE64.img.xz) = 41d69560f02c44057e236e196d77a789405f3f591562606fdd4fc59e6b01b8e8 o 13.3-BETA3 aarch64 PINE64-LTS: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-PINE64-LTS.img.xz) = 958c99c3b7347c9950c23e7538c2644e0a845ecc399fc098af30987c7df4c37856d1ae3bc2b6e0a327821b5506a1b3683113928fd13bb1f8c55ba7b6a39f53f2 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-PINE64-LTS.img.xz) = b94034a75bf9918b99b539991c9252d4ec02d80720fac8c5760f30a047547cc0 o 13.3-BETA3 aarch64 PINEBOOK: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-PINEBOOK.img.xz) = 46f1a6b35482ea8439fc74ba631ae464263881c408fb2d563f288b202038bf936727784cac710613646e4208dd16072a847349119f8195057f8d419ae7026bb4 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-PINEBOOK.img.xz) = 1c2b795646cbb48a199afeab4cd6f93efcf463e345c530efe61bc035d25d857c o 13.3-BETA3 aarch64 ROCK64: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-ROCK64.img.xz) = 0ffe48e002d9fbbc3625ecab14142a9079ae7d15cae088b9cb8fda54466010cd9022aa801d30853905b403134b0f169c7256853b5d81d4362114671f2ef6e62b SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-ROCK64.img.xz) = 9990c37af130f9fcf738c6879b7eb0d112218fe1c605f3d7708ec2ca066a4f1d o 13.3-BETA3 aarch64 ROCKPRO64: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64-ROCKPRO64.img.xz) = b56081dbb61275e49ffd96909cfdb2329c5b5580c73aecd5472fa6aaaf97d27520362fdb0939024387ea234476e704e5b05a2ef47f34127c81d43479851820c3 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64-ROCKPRO64.img.xz) = 63d0c7bbf4c0c54346c9fb033aed633fa2acf89ddfbab216251bd06f66ce326b o 13.3-BETA3 riscv64 GENERIC: SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-bootonly.iso) = daf898118eff0a010b2a09a578c123438400b85555a393661af321cc8c9ae6e76ab26ceab11f76a4672b0e72348aa8fa90e52f2cb399f9e8b9a7e94abb4ff06b SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-bootonly.iso.xz) = 7c79321734a83fbfb683cda45d4ed2f9b272b03d29dc46e2805ed762462a90a92125b38a21da62ca1f5d2f233af2be126cab05ccfc2a2dfa69db5cf6402eb6a5 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-disc1.iso) = 2bc871ef7a0d0f23b8c2573ec449def5862711e077bce730f8bea8f5f70b552cad8c64de914195e6d1d19ab074c5ee93473a84dc94f5dd5047830b1185d8c953 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-disc1.iso.xz) = 12c44c53ac67d6fc9a280fb96eb0661a445d35a31d17263bdad0ec7739f273182435358ea6725ab63349ee4abedf9eae1976d1162a6fabbbe21d0ff56cb9cb1d SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-dvd1.iso) = c8c1015ba62cfa93ec53612b1a22aab0f230e1def41607af51f128339a8b5f97eedda36cfcd60053170bbd96b44d49a23ea71382ef833ae853fb645085aad938 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-dvd1.iso.xz) = c715d826e3251fb6b1c1cef171295c6b2acd8c32e081dd23aada187b1aea43ba1d96a20336a5465299314a25457d37800668fe16499383ae3bd96ae938d53ee1 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-memstick.img) = 3c9a7bd9fcf986f42667149c00dac2be2bbc8005b8eaa480067e4702fb311da0d71575b884e60524d32ffdcf8688dcbf922248760bca8a43de859d200740617c SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-memstick.img.xz) = 300b902a18922974da4b1c218acbb958a6c8bb642d90051511fb7bfe58f8e92ea0dbc3e101ea3a5fa0bfa6282af2f01b79ea55c7de699a5dda66e7bd4e266fd0 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-mini-memstick.img) = f3aa708641df74e3ee96ab5f1b5c10533cebf537d69b97ab8fab423552ed813f417e1264e82ec61486055ec9248171b4e515487965176bfb648b876af190e7dc SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-mini-memstick.img.xz) = 61e94a6262e805a8643ae771e9d38718def9c2663db121e3af25ea4a1f9fa5cc5de0ada25dcdb126d031082b99bbcd4c031bd4f0881186297de4c1ffa8819020 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-bootonly.iso) = c2be1594fb19c931a7fcd9e3285282f860ade5992f1705a5ceea66dba380b05e SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-bootonly.iso.xz) = f01839c78270ca1f45b72687c5e79e5fdb3e09a45e952b3c8f1164ca3fbc7f55 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-disc1.iso) = de41accfa3c455061112abcef44ba65bf6957f5b7b1a0aada98d02722e0b56d6 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-disc1.iso.xz) = a0addfe110543e4cabf9b4ddfd60dfc682a83ad711cb56973e7627f264815581 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-dvd1.iso) = f5465b84feeb1318b5b17327c8bd02f5a2f250141f50717b7ec418e7b4549c97 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-dvd1.iso.xz) = dddf550c7d25981755658cebc8ea47de11dd9fff7edff51b0d5173f466b9737c SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-memstick.img) = 27d4a555976f0791570f74a90ddb8f8a164b6e65976b99abf335e68a6b059c1b SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-memstick.img.xz) = a8afe7255c1973c57150c27fa56dda3c7d4ee93c545ff588c4c5fde84fc040c0 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-mini-memstick.img) = 504aefed692f38e88a7e46210ad85cce90f10125bee90a64db031021883b6229 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-mini-memstick.img.xz) = 7d997c30ccc33e0926ce42af94d794ab35c42d86d94f7b4affa85bb53a02175a o 13.3-BETA3 riscv64 GENERICSD: SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64-GENERICSD.img.xz) = a605ccceb6a5f4d5f2583f72b69b40d95a72007d955774bccccdcc8fb5f6d3d073abb9dce81b994272108c902f7104dddf250c93d15bfdcb929c5bfad5e7e4aa SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64-GENERICSD.img.xz) = 78b5e3045271be1f836abce422e81eb4f3f4e1b5c195512fbf314c3076d48873 == VM IMAGE CHECKSUMS == o 13.3-BETA3 amd64: SHA512 (FreeBSD-13.3-BETA3-amd64.qcow2.xz) = 939b9238ac017e7b5b60dfc57ccb1053ef31c69ab3492a2927f007c7678a717d03d8a610adb7a4d1aad7e6d23e1923822c1492e6e5f05c1aab47a7bd266f9fe9 SHA512 (FreeBSD-13.3-BETA3-amd64.raw.xz) = 33a9cd0b4ae0561b2aac41f119883463ac5a52ee6a7c936d80d0dd20012a3aebcc19523b92dc0095e4456da9308162396c00dd2949af1a66596def5d54c2474e SHA512 (FreeBSD-13.3-BETA3-amd64.vhd.xz) = abb8ab49f40d200dc2b849b4eb1b8a98824449c55d165aec7a6dddc8625cfa9adb95369b70ea1edb280a810806ea8084b38f10779c5269d642d9149303658852 SHA512 (FreeBSD-13.3-BETA3-amd64.vmdk.xz) = 0ad5725675e3abd2b00dbc557dfe11c3f0974539a6574e123ac5d667de48f4fc1883ddfd124170051ecfe155afdc97d34c88ca431da9cd3847d00c57575e0628 SHA256 (FreeBSD-13.3-BETA3-amd64.qcow2.xz) = a16376e56712b6f3a1fbcccf235f23aa6157100f161ca61adb8738efb6eb6d6e SHA256 (FreeBSD-13.3-BETA3-amd64.raw.xz) = 5dee8e043cf5efeae54fcf91c6c04a8670eb53f1e892a2c366d2ea9b60069355 SHA256 (FreeBSD-13.3-BETA3-amd64.vhd.xz) = a30361d32f15911251a5b1e1a3615e1231696170e05955d867bd8afb4d38ddc3 SHA256 (FreeBSD-13.3-BETA3-amd64.vmdk.xz) = 68f2e7b0e03c072da7d031d952bda3c0a3aedf357a06adc5f83786c8ce9de0c5 o 13.3-BETA3 i386: SHA512 (FreeBSD-13.3-BETA3-i386.qcow2.xz) = 1fc5d75cc8d2d4741ec58decdb2de9c648c2894cecba6da975620ae837dd9b6ed47320c3f25bfa346c1f9deb0090f7f30ca472252d02546333a0d289c552aff8 SHA512 (FreeBSD-13.3-BETA3-i386.raw.xz) = 43914253b67de9fec580fefd2adce94fa0b96c83eb113793f2826bf58cf03553a38b4c8919729f4ea8422351e7cc92496b3ae0b042b748dc1eb223146a39a930 SHA512 (FreeBSD-13.3-BETA3-i386.vhd.xz) = 3a265eb7c42c9185b7f9c19d12321dba2d6062e8b3f97261d8bf1e455be05aa5f465c6569673231178d5a30a3e101c5a1e3cea4616a8de76624d09851b11b644 SHA512 (FreeBSD-13.3-BETA3-i386.vmdk.xz) = c096d3121c42952894ff2c69eb2792e473b49cb6340b2a1c680a113e686463633899cbd0b285a8b833d45e88cb6d0fd34725d0316a7f9261dbc760dbbef30df6 SHA256 (FreeBSD-13.3-BETA3-i386.qcow2.xz) = 2264dd32cb0fe927607a3b07db382f99c11e7e28e9cddb432c11b2eb2632d061 SHA256 (FreeBSD-13.3-BETA3-i386.raw.xz) = f2c46adfab793dea72383166c74336bdd651093f9c29d5b9551b687c4822a825 SHA256 (FreeBSD-13.3-BETA3-i386.vhd.xz) = 700f6578e5f330c234185e1d53be23455760ef79f3768158b37d9fe2215da324 SHA256 (FreeBSD-13.3-BETA3-i386.vmdk.xz) = ea1503ebb431f23a4affbb35c7d14a89d4da92dd3ddfb5dfa1975ee29d795380 o 13.3-BETA3 aarch64: SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64.qcow2.xz) = db505221762e09948df0faab6d270cdc003b58faf21269d2ea1dfd697feeed406a539e37fef168c016da4962f02fc4bb5a7e22efcc6a180a9cb10712c39f6444 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64.raw.xz) = 64cdecbfe7b480aaa369c1a41052d686217566b192d6bd291fd897ece0f90669710cec214eadb3a81d7387c9db37168fd949dc662c29c4d37dfb19d7219eef53 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64.vhd.xz) = e2aab920cc296b1ef037fa7df32933bc4ad2f6ba7ea7181926a60a73b91d8fdab7366f1bf2822dd57335a4b94b3f4eae9f70070d3602632072556602ecb97208 SHA512 (FreeBSD-13.3-BETA3-arm64-aarch64.vmdk.xz) = fd7a1cebd896bf41d78d2f0e1a3b94595b754b94006f985e6144aed2a9fa6ae0dde732a3222c7e4c8b68e9822244f02b4cac61b548a97c250041a33c32954e06 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64.qcow2.xz) = 4ab9e754c18ef9d7829c5b6752b3f5103ce6b4e4ce32f351703cc2122da85b35 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64.raw.xz) = 56bb912773306a2f442e7b28750d7b01d5ce39e73bdf1deec3e8092d26fa5883 SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64.vhd.xz) = 38f9473c26d6624750c93c57b7fe0fed3ef2652e6284b2888f99e16aa04e14ca SHA256 (FreeBSD-13.3-BETA3-arm64-aarch64.vmdk.xz) = 1cf8d794a6611864c94051a22a5435d9f6fae04385276fa8e053dd9e91106136 o 13.3-BETA3 riscv64: SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64.qcow2.xz) = 1f37c58f93c54f593af507895508c1bae9aed6377e12a46706805a3b1a8f6884601d39a5147f5c9c5353be1392e319054762614227aa0a36a37574c4fc663970 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64.raw.xz) = 4ff04d00865ec90cde2bd5d2436f476b8a1166659b6fd8f2586f743ea1cfdd67fb577f00335ec89dcee9c9003b224c8c9ed0b3c221a29ae91022f43f33332208 SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64.vhd.xz) = 547a176180819588c0f6dc2e29b468016f457c3c59dbeeaafb645590f57daf14077c53b93ae42885b12990afca50dc1fd1dd5cb2b2241dc3ee49665a0ae77d0e SHA512 (FreeBSD-13.3-BETA3-riscv-riscv64.vmdk.xz) = 911a248616098732fa3c772201b295fca681e335e5650f08b08b8f08d27398114ad3f02bc63435d2c344cdfb86f7854210690b7a78815829c712910a7bfbdb01 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64.qcow2.xz) = 0bda391e4544136e5d724791898fce9b2b56c0872624ff2bdb84bcad06f913da SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64.raw.xz) = f95a432ba430a388ccd46250dc5aff8a3a0b6e8049f62b4ba9b2d1615c7d685f SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64.vhd.xz) = 285b0dbfd90127f6a40c57f0548104ad1070ae1bb289257caf5b897e218270d1 SHA256 (FreeBSD-13.3-BETA3-riscv-riscv64.vmdk.xz) = d7c9e61ee1c98765d84a5e281d5136823b39b8f2c93898d1634017b51fc06cf8 Love FreeBSD? Support this and future releases with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEglY7hNBiDtwN+4ZBOJfy4i5lrT8FAmXPyKwACgkQOJfy4i5l rT8x5A//eRnbGX+v6A5NZKKp/64NJN7UxkHrNueK5Zsu7/p0SAY72gyLV92tSJk3 vngNiP4dVaLxus2SXNPICLWMoSds2sJFZlxp/1fehyxnRyolDRNlHMAPSjPI8FNh /6Vg/aWYQVUG07GoG7XcvQyog+aKk1fBsv7zUncpirSSTCP2VOCidry/EyustGU0 e4oCgXMTRsrC2wfXPRUUC8PLSEkpr9tU0sWokZF80IcOsLpeOk88x+P/OIDL6tG2 DzKy0MD6Myulnw+CAUUEkAQY4UFfD3Y5Z3ELaBTw21oCeDGPc2ZdGwot0uo3/hht W2eKQ5BdMtZzBNCh+iztXZ/HbBDExk16EuW25Bu+AmNuY77GuedWfA+faLFkxTUI eAOzvRWDpyVEldiPLY8H3gYLsLIy9siOGbzZqNG3CsosKVppl32Nx7XSc66WXw+I hqEN4Hkstj2m6NCnMlr8nwgpitUev0x/Y/BG0O1egGym78etPUHJgtp+0FUfktQJ 9G8xCV0PPo/eUR2uFiPZ5k9STIhpVCLvJuFqWuXV2O3Nu9nL6B+EiBy1kb9FUE3w TbA1c1YMJjdGgkqCkE8n5m05ktMn5ckGML089tmvJEgAkBRn4Ghxdc8VvkiCFOET eQQXg61dqtAqcexAkn20SbQfTpwX8UJu2ItJmYXR/zFlcLx81mY= =lrmP -----END PGP SIGNATURE----- From nobody Sat Feb 17 22:41:34 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TckLc2CW0z59wgn for ; Sat, 17 Feb 2024 22:41:44 +0000 (UTC) (envelope-from vince@hightek.org) Received: from mail.ngtek.org (ngtek.org [IPv6:2001:19f0:6400:8963:5400:ff:fe09:9585]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TckLb2rRqz53LG for ; Sat, 17 Feb 2024 22:41:43 +0000 (UTC) (envelope-from vince@hightek.org) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of vince@hightek.org designates 2001:19f0:6400:8963:5400:ff:fe09:9585 as permitted sender) smtp.mailfrom=vince@hightek.org; dmarc=none Received: from [170.39.28.55] (helo=marble.hightek.org) by mail.ngtek.org with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89 (FreeBSD)) (envelope-from ) id 1rbTNG-000DNh-3W for freebsd-stable@freebsd.org; Sat, 17 Feb 2024 16:41:34 -0600 Received: from vince by marble.hightek.org with local (Exim 4.95 (FreeBSD)) (envelope-from ) id 1rbTNG-0006rY-7E for freebsd-stable@freebsd.org; Sat, 17 Feb 2024 16:41:34 -0600 Date: Sat, 17 Feb 2024 16:41:34 -0600 From: Vincent Stemen To: freebsd-stable@freebsd.org Subject: gpart device permissions security hole (/dev/geom.ctl) Message-ID: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4TckLb2rRqz53LG X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.87 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.87)[-0.867]; FORGED_SENDER(0.30)[vince.bsd@hightek.org,vince@hightek.org]; R_SPF_ALLOW(-0.20)[+a]; MIME_GOOD(-0.10)[text/plain]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; MISSING_XM_UA(0.00)[]; ASN(0.00)[asn:20473, ipnet:2001:19f0:6400::/38, country:US]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; DMARC_NA(0.00)[hightek.org]; FROM_NEQ_ENVFROM(0.00)[vince.bsd@hightek.org,vince@hightek.org]; FROM_HAS_DN(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; RCVD_COUNT_TWO(0.00)[2]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; RCVD_TLS_LAST(0.00)[]; ARC_NA(0.00)[] Hi. In the process of writing some systems administration tools on FreeBSD 13.1-RELEASE to custom partition drives and setup computers for our network and our customers, I have discovered that any user belonging to the 'operator' group has the power to completely delete the partition table and wipe out the whole system, just because the drive devices belong to that group, even if there is no read or write access to the devices by the group. I had to do a lot of research to find out, via mention on the freebsd irc after I asked and had considerable discussion, that these permissions are granted by just having read access for the group for /dev/geom.ctl. I found no documentation in general searches explaining this and no mention of it in the man pages such as for gpart or geom. It seems like a bizarre design choice to me. It is very counter intuitive to see devices that have no write access and even no read access, yet be able to do something as critical as delete the entire partition table by just belonging to the group. I have been a Unix systems administrator for well over 35 years and It's not uncommon for administrators to belong to the operator group for restricted admin tasks. It is completely unexpected to discover the user can wipe out the whole system. https://unix.stackexchange.com/questions/11638/what-is-the-point-of-the-operator-user The concept of operators origins from the second generation of computers. The operator was responsible for putting the cards on the machine for execution. When the execution was done, the operator would collect the output and the cards and deliver them back to the programmer. During the third generation, when the first UNIXes appeared, ... the user operator on UNIX systems was meant for doing low privileged administrative tasks (replacing tapes, backups, maintenance, etc.). This is the purpose I have always understood and used the operator group for in a variety of different Unix systems during all the years I have been a systems administrator. I have always thought that FreeBSD put high priority and great pride in the security of the system, but this as substantial security hole. I only discovered it by complete accident during the development of our in-house tools when I ran the scripts from my normal user account, which also belongs to the operator group, during testing, expecting to get permission denied errors, only to discover it successfully wiped out and re-wrote the partition table. Luckily I had specified my test device that was not being used on the live running system. I don't know the rationale behind this design decision, and perhaps there are good reasons for it from certain perspectives, but whatever it is, it does not change that fact that it creates a massive security hole in FreeBSD that even the most seasoned systems administrator can easily and unexpectedly fall into. Here are the default permissions for geom.ctl. crw-r----- 1 root operator 0xa Nov 16 11:50 /dev/geom.ctl Here are the default permissions for the devices. crw-r----- 1 root operator 0x53 Nov 16 11:50 /dev/ada0 crw-r----- 1 root operator 0x55 Nov 16 11:50 /dev/ada0p1 ... This is not limited, of course, to the operator group. I can change the group on the drive devices to any other group that I am a member of and even remove read permission for the group on the drives and can still delete the partition table. I have never seen such behaviour in any other Unix environment. From nobody Sun Feb 18 12:10:05 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Td4HN3l2nz542Fb for ; Sun, 18 Feb 2024 12:10:08 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [107.204.234.170]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Td4HM1g6Yz4bFj for ; Sun, 18 Feb 2024 12:10:07 +0000 (UTC) (envelope-from david@catwhisker.org) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 107.204.234.170 as permitted sender) smtp.mailfrom=david@catwhisker.org; dmarc=none Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.18.1/8.18.1) with ESMTP id 41ICA5ra046459 for ; Sun, 18 Feb 2024 12:10:05 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.18.1/8.18.1/Submit) id 41ICA55x046458 for stable@freebsd.org; Sun, 18 Feb 2024 04:10:05 -0800 (PST) (envelope-from david) Date: Sun, 18 Feb 2024 04:10:05 -0800 From: David Wolfskill To: stable@freebsd.org Subject: Build fail: stable/14-n266695-52d7bd8c4268 -> stable/14-n266773-25bd87539704 Message-ID: Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="FOQgD8ibZ9vJkepC" Content-Disposition: inline X-Rspamd-Queue-Id: 4Td4HM1g6Yz4bFj X-Spamd-Bar: / X-Spamd-Result: default: False [-0.39 / 15.00]; REPLYTO_EQ_TO_ADDR(5.00)[]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_LONG(-1.00)[-0.999]; NEURAL_HAM_SHORT(-1.00)[-0.998]; NEURAL_HAM_MEDIUM(-1.00)[-0.996]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; R_SPF_ALLOW(-0.20)[+ip4:107.204.234.170]; FROM_HAS_DN(0.00)[]; ASN(0.00)[asn:7018, ipnet:107.192.0.0/12, country:US]; FREEFALL_USER(0.00)[david]; RCPT_COUNT_ONE(0.00)[1]; MISSING_XM_UA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; DMARC_NA(0.00)[catwhisker.org]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; MID_RHS_MATCH_FROMTLD(0.00)[]; HAS_REPLYTO(0.00)[stable@freebsd.org] --FOQgD8ibZ9vJkepC Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable First one of these I've seen in a long time. This is amd64, using META_MODE: =2E.. Building /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/db/Kyuafile Building /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/hash/h_hash Building /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/hash/sha2_test.d= ebug *** [zfsd_main.o] Error code 1 make[5]: stopped in /usr/src/cddl/usr.sbin/zfsd =2EERROR_TARGET=3D'zfsd_main.o' =2EERROR_META_FILE=3D'/common/S1/obj/usr/src/amd64.amd64/cddl/usr.sbin/zfsd= /zfsd_main.o.meta' =2EMAKE.LEVEL=3D'5' MAKEFILE=3D'' =2EMAKE.MODE=3D'meta missing-filemon=3Dyes missing-meta=3Dyes silent=3Dyes = verbose' _ERROR_CMD=3D'c++ -target x86_64-unknown-freebsd14.0 --sysroot=3D/common/S= 1/obj/usr/src/amd64.amd64/tmp -B/common/S1/obj/usr/src/amd64.amd64/tmp/usr/= bin -O2 -pipe -fno-common -DIN_BASE -I/usr/src/sys/contrib/openzfs/include= -I/usr/src/sys/contrib/openzfs/lib/libspl/include -I/usr/src/sys/contrib/o= penzfs/lib/libspl/include/os/freebsd -I/usr/src/sys -include /usr/src/sys/c= ontrib/openzfs/include/os/freebsd/spl/sys/ccompile.h -I/usr/src/cddl/usr.sb= in -DHAVE_ISSETUGID -DHAVE_EXECVPE -DNEED_SOLARIS_BOOLEAN -fPIE -g -gz=3Dzl= ib -Wno-format-zero-length -fstack-protector-strong -Wsystem-headers -Werro= r -Wall -Wno-format-y2k -Wno-uninitialized -Wdate-time -Wno-unknown-pragmas= -Wno-empty-body -Wno-string-plus-int -Wno-unused-const-variable -Wno-error= =3Dunused-but-set-parameter -Wno-tautological-compare -Wno-unused-value -Wn= o-parentheses-equality -Wno-unused-function -Wno-enum-conversion -Wno-unuse= d-local-typedef -Wno-address-of-packed-member -Wno-switch -Wno-switch-enum = -Wno-knr-promoted-parameter -Qunused-arguments -fPIE -Wno-c++11-extensi= ons -c /usr/src/cddl/usr.sbin/zfsd/zfsd_main.cc -o zfsd_main.o;' =2ECURDIR=3D'/usr/src/cddl/usr.sbin/zfsd' =2EMAKE=3D'make' =2EOBJDIR=3D'/common/S1/obj/usr/src/amd64.amd64/cddl/usr.sbin/zfsd' =2ETARGETS=3D'all' CPUTYPE=3D'' DESTDIR=3D'/common/S1/obj/usr/src/amd64.amd64/tmp' LD_LIBRARY_PATH=3D'' MACHINE=3D'amd64' MACHINE_ARCH=3D'amd64' MACHINE_CPUARCH=3D'amd64' MAKEOBJDIRPREFIX=3D'' MAKESYSPATH=3D'/usr/src/share/mk' MAKE_VERSION=3D'20230622' =2E... I have copied the full build typescript, as well as the meta file, to https://www.catwhisker.org/~david/FreeBSD/stable_14: albert(14.0-S)[9] ls -lT total 546 -rw-r--r-- 1 david staff 3107962 Feb 18 03:50:29 2024 build_typescript.txt -rw-r--r-- 1 david staff 228413 Feb 18 03:50:29 2024 build_typescript.txt= =2Egz -rw-r--r-- 1 david staff 74852 Feb 18 03:50:24 2024 zfsd_main.o.meta -rw-r--r-- 1 david staff 6623 Feb 18 03:50:24 2024 zfsd_main.o.meta.gz This machine is running: freebeast(14.0-S)[5] uname -aUK FreeBSD freebeast.catwhisker.org 14.0-STABLE FreeBSD 14.0-STABLE #59 stable= /14-n266695-52d7bd8c4268: Fri Feb 16 11:34:23 UTC 2024 root@freebeast.c= atwhisker.org:/common/S1/obj/usr/src/amd64.amd64/sys/GENERIC amd64 1400507 = 1400507 I have some other (slower) machines also trying it; if any of them does not fail in the same way, I will follow up with details. Information from yesterday's (successful) build of stable/14-n266695-52d7bd8c4268 (and the build environment) may be found at https://www.catwhisker.org/~david/FreeBSD/history/ Peace, david --=20 David H. Wolfskill david@catwhisker.org Alexey Navalny was a courageous man; Putin has made him a martyr. See https://www.catwhisker.org/~david/publickey.gpg for my public key. --FOQgD8ibZ9vJkepC Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iNUEARYKAH0WIQSTLzOSbomIK53fjFliipiWhXYx5QUCZdHznV8UgAAAAAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0OTMy RjMzOTI2RTg5ODgyQjlEREY4QzU5NjI4QTk4OTY4NTc2MzFFNQAKCRBiipiWhXYx 5VptAQDotF9ovR7ojscPP791O51yQ/awAoZWDa7sQfwryqxKgAD9HgPceveEQEGr vDSAMtsNmT6HlvKyL0wHIKP8f5mjRgs= =CeWg -----END PGP SIGNATURE----- --FOQgD8ibZ9vJkepC-- From nobody Sun Feb 18 13:04:27 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Td5V573JGz59bmt for ; Sun, 18 Feb 2024 13:04:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Td5V56Gdcz4kXw for ; Sun, 18 Feb 2024 13:04:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708261469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=h2Wd6420CIlOSdKgWZ0RatAGSBdJVYq/nXSoyYsbHnM=; b=xZp4vmBesX2DLnFSkInppXKgfwh9YHGYmitt37E6PmBGNd2YWZnqDtlIEtXsZkSY+xcZR8 i8urQWpz0hGppcPIKka9QAmRfmD+QGeN39NZLwe728l38mG1GzmCSmNBDnNOl7H66Yuzho dKuiTDWBqGVxtPCox7thkZvOR203sm7IHxoIILu8UdaqaBPGZYkx1Vgl19jpGLogbtFa+n hKiBn39WZIs1jfpPHfMAHjDLhO82h/5MgdyiwOjYm9C8UP5LmKB08Jwnad5CcFr0qbnrGo 7HnQjntwzMD9yygbnooKqbAosKs56hoK3oSbI//tdaWAJ3JVQPXQWHWX2tq+kw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1708261469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=h2Wd6420CIlOSdKgWZ0RatAGSBdJVYq/nXSoyYsbHnM=; b=lQxzURBxlgxjGIE+gKxrKBDndETUJYQPwnM72Vv4iEcO9wAVeWiFBX/KQIbzfehz5gwRn2 UxwGN4HP4nEej9oWZRjG5hicc7g7dBYFBm+rIm0664D6kbogi31V+T++63mWoITyWU7P8q UOoklLfzBKt9PkB8FLMCWxX0ejPjG+WVHXtYoY/9OYZ+Is928vKmMkiv00a6zedKCWCMhs 8nvCa7yf1cTO8nETpcZsKktRD0pcoQ7v2eMzpvkS6sqAPXU7EY1H6kwB05cC6YeW6+b3yV RpbvW00f8igsXMayMkKHiwB5yChx8FxmoTEb8uD4ndqAF2Nh/KCIepebykJYiA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1708261469; a=rsa-sha256; cv=none; b=dnCnl5wiM29HBfpqpTv5P8j6xnhBf0XZYL5o9vov0QRaEH7xnyol8Put7sKXYhxTH5Ie09 x4VvLp0z82OWZpZVONGwGHh1lBJMGN+ewE8YUzmSQsM1TVUgSaqFv1n4orupWsZcSpAaYU zN0R0ChH/c10IL+IqshF8Wfy7r0pVcyFxLEOTti5e1/uUU1En068OBBt+/8J5SARwqki4C NC+p6QpXCEhQmM8bC/2XOeayiQBmHFymy+Rdwqpee6s3PiYWepVQEiuB3zMiiRYjqgqVrq sejlgDhZvPFHZZOLk02PgB6JeMRMUfx1d3YNfl1VqROXD4r8uWVBQidrcMzMTA== Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "tensor.andric.com", Issuer "R3" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 4Td5V54cNZzG83 for ; Sun, 18 Feb 2024 13:04:29 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtpclient.apple (longrow.home.andric.com [192.168.0.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id ED6006AAC4 for ; Sun, 18 Feb 2024 14:04:27 +0100 (CET) From: Dimitry Andric Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.1\)) Subject: Re: Build fail: stable/14-n266695-52d7bd8c4268 -> stable/14-n266773-25bd87539704 Date: Sun, 18 Feb 2024 14:04:27 +0100 References: To: Freebsd-stable List In-Reply-To: Message-Id: <26E85115-5681-40E4-B392-0FDD1FD399B0@FreeBSD.org> X-Mailer: Apple Mail (2.3731.700.6.1.1) On 18 Feb 2024, at 13:10, David Wolfskill wrote: >=20 >=20 > First one of these I've seen in a long time. This is amd64, using > META_MODE: >=20 > ... > Building /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/db/Kyuafile > Building /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/hash/h_hash > Building = /common/S1/obj/usr/src/amd64.amd64/lib/libc/tests/hash/sha2_test.debug > *** [zfsd_main.o] Error code 1 The actual error was cut off: In file included from = /usr/src/sys/contrib/openzfs/lib/libspl/include/unistd.h:27: /common/S1/obj/usr/src/amd64.amd64/tmp/usr/include/unistd.h:507:6: = error: declaration of 'execvpe' has a different language linkage 507 | int execvpe(const char *, char * const *, char * const = *); | ^ = /usr/src/sys/contrib/openzfs/lib/libspl/include/os/freebsd/sys/param.h:60:= 12: note: previous declaration is here 60 | extern int execvpe(const char *name, char * const argv[], char = * const envp[]); | ^ Kostik fixed this just now, with: = https://cgit.freebsd.org/src/commit/?id=3Dbda0c0dc87c54b611d96b6d0dc194781= 9ffec083 -Dimitry From nobody Sun Feb 18 13:10:04 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Td5cZ415Rz59cgr for ; Sun, 18 Feb 2024 13:10:06 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [107.204.234.170]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Td5cZ12zsz4lTH; Sun, 18 Feb 2024 13:10:06 +0000 (UTC) (envelope-from david@catwhisker.org) Authentication-Results: mx1.freebsd.org; none Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.18.1/8.18.1) with ESMTP id 41IDA4NQ047577; Sun, 18 Feb 2024 13:10:04 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.18.1/8.18.1/Submit) id 41IDA4bv047576; Sun, 18 Feb 2024 05:10:04 -0800 (PST) (envelope-from david) Date: Sun, 18 Feb 2024 05:10:04 -0800 From: David Wolfskill To: Dimitry Andric Cc: Freebsd-stable List Subject: Re: Build fail: stable/14-n266695-52d7bd8c4268 -> stable/14-n266773-25bd87539704 Message-ID: Mail-Followup-To: David Wolfskill , Dimitry Andric , Freebsd-stable List References: <26E85115-5681-40E4-B392-0FDD1FD399B0@FreeBSD.org> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="qGzcgS64yY11RjtH" Content-Disposition: inline In-Reply-To: <26E85115-5681-40E4-B392-0FDD1FD399B0@FreeBSD.org> X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4Td5cZ12zsz4lTH X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:7018, ipnet:107.192.0.0/12, country:US] --qGzcgS64yY11RjtH Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, Feb 18, 2024 at 02:04:27PM +0100, Dimitry Andric wrote: > ... > The actual error was cut off: Sorry (but that's why I put the full typescript & meta file on teh Web server). > In file included from /usr/src/sys/contrib/openzfs/lib/libspl/include/u= nistd.h:27: > /common/S1/obj/usr/src/amd64.amd64/tmp/usr/include/unistd.h:507:6: erro= r: declaration of 'execvpe' has a different language linkage > 507 | int execvpe(const char *, char * const *, char * const *); > | ^ > /usr/src/sys/contrib/openzfs/lib/libspl/include/os/freebsd/sys/param.h:= 60:12: note: previous declaration is here > 60 | extern int execvpe(const char *name, char * const argv[], char = * const envp[]); > | ^ >=20 > Kostik fixed this just now, with: >=20 > https://cgit.freebsd.org/src/commit/?id=3Dbda0c0dc87c54b611d96b6d0dc19478= 19ffec083 >=20 > -Dimitry > .... Cool; thanks! :-) Peace, david --=20 David H. Wolfskill david@catwhisker.org Alexey Navalny was a courageous man; Putin has made him a martyr. See https://www.catwhisker.org/~david/publickey.gpg for my public key. --qGzcgS64yY11RjtH Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iNUEARYKAH0WIQSTLzOSbomIK53fjFliipiWhXYx5QUCZdIBrF8UgAAAAAAuAChp c3N1ZXItZnByQG5vdGF0aW9ucy5vcGVucGdwLmZpZnRoaG9yc2VtYW4ubmV0OTMy RjMzOTI2RTg5ODgyQjlEREY4QzU5NjI4QTk4OTY4NTc2MzFFNQAKCRBiipiWhXYx 5UrPAQCItLIc1Lm5DniGEYzTlZfw57FxJlJlv5wDaJEIbQHhgwD+OCLqR3VLzQel 1jf3D63/K7q+/oQxxoehab1FRj5QhwU= =JNdH -----END PGP SIGNATURE----- --qGzcgS64yY11RjtH-- From nobody Sun Feb 18 13:59:22 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Td6kq6SLdz59kyT for ; Sun, 18 Feb 2024 14:00:35 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Td6kq3KqCz4rLX; Sun, 18 Feb 2024 14:00:35 +0000 (UTC) (envelope-from kostikbel@gmail.com) Authentication-Results: mx1.freebsd.org; none Received: from tom.home (kib@localhost [127.0.0.1] (may be forged)) by kib.kiev.ua (8.18.1/8.18.1) with ESMTP id 41IDxMTZ075385; Sun, 18 Feb 2024 15:59:25 +0200 (EET) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua 41IDxMTZ075385 Received: (from kostik@localhost) by tom.home (8.18.1/8.18.1/Submit) id 41IDxMMb075384; Sun, 18 Feb 2024 15:59:22 +0200 (EET) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 18 Feb 2024 15:59:22 +0200 From: Konstantin Belousov To: David Wolfskill , Dimitry Andric , Freebsd-stable List Subject: Re: Build fail: stable/14-n266695-52d7bd8c4268 -> stable/14-n266773-25bd87539704 Message-ID: References: <26E85115-5681-40E4-B392-0FDD1FD399B0@FreeBSD.org> List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-stable@freebsd.org X-BeenThere: freebsd-stable@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-14) on tom.home X-Spamd-Bar: ---- X-Rspamd-Queue-Id: 4Td6kq3KqCz4rLX X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US] On Sun, Feb 18, 2024 at 05:10:04AM -0800, David Wolfskill wrote: > On Sun, Feb 18, 2024 at 02:04:27PM +0100, Dimitry Andric wrote: > > ... > > The actual error was cut off: > > Sorry (but that's why I put the full typescript & meta file on teh Web > server). > > > In file included from /usr/src/sys/contrib/openzfs/lib/libspl/include/unistd.h:27: > > /common/S1/obj/usr/src/amd64.amd64/tmp/usr/include/unistd.h:507:6: error: declaration of 'execvpe' has a different language linkage > > 507 | int execvpe(const char *, char * const *, char * const *); > > | ^ > > /usr/src/sys/contrib/openzfs/lib/libspl/include/os/freebsd/sys/param.h:60:12: note: previous declaration is here > > 60 | extern int execvpe(const char *name, char * const argv[], char * const envp[]); > > | ^ > > > > Kostik fixed this just now, with: > > > > https://cgit.freebsd.org/src/commit/?id=bda0c0dc87c54b611d96b6d0dc1947819ffec083 > > > > -Dimitry > > .... > > Cool; thanks! :-) I am sorry for the breakage.