From nobody Mon Nov 4 08:30:30 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xhl6P3qt5z5cSJ3 for ; Mon, 04 Nov 2024 08:30:53 +0000 (UTC) (envelope-from void@f-m.fm) Received: from fout-a7-smtp.messagingengine.com (fout-a7-smtp.messagingengine.com [103.168.172.150]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xhl6N06v7z3xfk for ; Mon, 4 Nov 2024 08:30:52 +0000 (UTC) (envelope-from void@f-m.fm) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=f-m.fm header.s=fm3 header.b="T/BqhLz0"; dkim=pass header.d=messagingengine.com header.s=fm3 header.b="cnS/MHdi"; spf=pass (mx1.freebsd.org: domain of void@f-m.fm designates 103.168.172.150 as permitted sender) smtp.mailfrom=void@f-m.fm; dmarc=pass (policy=none) header.from=f-m.fm Received: from phl-compute-05.internal (phl-compute-05.phl.internal [10.202.2.45]) by mailfout.phl.internal (Postfix) with ESMTP id 248E1138026C for ; Mon, 4 Nov 2024 03:30:51 -0500 (EST) Received: from phl-imap-04 ([10.202.2.82]) by phl-compute-05.internal (MEProxy); Mon, 04 Nov 2024 03:30:51 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=f-m.fm; h=cc :content-transfer-encoding:content-type:content-type:date:date :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to; s=fm3; t=1730709051; x=1730795451; bh=ziLUnvEfTJ382Cu644rFyY6syBeMhhPQCMopih8tMN8=; b= T/BqhLz0M8twwgTntqjluu0ZzbOSqg9sdNcA5VkK9BxPfppdlfTgon4cg3CJig67 cD93jt8YLcuV9a4YqGCHPEGWN+Etu5N8xsQJ7j8pPuV4HItS1SL1R46OPS1oBPQE 37nbjAFEbNbetDGIzeRwqlvGQ3ixdqVBkOrf+fkag9QUHPTvSngW5XXo2K6zzi0n VoFlIUOP2UzKIqYorY+BIAHkLv85YX5AsMkJKJmvIMxxlNY3kUOrghAMSQHXcuBF lanECWLKbbZo219SbY+1UfqcZ0REaq5ht4dADVIFEdchNkwNM9YEOfULAHp0mFUS vrv3u/tImxjlcNgtO5LXuA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :content-type:date:date:feedback-id:feedback-id:from:from :in-reply-to:in-reply-to:message-id:mime-version:references :reply-to:subject:subject:to:to:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; t=1730709051; x=1730795451; bh=z iLUnvEfTJ382Cu644rFyY6syBeMhhPQCMopih8tMN8=; b=cnS/MHdipfXqxk/7x u0u/ZPpkiZNhCdmt5hHWFn1+2FOkG/vly77sVimEap64/5BYqlwUuPS9LiS8skgu KPKxWWmlXNL+Ps/f6PQTjVKagptEl4/nbDfqR49itsMjE3hRpC1BN4UFcZ+qwMAX zCWaDbGe5rc4agSMNYuVzRfvmlpphS2J5KMjmzcFEDFtJycz3tSxvhBUpAK+vgRI Qho7dri8GZc23QjfPWhGdPCGzj6eJRJgB7bhdoeLjUHbjoo6C7BY61ehLVT56u4N Jm6P9IfrUIqJtopkUGu6PZ3PvOQAAwUZSVey1m8aIYQznT40Vh6BcG2wtzuT47RW tonaw== X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeeftddrvdelhedguddulecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpggftfghnshhusghstghrihgsvgdp uffrtefokffrpgfnqfghnecuuegrihhlohhuthemuceftddtnecunecujfgurhepofggff fhvffkjghfufgtgfesthejredtredttdenucfhrhhomhepvhhoihguuceovhhoihgusehf qdhmrdhfmheqnecuggftrfgrthhtvghrnhepiedtfeeifeetiefffeefgfejueevffeltd ehffegtdffhfefuefggfeuhfekgfdvnecuvehluhhsthgvrhfuihiivgeptdenucfrrghr rghmpehmrghilhhfrhhomhepvhhoihgusehfqdhmrdhfmhdpnhgspghrtghpthhtohepud dpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepshhtrggslhgvsehfrhgvvggsshgu rdhorhhg X-ME-Proxy: Feedback-ID: i2541463c:Fastmail Received: by mailuser.phl.internal (Postfix, from userid 501) id DF6802E60084; Mon, 4 Nov 2024 03:30:50 -0500 (EST) X-Mailer: MessagingEngine.com Webmail Interface List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 Date: Mon, 04 Nov 2024 08:30:30 +0000 From: void To: stable@freebsd.org Message-Id: In-Reply-To: References: Subject: Re: beastie menu is broken in latest update (stable/14-n269388-1821145f28e9) Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Spamd-Result: default: False [-4.09 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.997]; DMARC_POLICY_ALLOW(-0.50)[f-m.fm,none]; R_DKIM_ALLOW(-0.20)[f-m.fm:s=fm3,messagingengine.com:s=fm3]; R_SPF_ALLOW(-0.20)[+ip4:103.168.172.128/27]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_LOW(-0.10)[103.168.172.150:from]; XM_UA_NO_VERSION(0.01)[]; RCPT_COUNT_ONE(0.00)[1]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:209242, ipnet:103.168.172.0/24, country:US]; DWL_DNSWL_NONE(0.00)[messagingengine.com:dkim]; FREEMAIL_FROM(0.00)[f-m.fm]; FREEMAIL_ENVFROM(0.00)[f-m.fm]; ARC_NA(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; RCVD_COUNT_THREE(0.00)[3]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; RCVD_TLS_LAST(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[f-m.fm:+,messagingengine.com:+] X-Rspamd-Queue-Id: 4Xhl6N06v7z3xfk X-Spamd-Bar: ---- On Sat, 2 Nov 2024, at 19:08, Warner Losh wrote: > > I've tested EFI and BIOS and I have a couple of reports that it works > on BIOS so far. Thanks Warner, it's working fine now -- From nobody Wed Nov 6 16:04:40 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk95B52Dlz5ckXQ for ; Wed, 06 Nov 2024 16:04:46 +0000 (UTC) (envelope-from hausen@punkt.de) Received: from BEUP281CU002.outbound.protection.outlook.com (mail-germanynorthazon11020082.outbound.protection.outlook.com [52.101.169.82]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protection.outlook.com", Issuer "DigiCert Cloud Services CA-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9593NlVz4QDy for ; Wed, 6 Nov 2024 16:04:45 +0000 (UTC) (envelope-from hausen@punkt.de) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of hausen@punkt.de designates 52.101.169.82 as permitted sender) smtp.mailfrom=hausen@punkt.de; dmarc=none; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=i2eF1D11VPnBRZ0prcCaLrnsdHZAOETEwRNyTEjbdjBOpxlv2q1RBteZbDuDIsM+Gbp5mTcWmB9TeX3MxqrF200xozSA2dyB5mbyIiCQ+6+TWQS2hjcDtjzWXZH6UnwcwtlWNGkavThru4LeswGxvOuFaKRKkPi6/mLSTCgMRlFOUE6n3KltdTWWRNhZLmStUfL3quGE3VU24kfxtkMnayEJNoDAUVzKpe1Zejff3B2ZYdMZerYPcSShAlQKexQgsgun0X6yHspXe1DsGbSav8yyiJPbk9KzPXH5LyJ/+09tF4AbjHO0/H0WehSK6rzDi9cgCBWfdxrug2yEk/Dwkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=K7RMN/I3U1vxUV4BpF7vWiynpkp+NVAEZPv72gZvLeQ=; b=gnnberaKEevCMXObEIMbAZKUmHu7duCkz/ZHAP2eoV23pxA1xohHlh1Fk1yeTyYCyO8aLyy/050nUYvmnSeInCsUN3iXvBRf50NX8bL1pioKfAqblZ63gT9+ZAWav7AlSh+fLckKktLfcHJ8ibei/69FUEjcv3PO93Fw7JcuMcuDiKFgwxmQHvhjA5kpX1T0EtTcnlb+KRWCAnIVANZNYcqSUFRYXunktc543Q21ZLQHFbshj5IDLRT24huwboqnoSa8FAgqHBD+OAjoOWPhBk6xaZ0IuQ0ytIiB6snRfhsVTvsCDWRbdRKWgS9x5qLntXGVpNzMGfwcU03GyQn8pQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=punkt.de; dmarc=pass action=none header.from=punkt.de; dkim=pass header.d=punkt.de; arc=none Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:68::6) by FR1PPF8846C9FFC.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d18::f6a) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8114.30; Wed, 6 Nov 2024 16:04:40 +0000 Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059]) by BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059%5]) with mapi id 15.20.8137.019; Wed, 6 Nov 2024 16:04:40 +0000 From: "Patrick M. Hausen" To: Freebsd Stable Subject: 13.4-p2 "Loader needs to be updated" Thread-Topic: 13.4-p2 "Loader needs to be updated" Thread-Index: AQHbMGWVRP2eacX6ZUmi+DxRJNVRhA== Date: Wed, 6 Nov 2024 16:04:40 +0000 Message-ID: Accept-Language: de-DE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: BE1P281MB3156:EE_|FR1PPF8846C9FFC:EE_ x-ms-office365-filtering-correlation-id: c88bc58b-f8ce-486e-5b3e-08dcfe7cb864 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|376014|366016|10070799003|38070700018; x-microsoft-antispam-message-info: =?utf-8?B?b2J0b1p6dG9nekFJSW1hT0tpeUtVeEJoakE5YldhL0xaYmp0bGo2NHlPMURJ?= =?utf-8?B?Mm9oaEp4dmR3RU9BejlFelBVU2pQeXRhN0xpYW9zUFlPcGxrejFGMkJuU1lH?= =?utf-8?B?NEdKcEptSFpMSG5XdS9tbkJremhWVHBiVHdqSENUQWdJOTFPeGxhOEtseldD?= =?utf-8?B?WEFDMzRBUG05RDZmZEkybDE3aUlNdGRONFVDNXo5emErVWtGQXZqMVZOaHZ5?= =?utf-8?B?cUJOV2VWNm9oMEkyMHVVMS9WYUF5c0R1aSszdWxuYWpyd0p0ZXJ6L2ZBbkl0?= =?utf-8?B?S0ZjbDBWZTIvWWxsaEJRaXZzU3RFYTJKR2VIWVpleEtTaHBzWnljU3JnNW9r?= =?utf-8?B?Wk9rcFJRWHBGeTdVeVZiVmtTQTNRQ2lpWFAxcG9pVHV1VHhNZ20vY2dvaGRn?= =?utf-8?B?TEorYXhEcjNsb00yTGNZb2t1VVpZejJpak9ORyttRU5ZREJoam9tbkNxZytN?= =?utf-8?B?NGxkeXY2S1h6MTRQWDRDWVh5Y2RQSS9CbDFvMlI3dFBKUldpZlNzbEtkQUZI?= =?utf-8?B?cjgyd01aOGdmRTRUTnpLQ21EVjZ2SnZhdG0vRk52YXkzalo5MFlkVEplTWN5?= =?utf-8?B?T0Zha3BHR2JBWC9RaHRsSHZQZytGTnNlRmJWQnNxUkxFTndpMFdvWXAzMVlF?= =?utf-8?B?cWRCN1ljbnNYZXR3T2h1UTlGdEZZZW1oaDF4d3dvWnJIUHZZMnl2MFBXdFdL?= =?utf-8?B?RVpJT1ZJZDNHYWFoTUZWQmZrRG5OS2ZMRWw0aDJlTGs4MExrV0IrbFRBSWtp?= =?utf-8?B?dEVxS0pNUXN5V1JpOXVtYWIvNjhVRzU1Um5RWGF0RjBlMEpiam5tNVg2NE1R?= =?utf-8?B?cElSaWRENWRyUUtmRlRQWlJTS20rMGVhc09mTVRLMmMxeHdXZ1JuMm1BOVJM?= =?utf-8?B?Tm9IeGhhK0NTYnk4alZmNzMrZVVxRkgrVVU5TklQejhpdkN0ald3WmZmYm9x?= =?utf-8?B?MG5lU0hVOWlUT2g4Q1RoaHpPVWVCc0tOUitWaGR6aWZ1OS95cGI5ajlyRWxz?= =?utf-8?B?Tlh1MlNCSGRMdW52b1pROHJkY3FIMEplWHNHSTVBRDhpM0lBc3NzN1lyVjFQ?= =?utf-8?B?alNhYkNpNSsyZWdkeExuZ2h4QXlZUksvTlAvdlQxa01TaHU4c3Y2VlpSMXpR?= =?utf-8?B?dEpRNmp3dmdmK0Z5M2FrRmFZNjlLUkVxdGRLYUQ2SUpNNzJRaytWUmpsUXRN?= =?utf-8?B?TU9aVnZicUlKZm1IYzlFMTFNdFRaN1ZNOWd0bU5ITCtSUE5wL2gwUjhCaDF1?= =?utf-8?B?Q2VKUlJPY2Z6TXl1dWYvU1Nwa1VJVDRaSXdpeGtlUzgvbDhMR2xTK0MxaXBO?= =?utf-8?B?K2svTHA5Qys4RGVUdnk5dzNOVnlpZzdTQUlUdmdyRUMxWFNrNStoY1FyRTJ0?= =?utf-8?B?NXlsMEg4MkYxVXlRc0ppbGc0OXlrRmJQeHRZWFpHei8xWWN1YmE4NkY4N2Vr?= =?utf-8?B?LzZDQUhSSmhZZjNELy9TSTBBMjJNMjJhc1ZIeE5ldEJTc0NYS0JSTTBmRWgv?= =?utf-8?B?LzNGMGZKSFYvQzFNVkpoeFJQSlhSMXFZeHVQVnJpbTJwK3RyWUxmdkg0SVdY?= =?utf-8?B?S2ZNM2F4SS9yTXNKTXBlOW9zQlFHR1d3WVlYSUFuVW84cTZ2S3E3eFBSVGV3?= =?utf-8?B?ZDl3K0N5aS9wa2FCSzJ0d3ZScXJGcE1kWXJCd3dvdDBSY2YwUHphSG1ML2Np?= =?utf-8?B?YTVqcUFoUHVUUW01R3V3M2RYaTFFdkt0VFlnUXFGcEk3RGF4dUdOMFhpb2JG?= =?utf-8?Q?VSRUBrkaOig8SlKp89BsYpppIJdH3sWuggnq+s1?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(10070799003)(38070700018);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?SnNKbjBITTFSU0E3cEhVN2piMW9HS0Jaak04UjJmTzc3em9WSWxUTHpLZnpp?= =?utf-8?B?L1drWjE3azdQWkpxN2lDcVJmTUFHM3BGWm5xSTdpME5GaHh1VTRtanQyMXo0?= =?utf-8?B?RHVuUEFIU3NVZExQTE5TSm1RNjFjeGtyZTFTZjBYcEZOWE8xWjhWNmk0KzJ3?= =?utf-8?B?emxsV2lZYVhQamk1TUFXZTJRUjRLZUQ4S2U3RWpBSzZoa1hVRytvU1F0ZGRV?= =?utf-8?B?MEdUNkI0elEwOW1EL3RkZjJ3MXVjQm4zZFc2Y0IyUnZsVkRiRWYyMGJpTVU1?= =?utf-8?B?TW5US3lPMk93c2JJWUtVRllOSGxWWTkyTXhEZW00eDUrZkhXaC9wakJBTUZR?= =?utf-8?B?eFdGQnFKZkl6L1JPZ05vaGUvcEx0K00zZDRiSkRuVWg1SHU3cWZ4KzlkZ1dC?= =?utf-8?B?bGdqcnN3cTBoTUJsOUlUeU55STdUZEVXUXp6TjV0Q3ozQjIrNEJ4TnI2SHgv?= =?utf-8?B?aENnT2x5dFgwbkFXMFZPODZJamYyR2RYVVFVeU13K0MyNWVTb3dTTXQybVVZ?= =?utf-8?B?eEZFVThFZUpmTXpiVXoyMWZ6dFd5QVpZelpCZjRORVQwMWEwVHY1OFVKaUpK?= =?utf-8?B?TzVlS0t3SkpldERLaU9HS3JEdXBTQWxnTjE4UzBKQnRRUXlyR2lyYUdBdDVr?= =?utf-8?B?NlUySG9POVBma1FMMFBDMERocHBMWmlWb2syZ09hSHBJSzJGa0hFMVNESE81?= =?utf-8?B?aGMxdVJvbTlGbi9KaktQOVFZVUdJQWpCT3lnZG9Rb1Z1dTRjb0RsYTdUeXVx?= =?utf-8?B?aTJqdlo2L2o4K1RVVy83YWFwT09CR3hsKzdIVHBHS2dhMmJuRzJjUTdzeEFh?= =?utf-8?B?eVVSMXdXZEhQUmg0RlpyUkdkY25INjRocndaRHZjOUtGT2hhMVNsWE1Wcjg0?= =?utf-8?B?VHlGNTB1R2I3VnpnMGRtYU1oWjBaQmlrdFdkQjhsRkt5ZnNlaUZPbWMxaXVL?= =?utf-8?B?TXdoemFwVWpQUEd2R2VVMjROTnY3R3NmeTg5dm56WnEyclJVM281TlRaN2VQ?= =?utf-8?B?b1NaVm56Yk9xOWlmMjhnWncrSHJXNXU5bGY1M1Q0RjBTVzBHekxnZDhsamZv?= =?utf-8?B?K1F2STBLdUdadTBMb2h1Z3E2Z2FjQ1hydXU5bDBtZ2hIaldyeTdDS040ZnRP?= =?utf-8?B?dkc2Ui83ZzlHTlZhaDZ6QkhEU1cyaFZYdmYrY0VIdm9yUVZpRUpPVloxMm43?= =?utf-8?B?S0FVQnltS2d2akg3WFQyZjFOaFFZQXliazNsTG55aGhIUHdSdmk0NkRQL1Bw?= =?utf-8?B?WDl0ZW1NR3VKN3lId2U1Tit5M1gxcVR0ZUJFa3NqbWl0T3g1OVU2ak9KN05G?= =?utf-8?B?bis5bmxFT0xkZGZYUmoydjVJVDd3a3lnNVB6U0hCKy9LQ05ORnl4T3k0VnB3?= =?utf-8?B?Z3B3T2Q4NEN2NWQ2OXY1TlY5eEltZWtyMHZwc1NMbWRiK1ArUXB5dVI5Qi9K?= =?utf-8?B?eDk4TVdJVGtZSmFYSlJpc0hjei9vTXNYYzBaRWwwanNNb0RZeTZwbjVKNllI?= =?utf-8?B?eWJiZytQMm1qRWV2eUw3MXA1SGk3KzFyTkRMTURlbGFjMDB5SUVFd1U4MVdH?= =?utf-8?B?amVoZGtsZHJ4Z3l5cndzOVQyY1gxditFZU1Fd05BdEJ6bEhibk1rbmF5ZHpn?= =?utf-8?B?clVUM1NoSTRQN3cyV01DellUM3FORExXanpxL2lHbjUxTW9OK0gxV3hXL3pT?= =?utf-8?B?bXo4eFV2MHJtaFA3N2NPQ2NVbEdMWUVDUXdXMlNGR3RNNnhxMWZoaUlScVVN?= =?utf-8?B?bnpDNm1SNnhWTDkwSUpycGtiamNMUFNxb3o3T3dhbDZ2M2dqOTlLYVNhNzJx?= =?utf-8?B?V1QvcGF3Z0ZQaXE2SytVcTRldDhtSnkvOURSaWRLelBzM1RNdHhldDFvQ3h1?= =?utf-8?B?a25hTmIxejVrMUljL1o5NUlEWGFBSEQ2QkJXTFlSd1M0MWtyWlA0VVVxckFU?= =?utf-8?B?clFWakpqdkZlb1kvY3M0K0FaZ3JyRTh3d2xtd2JUTzJYNUh0MzJWSnJHZzRx?= =?utf-8?B?UjNzbUhXN0xUUUlpUm9KOFdoWDRnaTNGZVgyOWZCVEtNQTBwTGpoMlkxVWpQ?= =?utf-8?B?WEZYbWV6NEJsTHRCVEYrMUI1RytNRFdvTlE4dTZDVzRyVHRtckRlTFU3WVk4?= =?utf-8?B?NmNXMCtZSzY5Q0RPdk54cDl0dDd2VWFseGFaMmpWRGx1ejM4alYybGpWZnV1?= =?utf-8?Q?t3ZOKMUghsan1yyNAaFCw62xGYnwlD8gy/1gVHeq1ZrB?= Content-Type: text/plain; charset="utf-8" Content-ID: <98A38FB0F8F0F64E87089AF5820A1934@DEUP281.PROD.OUTLOOK.COM> Content-Transfer-Encoding: base64 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 X-OriginatorOrg: punkt.de X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: c88bc58b-f8ce-486e-5b3e-08dcfe7cb864 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Nov 2024 16:04:40.2168 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: d1aa1808-3734-45fc-a490-f8ba49028756 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: zLY7kYgkIePxyFTWgiT4g9lHYiRHE+GYVQNuNTzE7c50cr04BoBF/k6xHBuU9J9c X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR1PPF8846C9FFC X-Spamd-Result: default: False [-4.02 / 15.00]; ARC_ALLOW(-1.00)[microsoft.com:s=arcselector10001:i=1]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; NEURAL_HAM_MEDIUM(-0.82)[-0.823]; R_SPF_ALLOW(-0.20)[+ip4:52.100.0.0/15]; MIME_GOOD(-0.10)[text/plain]; MIME_BASE64_TEXT(0.10)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[52.101.169.82:from]; RCPT_COUNT_ONE(0.00)[1]; MISSING_XM_UA(0.00)[]; ASN(0.00)[asn:8075, ipnet:52.96.0.0/12, country:US]; MIME_TRACE(0.00)[0:+]; FROM_HAS_DN(0.00)[]; R_DKIM_NA(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; DMARC_NA(0.00)[punkt.de]; RCVD_IN_DNSWL_NONE(0.00)[52.101.169.82:from] X-Rspamd-Queue-Id: 4Xk9593NlVz4QDy X-Spamd-Bar: ---- SGkgYWxsLA0KDQpteSBuZXdseSBpbnN0YWxsZWQgMTMuNCBzeXN0ZW1zIHdpdGggVUVGSSBib290 IHNob3cNCg0KIkxvYWRlciBuZWVkcyB0byBiZSB1cGRhdGVkIiBpbiB0aGUgYmVhc3RpZSBtZW51 Lg0KDQpyb290QGFoMDAzOn4gIyBsbCAvYm9vdC9sb2FkZXINCi1yLXhyLXhyLXggIDMgcm9vdCAg d2hlZWwgIDQ2Mjg0OCBTZXAgMTMgMTA6MDUgL2Jvb3QvbG9hZGVyKg0Kcm9vdEBhaDAwMzp+ICMg ZnJlZWJzZC12ZXJzaW9uDQoxMy40LVJFTEVBU0UtcDINCg0KSSBhbHJlYWR5IGNvcGllZCAvYm9v dC9sb2FkZXIgdG8gL21udC9lZmkvYm9vdC9ib290eDY0LmVmaSBhbmQNCi9tbnQvZWZpL2ZyZWVi c2QvbG9hZGVyLmVmaSBsaWtlIEkgYWx3YXlzIGRvIGFmdGVyIG1ham9yIE9TIGFuZC9vcg0KenBv b2wgdXBncmFkZXMuDQoNCkRvZXMgbm90IGNoYW5nZSB0aGUgbWVzc2FnZS4NCg0KQW55IGhpbnRz IHdlbGNvbWUuDQoNCktpbmQgcmVnYXJkcywNClBhdHJpY2sNCi0tIA0KcHVua3QuZGUgR21iSA0K UGF0cmljayBNLiBIYXVzZW4NCi5pbmZyYXN0cnVjdHVyZQ0KDQpTb3BoaWVuc3RyLiAxODcNCjc2 MTg1IEthcmxzcnVoZQ0KDQpUZWwuICs0OSA3MjEgOTEwOTUwMA0KDQpodHRwczovL2luZnJhc3Ry dWN0dXJlLnB1bmt0LmRlDQppbmZvQHB1bmt0LmRlDQoNCkFHIE1hbm5oZWltIDEwODI4NQ0KR2Vz Y2jDpGZ0c2bDvGhyZXI6IERhbmllbCBMaWVuZXJ0LCBGYWJpYW4gU3RlaW4NCg0K From nobody Wed Nov 6 16:10:21 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk9Cg3Lxcz5cl1h for ; Wed, 06 Nov 2024 16:10:23 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9Cg2nfGz4Rhv; Wed, 6 Nov 2024 16:10:23 +0000 (UTC) (envelope-from dim@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730909423; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=HGrSyFEilEztPuAYTxmt/6ZBmecEwL5n2ojoUAs+Lcs=; b=rKV7af9VB9VDrR4iakd+9/Dwb/o4eYWnOzsG5ap+8QgJRJhcaRr+dHWs2bMnJBWrGjV40k sPnqUQZfxappwfVuEv+zB4M4HlY/S9lahvuhG47GJkQWkl0GvGBEi/zwGuJ8mVEYD1ef5Q qCbi69CnO4EgxqctoJxlUYoFxNloXFca4ZCdmRsskayYCUN+jkCfmBrSZsRKQrPkNQ2VQc cIe5++0jYdtFEgh05XXOmCCZLQRwLffRMPSEiZ8Zvi3etpuQc01K+w/gk7shAX6BX5UMDy M0T7pq+sLxgr5ACC4YR5Nm5xgKRB7eMYxbAj0tYZ/Y1fvt3UWGjGpaEsuBG6pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730909423; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=HGrSyFEilEztPuAYTxmt/6ZBmecEwL5n2ojoUAs+Lcs=; b=Zzndv0nxW/tFTZdfpczR+/jJO+pOwKJtq9DL3ZLzE4EF7mJUqKyCdAhUHAki4wOZ3VdqZ6 kQSpyHzTJCsCVt0pS3TnMzyKuUvJktSlLzwNihcPlBQn8SwX8CkGhCrrPER0LdTX+jUeR2 ffaHx9hpkMVj5rvvALzBCRmHNPeSC3qQ9j0lxYioZRqp5c7/rIVm08JDZEg2oNqDJWLwbz f6Lch8U+WeVtCtSF+Qg7GztJ89J2Jb64pINba0HgXeXyNCVK1HSLxvpEBSvLacTvXPLPjR kwsx7hYy8b1cQdI6DwDifAmfOMiQkGq/Q0g4dj2ADq14DgF1izg3aYepuWHwIA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1730909423; a=rsa-sha256; cv=none; b=qEMu7ksTOugAWfeoDhHIdYYqqClyLIjC/qn3RdUaaT0O/pCA2dDlj1yVuQuv5CbHK7or84 wK9j+huxUveQ0RC6t6xf0CtGAT9BP05fHbzZdy925M6b5Gb2OM8hzzKggBg+J+5Akja5am 3PsZ4yMUCmlZ08uKMzcmJecEy75axBiSj80Gk+OQyGwISAMLLJZMqZwSyzlm6JTBzcQhil nQFuwiYpluJmg17/qvcay3ZR4fnKlYZDfgk+KzyadtbB2vcbK148p2bQQcdge0mMGRpUyI o4vhQlkcZde23Cy14DiO6JtgN5v2LQVWmXbilcxp9J99wDC5/ZdUi/WAtinTcw== Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "tensor.andric.com", Issuer "R10" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 4Xk9Cg1rXxzgnD; Wed, 6 Nov 2024 16:10:23 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtpclient.apple (longrow.home.andric.com [192.168.0.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id 1C1685E403; Wed, 06 Nov 2024 17:10:22 +0100 (CET) Content-Type: text/plain; charset=us-ascii List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.9\)) Subject: Re: 13.4-p2 "Loader needs to be updated" From: Dimitry Andric In-Reply-To: Date: Wed, 6 Nov 2024 17:10:21 +0100 Cc: Freebsd Stable Content-Transfer-Encoding: quoted-printable Message-Id: References: To: "Patrick M. Hausen" X-Mailer: Apple Mail (2.3731.700.6.1.9) On 6 Nov 2024, at 17:04, Patrick M. Hausen wrote: >=20 > my newly installed 13.4 systems with UEFI boot show >=20 > "Loader needs to be updated" in the beastie menu. >=20 > root@ah003:~ # ll /boot/loader > -r-xr-xr-x 3 root wheel 462848 Sep 13 10:05 /boot/loader* > root@ah003:~ # freebsd-version > 13.4-RELEASE-p2 >=20 > I already copied /boot/loader to /mnt/efi/boot/bootx64.efi and > /mnt/efi/freebsd/loader.efi like I always do after major OS and/or > zpool upgrades. >=20 > Does not change the message. Shouldn't you copy /boot/loader.efi instead? /boot/loader is an older = binary, not suitable for UEFI. -Dimitry From nobody Wed Nov 6 16:12:36 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk9GK2kfWz5clLG for ; Wed, 06 Nov 2024 16:12:41 +0000 (UTC) (envelope-from hausen@punkt.de) Received: from BEUP281CU002.outbound.protection.outlook.com (mail-germanynorthazon11020125.outbound.protection.outlook.com [52.101.169.125]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protection.outlook.com", Issuer "DigiCert Cloud Services CA-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9GJ39bTz4Tjj; Wed, 6 Nov 2024 16:12:40 +0000 (UTC) (envelope-from hausen@punkt.de) Authentication-Results: mx1.freebsd.org; none ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=SjaEXMqtJ98NRncNHbmGlMJ/8w3XgCrLzqC8lWritR9RmN+QzcGu/irZlPWL56+qrs64DoOvb6/vBhUx+6lSzPJSxlNAuGlFCKJOzD0kdt5pUcrSwg3D0Lr2yGe7X416kEq02hxPXv5bM4thniCS+fJgkLTiHUmO0KHg9QjejX7tyWiOZwfGGbozFAU2StPc97YcY/mlGeHUXuS2E39qKS7AouhLCu8smn9/t5X2jS/J6213E632/IKopVNFlu7K7ABw0A+MWojDjgA5Mma5s8ZoBGlXGgj9QDRwP/K1k9SSCgbmyGY8+n72DFlzjgbz/aSIxOXdLqarYGdbUohrOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=oUQPaVxe9SRCLV8KX+DW4KswEQzhhSrU12Y3CKwSpcw=; b=l3m7jVXYYxx1dB/yg0fVAs0o8EOx9PxDc/DA7OPNXXASuKZ4zeJkkmg9NrnyQtge69opGzf2xItGWOo3PA0o9VCEXM0Qn03Yp04X8P/A2TfhsS7QBmV+N/Vfm2bWUacS4Qa8rlH2ci3xrT2Dv1Q3eAX95bD2F5P/WIrap1yiG6PFCrjza6M1YjS9Y243mQ3LJQP4uMEOmY0Tshig22AdD0PxMAxY+dOYFuS5pADnhqKAA3wLErwNIu3wpc0tJ4yxObeOepveCnJb8a7ofOHPhquIkOyqtyIwn/bvuhydi7Hh+LoDb2LkcIb8a1VY5e6Vx8GG5TNKo9Cy47BgFokNvg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=punkt.de; dmarc=pass action=none header.from=punkt.de; dkim=pass header.d=punkt.de; arc=none Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:68::6) by FR0P281MB1808.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:6f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8069.23; Wed, 6 Nov 2024 16:12:37 +0000 Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059]) by BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059%5]) with mapi id 15.20.8137.019; Wed, 6 Nov 2024 16:12:37 +0000 From: "Patrick M. Hausen" To: Dimitry Andric CC: Freebsd Stable Subject: Re: 13.4-p2 "Loader needs to be updated" Thread-Topic: 13.4-p2 "Loader needs to be updated" Thread-Index: AQHbMGWWgfYbx0NAo0+aEvoEIRLs2bKqa/aAgAAAlQA= Date: Wed, 6 Nov 2024 16:12:36 +0000 Message-ID: References: In-Reply-To: Accept-Language: de-DE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: BE1P281MB3156:EE_|FR0P281MB1808:EE_ x-ms-office365-filtering-correlation-id: b5bcfb26-7f74-440e-cf8e-08dcfe7dd483 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|376014|10070799003|1800799024|366016|38070700018; x-microsoft-antispam-message-info: =?utf-8?B?ck5MdXZEQ0JLb1JLcVZxWVR2VGs3NnBleUdxN2gwZEhYdG0rUjBPNjFrK3VH?= =?utf-8?B?NGxWQllRVnpSRWdFcndIYTNzYzZvcjNVbkVoUVJMWDNLVFlxRHd0MkRUMU1z?= =?utf-8?B?cXZqc096VnRGRk9VS0dzRzZ3SENHNlJuSG51TUUwM3BLRkVTTEN0a1pheEpa?= =?utf-8?B?TlZtbWZQRlcybm9VNHRwVmxVTmtHYmZaeWw1RG4vdFBXa1ZLdEh3dS80RkVt?= =?utf-8?B?ZittNXVEZlFlYXlnN2FjcTNIaHFRWHNHMFhXWDNudUV4MHhwRGJWN3pGaUtL?= =?utf-8?B?NlJOc05LLzd6ZHZVeW4rcWw0SFNsUE9zbVI5QTNYZVJodGtnekV6SXpFa3ZD?= =?utf-8?B?Z01EVXIzdUhUT2pIWjVEbkpyTVVrMnBQQzd4ZWl5V0hFVkU0dTVWM1NTdGZP?= =?utf-8?B?TWFlUjhpMlM4TEFQOVJpQWpLUUJGWkg2THVPbkVWU0NIcEZmT3JuMjZrR1Ri?= =?utf-8?B?bi9POXFZenNmMExFcWdFakVGbGhwWVgvajNFS245L1VXcXBta2IxbmEzSXRn?= =?utf-8?B?NmorSnh0YTVnbjVCQzYrQmo4UDFMNFpQa0plVURFNjFDbFZ6VWJ5Mmw1aGV6?= =?utf-8?B?aXYrTU1JNlZiUkZRaTdZc3R4RnQrT3J4UkdhM0NydGhhZS96Yk12ZnFmUUtk?= =?utf-8?B?MndnZEZOc1NxN2EzanZmZjBTN3NuWEx5aE1UNEw3NGkrM2xEYU0xZVNRUnJR?= =?utf-8?B?REF6YVUyTVRnbTdCbmtFQ1ArdStvWFUwS2VhUTJ6UzFORlRRdHNuRWZEc1Js?= =?utf-8?B?TUNPWFFrMnVWWFFlOW1pLzRFQjBrMWVxMWlRcHdjOE0zbkNqSFNMVWtneFZS?= =?utf-8?B?VWQ5WjNCcmNKNUtPN1krQnVFS1A5QktjVVoyaDZPdE54ZktqNXZZbENYSlVQ?= =?utf-8?B?V3Q0UE92ZkYwYmQ2SGFvV0FTRGlROC9qcmJSYkFjSk4raE5CMnluMzJJTkp0?= =?utf-8?B?cklQZFNBeUJKaDBZOWkwdFZmTjRaTEhCbzc4Y052VG5IT0JFMEQ0VjVsNjUx?= =?utf-8?B?TnZqWXZ2RnhSam5QZmJRdTVpajlDci92cm41ZWo3MzNiSDBJWVQrSjNkZHNX?= =?utf-8?B?N1JaOU4zcjJKMXorMzdFOVZkb1dHUlhLeDVBT3RhT2xXSVB0VjNxbzhDeW42?= =?utf-8?B?VmwwWnVEVnZNTFBXLzlYanJOZjVvWVVmUUN5dDViNVJucUZZMk9zUFJiaEVk?= =?utf-8?B?T1VIZUVERmRHNHJ4TVBwcm4wL2dqY1RJMWdBa05TTXdEQ0xadTllTEtJYUtK?= =?utf-8?B?TCtPbU9LRloyN1FuZFlMOWphZU45VXVaS012Qlh2U1FTS3ZXVlR2d2tVMjFo?= =?utf-8?B?OEVGc0NON0hyVUplN0MyMEpZN2YwSU1ZSlVCZEErRCt6RnlKSm5JVTZITnJy?= =?utf-8?B?eHJjWUxKTkhocHlqSG03NnErTldLODJibzNGWUppUWIyNjIrUnJEbCs2RCtt?= =?utf-8?B?SmtXWVVJWEtHbHhkSXhNekJiRnplTlBFeWJjZ0xrQ1NJYUJrL0t2bzhqZ2pq?= =?utf-8?B?Vjl5MS8vRXcwaytLeTNUZllkcUdkMkUxU3NFWFNhSG9qdXZxYStCa200eDNM?= =?utf-8?B?YzBWZEY2MGZJd1ZVRlVsTXJNRjl1ZXQ2STR4Vzh1MS84eHQxNnU4VDlndm9X?= =?utf-8?B?R0xBYmlBWThEbVlnaFdSYU5vVmViL1FNSmYxOEtoS3d6dTcrTFFpOUx6Q0xo?= =?utf-8?B?SFo2aENPdDBpRGpzLzBGTG9vaXZLakZEYVZ0eDA1dTlTaFBNblZiYlZCeVFv?= =?utf-8?Q?SRU+ZTjcts9qfr5MIpa/Hgkq0L3dqe263ufP3RO?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(376014)(10070799003)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?RnZPdG5jNTU2SGJ3Zi9OSUdhZ050UzI5RkhjTWtSbEhuQ2h2d1ZMK3B1OE5T?= =?utf-8?B?empYdmV2b0JoaDF5VnpaYlNhY1A2bVpreFdsU05QNDBrL2F4aVFGSy9Rend5?= =?utf-8?B?YWJZdE45N2xnZlZabWMzT3VqWTdEVU5RaEJIOERLSFR5NzA2dld2eDRrczZ5?= =?utf-8?B?RmZvYldXaStuam5hZ2FWK014QjJxdHArU2ZLUUNtSUU0RWhjT1lVbFAxRlRY?= =?utf-8?B?TUFoVDVEK1RmZ3N6bVAzYnNhZC9tdFNOMnF5K2VUL1Y4c2FDSGh5KzEvMkZE?= =?utf-8?B?dTk1RW9rTk5XT2VLTHczMkVmb0xJOXZmR3pMUEdub2IxUThpODBnZVNyWllu?= =?utf-8?B?cGk3cHh5eUR2VURza3dpVXQ0bFN5NHdRdENKR1hFZGFRK1h2RmJuditrU08r?= =?utf-8?B?OTlOaEw3TWRLVVFteUI1N3pUalZUNC9zSjd2VzY5bzRlZDJhYlpyMlNTTHFC?= =?utf-8?B?akl2WHNqZGpodm9rdzlrT3NEcmVjTUVseWI2ajZ1clJEU3YxSUx4R09TQkhm?= =?utf-8?B?TkFtU0dkZE44NEhkY05Jc0VBSTlURlJEUm51YTdxamNGN1dib2JadlM2bEFl?= =?utf-8?B?OG9HZ2F1Z1RndEpmNXlyemphTzFrdEh4RXRvL1I5bUFkbStXa1VKemdkVnVL?= =?utf-8?B?ZUh6SzVWM0ZrTUo5aHN6OUR2eHlkTVB0RTNQcmtrcXJ1NDdZeW1UNGVRbHJa?= =?utf-8?B?WE05YWFUSXJyM1RvN2hNOERPdDJaK01NTHVRTE5WZk13UVlWK2VpU2s1UUFO?= =?utf-8?B?KzcrTnFSUGZvOFdGaGJ0VVBicitqd1M5NW5TbTg4RU1KUlRBUjVHSlFjY0tl?= =?utf-8?B?OFRJd3dWMnlCclNSUkVJcTlvazdzcFFteS9LdFZRaHhuczEvbHViWUJsUFRU?= =?utf-8?B?bGw3cGZncmdKQkNoRkl1YjRWQUoyWS93TllhdFFmSWtMU1dnWnRCL01lRWNO?= =?utf-8?B?NmZ5K21KREI0bVNFaGhZUytKTXhLNkpvdEhTcVpvZDBWdDNXS0NFcVBScFNI?= =?utf-8?B?Wm9XSmR6OEdsZmZPV2xEQWt6WnMySENFcUdES2xoZ2FjZ0NiNldNUGhaN3RV?= =?utf-8?B?NWVwdE9ESjc5Q1dNM2xjb3FGa0JTdTFLVlVlQ1VPY3dZT04ybW85OHU4M294?= =?utf-8?B?Z1hXclBadlFVQkNXbVZvZ0RKMGxnVXJYV3p1TUF4R3d1Q1BHWTg1bTBkejJ2?= =?utf-8?B?MUt0ZExId0V3ZnFvMDhzUlVWU1lXMWx4bjhTMVN6N1VIVnlnVnhiWGtOdWNk?= =?utf-8?B?MmVRM1NieUtSdk5kY2lraDlUdmdsWkJkNzJRWVRnUUZBZW5yUHU1L0pXUlVL?= =?utf-8?B?LzBPODJiMER3M0wvV0tHR1JmNndSVWdUTTh0aFA2dXRmUkFYNG9EcE9BbExC?= =?utf-8?B?YkczdWczTDJQSEoxemtJYWFtK3FQVGFIaXpYNWRUTzdrSGZhNHFZRjcxT3I3?= =?utf-8?B?M29HaXI0Q3h0TURLSHMxSHp2TFRRRzBWZFNNR2I2UytuOXQrTmtod3ErcE5M?= =?utf-8?B?cStQUDNNdys3UE1MbkJQWWRhUWIyS1N3S3psV0tQNXNKazE4T09BWTZONGhS?= =?utf-8?B?NjNNdFJ4T2xYbjZJczRwR1Z4VExYeExtbm9xeC9ncStPQ2dmUXUvWjBqSlZB?= =?utf-8?B?OWlwTkZocUIxdlEyVGhPaWs3enZLK1Bicm9uZXBTdFRPa1Y2MUc0K1pRNGt4?= =?utf-8?B?b2xtT0d1RFB2YTFQN1NqR0Uvd05SM0I2TXVIK2RYOUpEMlZVY1VweVo2RVZC?= =?utf-8?B?ZFJCWFZUbU84Nkg0Zzk1cHk4RVpXNVBiWDM2L2ZqZnVhc2d5b0NaQ2ZlaEV4?= =?utf-8?B?VVJmWkFCWFhTcC9NdjY1WlpoUTNkWjB6WHJHOVM1UkY3OStmcnUxNkc1RE84?= =?utf-8?B?M3VtL2RHc1VWMGVOWG9UckJZZ0YrdmtOczZ6d0FTbHRVRG1obGNuWVRiei9Y?= =?utf-8?B?bzRrZmZ3clczN3NrSHZoMVVRUXFpSkRTYTdPSE05MlhuRlpBeE8rcTZuQi91?= =?utf-8?B?c2VwVEJBZnR5UXdnYko0RDljTlo2amdPOVhqQk96MWlWMDJTTEROeitJTWh2?= =?utf-8?B?RENmVUlpMlFIekhjaEhxV1BVeERwaXl1czdpMHVXVFdEZHJsR1h3NGpNZFZn?= =?utf-8?B?emdseGJ5RnI1RS9yRTYwZm91Ym8wNndvaHBLbW4vdnNpS1dzZ1h5dXRvWGZZ?= =?utf-8?Q?B2MI5xp5soYfiArWaqnYjSsqCA5ckSOWx2acn/lDeBfs?= Content-Type: text/plain; charset="utf-8" Content-ID: <8B66E49FDD07304C985E7594F4C571C1@DEUP281.PROD.OUTLOOK.COM> Content-Transfer-Encoding: base64 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 X-OriginatorOrg: punkt.de X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: b5bcfb26-7f74-440e-cf8e-08dcfe7dd483 X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Nov 2024 16:12:36.9428 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: d1aa1808-3734-45fc-a490-f8ba49028756 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: MB6u9Kn1DBQGmznpit3FiXx4MN1jDpM6Cpnv2rPkDLdXiyaQK6i+KT6P95Y2XNzU X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR0P281MB1808 X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:8075, ipnet:52.96.0.0/12, country:US] X-Rspamd-Queue-Id: 4Xk9GJ39bTz4Tjj X-Spamd-Bar: ---- SGkhDQoNCj4gQW0gMDYuMTEuMjAyNCB1bSAxNzoxMCBzY2hyaWViIERpbWl0cnkgQW5kcmljIDxk aW1ARnJlZUJTRC5vcmc+Og0KPiBTaG91bGRuJ3QgeW91IGNvcHkgL2Jvb3QvbG9hZGVyLmVmaSBp bnN0ZWFkPyAvYm9vdC9sb2FkZXIgaXMgYW4gb2xkZXIgYmluYXJ5LCBub3Qgc3VpdGFibGUgZm9y IFVFRkkuDQoNCkV4Y3VzZSBtZSAtIHRoYXQgaXMgd2hhdCBJIGRpZCwgb3RoZXJ3aXNlIHRoZSBz ZXJ2ZXIgd291bGQgYmUgcXVpdGUgZGVhZCBieSBub3cuDQoNClR5cG8gaW4gbXkgZW1haWwsIG5v IHR5cG8gaW4gdGhlIGFjdHVhbCBleGVjdXRpb24uDQoNCi1yLXhyLXhyLXggIDIgcm9vdCAgd2hl ZWwgIDg2ODM1MiBTZXAgMTMgMTA6MDUgL2Jvb3QvbG9hZGVyLmVmaSoNCg0KS2luZCByZWdhcmRz LA0KUGF0cmljaw0KLS0gDQpwdW5rdC5kZSBHbWJIDQpQYXRyaWNrIE0uIEhhdXNlbg0KLmluZnJh c3RydWN0dXJlDQoNClNvcGhpZW5zdHIuIDE4Nw0KNzYxODUgS2FybHNydWhlDQoNClRlbC4gKzQ5 IDcyMSA5MTA5NTAwDQoNCmh0dHBzOi8vaW5mcmFzdHJ1Y3R1cmUucHVua3QuZGUNCmluZm9AcHVu a3QuZGUNCg0KQUcgTWFubmhlaW0gMTA4Mjg1DQpHZXNjaMOkZnRzZsO8aHJlcjogRGFuaWVsIExp ZW5lcnQsIEZhYmlhbiBTdGVpbg0KDQo= From nobody Wed Nov 6 16:32:20 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk9j16yMsz5clv9 for ; Wed, 06 Nov 2024 16:32:21 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9j16VvBz4YG1; Wed, 6 Nov 2024 16:32:21 +0000 (UTC) (envelope-from dim@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730910741; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TultVDC67fJD5YY5SOVdLwjdwYGQ2h3ob+wafxppOHs=; b=jAVo8MYHk7plDkp2x3pEfeEhACtWcuBTVz3vHvmaO0DwWcEM1RqiwKIUKEMs2MjTXdkHFI CpvNPCuoUa0nrPB3CDjtvg9I4BA5oSmuiv9iPUxculrM80IbFPSRaJJnqmYkLWj0TnIz2s HRyj83j45I7mz50d/ui1hd77WREFZL4RFHFAZgaAQRYjqU2BzwUQ13fU/FtIqzjhsdrGH8 4Sjhkw3P068o64VvoineuZfGTunv3bZqF4fjZQnKHgH706IXHIe38TDEx3MxfgXpPh1CM3 MawlDXATbQUomovD4tIEdlaHDRKc2rG487qST+Bou8ID8sx6BSMIBYZzONDOZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730910741; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=TultVDC67fJD5YY5SOVdLwjdwYGQ2h3ob+wafxppOHs=; b=vCj9cky48qy13z+U1OPkRUORFMeZyFp5t7lUMUZO5/6R8gAEgiYwzTQwaj+LvotP7RJQ4w Ah7VhIDRC17Ul8+FZUPZAU0cW2We+H9e9SdadsO7qz6PuYajYTiht4YjHKGoHCFHJLRB91 iGSACwTkqxeOo0lEYSA3Yn5+WhJdcqIYQD1GmAH3yVbjkEsIIvupDSDNpqa83QbGNlTetK yLAXz9Rl28tfpCqJTn28uYnQGIXYEgq6TC6TDygrDIe86KIIlgbaxGC6xUWtiDEbCMGpeD 01BxJnn0Fbj8PbEWRndF6ybzrr4bDrDYhiv85xMBkzxwc/b8lJTXjD//j7RsrA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1730910741; a=rsa-sha256; cv=none; b=ACn6h6paM8Gd+KVehtLFm1lkL5LF0qvjSlQ74KYRbsDehisrveTZtnfb0pwrj0O4MFU1Kq I4hqeJKCK+zItd8FFUrNk94PHKYHpns92UHZNWLS/MOEo+/qfpc5g0xn72KLp8/I5AczAH B9vQ+/h3GxvQx9Va+ld3D8lCxrALJaAKekxW+pi5cGJPrZzRLTa8r8yrvd9YEdE3tFFav5 KR3vwjwOY3tXl0zmRRKhEX5n8A97uvVwp0imHLpvyeNKfqH1MhAZjnIh+hqeGyq7Fb8HXL p+dXU6aLhmmm9u/ybi5c4LgVi8ttBpPsJeo8osMs1W96JWQVbJHFfh90otGDSA== Received: from tensor.andric.com (tensor.andric.com [87.251.56.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "tensor.andric.com", Issuer "R10" (verified OK)) (Authenticated sender: dim) by smtp.freebsd.org (Postfix) with ESMTPSA id 4Xk9j15ZDCzhNH; Wed, 6 Nov 2024 16:32:21 +0000 (UTC) (envelope-from dim@FreeBSD.org) Received: from smtpclient.apple (longrow.home.andric.com [192.168.0.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by tensor.andric.com (Postfix) with ESMTPSA id C9D405E38F; Wed, 06 Nov 2024 17:32:20 +0100 (CET) Content-Type: text/plain; charset=us-ascii List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.700.6.1.9\)) Subject: Re: 13.4-p2 "Loader needs to be updated" From: Dimitry Andric In-Reply-To: Date: Wed, 6 Nov 2024 17:32:20 +0100 Cc: Freebsd Stable Content-Transfer-Encoding: quoted-printable Message-Id: <24632F35-757E-4358-B13E-1978E24BC929@FreeBSD.org> References: To: "Patrick M. Hausen" X-Mailer: Apple Mail (2.3731.700.6.1.9) On 6 Nov 2024, at 17:12, Patrick M. Hausen wrote: >=20 >>=20 >> Am 06.11.2024 um 17:10 schrieb Dimitry Andric : >> Shouldn't you copy /boot/loader.efi instead? /boot/loader is an older = binary, not suitable for UEFI. >=20 > Excuse me - that is what I did, otherwise the server would be quite = dead by now. >=20 > Typo in my email, no typo in the actual execution. >=20 > -r-xr-xr-x 2 root wheel 868352 Sep 13 10:05 /boot/loader.efi* Yeah sorry, I was not sure if it was a typo or not. :) Anyway, this appears to be a reported bug: = https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282001, but there = was no EN for it. The draft schedule for 13.5 points to next year, so = you will either have to be patient, or patch a lua file, it seems. -Dimitry From nobody Wed Nov 6 16:36:39 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk9p34Zq8z1GhNX for ; Wed, 06 Nov 2024 16:36:43 +0000 (UTC) (envelope-from hausen@punkt.de) Received: from FR4P281CU032.outbound.protection.outlook.com (mail-germanywestcentralazon11022119.outbound.protection.outlook.com [40.107.149.119]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.protection.outlook.com", Issuer "DigiCert Cloud Services CA-1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9p26H3kz4ZJj; Wed, 6 Nov 2024 16:36:42 +0000 (UTC) (envelope-from hausen@punkt.de) Authentication-Results: mx1.freebsd.org; none ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=EPP8nvisuRsD8N7pW/wbttbna83eDhN2H4RaJg1M/bfJdf9jLfdm01NeqzV5KItMz9Lt7LcWmaM93vYC0G0ovqLpuvRF1X3s75ekRAWbuLwyJnCFI6J4GnjKtHzoYhmxC43d+not69NNdWKHi725GGgSWwoawHIiftY3C9LsYLZp8UVXweCkWWMMPUmXLerrC1IsKGcpSRjwZlS3NzAWvK8hw/U4PC65VJbOBKGyh47+6nl1/vQp/4XgO3wsypo/iUwXgdVlFMLSrrltl/cPU5CD7tjer4Yw1sGNodYMJA+fBWFjRdYP+4CkfuUhNmpHbAcYSJAbx2RTQi2lLWegZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ftS7qdWAnZ7NXbUaCo9lhFWp9cysyryzOypXgW49muw=; b=fHDuCY4JPeJd9ErO9dJNU7fsBJ/xOlmjM2M+rintGJxOIcS+v/alKpd/7cIfhPD8hU52Yhxxu0+Xu1d47T136+vcZ+hXq15aiedG629EtyoUq0ykinKCS1j1hJryCo7z7VTyodLgMSN4t3VPGIYDm7BpULXbSXg+Z2RpTTp/yzvOqMR3u5F4ya07tQT3jqjPqorISzmOmQkNXPHIHRAuunBE09WwnJmUldv7fqrCB/KtDa47E4GY35i+Jmzs7mezE0VT81qTd4Nt1/6HJtFqqiI7XOYjqDhucW+8BbGb0P5gp4QG0IaLv+ICihrwiCNH7gs94qN08DCi7O7nELGdLQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=punkt.de; dmarc=pass action=none header.from=punkt.de; dkim=pass header.d=punkt.de; arc=none Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM (2603:10a6:b10:68::6) by FR2PPF2F9BEFB68.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d18:2::1c) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8137.18; Wed, 6 Nov 2024 16:36:39 +0000 Received: from BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059]) by BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM ([fe80::47b3:d399:d24b:4059%5]) with mapi id 15.20.8137.019; Wed, 6 Nov 2024 16:36:39 +0000 From: "Patrick M. Hausen" To: Dimitry Andric CC: Freebsd Stable Subject: Re: 13.4-p2 "Loader needs to be updated" Thread-Topic: 13.4-p2 "Loader needs to be updated" Thread-Index: AQHbMGWWgfYbx0NAo0+aEvoEIRLs2bKqa/aAgAAAlQCAAAWQAIAAAScA Date: Wed, 6 Nov 2024 16:36:39 +0000 Message-ID: References: <24632F35-757E-4358-B13E-1978E24BC929@FreeBSD.org> In-Reply-To: <24632F35-757E-4358-B13E-1978E24BC929@FreeBSD.org> Accept-Language: de-DE, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: BE1P281MB3156:EE_|FR2PPF2F9BEFB68:EE_ x-ms-office365-filtering-correlation-id: 4596df29-2253-44a0-44d7-08dcfe81303a x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|10070799003|376014|38070700018; x-microsoft-antispam-message-info: =?utf-8?B?eHc4SDdyWjlaN2RaUVZFVnZ2WHROSVF3ejVDSlJUcThERTArRkxLL2hYTjFQ?= =?utf-8?B?RnR4Sm1Da000Z3dRMkU3Vnp1ZldZTWp6WWZGYjFidHJsWjluMit1bWpla0tJ?= =?utf-8?B?RWxQYTdDbTJoSldDaGtodWNQQTNMQUhxUHpKVUJsV3pmZDNLaUJ3QU1ieVcy?= =?utf-8?B?TzZVcjF4b2xSa3RmNXA1WnlZNGtuelh0a0lncXQ1QndrZmsxNjMrS2ZteVlr?= =?utf-8?B?V1J6Y1JvWG04S1JlWXZ3K2NBbkFoTUZ6MzlSM2xRbkZNUm5rSk44TkhjNVI1?= =?utf-8?B?aDh5bnRwUjV3SG9tTXhWemFUVnFLRGR1VFdQMUxYYngvTzQ4OUYrbmhzYjJN?= =?utf-8?B?aytMUnpDMllXR0ZPbklYaS81ZWc1TEFhcHNxTnJxb3hnYWtWbm8vM0dSRVJ5?= =?utf-8?B?TDZoemR3MmRmcTlSSzB1T240R082WmFwMUk4cGFkY2Q1dmxmOUtsOGxwY2RT?= =?utf-8?B?djYydm16dmpaMzFEdEY5YkJSZ2o1WUNMSjFnN1B2L0dKSXhpUmJiVFNmV3dG?= =?utf-8?B?YXpOVjRYVm5INUNUd1VGS3RjRXNyOXhxQm1lR0Fyb3JYNURKUlA5ZnFWNTR5?= =?utf-8?B?Vm5vU1lzODg0UnZ3YkszbE15R2x6ZFlRVEViZVVNc0FyVVlENDE5V1psL1Mw?= =?utf-8?B?OFVQMXZYSnFXRldoV3RTYWthYVptRjlVd0FXNVZrNnp2aUNXYXBtSGt5Ynl5?= =?utf-8?B?OEJ3QTVlUFlxQ012VmlUTkZhVmVIZ2FHOE95Vmw1MVN3UmhyL3ZkbTFhMFV3?= =?utf-8?B?SDJINTV2OXdwcGluczcvZExEOEdEUjlOdS9JYkZZdEVsRmYxMTJrYW9NUUFl?= =?utf-8?B?NEt5ejdWWVVwQlMwUlJObmUxVW5aUzRwektkRUg4QXFWakNSUHVTU2l6N0l5?= =?utf-8?B?dkJ3Y256ci9CdHBmdm1Wem1FK0cvaFJCSThCSWhTUDRlRXkrczNVclowbHEw?= =?utf-8?B?UmxxWElzVmtFYlRqZzhBU2hlYS9aWFErOE5qMEFEakF6Q2FRajZmWWUzYkVm?= =?utf-8?B?NVcrQ3YvWk51SVFIOGd4VzR3cWg3YmRQL3lEejQ1K21aZ3RtWGVxc2lITDU0?= =?utf-8?B?TVJocHRXdnFJbXV0VkJuN2FodDRsdDRZNFI0YzMvb1p6TnpmMkhMYVZYMGhw?= =?utf-8?B?eG50c3I0R2hIbkJFVlhaVzI1MWcvZTNRbE95UlZTR2M4RlNlVU5lNWJNS0Vh?= =?utf-8?B?OVVKbCtRemt3c2ZYS0t3R0xDbHU2WkhrZWlPb1JLNGJCUXczY2Z5blJJY2xo?= =?utf-8?B?RW9CNm1KcFhTMlJWeURYdmtjbnQ2a0xWaDd0dCs3R08zSE1VdHZIVEd0Rjdo?= =?utf-8?B?aWY4U3NmN2J5em04ckZUd2VyUkh1c1ZWWkxKOU81WnNpcmwvVWlTUmRRZ3Bn?= =?utf-8?B?RkYyMmJaM3F2cXhrcGV5TUhVeVRwZkpzcEwxQXQ1S1lMSVZLYW84bDY1Smtl?= =?utf-8?B?THVteUlQa0ovVzRlNmlQNjY3Nk5VNGlJenVuRmhidUgrZjROWmx3bllJVnRs?= =?utf-8?B?TFplS2t1OXNFSnNwWllrV3hvMDdaMVo2TUlKTW5lRDRLckVKT1kxZ2NhYWZh?= =?utf-8?B?UGRqMk1VSTUvSURlZDI3bDhFUUZUcVc0VGJRK3EvZDh4a1JPbFY5a2VjbTB4?= =?utf-8?B?enpTR3FUVjlNbGxoSnBGajZ2dUkwTGt4VVVsTkNHNFduMkJtZVVhU3Z1LzYv?= =?utf-8?B?YzVncDJJb3dVYXI2VVdwUmVWenlQa0VNZkxIQUNxbmZVV0l6UGtqcEdjdlVN?= =?utf-8?Q?6vxChheJUFLaxunmtv9kQWAIBWZpm0YDxhjOZNN?= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(10070799003)(376014)(38070700018);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?VzY1a1o4eVNNNEVaRWdvcXpqZkJDK3JpRy9yby9Fa01YTDhwbFJmTUxMVERw?= =?utf-8?B?R2pwRXp5dlUxTWp5Ly9vWkhrZ1FEVzRYS2JsbSsvcWUrU3UwY1ZXRWo4TVVl?= =?utf-8?B?cEpGeUlNUTlZZzF6SmlaVTNxOG5DRFFPWU5JTjhtOG1JSGJIdndSWjdkYWpm?= =?utf-8?B?NmhlNGRXTEFSbC9kUEltd3ZlTkFabzFUL1FjOHV1NjNuMEE1dFQ3ZVVObGZ6?= =?utf-8?B?MDI5K0RWbGZaQnl3cnQ3SnFaYzdUcnFzdEtSdm5tNXdGV1dJMHQzbWo4SHl0?= =?utf-8?B?WkVhQ3MrN0NnWEU2cjdrZk9yZ3BxNk95MS9HTDRMOG1wTUYwQnFIZC9TcWhp?= =?utf-8?B?VmRNeDEwM0JWSktCTjNQam91aFJsTkYvd21paElHRkJKMkpjRkF5bmF0VUxC?= =?utf-8?B?RktyMFRGL1h5OUV3UXRzVDY1M1J6dStEc3MxbjdnSDd0eFdDWXRjYVJIdGRw?= =?utf-8?B?MzUvMk9vSEl6aFMxaUlUMnJKa0ZQRUdpL0taN21kRUNoVG9hcExMZk8yY1JK?= =?utf-8?B?MWJDYllaaitOOXNHWVNXekVnamMyVjFEbFl2M3Bwcy92ZTZFRFZRT25yM1Bv?= =?utf-8?B?aEIzWENBaURjTmNTeW5KYkxoc29tWXV4SUJ1UEMwK21xK2w3ZVFWcmVnVWFV?= =?utf-8?B?OSs0OUFhT0l1WDVxRm9oNmIvcFNUcDQ4Y1BIVldqVXJGdXB4L3FkUk50K1dp?= =?utf-8?B?eVl4dEI2NmwzdlV5Y3hRaG91VjZMekJXeUlSalF3UDVTUmx6cVIzclhBYmlD?= =?utf-8?B?VkZOR0U0R28zaTNXZDlLeUNLSS9RNXBRSnlPanBZdGVReFZJNGlkazd2VVdi?= =?utf-8?B?RmpjdklXZmxwNFJxOTE4Um9rdWlNSVJjNzdFNUtoYXYwNE9wMXkwdVVVbzVB?= =?utf-8?B?S0ZLQmtZSkl5YXptTlJ3d2laTEk0ZHdCdnhYaUhDMTF3azYrN2xMUytTdjgw?= =?utf-8?B?SHVzNkNQdlJBZjNyYWxWN0xSZHd1THE2a2k0OEoyTWRESjlGRlJGdjdaejJm?= =?utf-8?B?WlNjTHVTbzFhS0dxVUtxN0h0T25PaHd2ZjFwakMrb2NzQjE0YmxHMllrTjI0?= =?utf-8?B?NGxyaU5XTmtnMUd0VUpaNnRqSXFSR3BDbWpvZ0pUUjUrRmlWb3ZPcitTeXhy?= =?utf-8?B?Z0NjTHMxaUt2dWt0N2dpMk9rVTFQWjdoZHQrbWxvWDlJSWZKZkZxZk1BWUxF?= =?utf-8?B?U0p4L3llNXkwMkZkYksvOWVJUXMwMUpVTzZWZjdmd3JTMHc5VXdOeHNzRm1E?= =?utf-8?B?NnZQR0tEaVYvcElma1hNVzNQcGtqTWlVM1BCUnVZb2grSDdCeGVURDJMcFJH?= =?utf-8?B?dVVaa3lpd2hscnQ4WkdQSUNDS2VNKzBUR2ZFWFAzTm5TQis0MU1nSTZpTzRD?= =?utf-8?B?aHZKdmg3T0I0YzZIZTRRaDJZNjdyazdpS0ljREdQdzRzS1pFMkcyM0IxQk04?= =?utf-8?B?S3JLQVpDOCtpQzBPSXpCNEo4MDRHb2FxeW50cE9LUDdrbFB1NkdsOExaYnpH?= =?utf-8?B?OUNVdXdjRHZuSEl3WHFNK1lXTjZTd0dCMFgvVkVIT1pxbldqWlJwUkVJbkdr?= =?utf-8?B?OU9SV3BxVHBQcEZqWjdVdjBac1RCTUs3RDFNV0d5RDdYbUQrS29wVnAvTHVt?= =?utf-8?B?VDBQSHhCcVR4SGFLSGRvTXRJK0Rla2F0UlBuZUF0N05pcXB2SzhpRDNxQUlD?= =?utf-8?B?SFlxWUpZK0pYSjdLcVB2RkxkcVdqL1ZnV1hrVE8rZFNPZ1htcTRMVVptbExS?= =?utf-8?B?QkxZZVlPN1o3aENTQjZjMmtBd2dhOEpnaGdGaGhZVUY2VnpodmZwSUhqWE00?= =?utf-8?B?bmZZZlllWE5pMGZ1YWVaMEc4TXcrQ3pnckc3TDNZa0hscHB5UDRDWDQ5UHcv?= =?utf-8?B?aHlOQ3VyWDQ0TWVZR2NNNEFDbXgyc2RaczVGY0orQzFmRVhwanhUSlh3aFQ5?= =?utf-8?B?VVVPY0RwMGJHLzZpVUdHSm14NGV0amk5L3lBclR4UU13Zk5NbUc1NzlMa2Rp?= =?utf-8?B?RW5QNTZwTlVwa1VsdDE3eTVFZWZvSWVNN3VpNmZWaTRwRVFKRFMrZVBrYmgr?= =?utf-8?B?eG12ZFNYeW9WN2R0dTZEa0JnMEVCNnZPZDJnV014WUtwYWkvQjBUaWJKcWRt?= =?utf-8?B?dkFoZXhwUTVHUmJjYlYvZnMzczRLVjdEeWM2VUdWZnZlT0pEdFhlaDdOUlNv?= =?utf-8?Q?A7MQGYpp+r/E8yh7WXER6FVBH4LuR3Jp30VQi7Rht7Qv?= Content-Type: text/plain; charset="utf-8" Content-ID: <237FF642D305A942BDBD3C308BA3CA48@DEUP281.PROD.OUTLOOK.COM> Content-Transfer-Encoding: base64 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 X-OriginatorOrg: punkt.de X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BE1P281MB3156.DEUP281.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-Network-Message-Id: 4596df29-2253-44a0-44d7-08dcfe81303a X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Nov 2024 16:36:39.2612 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: d1aa1808-3734-45fc-a490-f8ba49028756 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: GNK7MQy0rxD/Y5VqCl910j4kqrkTFroykmgYYVNOgNI8gZjA5obUtmqZNsAhGGYP X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR2PPF2F9BEFB68 X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:8075, ipnet:40.104.0.0/14, country:US] X-Rspamd-Queue-Id: 4Xk9p26H3kz4ZJj X-Spamd-Bar: ---- SGkgRGltaXRyeSwNCg0KPiBBbSAwNi4xMS4yMDI0IHVtIDE3OjMyIHNjaHJpZWIgRGltaXRyeSBB bmRyaWMgPGRpbUBGcmVlQlNELm9yZz46DQo+IA0KPiBPbiA2IE5vdiAyMDI0LCBhdCAxNzoxMiwg UGF0cmljayBNLiBIYXVzZW4gPGhhdXNlbkBwdW5rdC5kZT4gd3JvdGU6DQo+PiANCj4+PiANCj4+ PiBBbSAwNi4xMS4yMDI0IHVtIDE3OjEwIHNjaHJpZWIgRGltaXRyeSBBbmRyaWMgPGRpbUBGcmVl QlNELm9yZz46DQo+Pj4gU2hvdWxkbid0IHlvdSBjb3B5IC9ib290L2xvYWRlci5lZmkgaW5zdGVh ZD8gL2Jvb3QvbG9hZGVyIGlzIGFuIG9sZGVyIGJpbmFyeSwgbm90IHN1aXRhYmxlIGZvciBVRUZJ Lg0KPj4gDQo+PiBFeGN1c2UgbWUgLSB0aGF0IGlzIHdoYXQgSSBkaWQsIG90aGVyd2lzZSB0aGUg c2VydmVyIHdvdWxkIGJlIHF1aXRlIGRlYWQgYnkgbm93Lg0KPj4gDQo+PiBUeXBvIGluIG15IGVt YWlsLCBubyB0eXBvIGluIHRoZSBhY3R1YWwgZXhlY3V0aW9uLg0KPj4gDQo+PiAtci14ci14ci14 ICAyIHJvb3QgIHdoZWVsICA4NjgzNTIgU2VwIDEzIDEwOjA1IC9ib290L2xvYWRlci5lZmkqDQo+ IA0KPiBZZWFoIHNvcnJ5LCBJIHdhcyBub3Qgc3VyZSBpZiBpdCB3YXMgYSB0eXBvIG9yIG5vdC4g OikNCj4gDQo+IEFueXdheSwgdGhpcyBhcHBlYXJzIHRvIGJlIGEgcmVwb3J0ZWQgYnVnOiBodHRw czovL2J1Z3MuZnJlZWJzZC5vcmcvYnVnemlsbGEvc2hvd19idWcuY2dpP2lkPTI4MjAwMSwNCj4g YnV0IHRoZXJlIHdhcyBubyBFTiBmb3IgaXQuIFRoZSBkcmFmdCBzY2hlZHVsZSBmb3IgMTMuNSBw b2ludHMgdG8gbmV4dCB5ZWFyLCBzbyB5b3Ugd2lsbCBlaXRoZXIgaGF2ZSB0byBiZSBwYXRpZW50 LA0KPiBvciBwYXRjaCBhIGx1YSBmaWxlLCBpdCBzZWVtcy4NCg0KVGhhbmtzLiBBcyBsb25nIGFz IGl0IGlzIGhhcm1sZXNzIGFuZCB3aWxsIG5vdCByZW5kZXIgbXkgc2VydmVyIHVuYm9vdGFibGUg YWxsIGlzIHdlbGwuDQoNCkkgcmFyZWx5IHNlZSB0aGUgbG9hZGVyIHNjcmVlbiwgYW55d2F5LiBJ IHdhcyBqdXN0IGRlYnVnZ2luZyBmbGFreSBib290IHdpdGggYSBuZXcNCmhhcmR3YXJlIGdlbmVy YXRpb24gYXQgSGV0em5lciBhbmQgdGhlbiBhIHdhcm5pbmcgbGlrZSB0aGlzIGRpZCBub3QgaW1w cm92ZSBteQ0KY29uZmlkZW5jZSA7LSkNCg0KS2luZCByZWdhcmRzLA0KUGF0cmljaw0KLS0gDQpw dW5rdC5kZSBHbWJIDQpQYXRyaWNrIE0uIEhhdXNlbg0KLmluZnJhc3RydWN0dXJlDQoNClNvcGhp ZW5zdHIuIDE4Nw0KNzYxODUgS2FybHNydWhlDQoNClRlbC4gKzQ5IDcyMSA5MTA5NTAwDQoNCmh0 dHBzOi8vaW5mcmFzdHJ1Y3R1cmUucHVua3QuZGUNCmluZm9AcHVua3QuZGUNCg0KQUcgTWFubmhl aW0gMTA4Mjg1DQpHZXNjaMOkZnRzZsO8aHJlcjogRGFuaWVsIExpZW5lcnQsIEZhYmlhbiBTdGVp bg0KDQo= From nobody Wed Nov 6 16:43:43 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xk9yN6kGcz1Gj65 for ; Wed, 06 Nov 2024 16:43:56 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-pj1-x1029.google.com (mail-pj1-x1029.google.com [IPv6:2607:f8b0:4864:20::1029]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "WR4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xk9yN51nyz4c1l for ; Wed, 6 Nov 2024 16:43:56 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Authentication-Results: mx1.freebsd.org; none Received: by mail-pj1-x1029.google.com with SMTP id 98e67ed59e1d1-2e2b9480617so4822a91.1 for ; Wed, 06 Nov 2024 08:43:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20230601.gappssmtp.com; s=20230601; t=1730911435; x=1731516235; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=WnKYyswq5PkcluUFw2VQSsYseScwmtHGwEGVgiuCfk4=; b=ncKAXWZcfzwIbuZmCo35LfEiqZXOlzaHHzrKyUP6fwQq/dOKSfZ73KRM7VKIl5/dIE FLpoEdAunAv1finS84Te7bZBWengWcpyqKdmlyH4JYfqp81aeq0zdleoDGxlevsRtvoy iwMdD/BiSmlQ7jD3k61WAoU4TAxxdMlxJymXcZNuBp3bsQvRnSnvB8JHr23iUQsGWgtp ICIO/CD6qlOgyMA70lfwfi4N7Y3Ub4Z2Zvpvsnkm/hN2pim+YV3h1uXx4ltWODh4R10i M4U85TW5wBpkxotN9Xnpf/LRtQvVC1oHQ5Mg9z9QkQv1WYBbqGS4jEcnhHfaityr7FTp 4p/g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1730911435; x=1731516235; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=WnKYyswq5PkcluUFw2VQSsYseScwmtHGwEGVgiuCfk4=; b=X4Tdp+q0y1lWNC1HghnEQU0rSDm+q1ozxtikHJjst1jKhK9venkbFxh+2JU/mGvpTu J268cnWtA5mlZvieOhai1hZVqikyjUGaBQh29YFnQ8BnxQM2k8Ap46NaTi0YIf596oQa 6oI615bbhC0ZP9gBqZX5X5fiHbr8sBgG3ZpxztEfJjyW+2ZXJn2fbYNjk10UGrrY97rj EZ/D+ZWLcGxbq3y6VaAOc1rmnbefrhdPlJmDsbbQldSpgFoAEqu6A9AKt5bgQ8Mnepga BuDZnGKkqBlJoxIQz/KY71t6K5H0yVVhIm2ZBz38TsJVjRe6xVabw/Sa2K3t9AE3Bq46 IUJA== X-Forwarded-Encrypted: i=1; AJvYcCUK5uibAJRJmkShUeGYD9XPeZ0zLXyP4D3Ydp+g2wJRov8wM7wCQVBZpFB+ptsa4ZeP6GP8NwGcf8xZ6zMU4Q==@freebsd.org X-Gm-Message-State: AOJu0YyMl55UZNsfuVCvI5rCbxA11JTwOBs9bGGAJ1WS/AQJEK6qTEcd JtLLDlBWadPZRbfO5QGZbwO4LB4ZB4hdaNHLdQ6W6Lq/4rSe7ez4FpO6g4XwlPT+OJ1aVityRrs RWmX2xpmwZiCKEIAzamUSC1foHQP9qhOdvCIRRenv5bzVTjeA X-Google-Smtp-Source: AGHT+IG8B3BSAYRg2otd5/w2Hp6Q7qYhMdEGHjI8GwRG+xzLV2WTAJdS9W2olwRRxiCrZr0XkjvfDWaaripSdqxrp5I= X-Received: by 2002:a17:90b:540b:b0:2e2:cc47:ce1a with SMTP id 98e67ed59e1d1-2e93c128a8fmr34299792a91.1.1730911435227; Wed, 06 Nov 2024 08:43:55 -0800 (PST) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 References: <24632F35-757E-4358-B13E-1978E24BC929@FreeBSD.org> In-Reply-To: From: Warner Losh Date: Wed, 6 Nov 2024 09:43:43 -0700 Message-ID: Subject: Re: 13.4-p2 "Loader needs to be updated" To: "Patrick M. Hausen" Cc: Dimitry Andric , Freebsd Stable Content-Type: multipart/alternative; boundary="0000000000003c257c0626413928" X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US] X-Rspamd-Queue-Id: 4Xk9yN51nyz4c1l X-Spamd-Bar: ---- --0000000000003c257c0626413928 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, Nov 6, 2024, 9:37=E2=80=AFAM Patrick M. Hausen wr= ote: > Hi Dimitry, > > > Am 06.11.2024 um 17:32 schrieb Dimitry Andric : > > > > On 6 Nov 2024, at 17:12, Patrick M. Hausen wrote: > >> > >>> > >>> Am 06.11.2024 um 17:10 schrieb Dimitry Andric : > >>> Shouldn't you copy /boot/loader.efi instead? /boot/loader is an older > binary, not suitable for UEFI. > >> > >> Excuse me - that is what I did, otherwise the server would be quite > dead by now. > >> > >> Typo in my email, no typo in the actual execution. > >> > >> -r-xr-xr-x 2 root wheel 868352 Sep 13 10:05 /boot/loader.efi* > > > > Yeah sorry, I was not sure if it was a typo or not. :) > > > > Anyway, this appears to be a reported bug: > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282001, > > but there was no EN for it. The draft schedule for 13.5 points to next > year, so you will either have to be patient, > > or patch a lua file, it seems. > > Thanks. As long as it is harmless and will not render my server unbootabl= e > all is well. > > I rarely see the loader screen, anyway. I was just debugging flaky boot > with a new > hardware generation at Hetzner and then a warning like this did not > improve my > confidence ;-) > It's harmless... Thanks for updating. Warner Kind regards, > Patrick > -- > punkt.de GmbH > Patrick M. Hausen > .infrastructure > > Sophienstr. 187 > 76185 Karlsruhe > > Tel. +49 721 9109500 > > https://infrastructure.punkt.de > info@punkt.de > > AG Mannheim 108285 > Gesch=C3=A4ftsf=C3=BChrer: Daniel Lienert, Fabian Stein > > --0000000000003c257c0626413928 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


On Wed, Nov 6, 2024, 9:37=E2=80=AFAM Patrick M. Hausen= <hausen@punkt.de> wrote:
<= /div>
Hi Dimitry,

> Am 06.11.2024 um 17:32 schrieb Dimitry Andric <dim@FreeBSD.org>:=
>
> On 6 Nov 2024, at 17:12, Patrick M. Hausen <hausen@punkt.de> wr= ote:
>>
>>>
>>> Am 06.11.2024 um 17:10 schrieb Dimitry Andric <dim@FreeBSD.= org>:
>>> Shouldn't you copy /boot/loader.efi instead? /boot/loader = is an older binary, not suitable for UEFI.
>>
>> Excuse me - that is what I did, otherwise the server would be quit= e dead by now.
>>
>> Typo in my email, no typo in the actual execution.
>>
>> -r-xr-xr-x=C2=A0 2 root=C2=A0 wheel=C2=A0 868352 Sep 13 10:05 /boo= t/loader.efi*
>
> Yeah sorry, I was not sure if it was a typo or not. :)
>
> Anyway, this appears to be a reported bug: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D282001= ,
> but there was no EN for it. The draft schedule for 13.5 points to next= year, so you will either have to be patient,
> or patch a lua file, it seems.

Thanks. As long as it is harmless and will not render my server unbootable = all is well.

I rarely see the loader screen, anyway. I was just debugging flaky boot wit= h a new
hardware generation at Hetzner and then a warning like this did not improve= my
confidence ;-)

It's harmless... Thanks for updating.

Warner

Kind regards,
Patrick
--
punkt.de GmbH
Patrick M. Hausen
.infrastructure

Sophienstr. 187
76185 Karlsruhe

Tel. +49 721 9109500

https://infrastructure.punkt.de
info@= punkt.de

AG Mannheim 108285
Gesch=C3=A4ftsf=C3=BChrer: Daniel Lienert, Fabian Stein

--0000000000003c257c0626413928-- From nobody Thu Nov 7 15:34:30 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XkmMp6Q5nz5c13p; Thu, 07 Nov 2024 15:34:30 +0000 (UTC) (envelope-from salvadore@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XkmMp64ZFz41v8; Thu, 7 Nov 2024 15:34:30 +0000 (UTC) (envelope-from salvadore@freebsd.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730993670; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=W41+ABVanZQDmGPHTklXSUH1KDiO99Zjs0mv+16I6js=; b=FWRM3OpK4XR3pHi9jE9ZYE6blEPD0hHgRWQZjtX+ubGaU0jLOD07VnE2E/tiKtCsv0ucJq 8gTJlHQBhC2wqCZgcZvAFYJESg5fNl29uI1TzI3gmXKMHyD3SlJjAA37kb9v77Bjs5h1i8 Y3LCUZNjTHqCcw50jhD4BXBe1zs2ALtCAdt7gDBGW0M5wr91IZ9CqmQigH142zjCrpX7cO XTZxy2DLnl3UTfwaySXetS//emM5cKs4NTip+fiQ/HW3xRyxAZQ88gyxZ2hyQFL4Atd+68 9O9ewoqJkU2lMVRcXQz9PqxglWDIJdDPV7gT62Oan1EXi0ZTpSsPN1SwDhKWOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1730993670; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=W41+ABVanZQDmGPHTklXSUH1KDiO99Zjs0mv+16I6js=; b=SV5g6ZfPORctNvJE7HD+8r5JQ/n9pWkwkk+QvooNLnVLa+UUwmQOXCYo4WJ3X//pXd7H57 0cDRHFlO3P7ys0MTFIltDyOdqys/ifAXzQyJyHRarIfi16s8R0n42BaiUYLCOC+FJnKwlA +TAxZKtbLaR+FOh2t74o4RCwqk4WC4IUdefIEwdavgGNNQjSoKPMVGbKXIdHMtLime8fbJ 0N7YwIGtNx8pitt0vyzq7kGuTZDte6mgtTR+lV48/OnC9nxyAQzy82iuD0skrDkUQMLuB8 OyH9cCiQl/2gOTYgYsgHpA5wMr2wUGch/DFTPuPHXdPJB3ciLGLVEBD8E9f23g== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1730993670; a=rsa-sha256; cv=none; b=Wvgbu56wk1kQio9/NBDbeKF8xvJgcntCCN/0H8monCfVOJm1aeBM6evCKUpK7npGhnF6xw Tzkq4opPW6Gbj8kbyfP91p50aPd1wmiMdFUBMcDmGT+xpO/+/0SMjXD9UqVM6b1Pqt/lDj veV0j6T+Srs0jsHwx/hKqUwByjnVy38EmBawoHNqpJPEgDvnN7ZpUteISGffDYBqBsyN1r NfTVWInwrBIJwOiIJsJLKuc9HZZCxMWhVLwnIOyP+J2Op4qz4JRAFggPaTfNzBnNAtHOii qwPDyL1WvGPc65Z0EPVcIyYgAIdmejH/wpcIHzPgmL/4t+C6M1ALaoF+L97GkQ== Received: by freefall.freebsd.org (Postfix, from userid 1472) id C529C77AE; Thu, 07 Nov 2024 15:34:30 +0000 (UTC) Date: Thu, 7 Nov 2024 15:34:30 +0000 From: Lorenzo Salvadore To: freebsd-hackers@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Subject: FreeBSD Status Report - Third Quarter 2024 Message-ID: List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline; filename="report.txt" Content-Transfer-Encoding: 8bit FreeBSD Status Report Third Quarter 2024 Here is the third 2024 status report, with 32 entries. Unfortunately we are late this quarter, just like last quarter. As our readers know, many FreeBSD contributors are volunteers, so it is natural that less important deadlines like the status reports ones are not always met. Indeed, if you are not a FreeBSD contributor yet, please consider joining us: you could help lighten someone’s burden while learning new skills, working side by side with developers all over the world. Have a nice read. Lorenzo Salvadore, on behalf of the Status Team. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ A rendered version of this report is available here: https://www.freebsd.org/status/report-2024-07-2024-09/ ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Table of Contents • FreeBSD Team Reports □ FreeBSD Core Team □ FreeBSD Foundation □ FreeBSD Release Engineering Team □ Continuous Integration □ Ports Collection □ Bugmeister Team □ FreeBSD Samba Team • Projects □ Audio Stack Improvements □ A bhyve management GUI written in Freepascal/Lazarus □ Changes to dhclient to speed up the FreeBSD boot process □ Capsicum and Bhyve Code Audit □ Endpoint-Independent NAT □ Kyua Jail Support □ Linux Source Compatibility Wiki page • Userland □ Service jails — Automatic jailing of rc.d services □ Userspace UFS Driver (fuse-ufs) • Kernel □ FreeBSD V4L2 & kernel USB Video Class driver □ mac_do(4), setcred(2), mdo(1) □ Scheduling Priorities: 256-queue Runqueues Sub-Project □ Wireless Update □ VirtIO Sockets and AF_VSOCK support • Architectures □ Pinephone Pro Support □ SIMD enhancements for aarch64 • Cloud □ FreeBSD on Microsoft HyperV and Azure □ FreeBSD on EC2 □ OpenStack on FreeBSD • Documentation □ Documentation Engineering Team □ FreeBSD Wiki □ The FreeBSD Russian Documentation Project • Ports □ GCC on FreeBSD □ Freepascal and Lazarus on FreeBSD aarch64 • Third Party Projects □ Containers and FreeBSD: Pot, Potluck and Potman ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Core welcomes René Ladan (rene@) as their new secretary. Liaisons Core selected new liaisons for the various teams among themselves: • bugmeister: glebius • ci: olivier • clusteradm: mat • doceng: lwhsu • foundation: hrs • portmgr: tcberner • re: dch • secteam: allanjude • srcmgr: glebius DevSummit 202409 • The Core Team was almost fully present at EuroBSDCon 2024 in Dublin. The following people were present: allanjude, dch, glebius, hrs, lwhsu, mat, olivier, rene • Slides are available at https://wiki.freebsd.org/DevSummit/202409 • Core met with the FreeBSD Foundation to have their periodic meeting and take the change to do it in face-to-face. Topics included improving alignment and communications between the two groups and the community. New support timeline for FreeBSD releases • Core approves the proposal by re@ to reduce the support timeline for FreeBSD releases from five to four years, after which the release is supported on a best-effort basis. This proposal is also backed by portmgr and secteam. srcmgr • Core helped in forming a new srcmgr team. Their charter is not fully set in stone yet, it can be adjusted if needed in 6-12 months from now. • Nominations for new src commit bits should from now on be sent to srcmgr@ instead of core@ • A lurker program is suggested to keep an influx of new members. • Core announced srcmgr during DevSummit 202409 and sent a follow-up to developers@ on September 29. Commit bits • Core welcomes Igor Ostapenko (igoro) as a new src committer. • Core extended the text that the grim reaper script sends to include ways on how to get commit bits of developers re-activated. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Foundation Links: FreeBSD Foundation URL: https://freebsdfoundation.org/ Technology Roadmap URL: https://freebsdfoundation.org/blog/technology-roadmap/ Donate URL: https://freebsdfoundation.org/donate/ Foundation Partnership Program URL: https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/ FreeBSD Journal URL: https://freebsdfoundation.org/journal/ Foundation Events URL: https://freebsdfoundation.org/our-work/events/ Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and worldwide community, and helping to advance the state of FreeBSD. We do this in both technical and non-technical ways. We are 100% supported by donations from individuals and corporations and those investments help us fund the: • Software development projects to implement features and functionality in FreeBSD • Sponsor and organize conferences and developer summits to provide collaborative opportunities and promote FreeBSD • Purchase and support of hardware to improve and maintain FreeBSD infrastructure • Resources to improve security, quality assurance, and continuous integration efforts • Materials and staff needed to promote, educate, and advocate for FreeBSD • Collaboration between commercial vendors and FreeBSD developers • Representation of the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity Even though the summer months tend to be slower, we accomplished a lot of work and you will see that in our Q3 report! Some highlights include raising over $135,000 from individual donors, and kicking off two major projects. First, thanks to a large investment from the Sovereign Tech Fund, we will be doing even more to improve our infrastructure. Second, thanks to a large investment by Quantum Leap Research and the Foundation, we will be working to accelerate a FreeBSD on Modern Laptops project. We also continued work on the Alpha-Omega funded project, hired a userland software developer, and opened a job position for a solutions specialist. As you will see below, spreading the word about FreeBSD through advocacy and community is still an important part of our mission. Over the summer, we sponsored EuroBSDCon, and the upcoming FreeBSD and OpenZFS Summits, and provided travel grants to around eight FreeBSD contributors to attend EuroBSDCon. Our advocacy team was busy producing content that promotes the benefits and strengths of FreeBSD, why companies are using FreeBSD, and why you should use FreeBSD if you care about security. We also promoted work within the Project and Foundation on social media. During EuroBSDCon, Foundation and Core Team members met to discuss Core’s questions as they navigate what they want to accomplish during their term. We identified 2 key areas to work on in the near term: 1. Financial reporting transparency - Break out operating system improvements spending in our quarterly reports. We are working with our accountant so that starting in 2025, we can report how much we are spending on certain projects and key areas, like laptop, enterprise, security…​ In the meantime, we will add notes to our financial reports that document which projects are included in the OS Improvement expense category. We are aware that we have not posted financials this year. Our accounting team is introducing us to improved reporting, while integrating our books into a new accounting system. 2. The projects we are funding are not mentioned on the Project’s website. We document these on our website, because we want to show our donors where their financial contributions are being spent. We recognize that we need to also add documentation about these projects on FreeBSD.org, so we will investigate how to better connect our software development work with the Project. We are funding a lot of software development work to advance, improve, and keep FreeBSD secure. We received funding for some of this work, but most of it is being funded by your donations and our investments. Our purpose is to focus on the long-term sustainability of FreeBSD. To do this, we need more companies stepping in to help fund our efforts. Our investments will only carry on this work for a year or two at most. If your company relies on FreeBSD, please consider giving a financial contribution so we can ensure it stays the secure, reliable, and innovative platform you depend on. Not sure how to go about asking? Please reach out. We can help you navigate the process. Please go here to make a donation: https://freebsdfoundation.org/donate/. To find out more about our Partnership Program, go here: https://freebsdfoundation.org/our-donors/freebsd-foundation-partnership-program/. OS Improvements During the third quarter of 2024, 263 src, 37 ports, and 11 doc tree commits identified The FreeBSD Foundation as a sponsor. Several members of the FreeBSD Foundation’s development team attended the FreeBSD Developer Summit in Dublin, Ireland prior to EuroBSDCon 2024. You can watch a video of the Hello From the Foundation talk to open the Summit, when: • Deb Goodkin introduced the FreeBSD Foundation • Joe Mingrone introduced members of the development team and said a few words about FreeBSD’s 2024 Google Summer Code campaign • Ed Maste described some of the current or recently completed Foundation development projects. Alice Sowerby, who recently began supporting the Foundation in Technical Program Management role, gave a talk to introduce the CHAOSS (Community Health Analytics for Open Source Software) project and how to start collecting and working with community health metrics. The Foundation, along with new funding and investment partners, is currently supporting four major projects. • The first, partially funded by Alpha-Omega, is to improve FreeBSD security. As part of this effort, the Foundation enlisted Synacktiv to run a code audit on two significant subsystems: bhyve and Capsicum. For details, refer to the dedicated Capsicum and Bhyve Code Audit report entry. • The second project, jointly funded by AMD and the Foundation, is to develop an AMD IOMMU driver for FreeBSD. The impetus for the project was to better support large core AMD systems. However, the driver will be useful in different scenarios when interrupt remapping is required. The work is nearing completion, and developer Konstantin Belousov is testing the driver on some of AMD’s large-core-count systems before committing. • The third project, backed by an investment from the Sovereign Tech Fund, is to improve FreeBSD through five key sub-projects: □ Zero Trust Builds: Enhance tooling and processes □ CI/CD Automation: Streamline software delivery and operations □ Reduce Technical Debt: Implement tools and processes to keep technical debt low □ Security Controls: Modernize and extend security artifacts, including the FreeBSD Ports and Package Collection, to assist with regulatory compliance □ SBOM Improvements: Enhance and implement new tooling and processes for FreeBSD SBOM To reduce technical debt, we have partnered with Bitergia to analyze and assess our open Bugzilla bugs. By implementing improved issue management processes and establishing open-source tooling for the long term, our goal is to achieve and sustain a manageable bug backlog. The remaining four sub-projects will begin in 2025. • The fourth project, which will be funded by both the Foundation and Quantum Leap Research, is to improve FreeBSD laptop usability. We have begun (or will soon start) supporting developers working in the following areas: □ Enhanced wireless chipset support: Expanding chipset compatibility to ensure reliable wireless connectivity and support for newer wireless standards. □ Power management: Implementing modern power-saving states (such as s2idle and s0ix) to improve battery life and energy efficiency. □ Graphics enhancements: Improving support for Intel and AMD graphics by integrating the latest DRM drivers. □ Audio improvements: Enhancing audio routing, headphone switching, and digital microphone (DMIC) functionality for a more user-friendly multimedia experience. □ Laptop-specific hardware features: Addressing specialty buttons, touchpad gestures, and other unique hardware components found in modern laptops. FreeBSD completed our 20th consecutive year participating in Google Summer of Code. The 11 projects for this summer are now complete; nine passed. The Foundation has been providing project management support for the FreeBSD Open Container Initiative (OCI) Working Group, with Alice Sowerby hosting the bi-weekly meeting, and running the recent Podman on FreeBSD testing project. The OCI develops open industry standards for cloud native container formats and runtimes, ensuring platform consistency. The FreeBSD OCI Working Group is defining these standards for FreeBSD, with implementations using jails and potentially lightweight VMs with bhyve. Refer to the Foundation’s OCI Container Support Project page for details. In other Foundation news: • Isaac Freund joined the Foundation’s development team as a Userland Developer. As the lead developer of the River Wayland Compositor and a member of the Core Zig Team, we are excited about the experience Isaac will be bringing to FreeBSD. • Alfonso Sabato Siciliano is working on a Vision Accessibility Subsystem for blind, low-vision, and color blind users. New features will include a Braille refreshable display framework, a communication channel for the virtual terminal console, a speech synthesizer, high-contrast TUI utilities, and an accessibility book to document assistive technologies available on FreeBSD. • Tom Jones, completed his work with RGNets to port the Vector Packet Processor (VPP), a layer 2-4 multi-platform network stack in userspace, to FreeBSD. You can read about Tom’s next project to support full-cone NAT for FreeBSD firewalls in his Endpoint-Independent NAT report entry. • Christos Margiolis continued to improve FreeBSD’s audio stack and provide audio developers with useful tools and frameworks to facilitate sound development on FreeBSD. Refer to the Audio Stack Improvements entry for the latest news. • Olivier Certner has two entries in this report. You can read about his latest work in the Scheduling Priorities: 256-queue Runqueues Sub-Project and mac_do(4), setcred(2), mdo(1) report entries. • Bjoern Zeeb continued to improve wireless networking on FreeBSD. You can read the latest news in Bjoern’s Wireless Update entry. • Philip Paeps continued work on a contract to modernize the FreeBSD cluster. • Chih-Hsin Chang has continued work to port OpenStack components so that the cloud computing platform can be run on FreeBSD hosts. Refer to the OpenStack on FreeBSD entry for the latest information. • Other members of the Foundation’s technology team contributed to FreeBSD development efforts. For example: □ Mitchell Horne committed work for RISC-V, including adding support for the Supervisor-mode: Page-Based Memory Types (Svpbmt) extension □ Ed Maste removed the deprecated mergemaster tool in favor of etcupdate (8) for updating files not managed by install world □ Joe Mingrone updated our base libpcap and tcpdump(1) □ Li-Wen Hsu kept our Jenkins port tracking the latest upstream versions with a number of port updates. Continuous Integration and Workflow Improvement As part of our continued support of the FreeBSD Project, the Foundation supports a full-time staff member dedicated to improving the Project’s continuous integration system and test infrastructure. Advocacy During the third quarter of 2024, we continued growing our efforts to drive awareness, advocate for the project, highlight users, and bring educational content to the FreeBSD community. Below are some of those efforts. • Presented at the EuroBSDcon 2024 FreeBSD Developer Summit. Slides and the Live stream are now available. • Attended and exhibited at EuroBSDCon 2024. The Foundation was again a Silver Sponsor. • Finalized our Bronze Sponsorship of the OpenZFS User and Developer Summit • Began planning the Fall 2024 FreeBSD Summit taking place November 7-8, 2024 in San Jose, CA. The program is now available and registration is open. • Updated the community on the new release schedule: Navigating FreeBSD’s New Quarterly and Biennial Release Schedule • Announced: New CIS® FreeBSD 14 Benchmark: Secure Your Systems with Expert-Guided Best Practices • Shared more information about the Sovereign Tech Fund’s investment in the Foundation: Sovereign Tech Fund to Invest €686,400 in FreeBSD Infrastructure Modernization • Announced the joint investment by Quantum Leap Research and FreeBSD Foundation to Improve Laptop Support and Usability and more on why we are making this investment. • Published additional blogs including: □ FreeBSD Ports and Packages: What you need to know □ Why You Should Use FreeBSD □ Enhancing Memory Safety in Programming: Insights from the FreeBSD Vendor Summit □ FreeBSD as a Platform for Your Future Technology □ Celebrating FreeBSD: Insights from Deb Goodkin • Participated in the following contributed articles, interviews and podcasts: □ Get to Know: Deb Goodkin, Executive Director, FreeBSD Foundation □ All Things Open Blog: Unlocking the Potential of FreeBSD □ Why Open Source Can Be the Perfect Place for New Developers – and How to Get Started, with Deb Goodkin from the FreeBSD Foundation □ Steady in a shifting Open Source world: FreeBSD’s enduring stability □ Apple’s Open Source Roots: The BSD Heritage Behind macOS and iOS • Published the July 2024, August 2024, and September 2024 FreeBSD Foundation Updates. • Released the May/June 2024 and July/August 2024 issues of the FreeBSD Journal with HTML versions of the articles. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to https://freebsdfoundation.org to find more about how we support FreeBSD and how we can help you! ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Release Engineering Team Links: FreeBSD 13.4-RELEASE announcement URL: https://www.freebsd.org/releases/13.4R/announce/ FreeBSD 14.2-RELEASE schedule URL: https://www.freebsd.org/releases/14.2R/schedule/ FreeBSD releases URL: https://download.freebsd.org/releases/ISO-IMAGES/ FreeBSD development snapshots URL: https://download.freebsd.org/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team, The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. The Team managed 13.4-RELEASE, leading to the final RELEASE build and announcement in September. Planning has started for the upcoming 14.2-RELEASE cycle. The Release Engineering Team continued providing weekly development snapshot builds for the main, stable/14, and stable/13 branches. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Continuous Integration Links: FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI Tinderbox view URL: https://tinderbox.freebsd.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org Hosted CI wiki URL: https://wiki.FreeBSD.org/HostedCI 3rd Party Software CI URL: https://wiki.FreeBSD.org/3rdPartySoftwareCI Tickets related to freebsd-testing@ URL: https://bugs.freebsd.org/bugzilla/buglist.cgi?bug_status=open&email1=testing%40FreeBSD.org&emailassigned_to1=1&emailcc1=1&emailtype1=equals FreeBSD CI Repository URL: https://github.com/freebsd/freebsd-ci dev-ci Mailing List URL: https://lists.FreeBSD.org/subscription/dev-ci Contact: Jenkins Admin Contact: Li-Wen Hsu Contact: freebsd-testing Mailing List Contact: IRC #freebsd-ci channel on EFNet In the fourth quarter of 2024, we worked with the project contributors and developers to address their testing requirements. Concurrently, we collaborated with external projects and companies to enhance their products by testing more on FreeBSD. Important completed tasks: • Update main and stable/14 build environment to 14.1-RELEASE Work in progress tasks: • Improving the src/tests/ci work to support running test suites • Merging Pre-commit CI with CIRRUS-CI • Designing and implementing pre-commit CI building and testing and pull/ merge-request based system (to support the workflow working group) • Proof of concept system is in progress. • Designing and implementing use of CI cluster to build release artifacts as release engineering does, starting with snapshot builds • Simplifying CI/test environment setting up for contributors and developers • Setting up the CI stage environment and putting the experimental jobs on it • Redesigning the hardware test lab and adding more hardware for testing Open or queued tasks: • Collecting and sorting CI tasks and ideas • Setting up public network access for the VM guest running tests • Implementing use of bare-metal hardware to run test suites • Adding drm ports building tests against -CURRENT • Helping more software get FreeBSD support in its CI pipeline (Wiki pages: 3rdPartySoftwareCI, HostedCI) • Working with hosted CI providers to have better FreeBSD support Please see freebsd-testing@ related tickets for more WIP information, and do not hesitate to join the effort! Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Collection Links: About FreeBSD Ports URL:https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://docs.freebsd.org/en/articles/contributing/#ports-contributing Ports Management Team URL: https://www.freebsd.org/portmgr/ Ports Tarball URL: http://ftp.freebsd.org/pub/FreeBSD/ports/ports/ Contact: Tobias C. Berner Contact: FreeBSD Ports Management Team The Ports Management Team is responsible for overseeing the overall direction of the Ports Tree, building packages, and personnel matters. Below is what happened in the last quarter. According to INDEX, there are currently 36,504 ports in the Ports Collection. There are currently ~3,379 open ports PRs. The last quarter saw 11,594 commits by 154 committers on the main branch and 832 commits by 78 committers on the 2024Q3 branch. Compared to last quarter, this means a slight increase in the number of commits on the main branch (from 10,525) and about half of the backports to the quarterly branch (compared to 1,771). The number of ports also increased (up from 32,471). The most active committers to main were: • 5133 sunpoet@FreeBSD.org • 1262 yuri@FreeBSD.org • 375 jbeich@FreeBSD.org • 357 vvd@FreeBSD.org • 331 bofh@FreeBSD.org • 192 uzsolt@FreeBSD.org • 185 eduardo@FreeBSD.org • 172 diizzy@FreeBSD.org • 148 mfechner@FreeBSD.org • 131 arrowd@FreeBSD.org A lot has happened in the ports tree in the last three quarter, an excerpt of the major software upgrades are: • Default version of PostgreSQL switched to 16 • chromium updated from 126.0.6478.126 to 129.0.6668.100 • firefox updated from 127.0.2 to 131.0-rc1 • firefox-esr updated from 115.9.1 to 128.3.0-rc1 • rust updated from 1.79.0 to 1.81.0 • sdl2 updated from 2.30.3 to 2.30.7 • wlroots updated from 0.17.4 to 0.18.1 • wine-devel updated from 9.4 to 9.16 • qt5 updated from 5.15.14 to 5.15.15 • qt6 updated from 6.7.2 to 6.7.3 • plasma6 updated from 6.1.1 to 6.1.2 During the last quarter, pkgmgr@ ran 24 exp-runs to test various ports upgrades, updates to default versions of ports, and base system changes. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Bugmeister Team Links: FreeBSD Bugzilla URL: https://wiki.freebsd.org/Bugzilla Contact: Bugmeister Charts and graphs Ed Maste from the FreeBSD Foundation has expressed an interest in seeing useful charts and graphs added to Bugzilla. The few that we have now are not very informative. Many of the interesting Bugzilla queries for them have been documented, but the information there is really dense. If you are interested in working on this task, contact Ed directly. Bugzilla version upgrade Recently, upstream Bugzilla has released 5.0.4.1, which is a minor bugfix release. Preliminary work suggests that the update will be unobtrusive. Work is continuing. PR statistics PRs continue to come in and get triaged. Over the longer term, we are nearly at steady-state. The number of PRs over the past quarter (and year) has fluctuated. Vladimir Druzenko pointed out that the number dropped by around 200 during 2023Q4. (We have not done the data analysis to find out why that was.) However, slowly, the number has come back to where it was a year ago. But we do seem to be closing incoming PRs more quickly these days. For reference: https://bugs.freebsd.org/bugzilla/page.cgi?id=dashboard.html&days=365 The overall number of PRs remains at slightly over 11,600. We do have a lot of technical debt. Bugmeister is also working towards restarting the Bugathons. Acknowledgements Bugmeister would like to thank a number of people who have assisted with bugbusting, including new triagers Alexander Vereeken, Alexander Ziaee, and Frederick Lee. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Samba Team Links: FreeBSD Samba Team Wiki URL: https://wiki.freebsd.org/Samba Samba Homepage URL: https://www.samba.org/ Contact: FreeBSD Samba Team Samba provides secure, stable and fast file and print services for all clients using the SMB/CIFS protocol. It is an important component to seamlessly integrate FreeBSD/Linux/Unix Servers and Desktops into Active Directory environments. It can function both as a domain controller or as a regular domain member. The new FreeBSD Samba Team was created to better coordinate maintenance efforts of the Samba ports and its dependencies, in particular: • databases/ldb22 • databases/ldb25 • databases/ldb28 • databases/tdb • devel/talloc • devel/tevent • net/samba416 • net/samba419 Notable changes in the last quarter include: • Creation of the FreeBSD Samba Team by Timur Bakeyev, Xavier Beaudouin, Yasuhiro Kimura, Mateusz Piotrowski, and Mikaël Urankar. • Added SAMBA_LDB_PORT to Mk/Uses/samba.mk (sponsored by Klara, Inc.) • Switching net/samba419 to use external dependencies by default instead of vendoring (sponsored by Klara, Inc.) • Updating net/samba419 to 4.19.8 Currently, the FreeBSD Samba team is coordinating efforts in the following areas: • Switching the default version of Samba from 4.16 to 4.19 (Bugzilla PR# 280769). • Current blockers are: • Broken fruit:posix_rename = yes (Bugzilla PR#281360) • Broken replication in Samba 4.19.8_1 (Bugzilla PR#281672) • Adding Samba 4.20 to the ports tree (Bugzilla PR#280533) • Adding Samba 4.21 to the ports tree (Bugzilla PR#281262) Testing and community contributions are welcome, please reach out on Bugzilla or via the team email. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. Audio Stack Improvements Contact: Christos Margiolis The FreeBSD audio stack is one of those fields that does not attract the same attention and development as others do, since it has been left largely unmaintained, and, although high in quality, there is still room for improvement — from lack of audio development frameworks, to missing userland utilities and kernel driver-related bugs. This project is meant to touch on all those areas, and as such, is more of a general improvement project, than an implementation of a specific feature. Important work since last report: • Several sound(4) fixes. • Wrote mixer(8) and sound(4) tests. • mixer(8): Implement hot-swapping • audio(8): Initial revision • sound: Implement dummy driver • Improved and added sound examples. • mididump(1): Initial revision • virtual_oss patches. • Gave a talk at the 09/2024 DevSummit in Dublin, Ireland. Future work includes: • More bug fixes and improvements. • Finalize and commit of audio(8) and mididump(1). • Implement a generic MIDI layer, similar to pcm/, and improve/modernize the MIDI codebase in general. • Implement a bluetooth device management utility. • More virtual_oss patches and improvements. • Attempt to implement an snd_hda(4) pin-patching mechanism. • Investigate SOF/DMIC support. You can also follow the development process in freebsd-multimedia@, where I post regular reports. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ A bhyve management GUI written in Freepascal/Lazarus Links: Bhyvemgr URL: https://github.com/alonsobsd/bhyvemgr/ Contact: José Alonso Cárdenas Márquez Bhyvemgr is a bhyve management GUI written in Freepascal/Lazarus on FreeBSD. It needs a bunch of tools mostly installed by the base system and some installed from ports/packages. The main goal is to be a desktop application focus on desktop user to easily and quickly setup and run virtual machines on FreeBSD hosts. It should be used for virtual machines testing purpose (not for production). For a tool for production virtual machines management, take a look at sysutils/ vm-bhyve, sysutils/bmd, or sysutils/cbsd. Bhyvemgr supports aarch64 on 15-CURRENT only, and amd64 from FreeBSD 13.x to 15-CURRENT. It can be compiled from sysutils/bhyvemgr as a port, or installed as packages with gtk2, qt5, or qt6 interface support. People interested in helping the project are welcome. Version at the end of 2024Q3: 1.1.0 TODO • Test on real aarch64 hardware • Add uart device support • Add missing global setting entries (bios, board, chassis, system) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Changes to dhclient to speed up the FreeBSD boot process Links: Speeding up the FreeBSD boot process URL: https://wiki.freebsd.org/SummerOfCode2024Projects/SpeedingUpTheFreeBSDBootProcess dhclient Pull Request URL: https://github.com/freebsd/freebsd-src/pull/1368 Contact: Isaac Cilia Attard As part of my Google Summer of Code 2024 project, involving speeding up the FreeBSD boot process, I have worked on decreasing the time it takes for ARP resolution within dhclient to happen. This involved reducing the default ARP resolution timeout from 2000 ms to 250 ms, and adding an option to disable it altogether. The latter is useful within cloud environments, where a node is certain to have an IP address allotted to it. As a consequence of this, connecting to a DHCP network is now faster, including the boot process during which this happens. The speedup experienced is about 2 seconds. This causes FreeBSD systems to boot significantly faster than before. Sponsor: Google LLC (GSoC 2024) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Capsicum and Bhyve Code Audit Contact: Ed Maste Contact: Pierre Pronchery < pierre@freebsdfoundation.org> With the support of the Alpha-Omega project, the FreeBSD Foundation undertook code audits of two important subsystems — the bhyve hypervisor, and the Capsicum sandboxing framework. In addition to uncovering vulnerabilities in these systems to correct, the audits look to identify classes of vulnerabilities and/or suboptimal coding practices that we can look to address across the project. The Foundation interviewed several firms, and selected Synacktiv to perform the audit. A number of issues with critical and high severity were identified, which have been fixed as documented in security advisories: • FreeBSD-SA-24:09.libnv • FreeBSD-SA-24:10.bhyve • FreeBSD-SA-24:11.ctl • FreeBSD-SA-24:12.bhyve • FreeBSD-SA-24:14.umtx • FreeBSD-SA-24:15.bhyve • FreeBSD-SA-24:16.libnv Fixes are in progress for a number of lower-severity issues. The code audit report will be shared in the near future, after issues above a severity threshold have been addressed. The FreeBSD Foundation will also publish a report including commentary on the impact of the Synacktiv code audit report, classes of vulnerabilities identified, and lessons learned. More information is available in the Alpha-Omega repository. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Endpoint-Independent NAT Contact: Tom Jones This project aims to add support for Endpoint-Independent Mappings for UDP to the pf and ipfw firewalls. End Point Independent NAT enables applications behind a NAT speaking to multiple remote hosts to receive the same mappings. This allows an application without any NAT traversal mechanisms to work around NAT issues to perform peer discovery. From the remote hosts perspective the NAT is transparent and it is as-if there is no NAT at all. This form of NAT has been given several names over the last few decades and might be known as 'full-cone' NAT. Patches to pf landed in early September based on work by Damjan Jovanovic and Naman Sood with updates to work on pf in main. The patches add a new 'endpoint-independent' suffix to UDP pf nat rules. ipfw support for endpoint-independent is going to be made available via libalias, allowing any system which uses libalias for address translation to benefit from the change. There is an in-progress review D46689 to add support to libalias. The in-progress change and the committed pf change could both benefit from testing in more and diverse environments. Sponsor: The FreeBSD Foundation Sponsor: Tailscale ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Kyua Jail Support Contact: Igor Ostapenko The FreeBSD test suite is executed by the kyua(1) utility. Kyua supports parallel execution of tests with kyua -v parallelism= test, however many network tests leverage jail(8) features like VNET(9) and have conflicts with jail naming and network configuration. As a result they are marked with the is_exclusive=true metadata property to prevent them from running at the same time and interfering with each other. It creates a dilemma when a project aims to increase test coverage, but the accumulation of exclusive tests proportionally increases the time required to run them. This, in turn, affects the development process from multiple angles. Kyua has recently got a change in 15-CURRENT to support a new concept called "execution environment". By default, tests run in the so-called "host" execution environment, where they are executed as before. A test can opt-in to use a brand new execution environment, the "jail" one. In this case, kyua creates a jail before running the test, and then executes the test within the jail. That opens up the opportunity to run more tests in parallel due to the extra isolation provided by the jail concept itself, and specifically by the VNET. It depends on hardware and configuration, but there are reports that having the same environment netpfil/pf tests can be run around 4 times faster — a few minutes instead of half an hour. The following Makefile change is a quick demo of how netpfil/pf tests were switched to run in parallel with jail execution environment: -# Tests reuse jail names and so cannot run in parallel. -TEST_METADATA+= is_exclusive=true +# Allow tests to run in parallel in their own jails +TEST_METADATA+= execenv="jail" +TEST_METADATA+= execenv_jail_params="vnet allow.raw_sockets" More details: • The key commit with detailed description: 257e70f1d5ee61037c8c59b116538d3b6b1427a2 • The man pages covering the "execenv" feature: kyuafile(5), kyua.conf(5) This change also brings new sysctl read-only variables, which expose more details about current jail, and may be generally useful: • security.jail.children.max: Maximum number of child jails • security.jail.children.cur: Current number of child jails A hint: the sysctl -n security.jail.children.cur run from prison0 provides the number of all jails in the system. Further improvements to Kyua, such as requirements definition and automatic resolution, are currently in the design phase. Potentially new metadata properties like required_klds and required_pkgs provide a clue to these topics. Please contact Igor to discuss ideas and use cases that can help shape these upcoming Kyua enhancements. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Linux Source Compatibility Wiki page Links: Linux Source Compatibility URL: https://wiki.freebsd.org/LinuxSourceCompatibility Contact: Edward Tomasz Napierala There is now a wiki page to track source compatibility differences between FreeBSD and Linux — and it needs your input! FreeBSD and Linux are already largely compatible at the source code level due to both being Unix systems and following the same standards. There are however certain system calls specific to Linux; there are also differences in header files, constants and so on. Implementing them in FreeBSD would make porting software easier. Not all of the items there are fixable. Some differences cannot be eliminated due to naming clashes, disagreements on how the system is supposed to work, or because it would make autoconf pick up a less functional compatibility API instead of the native one. In such cases we should document it and advise what API to use instead. The wiki page aims to provide an overview and help track progress. That is where your help is needed. I need people who actually port software to FreeBSD to add missing APIs, based on their experiences. This also includes non-syscall items, like missing headers and unsupported constants. Preferably also mention the name of the software that could use them. • Add missing items • Add prospective API consumers Sponsor: Innovate UK ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Userland Changes affecting the base system and programs in it. Service jails — Automatic jailing of rc.d services Links: rc-article part for Service Jails URL: https://docs.freebsd.org/en/articles/rc-scripting/#rcng-service-jails service jail patches for ports in our bugtracker URL: https://bugs.freebsd.org/bugzilla/buglist.cgi?quicksearch=service+jail+aware Contact: Alexander Leidinger Service jails extend the rc(8) system to allow automatic jailing of rc.d services. A service jail inherits the filesystem of the parent host or jail, but uses all other limits of the jail (process visibility, restricted network access, filesystem mounting permissions, sysvipc, …​) by default. Additional configuration allows inheritance of the IPs of the parent, sysvipc, memory page locking, and use of the bhyve virtual machine monitor (vmm(4)). Since the last report several ports have been modified to come with a service jail config. Out of about 1460 start scripts in the ports collection, about 80 start scripts are changed. Prominent examples out of those are postgresql, DNS servers, FTP servers, PHP, dovecot, postfix, rspamd, amavisd-new and clamav. Some more changes are waiting for a treatment by the corresponding port maintainers. Any help in changing more start scripts (most of the time just one line to add) is welcome. If you want to help, you can check the bugtracker link above for changes which are already under review. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Userspace UFS Driver (fuse-ufs) Links fuse-ufs GitHub URL: https://github.com/realchonk/fuse-ufs Contact: Benjamin Stürz During this year’s Summer of Code, I wrote a userspace UFS driver using FUSE and Rust. The project was meant to ease the process of mounting FreeBSD UFS filesystems on other operating systems. Up to this point, only read-only filesystem access has been implemented. But as a bonus, fuse-ufs has the ability to mount filesystems with endianness different from the host’s endianness. I am currently working on splitting the project into a binary and library part, to make it easier to integrate it into other operating systems. As part of this refactoring, an additional FUSE2 backend will be implemented, to be able to run it on OpenBSD. Currently there is testing infrastructure for Linux and FreeBSD with OpenBSD coming in the future. Although there is no CI for MacOS, a friend of mine tested it with MacFUSE and it works. Once the big refactor is done, I will start concentrating on implementing write support. Thanks to being bribed by Robert Clausecker, I will also add soft-updates and mounting Sun’s UFS in the future. The driver can be installed using cargo install fuse-ufs, or (if on Arch Linux) using your favorite AUR helper. Thanks to Robert Clausecker a port for FreeBSD exists in sysutils/fusefs-ufs. A big thanks to Alan Somers and Kirk McKusick for mentoring me and thanks to Robert Clausecker for the FreeBSD port and suggesting this GSoC project to me in the first place. Another thanks to Davids Paskevics for writing a fuzzer for me. Sponsor: Google Summer of Code 2024 ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Kernel Updates to kernel subsystems/features, driver support, filesystems, and more. FreeBSD V4L2 & kernel USB Video Class driver Links: Public development repository URL: https://github.com/AlvinChen1028/freebsd-src/tree/feature-uvc Upstreaming preparation repository URL: https://github.com/lwhsu/freebsd-src/pull/2 Contact: Alvin Chen Contact: Li-Wen Hsu This work is to create FreeBSD UVC (USB Video Class) kernel driver and follow v4l2 APIs, so that most of the Linux camera applications can be easily ported to FreeBSD. The code is still cleaning up and will be submitted to official review after completing. Current Status: 1. The key functions of the UVC driver are enabled. 2. The key v4l2 IOCTLs are implemented. 3. Support most of USB cameras (up to 4K resolution): Jabra, Logitech, etc. 4. Some applications validated: VLC, Cheese, pwcview. Future Work: 1. A couple of v4l2 IOCTLs need be implemented: make all cases in v4l2-compliance test suite be passed. 2. Some UVC APIs need be implemented: uvc control mapping callbacks, etc. 3. UVC lock issue related to USB. 4. PCI based AI camera supporting. 5. Code refactoring if needed. Sponsor: Dell Technologies for the development Sponsor: The FreeBSD Foundation for assistance of upstreaming ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ mac_do(4), setcred(2), mdo(1) Contact: Olivier Certner Contact: Baptiste Daroussin This project aims at allowing controlled process credentials transitions without using setuid executables but instead leveraging our MAC framework. Traditional programs for credentials change have to execute preliminary operations as root (if not as the effective UID, at a minimum as the saved UID). Some of these programs (e.g., sudo(8)) have lots of lines of codes and comprise features (e.g., loadable security modules) that can be dangerous from a security standpoint. Thus, they have a non-negligible attack surface and are difficult to prove correct. Additionally, in most scenarios, the extra features they bring are not necessary. More generally, the threat model for the mac_do(4) kernel module part is that of compromised userland programs, be they credentials changers or credentials providers ones. This stance implies that calls to the kernel’s credentials-changing API must be monitored by the kernel without upcalls to userland. In practice, mac_do(4) must be configured beforehand by the administrator to indicate which transitions of credentials are valid (through a sysctl(8) knob, security.mac.do.rules). Currently, the companion userland program, mdo(1), is the only one that can be authorized to proceed by mac_do(4) (for now, based on the executable path). This tiny program simply establishes the new credentials via calls to setuid(2) , and optionally initgroups(3) (calling setgroups(2)) and setgid(2) (if -i was not passed). The resulting set of groups is either that of the target UID based on the password database, or that before the change in UID (when using -i). The second alternative can be a security hazard in some cases (as the effective GID is not changed either), whereas the first contradicts the threat model above. The current mac_do(4) rules specification indeed only allows to express simple UID transitions towards explicit UIDs from other explicit UIDs or GIDs, without taking into account groups. Consequently, the kernel module currently cannot check the content of setgroups(2) and setgid(2) system calls' parameters, relying completely on mdo(1) passing the right information. A new version of mac_do(4) has been in the works for approximately a month. Besides fixing concurrency, per-jail settings and MAC policies composition problems, it features a revamp of the rules specification in order to make it possible to finely control which groups are allowed in the resulting credentials. Notably, primary and secondary groups can now be specified independently, and for the latter, GIDs can be tagged as allowed, mandatory or forbidden. A special alias, ., can be used to indicate the current process' UIDs or GIDs depending on the context. These new features imply that the mac_do(4) module is able to apply credentials change at once, since the allowed final credentials depend on the initial ones through the configured rules. The traditional userland interface (e.g., setuid (2), setuid(2), setgroups(2), etc.) is at odds with this requirement as it necessitates multiple calls to reach the desired final credentials, making the process pass by several successive states that themselves may not be allowed by mac_do(4)'s rules. We overcome this limitation by introducing a new system call, setcred(2), which allows to request arbitrary transitions of credentials at once. Beside its usefulness in conjunction with mac_do(4), it has the benefit of simplifying coding of credentials change in userland. Since it is also extensible, it may have the potential to be adopted later by other systems. Pre-requisite changes are currently under review (see in particular revisions D46886 to D46889 and D46896 to D46923). The bulk of changes in mac_do(4)/mdo(1) proper will soon be pushed under review as well. An older version of the full series can be seen on GitHub. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Scheduling Priorities: 256-queue Runqueues Sub-Project Contact: Olivier Certner The goal of the 256-queue runqueues sub-project is to fix FreeBSD’s POSIX compliance in that different priority levels in the SCHED_FIFO or SCHED_RR scheduling classes must lead to immediate preemption by threads having higher priority. It is part of the bigger scheduling priorities revamp project aiming at rationalizing FreeBSD scheduling interfaces, including having consistent rtprio(2) and POSIX interface behaviors (where it makes sense), enhancing POSIX compliance, removing duplicate code and fixing existing bugs, and enhancing the non-standard parts both for better control and security. Expected benefits are increased usage of FreeBSD as a soft real-time platform, e.g., for video and audio processing in casual desktop uses to professional settings. Readers interested in this topic are invited to consult AsiaBSDCon 2024’s paper and EuroBSDCon 2024’s slides for a wider view, and to contact me for questions, feedbacks or discussions. Currently, priority levels specified either through the prio field of struct rtprio (rtprio(2) interface) or the sched_priority one of struct sched_param, for real-time scheduling classes (RTP_PRIO_FIFO and RTP_PRIO_REALTIME for the former, SCHED_FIFO and SCHED_RR for the latter) as well as idle-time ones (RTP_PRIO_IDLE), are conflated as follows: Each priority level that has the same quotient when divided by 4 is internally treated the same. In particular, threads being in the same such equivalence class but having higher priority will not preempt other threads in the same class, violating POSIX expectations for SCHED_FIFO and SCHED_RR. To remedy this situation, we have chosen an impacting internal change on the number of queues per runqueue, and defer to the above-mentioned EuroBSDCon 2024’s slides for more details. The switch to 256-queue runqueues having non-trivial impacts on the ULE scheduler, we have been analyzing it and tuning the scheduler to preserve its previous behavior with respect to anti-starvation and the effect of nice values. With the goal to perform further testing, we have revived Jeff Roberson’s initial ULE’s test tool, called late (currently available on GitHub ). All the modifications made as part of this sub-project are currently under review, starting with Phabricator’s review D45387 (click on the "Stack" tab to see the full series of reviews). In the course of this project, we have noticed that the effect of nice values is especially weak, and consequently have produced experimental patches to make their effect stronger. However, it is not clear at this point whether we can increase their effect satisfactorily enough in the current ULE setting. We have also started another scheduler project about adapting ULE to hybrid architectures, which might also trigger more drastic scheduler changes. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Wireless Update Links: Categorised Wireless Problem Reports URL: https://bugs.freebsd.org/bugzilla/showdependencytree.cgi?id=277512&hide_resolved=0 Contact: Bjoern A. Zeeb Contact: The FreeBSD wireless mailing list The ongoing wireless efforts are trying to bring more support for recent chipsets as well as newer standards. With iwlwifi(4) and rtw88(4) being supported we received patches and initial reports for rtw89 and ath10k working for some people. Additionally ath11k, ath12k and various chipsets supported by mt76 are waiting for someone to find the time to finish compat code, test and debug. Work is ongoing to update drivers to Linux v6.11 using the now bootstrapped vendor branches, which should help maintenance a lot in the future. One particular focus for this update is also to find ways to minimize incompatibilities between wireless compat code versions in order to support multiple Linux versions as needed. After the native kern_malloc changes got committed, LinuxKPI is seeing ongoing work for memory allocation to play better by the rules set out in Linux which should help with DMA problems seen. There is further work pending to add missing bus_dmamap_sync() calls. There is work to support rtw88(4) SDIO devices (being tested on an r2s-plus) and ongoing work to stabilize updated USB support which should start landing once the driver updates have finished. Lastly there are more updates in the queue to finish 11n support for LinuxKPI 802.11 compat code as well as improving native net80211 code. If you have questions or feedback please use the freebsd-wireless mailing list. That way everyone will see, be able to join in, and the answers will be publicly archived. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ VirtIO Sockets and AF_VSOCK support Links: Source code URL: https://github.com/daniloegea/freebsd-src/tree/virtio_vsocks Contact: Danilo Egea Gondolfo The VirtIO Socket device is used to enable communication between guests and host without networking. The AF_VSOCK protocol family enables it to be used through the sockets API. For the past many months I have been working on a guest driver for the VirtIO Socket device and an implementation of the AF_VSOCK protocol family. Originally, I wanted to get the lxd-agent daemon working on FreeBSD but the communication with the LXD host daemon is done through VSOCKs. LXD is a nice container and virtual machine manager based on Linux/KVM and my end goal is to make FreeBSD a LXD first-class citizen. At the moment I have it working well enough to enable the lxd-agent to work. I adapted the golang.org/x/sys library and the lxd-agent to support AF_VSOCK on FreeBSD. Features such as command execution, interactive consoles and file transfer are working. On Linux, AF_VSOCK can be used with VirtIO, HyperV and VMware sockets as transports. I am trying to design my implementation so it will also be possible to use it with different transports in the future. After getting the current work in a good shape, ideas for future work include integration of AF_VSOCK and HyperV Sockets (which is already supported on FreeBSD through AF_HYPERV), VIRTIO_VSOCK_F_SEQPACKET, VirtIO Socket device for bhyve and the host side of the driver. I will continue to slowly work on this on my limited free time and hopefully have something more concrete for the next time. There is still a lot of work to be done until it become ready for code review. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Architectures Updating platform-specific features and bringing in support for new hardware platforms. Pinephone Pro Support Links: Repository on Codeberg URL: https://codeberg.org/Honeyguide/freebsd-pinephonepro Contact: Toby Kurien A new project trying to make FreeBSD usable on the Pinephone Pro has been started during August. The current FreeBSD RELEASE images already boot on a Pinephone Pro, but no screen output or other devices are supported. The aim is to step by step support additional components so that the device one day might be usable as a highly mobile FreeBSD device. Over the last few weeks, the groundwork has been implemented like getting used to the device, cross-compiling and booting a 15.0-CURRENT custom kernel as well as toggling the LEDs (red/green/blue in the front). Also, the LCD backlight can be turned on already and the USB-C hub is enabled even though it is not yet functional due to missing power management support. The next step is to write a driver for the RK818 power management chip. Without it, most of the hardware will not power on like the USB-C port above. This will be done by trying to modify the existing RK808 driver. RK818 support should then make it possible to access a lot more of the devices, e.g. allowing to enable the screen, USB peripherals or WiFi. Additional feedback and testers are welcome. Sponsor: Honeyguide Group ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ SIMD enhancements for aarch64 Links: EuroBSDCon 2024 presentation URL: https://www.youtube.com/live/OzX38cWdivc?si=VsMrEmT_IdKpjv7W&t=22070 Slides from presentation (PDF) URL: http://fuz.su/~fuz/talks/eurobsdcon-str-talk.pdf Google Summer of Code (GSoC) project description URL: https://summerofcode.withgoogle.com/programs/2024/projects/TKRS35FA simd(7) URL: https://man.freebsd.org/cgi/man.cgi?query=simd&sektion=7&manpath=FreeBSD+15.0-CURRENT Contact: Getz Mikalsen The porting effort of the SIMD enhanced libc string functions from amd64 to aarch64 has been successfully completed. There are now optimized implementations for 16 libc string functions in addition to those with implementations already available as part of the ARM optimized subroutines library. There is also a presentation regarding the general method for these methods from EuroBSDCon 2024 available on YouTube with a short description in the end of how the porting has been done with regards to the aarch64 architecture. These enhancements significantly improve performance of string functions for all FreeBSD systems on the aarch64 platform. The code is currently undergoing acceptance testing in the form of an exp-run building all the ports, once without and once with the patch set applied to see if it has caused any new failures. Sponsor: Google LLC (GSoC 2024) ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Cloud Updating cloud-specific features and bringing in support for new cloud platforms. FreeBSD on Microsoft HyperV and Azure Links: Microsoft Azure article on FreeBSD wiki URL: https://wiki.freebsd.org/MicrosoftAzure Microsoft HyperV article on FreeBSD wiki URL: https://wiki.freebsd.org/HyperV Contact: Microsoft FreeBSD Integration Services Team Contact: freebsd-cloud Mailing List Contact: The FreeBSD Azure Release Engineering Team Contact: Wei Hu Contact: Souradeep Chakrabarti Contact: Colin Su Contact: Li-Wen Hsu In this quarter, we have published the 13.4-RELEASE on Azure Marketplace. Souradeep Chakrabarti from Microsoft has added a feature to use hypercalls for TLB shootdown on Hyper-V and Azure. Micro-benchmark shows 30-40% performance improvement on TLB shootdown. This has been presented at the DevSummit 202409 Wei Hu root-caused an issue on missing CDROM device when booting FreeBSD on the latest Azure v6 VM SKU. V6 type only offers NVMe disks to guest OS. He also continues bug fixing for FreeBSD MANA NIC device. Work in progress tasks: • Automating the image publishing process and merging to src/release/. (Li-Wen Hsu) • Colin Su is testing adding FreeBSD support in Azure Pipelines □ https://github.com/microsoft/azure-pipelines-agent/pull/3266 □ Building and publishing snapshot builds to Azure community gallery. Open tasks: • Update FreeBSD-related doc at Microsoft Learn • Update sysutils/azure-agent to the latest version • Upstream local modifications of Azure agent • Port Linux Virtual Machine Extensions for Azure Sponsor: Microsoft for people in Microsoft, and for resources for the rest Sponsor: The FreeBSD Foundation for everything else ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD on EC2 Contact: Colin Percival FreeBSD is available on both amd64 (Intel and AMD) and arm64 (Graviton) EC2 instances. In the past quarter, a new "small" flavour of EC2 AMI has been added, without debug symbols, tests, 32-bit compatibility libraries, or the LLVM debugger, and without the Amazon SSM Agent pre-installed or the AWS CLI installed by default at first boot. Build performance tests are now being performed weekly using the snapshot AMIs built by the release engineering team. These tests revealed several performance regressions which have now been fixed; in particular a bug fix to the use of the EFI RNG in the boot loader produced a dramatic speedup on Graviton instances. Sponsor: Amazon Sponsor: https://www.patreon.com/cperciva ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ OpenStack on FreeBSD Links: OpenStack URL: https://www.openstack.org/ OpenStack on FreeBSD URL: https://github.com/openstack-on-freebsd Contact: Chih-Hsin Chang Contact: Li-Wen Hsu The OpenStack on FreeBSD project aims to bring OpenStack cloud infrastructure to the FreeBSD operating system, using FreeBSD’s special features while keeping it compatible with OpenStack. In the third quarter of 2024, we continued working on several important tasks. Our work on porting OpenStack Ironic is still ongoing, with tests now running on arm64 servers. In this setup, the service node is amd64, and the provisioning node is arm64. This helps us explore more options for running mixed environments in OpenStack on FreeBSD. In August, we gave a presentation at COSCUP 2024 to share the project’s progress and our experiences. This helped us get more attention and interest from people in the community. We also updated some of the OpenStack components, like Keystone, Glance, and Placement, from FreeBSD 14.0-STABLE to FreeBSD 15.0-CURRENT. This update helps us keep up with the latest changes in FreeBSD, making the project run better. Another notable item was testing the bhyve serial console over TCP patch and using it in the OpenStack workflow. This brings us closer to stopping the use of the custom socat-manager solution and moving to a built-in serial console solution. Although we are still planning to turn the OpenStack manual installation process into FreeBSD ports, there has not been much progress yet. We hope to work more on this in the next few months. Existing work can be found in the openstack repository. Sponsor: The FreeBSD Foundation ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Documentation Noteworthy changes in the documentation tree, manual pages, or new external books/documents. Documentation Engineering Team Link: FreeBSD Documentation Project URL: https://www.freebsd.org/docproj/ Link: FreeBSD Documentation Project Primer for New Contributors URL: https://docs.freebsd.org/en/books/fdp-primer/ Link: Documentation Engineering Team URL: https://www.freebsd.org/administration/#t-doceng Contact: FreeBSD Doceng Team The doceng@ team is a body to handle some of the meta-project issues associated with the FreeBSD Documentation Project; for more information, see FreeBSD Doceng Team Charter. Benedict Reuschling steps down from doceng@. doceng@ would like to thank bcr@ for his service. Document changes • Handbook: Document the automatic creation of XDG directories starting with FreeBSD 14.1. The VNET config example script has been fixed. • Architecture Handbook: remove K&R prototypes in MAC chapter. • Website: Some improvements regarding the top banner and layout, visually rearrange buttons and more. • Documentation repository: fix of all malformed tables warnings. Removal of deprecated attributes to conform to new gohugo releases. FreeBSD Translations on Weblate Link: Translate FreeBSD on Weblate URL: https://wiki.freebsd.org/Doc/Translation/Weblate Link: FreeBSD Weblate Instance URL: https://translate-dev.freebsd.org/ Q3 2024 Status • 17 team languages • 214 registered users 1 new translator joined Weblate: • matthew (id) Languages • Chinese (Simplified) (zh-cn) (progress: 7%) • Chinese (Traditional) (zh-tw) (progress: 3%) • Dutch (nl) (progress: 1%) • French (fr) (progress: 1%) • German (de) (progress: 1%) • Greek (el) (progress: 1%) • Indonesian (id) (progress: 1%) • Italian (it) (progress: 5%) • Korean (ko) (progress: 32%) • Norwegian (nb-no) (progress: 1%) • Persian (fa-ir) (progress: 3%) • Polish (progress: 2%) • Portuguese (progress: 0%) • Portuguese (pt-br) (progress: 24%) • Spanish (es) (progress: 36%) • Turkish (tr) (progress: 2%) We want to thank everyone that contributed, translating or reviewing documents. And please, help promote this effort on your local user group, we always need more volunteers. Packages maintained by DocEng During this quarter the following work was done in packages maintained by doceng@: • textproc/docproj: Bump gohugo dependency to 0.133.1 • www/gohugo: update to 0.134.3 Open issues There are 2 Open PRs in bugzilla assigned to doceng@: • 276923 www/gohugo link error under poudriere • 267274 Please remove the zh-CN Handbook of the current FreeBSD website During this quarter doceng@ closed 3 PRs: • 266107 FreeBSD Handbook and other books: PDF: broken links – crossref • 279815 status reports: ERR_TOO_MANY_REDIRECTS • 281396 handbook: ERROR: : line 149: dropping cells from incomplete row detected ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ FreeBSD Wiki Links: FreeBSD wiki front page URL: https://wiki.freebsd.org/FrontPage Contact: Mark Linimon Contact: Wiki admin < wiki-admin@freebsd.org> The FreeBSD wiki is a repository of information that does not fit well in the official project documentation because it is too specific, too disparate, or too transient. Current projects: Mark Linimon has started attacking various stale pages. The focus has been on pages that we show to new, interested, users. (Recent Foundation newsletters refer to some of these pages directly.) Unfortunately, many of these pages have become stale, to the point where they were actually not good recommendations. The pages that have received the most work are: • IdeasPage (referenced in Foundation documentation) • JuniorJobs (referenced in Foundation documentation) • SummerOfCodeIdeas • various pages under CategoryProject • various pages under CategoryTodo • MentorMatch In addition to removing obviously stale entries, all entries have now been datestamped with the time that they were added to the various pages. wiki-admin@ would like to request that we carry forward this tradition into the future. As well, wiki-admin@ has been sending email to ask committers/contributors to the above pages "should we keep this entry?" This task will continue until the pages have been cleaned up. (NB: the fact that content in the wiki was stale was mentioned by numerous respondents in the FreeBSD Foundation 2024 Community Survey Report.) Previous plans that have stalled Plans are still underway to familiarize our audience on Discord with the wiki (there are too many "silos" in our FreeBSD community). The team has simply not had enough cycles to do this. However, contact Setesh on the FreeBSD Discord for more information. Preliminary work was being done on updating the wiki software itself. Earlier, we were looking at switching implementations because MoinMoin development seemed to have stalled, leaving us with an unwanted hanging python2 dependency. However, MoinMoin now claims that they are nearing a 2.0 release. We have not yet tried an install of their latest beta version to test compatibility. Testers welcome. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ The FreeBSD Russian Documentation Project Links: FAQ URL: https://docs.freebsd.org/ru/books/faq/ Handbook URL: https://docs.freebsd.org/ru/books/handbook/ Web URL: https://www.freebsd.org/ru/ Contact: Andrei Zakhvatov The FreeBSD Russian Documentation Project’s current goal is to provide up-to-date Russian translations of the most important parts of FreeBSD documentation (FAQ, Handbook, Web). It is important to support Russian speakers with high-quality official technical materials and increase acceptance of the operating system around the globe. We hope that this activity will receive some support from the Russian-speaking FreeBSD community and lead to more translated materials. There is some progress in document translation: • FAQ: PR #277008 and PR #282062 • Handbook: Chapter 1. Introduction: PR #276334 • Handbook: Chapter 2. Installing FreeBSD: PR #280610 • Handbook: Chapter 3. FreeBSD Basics: PR #282059 Check the official translation guide if you are willing to help. We always appreciate your help with translation of the following materials: • Handbook chapters and sections • Articles • Web pages ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. GCC on FreeBSD Links: GCC Project URL: https://gcc.gnu.org/ GCC 11 release series URL: https://gcc.gnu.org/gcc-11/ GCC 12 release series URL: https://gcc.gnu.org/gcc-12/ GCC 13 release series URL: https://gcc.gnu.org/gcc-13/ GCC 14 release series URL: https://gcc.gnu.org/gcc-14/ Contact: Lorenzo Salvadore This quarter the main news is about the new GCC releases: • lang/gcc11 has been updated to 11.5.0, which is the last GCC 11 planned released; • lang/gcc12 has been updated to 12.4.0; • lang/gcc13 has been updated to 13.3.0; • lang/gcc14 has been updated to 14.2.0. The exp-run to update GCC default version from 13 to 14 has started. As usual, thanks to everyone involved. If you maintain any of the affected ports or want to give a hand preparing and testing some patches, please consider trying adding -fpermissive to CFLAGS in affected ports: GCC 14 has transformed some warnings into errors, which is the cause of many of the failed builds. The -fpermissive flag switches those errors back to warnings. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Freepascal and Lazarus on FreeBSD aarch64 Links: Freepascal Project URL: https://www.freepascal.org/ Lazarus IDE URL: https://www.lazarus-ide.org/ Contact: José Alonso Cárdenas Márquez Free Pascal is a mature, versatile, open source Pascal compiler. It can target many operating systems and processor architectures: Intel x86 (16 and 32 bit), AMD64/x86-64, PowerPC, PowerPC64, SPARC, SPARC64, ARM, AArch64, MIPS, Motorola 68k, AVR, and the JVM. Additionally, support for RISC-V (32/64), Xtensa, and Z80 architectures, and for the LLVM compiler infrastructure is available in the development version. Also, the Free Pascal team maintains a transpiler for pascal to Javascript called pas2js. Lazarus is a Delphi compatible cross-platform IDE for Rapid Application Development. It has a variety of components ready for use and a graphical form designer to easily create complex graphical user interfaces. Three years ago, Mikaël Urankar began porting the Free Pascal compiler to FreeBSD aarch64 and it was merged into Free Pascal source code (main branch). Some months ago, I added lang/fpc-devel (3.3.1) and editors /lazarus-devel (3.99) to the ports tree only for i386 and amd64 because aarch64 was not ready yet. The binaries generated on aarch64 did not run because of ELF issues. Finally, some days ago the issues were resolved and support for FreeBSD aarch64 was completed. lang/fpc-devel and editors/lazarus-devel were updated to 3.3.1.20240913 and 3.99.20240913 with support for aarch64 respectively. It brings to FreeBSD users a new language and platform working on FreeBSD aarch64 for console, graphic, or any kind of apps development. TODO • Update fpc/lazarus based ports (such as sysutils/bhyvemgr and archivers/ peazip) to support FreeBSD/aarch64 • Push FreeBSD RISC-V support ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Third Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. Containers and FreeBSD: Pot, Potluck and Potman Links: Pot organization on GitHub URL: https://github.com/bsdpot Contact: Luca Pizzamiglio (Pot) Contact: Bretton Vine (Potluck) Contact: Michael Gmelin (Potman) Pot is a jail management tool that also supports orchestration through Nomad. Potluck aims to be to FreeBSD and Pot (and potentially one day also Podman) what Dockerhub is to Linux and Docker: a repository of container descriptions and complete container images for usage with Pot and in many cases Nomad. During this quarter, there were two bugfixes to Pot that will be released soon. Potluck images saw some updates again. All images have been rebuilt again to include the latest fixes and quarterly packages. Additionally, some images like Loki or Vault have also received additional updates and bugfixes. Also, we have done some research regarding potential future support of OCI, Buildah and Podman images in Potluck. Two blog posts, one describing a basic Buildah and Podman setup and one describing how to orchestrate Podman containers with Nomad and Consul have been published. As always, feedback and patches are welcome. Sponsors: Nikulipe UAB, Honeyguide Group From nobody Thu Nov 7 22:19:35 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XkxLX1tz5z5ckJt for ; Thu, 07 Nov 2024 22:19:00 +0000 (UTC) (envelope-from pj@smo.de) Received: from mail.adebahr.de (mail.adebahr.de [185.66.179.123]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "mail.adebahr.de", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XkxLW2Nmmz4Csb for ; Thu, 7 Nov 2024 22:18:59 +0000 (UTC) (envelope-from pj@smo.de) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=smo.de header.s=mail header.b=k5k5FDMS; spf=pass (mx1.freebsd.org: domain of pj@smo.de designates 185.66.179.123 as permitted sender) smtp.mailfrom=pj@smo.de; dmarc=pass (policy=reject) header.from=smo.de Received: from [192.168.153.212] (pd9515c67.dip0.t-ipconnect.de [217.81.92.103]) by mail.adebahr.de (Postfix) with ESMTPSA id 58328600DB for ; Thu, 7 Nov 2024 23:18:50 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smo.de; s=mail; t=1731017930; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=d1HbhnWGsNFXRLaDcMQiMy4D8HxOkQLcx8iEb+W7eiE=; b=k5k5FDMS5X/7ZVjjHiQS2fdFCxyORnZhrDHcClKlEA96lA0LhGWR1zcz6xlHyfIeihF0nk /UTuZ+D46iTum+IBLe2pS5EeZqgdrL7qddsRjFmpSAIqwmZXfCO2195fJ3mjrqR0BBojD6 XhOUpiU7pLdunFpTIRqBS/yXM73FtAc+cY4PiA0kny5dE/YBPTlB7/4t5GgTGgGSP2zt1g ljJraoGn0Lxlgl0qgVPHP/koaXeYvppzYDlLXC5DfEzOv8fs1pqTtCta7lmwRvS/ncfFkq Fti92gmv3YRQ5gd/X+x1Tzt5613O6DP9GiTH48t9boGKm3qwn1dFv+TU/O9bmw== Message-ID: <087cf5ee-186a-41ee-93ed-154588964d41@smo.de> Date: Thu, 7 Nov 2024 23:19:35 +0100 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Content-Language: en-US To: "freebsd-stable@freebsd.org" From: Philipp Ost Subject: Firefox and Thunderbird freeze system causing a reboot Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Result: default: False [-3.99 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.998]; DMARC_POLICY_ALLOW(-0.50)[smo.de,reject]; R_DKIM_ALLOW(-0.20)[smo.de:s=mail]; R_SPF_ALLOW(-0.20)[+ip4:185.66.179.96/27]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_COUNT_ONE(0.00)[1]; ASN(0.00)[asn:212341, ipnet:185.66.176.0/22, country:DE]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; MLMMJ_DEST(0.00)[freebsd-stable@FreeBSD.org]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; TO_DN_EQ_ADDR_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[smo.de:+] X-Rspamd-Queue-Id: 4XkxLW2Nmmz4Csb X-Spamd-Bar: --- Hi everyone, I have a curious situation with my system since updating to 14.2-STABLE on Tuesday, 5.11.'24: both Firefox and Thunderbird cause the system to freeze which then triggers and automatic reboot. This doesn't happen immediately, though. It takes at most 2:15 minutes until this freeze and reboot cycle happens. No user-interaction is taking place during that time. The machine is running FreeBSD 14.2-STABLE stable/14-n269500-cdffbea57c0d amd64. Firefox is at version firefox-132.0.1_2,2 and Thunderbird at thunderbird-128.4.1_1. Other gtk3-based programs do not show this behaviour, i.e., Inkscape, Darktable, GIMP, EOG, Filezilla, Gnumeric. I (re-)built both Firefox and Thunderbird with debugging symbols. Console output of both Firefox and Thunderbird (when being started from an xterm) can be found here: philippost.de/firefox-debug-console-output philippost.de/thunderbird-debug-console-output In addition, I tried running them under truss(1), but from skimming through both logs nothing immediately stood out at what could cause this. Also, there's nothing to be found in the logs at all. Did anyone else observed this? How do I go about debugging this? I am at a loss at how to proceed and appreaciate any help in trying to figure this out. Best Philipp From nobody Thu Nov 7 22:57:45 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XkyCP1CXjz5cnDS for ; Thu, 07 Nov 2024 22:57:53 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from mail.nomadlogic.org (mail.nomadlogic.org [66.165.241.226]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4XkyCN1tTrz4JTh for ; Thu, 7 Nov 2024 22:57:52 +0000 (UTC) (envelope-from pete@nomadlogic.org) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=nomadlogic.org header.s=04242021 header.b=zSwojg+B; spf=pass (mx1.freebsd.org: domain of pete@nomadlogic.org designates 66.165.241.226 as permitted sender) smtp.mailfrom=pete@nomadlogic.org; dmarc=pass (policy=quarantine) header.from=nomadlogic.org DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nomadlogic.org; s=04242021; t=1731020230; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=fF5s62W5eZEpBA6LwLTGrK6W20qdlH8dsZ/7Jd0GsxA=; b=zSwojg+BBh2Yt/BzVvzVBkkaqczZJtSKaSTRyNKa8IWQ6p8FLR6HZsYOh5AvDQJuvSen7m wpuchAZW2+cCTerh38GT/MetCNKJeLikQUMu7y4q/PNidfzkoH5xL0x4hqc8BeFbMJWRLu 9shzvvgvSFm/RYQS6nlsQUusyGnYzzk= Received: from [192.168.1.160] ( [47.154.20.141]) by mail.nomadlogic.org (OpenSMTPD) with ESMTPSA id 1d675feb (TLSv1.3:TLS_AES_256_GCM_SHA384:256:NO) for ; Thu, 7 Nov 2024 22:57:09 +0000 (UTC) Message-ID: <58157db8-7af9-41cd-9fa1-5f9677878f89@nomadlogic.org> Date: Thu, 7 Nov 2024 14:57:45 -0800 List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: Firefox and Thunderbird freeze system causing a reboot To: stable@freebsd.org References: <087cf5ee-186a-41ee-93ed-154588964d41@smo.de> Content-Language: en-US From: Pete Wright In-Reply-To: <087cf5ee-186a-41ee-93ed-154588964d41@smo.de> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Result: default: False [-3.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.999]; DMARC_POLICY_ALLOW(-0.50)[nomadlogic.org,quarantine]; R_SPF_ALLOW(-0.20)[+mx]; R_DKIM_ALLOW(-0.20)[nomadlogic.org:s=04242021]; MIME_GOOD(-0.10)[text/plain]; XM_UA_NO_VERSION(0.01)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; ASN(0.00)[asn:29802, ipnet:66.165.240.0/22, country:US]; RCVD_COUNT_ONE(0.00)[1]; RCPT_COUNT_ONE(0.00)[1]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; MLMMJ_DEST(0.00)[stable@freebsd.org]; ARC_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; FROM_HAS_DN(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; TO_DN_NONE(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[nomadlogic.org:+] X-Rspamd-Queue-Id: 4XkyCN1tTrz4JTh X-Spamd-Bar: --- On 11/7/24 14:19, Philipp Ost wrote: > Hi everyone, > > I have a curious situation with my system since updating to 14.2-STABLE on > Tuesday, 5.11.'24: both Firefox and Thunderbird cause the system to freeze > which then triggers and automatic reboot. This doesn't happen immediately, > though. It takes at most 2:15 minutes until this freeze and reboot cycle > happens. No user-interaction is taking place during that time. > > The machine is running FreeBSD 14.2-STABLE stable/14-n269500- > cdffbea57c0d amd64. > Firefox is at version firefox-132.0.1_2,2 and Thunderbird at > thunderbird-128.4.1_1. > > Other gtk3-based programs do not show this behaviour, i.e., Inkscape, > Darktable, GIMP, EOG, Filezilla, Gnumeric. > > I (re-)built both Firefox and Thunderbird with debugging symbols. Console > output of both Firefox and Thunderbird (when being started from an xterm) > can be found here: > philippost.de/firefox-debug-console-output > philippost.de/thunderbird-debug-console-output > > In addition, I tried running them under truss(1), but from skimming through > both logs nothing immediately stood out at what could cause this. > > Also, there's nothing to be found in the logs at all. > > Did anyone else observed this? How do I go about debugging this? > > I am at a loss at how to proceed and appreaciate any help in trying to > figure this out. I use both firefox and thunderbird pretty heavily on my workstation (14.1) and laptop (current) and have not had any issues. a couple thoughts though to help you debug this: 1. maybe run a memory test and check the SMART status of your disk(s). i've seen behavior like this with flaky hardware in the past, and both of those apps are extremely memory hungry 2. are you getting core's after rebuilding debug builds? if so what does backtrace show? 3. is this a low memory system? when i was debugging a memory leak in firefox a while ago i wrote a wrapper that invoked it via limits(1). -pete -- Pete Wright pete@nomadlogic.org From nobody Sat Nov 9 01:54:59 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Xlf5J2N8Zz5d6fX; Sat, 09 Nov 2024 01:55:00 +0000 (UTC) (envelope-from cperciva@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Xlf5J0CxFz4pP4; Sat, 9 Nov 2024 01:55:00 +0000 (UTC) (envelope-from cperciva@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731117300; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc; bh=JP+dDcn6rJydhTMTBgb6xdyrIEloPQpI4Cr0TUDw/jA=; b=Nb8ifLJi7PBfS/cQo5ix7GaX10blPqMtQOUnr6y3hCZkFYM9G5tGlo6UQoxBqxYzJdH7Si 0gnP/aS7gJgMZkG/328QumsKSfv7PV7R2UNVheNEO/DhwsQ0OSGeFxx7g1vBsq1Cx18e7C xxpczffu9wTl7iOjfF5zhL9a6vgLYD0dyPycJAJ8dDEeQBPPfUcOTpyCiDuQZ8gSgAfEXO BtBM4h664R/7zUpNMgSeDhEc4jeaWRidLjm7k7AzzvyAoVc5jZWxccwQmdlqdbCliv3OpN bKdw8QjVt+zPcMJDlM3MBFN4/PriUs2f62asPD7sgZmvrkFIM/nBpvySTXerBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731117300; h=from:from:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc; bh=JP+dDcn6rJydhTMTBgb6xdyrIEloPQpI4Cr0TUDw/jA=; b=hXR+XOZS/Ey9r//VLT+C/v8pTLuHt+IoTEgW/zz1VYQg2L7fVBVL0acdvIwiHUIhq1CVhp h0PVAIVBIn8K+ExfzxRrersQ98ho1XGND5z9l2Can9yi73Y9PoAovAomj5HuMYZnfDQ5dv hQGgpo+NzNi8bo2/xLANyT1/vvbsPaBG1K1FB0QdrOMDQYJvWc9YjROanetFplb7XEbnZP VR0f/wYthASiC4DlsuEaJU42ZmihPr9TSS7c+NotC5gocUlR3E9cYiT2EZboKphrG4gvfA yeijmqvO0O+5VFNw30pRt0vS8nCMxfqUmVWG3IkUSg4NEOwiU2f+BKRsym5lsw== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1731117300; a=rsa-sha256; cv=none; b=h5MTXewhRzsk9bbYMyb2Z1z8+71jZ9KhdH7b/1rrZi1DCwIxlHBxeXMKT0mt7jjOxxo0NS Up0LLuws1yUlUQjlOUOi+AWiCbEBzHx6cs4c2+dEVg3EtXEZThHd9p3ad+krsNCDANHdyp 6inpSAzKJaA/CIW/eZanET58NTgeHaSRTAz/ySaFf1Ibkba0G7J7kjhPvHkAa4vxxKUz7u IugkkX9kVTsxr1ImMCQeq8izvBIrFMOgt/8IllVIGdWx/3Q5dxY5HgJPMRf4akjasSOG29 VjiWryod1Bebdi5G/x89log33digXiGvz3eknVnmlDMOz8H4Br598JNcDTbX8Q== Received: by freefall.freebsd.org (Postfix, from userid 1002) id E8594BC14; Sat, 09 Nov 2024 01:54:59 +0000 (UTC) To: freebsd-snapshots@FreeBSD.org, freebsd-stable@FreeBSD.org Cc: FreeBSD Release Engineering Team Reply-To: FreeBSD Release Engineering Team Subject: FreeBSD 14.2-BETA2 Now Available Message-Id: <20241109015459.E8594BC14@freefall.freebsd.org> Date: Sat, 09 Nov 2024 01:54:59 +0000 (UTC) From: Colin Percival List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 The second BETA build of the 14.2-RELEASE release cycle is now available. Installation images are available for: o 14.2-BETA2 amd64 GENERIC o 14.2-BETA2 i386 GENERIC o 14.2-BETA2 powerpc GENERIC o 14.2-BETA2 powerpc64 GENERIC64 o 14.2-BETA2 powerpc64le GENERIC64LE o 14.2-BETA2 powerpcspe MPC85XXSPE o 14.2-BETA2 armv7 GENERICSD o 14.2-BETA2 aarch64 GENERIC o 14.2-BETA2 aarch64 RPI o 14.2-BETA2 aarch64 PINE64 o 14.2-BETA2 aarch64 PINE64-LTS o 14.2-BETA2 aarch64 PINEBOOK o 14.2-BETA2 aarch64 ROCK64 o 14.2-BETA2 aarch64 ROCKPRO64 o 14.2-BETA2 riscv64 GENERIC o 14.2-BETA2 riscv64 GENERICSD Note regarding arm SD card images: For convenience for those without console access to the system, a freebsd user with a password of freebsd is available by default for ssh(1) access. Additionally, the root user password is set to root. It is strongly recommended to change the password for both users after gaining access to the system. Installer images and memory stick images are available here: https://download.freebsd.org/releases/ISO-IMAGES/14.2/ The image checksums follow at the end of this e-mail. If you notice problems you can report them through the Bugzilla PR system or on the -stable mailing list. If you would like to use Git to do a source based update of an existing system, use the "releng/14.2" branch. A summary of changes since BETA1 includes: o Adding support for GPIO _AEI events o Fixing boot loader "text mode graphics" when BIOS booting o Adding support for OpenStack network config in nuageinit o Unbreaking the -A option to ndp(8) o Fixing the terminal bell pitch in vt(4) o Fixing a kernel panic in sctp(4). A list of changes since 14.1 is available in the releng/14.2 release notes: https://www.freebsd.org/releases/14.2R/relnotes/ Please note, the release notes page is not yet complete, and will be updated on an ongoing basis as the 14.2-RELEASE cycle progresses. === Virtual Machine Disk Images === VM disk images are available for the amd64, i386, aarch64, and riscv64 architectures. Disk images may be downloaded from the following URL (or any of the FreeBSD download mirrors): https://download.freebsd.org/releases/VM-IMAGES/14.2-BETA2/ BASIC-CI images can be found at: https://download.freebsd.org/releases/CI-IMAGES/14.2-BETA2/ The partition layout is: ~ 16 kB - freebsd-boot GPT partition type (bootfs GPT label) ~ 1 GB - freebsd-swap GPT partition type (swapfs GPT label) ~ 20 GB - freebsd-ufs GPT partition type (rootfs GPT label) The disk images are available in QCOW2, VHD, VMDK, and raw disk image formats. The image download size is approximately 135 MB and 165 MB respectively (amd64/i386), decompressing to a 21 GB sparse image. Note regarding arm64/aarch64 virtual machine images: a modified QEMU EFI loader file is needed for qemu-system-aarch64 to be able to boot the virtual machine images. See this page for more information: https://wiki.freebsd.org/arm64/QEMU To boot the VM image, run: % qemu-system-aarch64 -m 4096M -cpu cortex-a57 -M virt \ -bios QEMU_EFI.fd -serial telnet::4444,server -nographic \ -drive if=none,file=VMDISK,id=hd0 \ -device virtio-blk-device,drive=hd0 \ -device virtio-net-device,netdev=net0 \ -netdev user,id=net0 Be sure to replace "VMDISK" with the path to the virtual machine image. === Amazon EC2 AMI Images === FreeBSD/amd64 EC2 AMI IDs can be retrieved from the Systems Manager Parameter Store via the AWS CLI using the command % aws --region $REGION ssm get-parameter --name $KEY where $REGION is the desired region and $KEY is one of the following keys: /aws/service/freebsd/amd64/base/ufs/14.2/BETA2 /aws/service/freebsd/amd64/base/zfs/14.2/BETA2 /aws/service/freebsd/amd64/cloud-init/ufs/14.2/BETA2 /aws/service/freebsd/amd64/cloud-init/zfs/14.2/BETA2 /aws/service/freebsd/amd64/small/ufs/14.2/BETA2 /aws/service/freebsd/amd64/small/zfs/14.2/BETA2 FreeBSD/aarch64 EC2 AMI IDs can be retrieved using the keys /aws/service/freebsd/arm64/base/ufs/14.2/BETA2 /aws/service/freebsd/arm64/base/zfs/14.2/BETA2 /aws/service/freebsd/arm64/cloud-init/ufs/14.2/BETA2 /aws/service/freebsd/arm64/cloud-init/zfs/14.2/BETA2 /aws/service/freebsd/arm64/small/ufs/14.2/BETA2 /aws/service/freebsd/arm64/small/zfs/14.2/BETA2 === Vagrant Images === FreeBSD/amd64 images are available on the Hashicorp Atlas site, and can be installed by running: % vagrant init freebsd/FreeBSD-14.2-BETA2 % vagrant up === Upgrading === The freebsd-update(8) utility supports binary upgrades of amd64, i386, and aarch64 systems running earlier FreeBSD releases. Systems running earlier FreeBSD releases can upgrade by first installing any updates for the currently running release: # freebsd-update fetch # freebsd-update install and then downloading the new release: # freebsd-update upgrade -r 14.2-BETA2 During this process, freebsd-update(8) may ask the user to help by merging some configuration files or by confirming that the automatically performed merging was done correctly. # freebsd-update install The system must be rebooted with the newly installed kernel before continuing. # shutdown -r now After rebooting, freebsd-update needs to be run again to install the new userland components: # freebsd-update install It is recommended to rebuild and install all applications if possible, especially if upgrading from an earlier FreeBSD release, for example, FreeBSD 12.x. Alternatively, the user can install misc/compat12x and other compatibility libraries, afterwards the system must be rebooted into the new userland: # shutdown -r now Finally, after rebooting, freebsd-update needs to be run again to remove stale files: # freebsd-update install == ISO CHECKSUMS == o 14.2-BETA2 amd64 GENERIC: SHA512 (FreeBSD-14.2-BETA2-amd64-bootonly.iso) = 8a3f06953c32d4f2581d6db5c466924fecf2ea61aada950c692887d43a52b849522598b09aa4678a453124f9d675d8579f1546338fcac7916f27174f7647e6ba SHA512 (FreeBSD-14.2-BETA2-amd64-bootonly.iso.xz) = 55a9c5eaa170c7d4eecfb4c2fe13c67d39b2fecc90542247d54a2ed9b4e69a215d4dcc48606c99bb77c9d785864580feec0de4322e479c7de69d7d34d59c42b2 SHA512 (FreeBSD-14.2-BETA2-amd64-disc1.iso) = 53f86fdcd4fd0452db86046e86b75d5557d5802481049577901c9693377a866e63e48c0f8622b1fdf744794d8015f50ac08e3a2fb0b66319af80abfef41e975d SHA512 (FreeBSD-14.2-BETA2-amd64-disc1.iso.xz) = 914a11ad73b80eba96116ee4e82cb4c58f0e184d7b600c1d7dfdcc40859a1e4020b45748aa9cf69c05b3023b8c03396401b30855b3d25ac201286481f24d7300 SHA512 (FreeBSD-14.2-BETA2-amd64-dvd1.iso) = 696fa0d18866ed6522eb1e547d9bbbbfc008bd0a5dbca65d768de52e436eed9fd1267210898de8d32e15bcff49d0578cf563def29276f50cef1441af701b3997 SHA512 (FreeBSD-14.2-BETA2-amd64-dvd1.iso.xz) = fea5e98fae550dbd9bcd4a1e6234013769b8f0b293c19220322c736a0954b4ef5f3213810f518cb27ce11981814b920a701c44bdaf59ed4cda02cf8a21406b80 SHA512 (FreeBSD-14.2-BETA2-amd64-memstick.img) = 3716e044b5e3297fbfa5571ad904e67353a653facdad16b48557abb1fe6073e9ced35db89debdfd441fef99605d10e1d61aee4b7d1f8fe3bdd04b482058d6b71 SHA512 (FreeBSD-14.2-BETA2-amd64-memstick.img.xz) = e3435fcd0f12ca9bf5330a948ca7d845f18c60230fe6eae943e3b285f04abf3771f6eab544a5cf36c26a90b44cd837385037ae36cd884291f99f475610340d1a SHA512 (FreeBSD-14.2-BETA2-amd64-mini-memstick.img) = ceff0da7dd35a45e9244dc1ab9ddf54c0e9d1eb7340e9dd8778cdfc7819f3aa627aee46c105bc60892ca23ab83b2d553262e55529eebfd71c39d9f6dfd4a54fb SHA512 (FreeBSD-14.2-BETA2-amd64-mini-memstick.img.xz) = 20a2d0ea6603bd4c2fc36c01f489f9a8f7c5c2ab3933479bafe57ba5e8777d2c2d880141ecc7ffe128bf3fdff80462aeab099a91725796089a805dc856374b09 SHA256 (FreeBSD-14.2-BETA2-amd64-bootonly.iso) = 030c21f56cc701da957479958477009a616dde6cbc310aa8523c820fb75f1db8 SHA256 (FreeBSD-14.2-BETA2-amd64-bootonly.iso.xz) = 41b7ae951fdba285c8f12287b12328da05ad1b25d5a22bdb57a233de12f2de5b SHA256 (FreeBSD-14.2-BETA2-amd64-disc1.iso) = 7b97293962291297fd40df44dda843f3e6be31e552c683df39842d2b04df6d7e SHA256 (FreeBSD-14.2-BETA2-amd64-disc1.iso.xz) = c9bf7ce73280a034e94905a73ef11e49a392cff81fdc8f39e1b16f1376174d7e SHA256 (FreeBSD-14.2-BETA2-amd64-dvd1.iso) = 4a7d6002cdbd24b25ed621d308a53f0dd2ed800656fac6c46eab59854e4c8c86 SHA256 (FreeBSD-14.2-BETA2-amd64-dvd1.iso.xz) = b7aef63f49196f46a3b102ceba649f75e72507ebd3be56bfdab73ee50703ba52 SHA256 (FreeBSD-14.2-BETA2-amd64-memstick.img) = 96739d7a29f33243b0a2ab3b4ceaa21f4e94a215d361398b56b1ed6072127551 SHA256 (FreeBSD-14.2-BETA2-amd64-memstick.img.xz) = f73893baba89d02a482973e7d45173540ea23625600054ab022120c3c9a3b566 SHA256 (FreeBSD-14.2-BETA2-amd64-mini-memstick.img) = 54352d7ccd294be485f0086b484ea86e0a71b967cf74a83c6a269b046e2df178 SHA256 (FreeBSD-14.2-BETA2-amd64-mini-memstick.img.xz) = 3af478bee07e42c62fdde4717384806e32216510bd5a1055d361e9b1ac8b5963 o 14.2-BETA2 i386 GENERIC: SHA512 (FreeBSD-14.2-BETA2-i386-bootonly.iso) = 51228e7311dd883f7ad09f074f16943e6127ef82f2fa4124deda8e9adb4f9c542ef659a2f6c7ea2bbf9c1174a524b14c811e08556b805428d8a0351a03914609 SHA512 (FreeBSD-14.2-BETA2-i386-bootonly.iso.xz) = 522790cc530ebdafa1564021a145d80c4f56d7147b188cdccbd4f314776da1c5e2db477cf4e6a649bed102e4eb8e97348ddab6a50a764f6bb30c75be290a2b8a SHA512 (FreeBSD-14.2-BETA2-i386-disc1.iso) = 3af4fbf710297ffeecf7e6e90b60074e26c3b0c431b2121fe8fd5dddfeb644571f6ed22932a7ed72082a3c675624b1aa59a3ff883f9937a22e339dbc597fc0f5 SHA512 (FreeBSD-14.2-BETA2-i386-disc1.iso.xz) = f3edd0e44acd65f3dd9473909201543575c9910326394fa19a70ae9207c2da9b3aebf9168fd98a59dde11df728b98f09585295f024ece5f5ae52a93efdf6dc4d SHA512 (FreeBSD-14.2-BETA2-i386-dvd1.iso) = 4c4df88daa3f77adbf841ebbcdafa231d39f5b705f06d49537d67e2ed4786d10444c841bdf038b70bbc87fbc5efb8b1eb33cd61fda6a4aa40f36a9746176e52d SHA512 (FreeBSD-14.2-BETA2-i386-dvd1.iso.xz) = 46833e8c6d5c5baf66077f853e89e907b009a485a007f1f77d4ec94078bd64b7e3e6fa6bee13687f06bd5e3ab34f12d1eb48ed8e1733f7404f77c5a5cab4bf0d SHA512 (FreeBSD-14.2-BETA2-i386-memstick.img) = 30d57fe167da6323fcc051c646f2bdfcb69cd36a8ec86c8fed0fe120ccdeeeb4d39d92db1c299d62b6e31caddb5f4b1ab588b7bb65b684dfcef3f83aae8758b7 SHA512 (FreeBSD-14.2-BETA2-i386-memstick.img.xz) = 432fc3e650581e40a28de70d4ff9075038c1abb9d4c3ebd93d9370807cf892660cb478f93032b9c6b27b4ce22d3ca0dd8dc52916a86e63784dc227107004823a SHA512 (FreeBSD-14.2-BETA2-i386-mini-memstick.img) = 2f34e923649393cc8bb7e7830adbb804022ed3e2837813e4c5ac80fb3d9189e9ef6f3d5a16ce01d509c4878f398d950265b372e5dbb0b35384e53fbbb45ecee1 SHA512 (FreeBSD-14.2-BETA2-i386-mini-memstick.img.xz) = abac388c9df39026f5d75029d50fce5d49cdbb98471e4bf6e34aafd47ca71b9466a69405cdeec361773fa1a107f77bff280df175a7cfae1f98f1e5e12457df3e SHA256 (FreeBSD-14.2-BETA2-i386-bootonly.iso) = 9cf91a0d32b910adf566174d7c9b9523ccb5c22316ae383bfdbbcc351cd97278 SHA256 (FreeBSD-14.2-BETA2-i386-bootonly.iso.xz) = aeee424464dce8545b6d56c28e852c45b4d1a1b9c57cce3e25daa48aeb3fd191 SHA256 (FreeBSD-14.2-BETA2-i386-disc1.iso) = bef1170354ebece94435c63a41eac742486aa4cb915d65ed3e9193a424f4d0e2 SHA256 (FreeBSD-14.2-BETA2-i386-disc1.iso.xz) = ff5c85c6e5983d483c9a5beadbcf3e2f8f1491a5145f3b637146e790ed622a64 SHA256 (FreeBSD-14.2-BETA2-i386-dvd1.iso) = ecf9cddc5f51cf14a6f3414fb9cf53691b87e4c444031612da267d8ddb8fde36 SHA256 (FreeBSD-14.2-BETA2-i386-dvd1.iso.xz) = c45b53c2669471b362c66d95c359359df13aa38e551b31c8821caae9e23cc9db SHA256 (FreeBSD-14.2-BETA2-i386-memstick.img) = 927bc06240cb42869c04c8b8c5f68e17615fc5fd1440b670a5e0d68c2ea5b1e9 SHA256 (FreeBSD-14.2-BETA2-i386-memstick.img.xz) = cb19254ab2f334c61e95ee00e5aa0691e94b35d42118b0eb9360d7a5d3964d5a SHA256 (FreeBSD-14.2-BETA2-i386-mini-memstick.img) = 45537ea9aae04b6e383606f9b203f2da4ea606e8429f62c9fc51fe82f6a07952 SHA256 (FreeBSD-14.2-BETA2-i386-mini-memstick.img.xz) = 2629fff5727f6023961cf8cc96c36e0d105103e8d2ba0abc2cbb3b18c8f01086 o 14.2-BETA2 powerpc GENERIC: SHA512 (FreeBSD-14.2-BETA2-powerpc-bootonly.iso) = 0e5a7bd582b3287bbda07733a5d4b98aecc4f2280b01eb3842ed3f4b5897469486af7cc5d0d95e5cddb25872df2e56c946a1355191b4e361ecef9bcf8af9a2c4 SHA512 (FreeBSD-14.2-BETA2-powerpc-bootonly.iso.xz) = 2ecd03fb9222d276198ae938939dab2c384947e182da5c4d2270073a0af14c0b26e83042c94c9cb7dd93a9bc0e7e508941cf9827980299ccc5e951a198179c9c SHA512 (FreeBSD-14.2-BETA2-powerpc-disc1.iso) = 7847763aa001942c1aac6f1d2c165bbfa4f0969883e0bec397326b618a1e9031087ef63461f25f27ebadf4821061a36e12309352e75bf63edd6355d43edf167f SHA512 (FreeBSD-14.2-BETA2-powerpc-disc1.iso.xz) = ef5d4078c0b99b28fbb91205d6b4a424485cf8a8ab6b5b3af42c1d1bb71c0a8ff0528637ade8088c95256af69518c9b578ff51e237e4110f3dfb601de357441c SHA256 (FreeBSD-14.2-BETA2-powerpc-bootonly.iso) = d604c0d5b20673d0958c2199091f96b213f3189772f0a35a211eb3c75eca0d5c SHA256 (FreeBSD-14.2-BETA2-powerpc-bootonly.iso.xz) = 5665d8506298b6cea12d71e99210c8fbead72b5b1d7a382361175d09221e3937 SHA256 (FreeBSD-14.2-BETA2-powerpc-disc1.iso) = ee140b5a011ea7c97666da2269ee58b67919902b9097a83e5248b2d2cb7b29ee SHA256 (FreeBSD-14.2-BETA2-powerpc-disc1.iso.xz) = 899ffbad619138af734bef84b2cb11908d15bab83c5176ce438e7959d1965ad4 o 14.2-BETA2 powerpc64 GENERIC64: SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64-bootonly.iso) = 0f1a6067a02c25d2ad32ff2bf0e56114b8a992de3763d7a174717e08f4a879320a50da039168ac967957554a0dcae74cd437edd078cd7e2feff029d3e3fb1c24 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64-bootonly.iso.xz) = b296a7eed05d5892e1811a1cd77772deef91717c43a756c4df6b0a860daaaa7f1ea6c486cdee10b941305e5ce085187779f1284334ca4f8de3785f5b38b4c841 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64-disc1.iso) = de7f2f9277b941890fd684d87d9efceb74b44a0d9d56bd247f8fb068ab962a46ebc82c9f23635aad5f1bb894afd3e6f1125e7513f35631243ca3686a6d68f2e0 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64-disc1.iso.xz) = 842d70bc97352988c33648a227129946c96207d81bd026e59ebd408168c2024376b7dbd0eed954b26764d45c65d3910e498adf6b44fc5b7ce4802bc185cfd49d SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64-bootonly.iso) = fb3060459381a048a4ebffb6e52670d36f4900a191cc793bc79d5121ed7737d7 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64-bootonly.iso.xz) = c16948f83debce40d6f7ba80bae03bc19b9c3d7760c31ba5a246bfb1c2f73f6a SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64-disc1.iso) = 9e73c271e8494906437e53bf7b4628045917fe0b37d61df7cdd5687277a7876b SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64-disc1.iso.xz) = 33de057162c3d488787057d57cdd94bd194f8f37af0cc4942a264e7693b16702 o 14.2-BETA2 powerpc64le GENERIC64LE: SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-bootonly.iso) = 805c416188693c527ea5bea3bb61a1bc85638ac4f7b6734d7ab11bdd83bc68448cf634a6692f22a4f6ed05407cdc349624cd71ee9aa5d879c17c880f313d32a8 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-bootonly.iso.xz) = 249dea0b38beb4dfabd74d9fd38dc8726a236bf527020df892c9a43b8c9570d0f6a92ab3b256c067847ac40002e05084236c3deedcaad28e8e6de327d003326e SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-disc1.iso) = 442a806209d6d103e079d0ae4fcf47065d1be499ba440095d2fe2dfb7ff9f9da1fb64e0860a1ba46cecf1eba87d7ad220be3e675e5c83d8bc5d5a5d5eaac506b SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-disc1.iso.xz) = 3c684505f1149aa9a027aa4e207e5c60b869ec4be0b18629a6dc7b5255cd14e1e86af5746ccf521a4f9d199a01787d864b6d1dda26427428691994ce7ca82156 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-bootonly.iso) = 84659acd45bb033280782c9069ac21d3f8fd27ebb1ad8ab6dbc0c0197809c05e SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-bootonly.iso.xz) = 8c1fc57335509de640883eaf4c2bc60b76ae47d24e0f21582740657d00d27741 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-disc1.iso) = bd9132ccc38daaf007dc85598edbd9b5244de55cb8da24382d1fec3c43285db7 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpc64le-disc1.iso.xz) = 391568b51af982bd7b1deffe89af346af7b521ca7e363b74fbd07a619b69a82b o 14.2-BETA2 powerpcspe MPC85XXSPE: SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-bootonly.iso) = 31aceb8f5da5cbd6fb5cbe6401b04c731269facd363250a07e9fd118cf0259f60bbea8f9b0cd0c12cbfcb43db2e0cd7de69da5c37a8264091f388c64ecf5b144 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-bootonly.iso.xz) = d840deba27ecd6b78f94b12bf0a08b443f37e8c34ab00bf6f0fafe7d13e1be67eab29ab00dfe4ce215eb1a5f1278fb70787b86ccf6b5a7fb20e69739c9f86de3 SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-disc1.iso) = 534e0dfa77a6275f274da9548a3b865ee08dd0d1878006301554ce9fa70f225223b09f4e4d5b0ffb9d39aa699d4cce28423e67dc0643b11eb48cdf06792ae7dd SHA512 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-disc1.iso.xz) = 627575da523e5d0411a4ee7f50c8859a552968bff5f966c7bf053824f181bb7e66be55a904514d58032cc4018fb778e2054959c40b448930750aca2bb286c172 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-bootonly.iso) = ea9c9ce17ff80329760795c33e421571709edf26b53451bab19806d4a49e7b5c SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-bootonly.iso.xz) = 2a072af527d658c1686cf933626e0cca1e235e525623768b8c58b693a3a20a69 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-disc1.iso) = ac57c1192a67d4f2934640b2b3182053bcf779381d966806ec3406abc7e86ff2 SHA256 (FreeBSD-14.2-BETA2-powerpc-powerpcspe-disc1.iso.xz) = 31e059ca4234f4f3577d9b31aee73c2915a65c78e12f810341514973fb6a3b66 o 14.2-BETA2 armv7 GENERICSD: SHA512 (FreeBSD-14.2-BETA2-arm-armv7-GENERICSD.img.xz) = 49184c2bcaed0ee7f82d1e61f753b480cebd6e599c93a67612eb0ddda31dc2e1de59065802a307f8c9b5581a7b647c84cf0417966b6ae437427983bebc92f8c6 SHA256 (FreeBSD-14.2-BETA2-arm-armv7-GENERICSD.img.xz) = 96669d0f6aeb8753e3fcbfd12834a67c0936d474e9c97daffd71076e3c250948 o 14.2-BETA2 aarch64 GENERIC: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-bootonly.iso) = 1b944a8c9f62e861039a6d676e4ef86a710b30f25d80166cd1a5f39db2af14da3f96afe7c9d9e6f289449f25aba66a1cd5b935fa6a9805fd39e1c7220b2d617f SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-bootonly.iso.xz) = a4d3a4649a85fba3ea0be097afaf99c44e0e381183e76d961772a5d9870d52d8e4badda76df6a15c4cb5dcc6ef26a9d7ab7b54a2bf0d916ab5b758495e55a849 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-disc1.iso) = bebbd96f425a2c3004f1a7f872fec3d4709b766631f66fdbbd0fb00766c5b3f3c682b873ebdb3e2d95cedc02553fa1036b073e1e85c83b469ce57ca0c520104b SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-disc1.iso.xz) = 65fb81b58d293a99798c5886ecf8aa53e2c2e53d49ce787eba883216188af29f66b304d78bbbb1f822f929eaefdf4ac7cfc201d68a8793e91891426d31c99131 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-dvd1.iso) = 508c1446cfdfb90f4873a0325d13a4f24ca013f30f4510ea367a961eba1e457128fc8ce01643ecc4464942f8f683f0f07bbbad7273a0686424594acba4c30f5b SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-dvd1.iso.xz) = 4f9327b7cd42ba571737fb3612867848ca3e8a52d97cd24fae847b1f158b1e49556a8f6a9966788d00367a722332d583b022f6555beaa9ed6dccfa3f7b0081aa SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-memstick.img) = 04ef99ce960975474e3e6b07cdaebe57a108f3b37b0868f5c7de7b3c38965882f2068b7fc5bd2099828e9a10fd1971279531c79c4aceda0975a256156ed10f96 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-memstick.img.xz) = 7f60c1ac6aeb85886b85c0e1d6e6d9a20187a0114730d62368b7fad2e1585a97f7d14276735e20caded52a2f6405a6897a19ef88967edfe21dbbdc245dac4d2d SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-mini-memstick.img) = a5763419a1837680dbd7968e936a25f23f3155b32a91252fa60465e834b5f42ebf7fdd764cc47da8c25efda59b2265427b03b8d9301f2ec1f2be89ed9e867bb5 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-mini-memstick.img.xz) = 8bd738f308278d55eeddae1a9be92b463d32dc5d6683be2f160d7dd34b3b8f2ca7a12f43f2d6223b418f6668b4e9bef77aeb29dd3c6d50a15c39b713348da679 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-bootonly.iso) = 8cf78b22deac0d5aba2ba16b19b16e37b1cef22cc436a7e20d849e575baebf1b SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-bootonly.iso.xz) = 5cf4af3a120cbda5f8d05fb3807935594826f00c485c5307104996d80c92fc9d SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-disc1.iso) = 324851e0e35248a741afb3682b8edec466f880f6f3bd8e5745156916e9b853b3 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-disc1.iso.xz) = 862ead05033b0ac2914733e3e087748765fc4c6804040a5b50792345565c59d8 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-dvd1.iso) = 2feab4b9dcda54067397bd6e37eecc6c77e3d357f6564c8b189d1a1bc6626d3e SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-dvd1.iso.xz) = 75a20cc526f79f05d52cc175a30f623135ab5bda4823e7c634a869222b073201 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-memstick.img) = c5350286fdc403520c29a67b3067f7580b00df0c64bc29e195d2eaa5e7f54a74 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-memstick.img.xz) = 1ff1d4eb6292917e00aad6ad082b5b04d3aae3687fa566ed688fdcca8df3d85c SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-mini-memstick.img) = 9a7ffefad9b6faef809d8061eaada29b7c57deed171a9618b286ef8108370ae7 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-mini-memstick.img.xz) = 48b1a85730b21b1702d86f08c16296d1cc9efbacdf6399c498b845db41d49d85 o 14.2-BETA2 aarch64 RPI: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-RPI.img.xz) = be882b8c342e140079e154627f113b865605d5204c865bb507c5addf089022b616e6b1451ed53436dea43c327126d4c649ac1c27345d53e3905a1c9ad22acdeb SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-RPI.img.xz) = 8ccd0b4e43d545ae9077fd09f57fb4ef12e0b5bc846148ef301ca642f83918bf o 14.2-BETA2 aarch64 PINE64: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-PINE64.img.xz) = dfa87e6972c6fc5fb045423b8bb3475ee6e2d4a1e1efb31da4c9d17925453c17b5a61b9c0e21f21e7246f15adda42e18b1d23b8a3bb54f2811aff0a754b2c2ae SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-PINE64.img.xz) = e7d18857dd58352ff53fe512fd231640b64ab352a481982e83d334f97012d1c1 o 14.2-BETA2 aarch64 PINE64-LTS: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-PINE64-LTS.img.xz) = ccb5ea74ff3c596ede7516d6d49c80ef8c612385766a3b35b2c0f69ca79c6bb18fe3680362812f1d481d4fa47cffd211254482107e5623fdec74b0d91ad92309 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-PINE64-LTS.img.xz) = 23494ec025f98ee47c9c2fc64931a60fa2d27bb4b44a5bfca483830fac84f58e o 14.2-BETA2 aarch64 PINEBOOK: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-PINEBOOK.img.xz) = 1da888a1e0668f17c6bcdbd0e245b79753f6d70c531d80007e994c9cb1a7400a6ff29556afc67986db1aa8e100ee0ed5a866223d41f1e6d1fefad8d8985088ee SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-PINEBOOK.img.xz) = 56c7f7256f40da4f0df8a2f6b4807c509f71c882467b6cd2aec0128fb1ec6d54 o 14.2-BETA2 aarch64 ROCK64: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ROCK64.img.xz) = 35aac478e8d7a07b5ff98a897c5479b2053220dc5c368fbb21295b41e67d99e399e209ffc5f5ce95c733c08db1594f31dd358531a8a974169bc234c23faebed4 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ROCK64.img.xz) = d740c0b8813b61492d7252faa88c434e5a5bf3d3e394d9e9f5b6969c2099399e o 14.2-BETA2 aarch64 ROCKPRO64: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ROCKPRO64.img.xz) = 710d92b5235a9510fec381de8e96e1f79af835f817f8a18466eb99201f90642e2b994c86698d2805f4ee6bbfa2c8e3bc5961853c234767cc5b158310f1cc39d4 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ROCKPRO64.img.xz) = d95750573e6b718f76b9b5a247b4aab196a7c39579bb70f6779dca3d5e7adc72 o 14.2-BETA2 riscv64 GENERIC: SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-bootonly.iso) = c8f6a31a0e1d3fcd277ffbfbcb9ee74fd1e9bc9f6e5e1af9fe5d4d55a902d535b174ebaf23ac34c4ef6b7dadb3a75ac611a0e7b17e858bf48ce06fd660f6b86d SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-bootonly.iso.xz) = a94f5cd009060e249d97b8ebd23d5cafd72b5e3522e79dfe19555688555fcc51cf13da23baadaa6ec156544e187fbcb4cce4af5e33b27f46abb60e982492f080 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-disc1.iso) = 91fc7fa726530ef4d63b06346e33a935969de568309bc1c81df78034dabd2b549600891b73242cd24ef3c6a51b492472403ed4d274fa667851507ee159b988bd SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-disc1.iso.xz) = 638de1590d80447546004830ef574f44a0cff2edfe1d14cfef6b7a82a37caa3d1baf8c0861f86be344bcc1ae88724af0421b7c6e847d1b0390b54a94d4afad47 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-memstick.img) = 449fab933b681ad32b7b6fce44c22dad80b9619fdbb5d57deef266041730ba44de5ebaf1cf5cdb61beebb4f2cb57117f61eb5c19ade1cbd1857fb1586621f58f SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-memstick.img.xz) = a590156698cedff1e7c8baa3171f1f99e90261a26e11314534d5e9e33a43f373d6f31e831f2cc6801b8fa71a43c0af29975093d2e27dd67f65095fba20cfbb1a SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-mini-memstick.img) = 5a0876d6997155c9070e30c84656dcb27aafbe644eb309b60c7ac6f74a5bc502309d246726f7992281e60fffd9e4a9fdea7861821854a55f3aa8e0b563b946da SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-mini-memstick.img.xz) = f2ab16f56fb0b6a96dd05215a160ba41dafb0748c75248fb5e41ec8b3a4e5242fc8f11f095abb453c051c0795a0e07b926950784a91f6a186ed838d457ed8adf SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-bootonly.iso) = d6803d047d71adb43f42185c731f81ee90e710b296909c22c3da5a92d4f69f48 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-bootonly.iso.xz) = fbdb337077faa88ae38f7c814470be29289861a0f1b0a95c79f4f2e59e5ce176 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-disc1.iso) = 441a73c700b9671859e4103b7209b085d216e18bd212e4ab48907e1dd038ca4c SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-disc1.iso.xz) = 2396e5136a1834245b21ae7ff2a6b1c5522802865e7b538538b0455ad4d9f3d0 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-memstick.img) = fd5a488bc92022b9df4d5676e64b9727f98770d82695555efc51173edaee9d49 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-memstick.img.xz) = 101fc2082131e92cc4c07bae1d934b6d17e637caac89f7e64093f4384ce4a876 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-mini-memstick.img) = 803900490f349770c58cd1672092b59a6040abcb33910fb09e2d5334730f86c6 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-mini-memstick.img.xz) = cae2777961de027e388748c227cfff41ca2492c3e8243b7d1092d5b1abe68986 o 14.2-BETA2 riscv64 GENERICSD: SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-GENERICSD.img.xz) = 3f011970371ec456996e74cafd195f7a0167b4cb6f7b1c0d1343d53f13bb1ea50a0f05705b475842df11f58bf71ae7c02767e2ea4f526a4be4cacfaacb88564f SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-GENERICSD.img.xz) = 49dcd41483165494426d2303748a5899d3d31d227473fce2f9acaae17d44a7bd == VM IMAGE CHECKSUMS == o 14.2-BETA2 amd64: SHA512 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.ufs.qcow2.xz) = 884c520addbea05f42aa733a4978b9342172638d9a6c7cefa6a22e91e404acf36f807a854a7aea8516ab7bf06d2a0ea70aebd2dd5dcfb49502b6c3d6ba333b26 SHA512 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.ufs.raw.xz) = 3318ad3ecd2e396c80d1fbe573ec612328a7cb879a909cf4cdfb0078f50553ae1537d61c01ef5603e98217e41f1190a8a766b356d4ab11757b765fc17439120c SHA512 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.zfs.qcow2.xz) = f5431df934700b31b7205dee088e72cc8c90a949843b0b0b23deec18192edee659fbef0f01e78a255e057b3f4887c3987dc25e37a2da0c440d595c3837bc607f SHA512 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.zfs.raw.xz) = 60ccd8d600bd4c145cf60446b1cd59d8cf24fbe9caca18a026352cc1192518f23a8ab488e3f3940e85ea59d58360ade2cd8e0d59fca0958946b99a02ca927ea8 SHA512 (FreeBSD-14.2-BETA2-amd64-ufs.qcow2.xz) = bf2e35805e04f2f1dd92cadc1133cbaae276add337746a9aeb61dbd46fb723b38f4a4c4c2779bd2232d630277b98b02f2367510da0da27f732ad10de3b90b877 SHA512 (FreeBSD-14.2-BETA2-amd64-ufs.raw.xz) = 612e5e018f8f7c17b33ecb8232bb9a1520f9db9692e4f47cbf2f38d1bc1c5d3df688f9d618aeade4b45acc0402343a7a20d40ad59a7260ddbbc988967664bbaf SHA512 (FreeBSD-14.2-BETA2-amd64-ufs.vhd.xz) = 360d9ca34139ec9711fe35533f3cc407a3b51f5ab04e53e44f22dbb6962e8f3d38f0ca519eb155e2d95832b0529de5f82122bb95c47569f4bc6b35ddee2bf6d1 SHA512 (FreeBSD-14.2-BETA2-amd64-ufs.vmdk.xz) = 82aa7fe07e168a4db9001cee1d37c4d57f50d61d32a6591e7986008042a82d654d271e8c253f741711677eba97aefd4042c59384ab72792c62fa50957969b06d SHA512 (FreeBSD-14.2-BETA2-amd64-zfs.qcow2.xz) = 3836b55853b6147795e575bff9c06393f3e8c416446ad43ad59f9edfe6a09bfa5d83b40fe9c2000d2b4563f7dce79a6bb3fc0674d36aa23384925223a161fecd SHA512 (FreeBSD-14.2-BETA2-amd64-zfs.raw.xz) = e30c400073317fc02d1f8c4de892b22cb3c07ed59acb5f378d44c58cbb4c1bb2609482cc09afad67e4bf8dd975c53a79baba99a7254b04da8d0d041349d6ac41 SHA512 (FreeBSD-14.2-BETA2-amd64-zfs.vhd.xz) = 418baf01ad83b370359eb65a72db97b711754b85daf103eabda013f2b3de86f91d660497d48033605191992d986b9b04c8873f218ea9130325fc8bd7f4ca7174 SHA512 (FreeBSD-14.2-BETA2-amd64-zfs.vmdk.xz) = 215872e6fd644b9857bb1a96a5a3028385c0806c0d7158173112e4a23fd9f98337eb58b19088b21a682660910770eb3e2e1e33e13fe3ff4e47b423ac30e4fa7f SHA512 (FreeBSD-14.2-BETA2-amd64.qcow2.xz) = bf2e35805e04f2f1dd92cadc1133cbaae276add337746a9aeb61dbd46fb723b38f4a4c4c2779bd2232d630277b98b02f2367510da0da27f732ad10de3b90b877 SHA512 (FreeBSD-14.2-BETA2-amd64.raw.xz) = 612e5e018f8f7c17b33ecb8232bb9a1520f9db9692e4f47cbf2f38d1bc1c5d3df688f9d618aeade4b45acc0402343a7a20d40ad59a7260ddbbc988967664bbaf SHA512 (FreeBSD-14.2-BETA2-amd64.vhd.xz) = 360d9ca34139ec9711fe35533f3cc407a3b51f5ab04e53e44f22dbb6962e8f3d38f0ca519eb155e2d95832b0529de5f82122bb95c47569f4bc6b35ddee2bf6d1 SHA512 (FreeBSD-14.2-BETA2-amd64.vmdk.xz) = 82aa7fe07e168a4db9001cee1d37c4d57f50d61d32a6591e7986008042a82d654d271e8c253f741711677eba97aefd4042c59384ab72792c62fa50957969b06d SHA256 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.ufs.qcow2.xz) = 70f5ad9b87972bca4351edc3ebafbe992a9a88701a233e39df46b211da552a54 SHA256 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.ufs.raw.xz) = 46f23273df89d21fd792e72a943287bf556448d759ef6d2ec8458e060c78e08c SHA256 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.zfs.qcow2.xz) = 3733cdb388f3717c9ea90581d2c24de966b69338fad276e475f765e4a7ad081f SHA256 (FreeBSD-14.2-BETA2-amd64-BASIC-CLOUDINIT.zfs.raw.xz) = b75c69fed0cb5935a769279bad8313295be63e7620676751771e27b62cdeb948 SHA256 (FreeBSD-14.2-BETA2-amd64-ufs.qcow2.xz) = 10e8ad2cc011b41cc42c8b7c94332754b9d72c2cd8fefcaa1dc64e7158841a19 SHA256 (FreeBSD-14.2-BETA2-amd64-ufs.raw.xz) = ef8f6da617bf1dd321f282f78d06e06387dddca13a163c4da497635ce5206871 SHA256 (FreeBSD-14.2-BETA2-amd64-ufs.vhd.xz) = f9fc846dc9c47a7a104a3aefee415b6822f9cb41daba660cf2ef5832f5dd77f6 SHA256 (FreeBSD-14.2-BETA2-amd64-ufs.vmdk.xz) = 7b0064b80f818ecb9e56c72dc033f1e8912ee6a5a4bb6473f014255a611b9b2e SHA256 (FreeBSD-14.2-BETA2-amd64-zfs.qcow2.xz) = 9721824beceb37540b52b472119e72a7a701738ad3f5769bc630500781c7e1e1 SHA256 (FreeBSD-14.2-BETA2-amd64-zfs.raw.xz) = ef1a44f98ae38ecbfbf1ece99298a2c72209d32722c9b461083559caa9a43bd3 SHA256 (FreeBSD-14.2-BETA2-amd64-zfs.vhd.xz) = 7813fa01e45e83f08eca358cafd808bea1f4b57c85d938aaa94ed2cee9dc42f5 SHA256 (FreeBSD-14.2-BETA2-amd64-zfs.vmdk.xz) = 52e9254006855c8d2c11a8660b2fd1013514f387e2d52d06e09adf406d09690c SHA256 (FreeBSD-14.2-BETA2-amd64.qcow2.xz) = 10e8ad2cc011b41cc42c8b7c94332754b9d72c2cd8fefcaa1dc64e7158841a19 SHA256 (FreeBSD-14.2-BETA2-amd64.raw.xz) = ef8f6da617bf1dd321f282f78d06e06387dddca13a163c4da497635ce5206871 SHA256 (FreeBSD-14.2-BETA2-amd64.vhd.xz) = f9fc846dc9c47a7a104a3aefee415b6822f9cb41daba660cf2ef5832f5dd77f6 SHA256 (FreeBSD-14.2-BETA2-amd64.vmdk.xz) = 7b0064b80f818ecb9e56c72dc033f1e8912ee6a5a4bb6473f014255a611b9b2e o 14.2-BETA2 i386: SHA512 (FreeBSD-14.2-BETA2-i386-ufs.qcow2.xz) = 7661ccf6ba9f91d59b6c31c27eb56f52a6e128c4b0361c988dd4a652ee72309a125d84b0a0fa69a56bd8910ac15ad0386b55856677764cde14aa3c7835339ad8 SHA512 (FreeBSD-14.2-BETA2-i386-ufs.raw.xz) = ba31c53fbc9cdb63684801691142294b640eada79b46b29ffb17c500d1d5dd9a40611a2c32b173511e9bdd684819d5a8de3771c12f097ef9d501dfe1cb656add SHA512 (FreeBSD-14.2-BETA2-i386-ufs.vhd.xz) = 34f4597ef617a001147c32c3a1fac53759fedaaf0c81bac00e7bc7afcb80e3d15d0e84f68ad1eb31808f2e9c5c29a1e0964a7f4a8e67418d7e342716a02802af SHA512 (FreeBSD-14.2-BETA2-i386-ufs.vmdk.xz) = fc3e7a9ec26a826f8307a8622eede50b7e14fb558913e0bd7e31b6dbe3c3a262b6e9b640545cf18861b72635cefde476c3574a449b2e4d01f6143ad3733aba6d SHA512 (FreeBSD-14.2-BETA2-i386-zfs.qcow2.xz) = db48aa5d045a3471aff6f6897a712f11624be9ecfdbaa8e34d4886d3bb4960880390b1aa7fbc31d5bc8cf9412e54750ed4bd3dea528491cd2f723cebc8d5a518 SHA512 (FreeBSD-14.2-BETA2-i386-zfs.raw.xz) = f299e3500f5aff5a9c548c62d826a52135d634a26d8517292a90b73ab6adc8e3de3f57b18529eb73e701d8e49407577c6e68d591f90d7eb963c3171b714b113f SHA512 (FreeBSD-14.2-BETA2-i386-zfs.vhd.xz) = c87ffd16e658d900193767bac826981c1d02a35188be3b3f2256461d9a64345a8ae7795714d673e757875eb5c0a77a7374e26ce964b8cdec599415e2c1ec3dde SHA512 (FreeBSD-14.2-BETA2-i386-zfs.vmdk.xz) = 07f9056739549b7ecd32d18d954404c72cb56319263806db806210135bbe1edff054a8b18686f4ca2dc95d02a87e956557db6c4ebe17dd243e8e9bbc7405faee SHA512 (FreeBSD-14.2-BETA2-i386.qcow2.xz) = 7661ccf6ba9f91d59b6c31c27eb56f52a6e128c4b0361c988dd4a652ee72309a125d84b0a0fa69a56bd8910ac15ad0386b55856677764cde14aa3c7835339ad8 SHA512 (FreeBSD-14.2-BETA2-i386.raw.xz) = ba31c53fbc9cdb63684801691142294b640eada79b46b29ffb17c500d1d5dd9a40611a2c32b173511e9bdd684819d5a8de3771c12f097ef9d501dfe1cb656add SHA512 (FreeBSD-14.2-BETA2-i386.vhd.xz) = 34f4597ef617a001147c32c3a1fac53759fedaaf0c81bac00e7bc7afcb80e3d15d0e84f68ad1eb31808f2e9c5c29a1e0964a7f4a8e67418d7e342716a02802af SHA512 (FreeBSD-14.2-BETA2-i386.vmdk.xz) = fc3e7a9ec26a826f8307a8622eede50b7e14fb558913e0bd7e31b6dbe3c3a262b6e9b640545cf18861b72635cefde476c3574a449b2e4d01f6143ad3733aba6d SHA256 (FreeBSD-14.2-BETA2-i386-ufs.qcow2.xz) = ce47fb21a6f7ea84f6eaa2bcd9d15dcf7e4b90514c334842d632a782c166cd22 SHA256 (FreeBSD-14.2-BETA2-i386-ufs.raw.xz) = 8fcb50dd27763b2ddde6fe30dc383848313f523492d0359e9c06829d4de96a54 SHA256 (FreeBSD-14.2-BETA2-i386-ufs.vhd.xz) = ba1ac3f857ef98b96c12e8eac64ec2c69ecfca9afe553125d64bd33489fbaa4f SHA256 (FreeBSD-14.2-BETA2-i386-ufs.vmdk.xz) = 30e26a33e0f5fcd0cd62abb616f30d6b28a63e5b8a0e04e179bff6550cf6390b SHA256 (FreeBSD-14.2-BETA2-i386-zfs.qcow2.xz) = 2bdb2b61ecd3452f4fb010f7ea1b129d5300195357f958aca583b8b0158e4bd5 SHA256 (FreeBSD-14.2-BETA2-i386-zfs.raw.xz) = 6699089bc6134e7d0a8f0a1ca1690ffe5de29302470361541535f148453dc8b3 SHA256 (FreeBSD-14.2-BETA2-i386-zfs.vhd.xz) = 2f91af6eda0947e91da7cb7d80ed7945a9152b9263703e1bbbb2a598cde8551e SHA256 (FreeBSD-14.2-BETA2-i386-zfs.vmdk.xz) = a00cccd8e22d09005c7dc2e1929bf31a0d057fcadfba95fc65d4adede32ae486 SHA256 (FreeBSD-14.2-BETA2-i386.qcow2.xz) = ce47fb21a6f7ea84f6eaa2bcd9d15dcf7e4b90514c334842d632a782c166cd22 SHA256 (FreeBSD-14.2-BETA2-i386.raw.xz) = 8fcb50dd27763b2ddde6fe30dc383848313f523492d0359e9c06829d4de96a54 SHA256 (FreeBSD-14.2-BETA2-i386.vhd.xz) = ba1ac3f857ef98b96c12e8eac64ec2c69ecfca9afe553125d64bd33489fbaa4f SHA256 (FreeBSD-14.2-BETA2-i386.vmdk.xz) = 30e26a33e0f5fcd0cd62abb616f30d6b28a63e5b8a0e04e179bff6550cf6390b o 14.2-BETA2 aarch64: SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.ufs.qcow2.xz) = 2ec15e3657a93e7aef849c0775367a2b0ce32ab0249022ec89ba3518cc6dcad0456860c860a2a833913146f0b9325e8b0f715deb146408ccaa8b38d3e52aecc3 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.ufs.raw.xz) = 23cd767cdaa7457f0e1a59d6df3e37c429600367eeaf87d21b47fd8166311cd75fb279401b279d4d0a6e1383c1f7f9efb4e455885d0b4d2de4658fc8eb84f908 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.zfs.qcow2.xz) = 6f1825944815414dfe7b88bec0d917f64593b8f72b5d1f2b8998dc4c45d4cb61589c6d44f2823b67256855dbeb4df517295528d72f2eceea58d5e3b6398ae29b SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.zfs.raw.xz) = 7a2127e639804fb7a7ec9e271a2a2b3f674c0334f31024d54ff15bf2b0780130c91ec1ff2dfcb8fd8e8b947789337c404d28a50e1f204e1529c3d61257a7d240 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.qcow2.xz) = 0b117dfd55296240c84ebb549093ac7745e3d3cb6ca754ffa7f03ed92d2eca73b8ddb0053fe47f559a4628b8fb2df62389339e765e480199aa1bc04e5c972a90 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.raw.xz) = 064dbc5f3051ceda159e6da64d9931bd49ed2d4d71a6fac4c19fe879f95200d8f8f854ceb327a0e43b2dadd2ef6a50afe76531a496d39065cd97b2d1e0215bd6 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.vhd.xz) = ed9396d203f0d6e4bca80e67eb023fa266e5cc1e85867129c6210616ca94d2a9c53a9af440cd9f4b652898e50d6946cf266dcb51156994a5c2017dc2be2f3dfe SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.vmdk.xz) = 4f507e5d92e3676f1ecbe280dbe28456cc7b0e093018d68ddc2c55c8273215b3d4d3b33023865b1f9bfb9bcbba32d3a8db34df287fab109d5f8b0dfcb3465132 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.qcow2.xz) = 3d91280f20432f6a644ef45c72d8910e9153fc50f64de9234d0869a7e854089949347cdebd500beac003d70e378183083f0530ab75c38204f61bf05a290b4086 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.raw.xz) = d2b8869d70ecccd9b4f0e58ec3a6d1eaa701457493a48b5b29d72643cf76ddb6cb253d5ba6bbca86ea8c440e49e05b2b4ef897a160f1e13af0d22a1657f15569 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.vhd.xz) = 76f65dda37e1c68cc76f49fa7f571399f3f735ffaab49416ed08214d62aead4ca5e99aef9399758a207db173db63fc91acdf4432dfa5b8e5183e1cf1bb9ef479 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.vmdk.xz) = 4437faccb3c6650ca8186815857b5d5285dc1b8cd550adb032bc19543144e082592bacae3987f0d46c58ce128c10eac21bb85e02f3970e1569c1c70f22031de5 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64.qcow2.xz) = 0b117dfd55296240c84ebb549093ac7745e3d3cb6ca754ffa7f03ed92d2eca73b8ddb0053fe47f559a4628b8fb2df62389339e765e480199aa1bc04e5c972a90 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64.raw.xz) = 064dbc5f3051ceda159e6da64d9931bd49ed2d4d71a6fac4c19fe879f95200d8f8f854ceb327a0e43b2dadd2ef6a50afe76531a496d39065cd97b2d1e0215bd6 SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64.vhd.xz) = ed9396d203f0d6e4bca80e67eb023fa266e5cc1e85867129c6210616ca94d2a9c53a9af440cd9f4b652898e50d6946cf266dcb51156994a5c2017dc2be2f3dfe SHA512 (FreeBSD-14.2-BETA2-arm64-aarch64.vmdk.xz) = 4f507e5d92e3676f1ecbe280dbe28456cc7b0e093018d68ddc2c55c8273215b3d4d3b33023865b1f9bfb9bcbba32d3a8db34df287fab109d5f8b0dfcb3465132 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.ufs.qcow2.xz) = 15534d46c05f53b2db0526120f147796b7da38b2d1fdbdc3c1f9fc3c588178c4 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.ufs.raw.xz) = fce10dfa72dfcb53592ae7b20b2255d398eef1142beaf7e9331ba72968563b32 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.zfs.qcow2.xz) = 26db413c1a41080a5105852de56917d61496511f307a34c6ec219df3334ba2a9 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-BASIC-CLOUDINIT.zfs.raw.xz) = ad031b53e8ffebd582df92175f250e104b162e23a65104cc57456c71ae1d082d SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.qcow2.xz) = f6a221031f3dcfeb0ede546881926c2da4d22060be096b2bf375e48162cb8508 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.raw.xz) = 55a7211e371f5062373d99ec099bb318eceaa822884daebd49c6c1fc4fdfe133 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.vhd.xz) = 79f88112d5736eaa90bbc66fa807f7768b92792a2e1623a4f5b0a9e324b28a65 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-ufs.vmdk.xz) = 2abdbcd59c994e2da8883b5dbfc64075b3b4e8dc698e45462fef758f6f148182 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.qcow2.xz) = cf1344f17660524cf56500f3299bee9cae868c009c0c93ccc0768e06be94978c SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.raw.xz) = f2b22113ef6073f57cf434385f7bfb4a6d7e7e1846e78586a5a49d4a0dc2851c SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.vhd.xz) = a95498eec855c6e9495b2b56d860a1cdae221255011a65d87cdcf5a2b8c759f3 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64-zfs.vmdk.xz) = a0236aa13d54675fe2290f35ffb9e30c0514d4da7815e69e75e3c8702927bb81 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64.qcow2.xz) = f6a221031f3dcfeb0ede546881926c2da4d22060be096b2bf375e48162cb8508 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64.raw.xz) = 55a7211e371f5062373d99ec099bb318eceaa822884daebd49c6c1fc4fdfe133 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64.vhd.xz) = 79f88112d5736eaa90bbc66fa807f7768b92792a2e1623a4f5b0a9e324b28a65 SHA256 (FreeBSD-14.2-BETA2-arm64-aarch64.vmdk.xz) = 2abdbcd59c994e2da8883b5dbfc64075b3b4e8dc698e45462fef758f6f148182 o 14.2-BETA2 riscv64: SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.qcow2.xz) = fc44644ff92a3b1fc4e777c7c6172e01c0d201cb11b0a7a1a20ff3470a6216a33dcacf4877d2ead9562bead6963df5d541796c644e211d9312047ae92eb66c27 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.raw.xz) = 009f4b6f4b39eba1ae4cd71b9280436add320a90af146b61278fe1f06b8460718faf1d9ca746357c5f6de3864576eb89c7486996a2e6dd376487f17b2f94eaad SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.vhd.xz) = 9e0a84856cbb25a856385377038ed35a16fd079fd9dea495c8fca069d78db682d6887b43748df6792d6617d9a0f83c7f443c5aec214b5c43c81be890dd28966a SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.vmdk.xz) = 4524aabdc91473366011fe598a3b0f5ce7e8ed678272b01a47d389fa74d027946fb45edfb7d3ab8a872382c1945c7e1f0925c70ab4f4c7e9805d2f54a5460a41 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.qcow2.xz) = a64a0731290de3d1fa817acca67e8f72d1a20e1fbce48c429864159f459de21c90c8edc83b1ad587ce6525f49caafbdc3007371598d054230230c3d979eb2179 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.raw.xz) = 92c28ad733f360794e756a57ee0a35510acb80abfb83fdde4459b6ea2e65ec7837406ed1f1dac9204452b54afaf6946b83e9ef1bf351c85fddb9c54fc59a79d9 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.vhd.xz) = daec13ad09f93384587fbc8638381e72d5935ad4796e7b1867067795bebc9253c76859a2fbbf4d4d51b2882c893084c2ba26978f1e626585a29855c40114583d SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.vmdk.xz) = e4013b4e094d27459c0475a7aaa6096cfefced4c539c106e7080fe091a3be91ef3cfc48ff57116df7f63583a54f9ee7e512c103c3d78a568ec53781bf6201537 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64.qcow2.xz) = fc44644ff92a3b1fc4e777c7c6172e01c0d201cb11b0a7a1a20ff3470a6216a33dcacf4877d2ead9562bead6963df5d541796c644e211d9312047ae92eb66c27 SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64.raw.xz) = 009f4b6f4b39eba1ae4cd71b9280436add320a90af146b61278fe1f06b8460718faf1d9ca746357c5f6de3864576eb89c7486996a2e6dd376487f17b2f94eaad SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64.vhd.xz) = 9e0a84856cbb25a856385377038ed35a16fd079fd9dea495c8fca069d78db682d6887b43748df6792d6617d9a0f83c7f443c5aec214b5c43c81be890dd28966a SHA512 (FreeBSD-14.2-BETA2-riscv-riscv64.vmdk.xz) = 4524aabdc91473366011fe598a3b0f5ce7e8ed678272b01a47d389fa74d027946fb45edfb7d3ab8a872382c1945c7e1f0925c70ab4f4c7e9805d2f54a5460a41 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.qcow2.xz) = 3ff5d1f7ffdade6c4b6d450e6226d34be8da8be71e2b6ef219d8450077b5d564 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.raw.xz) = ee84d02f2f6fa9a0aa46083aa28871784a04d8e916d71a71788a8e332822d08b SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.vhd.xz) = c1189e0abb7580a47a25449747e70e5fb2202f268057ad0235d045967d82c2c3 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-ufs.vmdk.xz) = 0a7abb33e3ef791d1d202e8204fed294c4d5deed6134e992cd3881c5cfc986c3 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.qcow2.xz) = ab62e3b1a5b40ab5ef1ee7fd33a097aeb70c1b7971073d29eba1a40e7c0bb1f7 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.raw.xz) = f607776e01fffa85103045faf711c738b0a189180a0a794870d84818c9e04bef SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.vhd.xz) = 811ac9eec2aab7911ca14ba0eeeb806d5410dc78e67182d7f834e62b130c7418 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64-zfs.vmdk.xz) = eea322be0d85738b9bacccb96b8a2ded1eccdba7867a659a8f077933599d9e7d SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64.qcow2.xz) = 3ff5d1f7ffdade6c4b6d450e6226d34be8da8be71e2b6ef219d8450077b5d564 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64.raw.xz) = ee84d02f2f6fa9a0aa46083aa28871784a04d8e916d71a71788a8e332822d08b SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64.vhd.xz) = c1189e0abb7580a47a25449747e70e5fb2202f268057ad0235d045967d82c2c3 SHA256 (FreeBSD-14.2-BETA2-riscv-riscv64.vmdk.xz) = 0a7abb33e3ef791d1d202e8204fed294c4d5deed6134e992cd3881c5cfc986c3 Love FreeBSD? Support this and future releases with a donation to the FreeBSD Foundation! https://www.freebsdfoundation.org/donate/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEglY7hNBiDtwN+4ZBOJfy4i5lrT8FAmcuwMYACgkQOJfy4i5l rT947BAAjXd4uph0uIcgtJDzJNA7z0Uk4GsMQEiRb/zyOLQ+Ct4NQtvw0nsNE349 lzStnI3OWbXxyVtlAfISHHqvqVnwoScswGBLF0Fz5wasBTDFfirzHJgdiUkykzhB hDuy7HzLVZ8h9nWTPNUspLBzONIinv341CCPJ/a5KUBYoRUVdnLqztgqFOSxmrDH NVOHwFMsJBpDgz+gInazCTD7lS/xj18MC87BaV7pMOaise0zzhlbZ31v71xlEIoB Pahk53qrFNtgwKNE7nWq8Zb78a2qnwCrEGfiquP+/5Dhk2cZeSprH7ZpU8D+y1vN xnVZ7CoTQHg7p1aWuvf9dmiym4hBAGfmHaGWJMJEIsE+Pf3TXyzefZxtGlAP44SE EZyTCI6P7hycP34D3SiO1kU4Oz0lwMtd04w+80uuFLeJzSr3bSnEKIgTphxeC1b3 X0gMFd4xQRBiCSX5p2irx9GxkSdwkUFUbW9YqUN/is42SWPIhu25q0+7/ZkRhugn qx9M79PE3+9JiChqyMWdkdeMTKU5Em/2uZxbUiU25OB+5L8NShJ4SRwwUEdhYBaK jbW48AgCJoLyZi82gk7nDAYJhr0o3DzayDVBPpx2j74lLxOQdrRGD4oD18IVbnmU DSb+5QihFULTmwEGFu8wYCLCeujrv9XVBMx+Mp282ks7WeH+TxQ= =Y5kS -----END PGP SIGNATURE----- From nobody Sat Nov 9 13:28:34 2024 X-Original-To: stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XlxTr725rz5c8nY for ; Sat, 09 Nov 2024 13:28:48 +0000 (UTC) (envelope-from rhs.message@gmail.com) Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "WR4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XlxTq75N5z40Nm for ; Sat, 9 Nov 2024 13:28:47 +0000 (UTC) (envelope-from rhs.message@gmail.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20230601 header.b=bOmaN7sN; spf=pass (mx1.freebsd.org: domain of rhs.message@gmail.com designates 2a00:1450:4864:20::62c as permitted sender) smtp.mailfrom=rhs.message@gmail.com; dmarc=pass (policy=none) header.from=gmail.com Received: by mail-ej1-x62c.google.com with SMTP id a640c23a62f3a-a99cc265e0aso471337466b.3 for ; Sat, 09 Nov 2024 05:28:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1731158926; x=1731763726; darn=freebsd.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=ZB0FLUlftyemu+IS99oDEdfHCI4N221jbItCxjPukgo=; b=bOmaN7sNC7o+Fvo4U21EGUhxHmGMR9I0n6WhENH3PKa3wSn+9v5jNPYaBcvyUsjLsZ aK22LAY9PKTg4spg8rGljHik/5x+v6gzLgxLoTIICwNX4+Vxoltnjhbb5UKGR2e7oKQH Ha9IsFy/LN6KrCQxrhyEMxw2e6ofFbi3NF9ZHcVWnQWkjrmGKmY/RhQiN62u4138ZJeU LGuGEiacw2f+R4U2nmH8UsZbjsywJ1Sw3NpAfudg3XJlN5q+kKfaZ7T5GbGtKboyWs+D SOiVz2hyiJlqyqPxcWaOCZEMCsVX7DDxKNHKtSNRQE1Dk0yT5Pww+2l4DEu8zxQTAj3t X4ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1731158926; x=1731763726; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=ZB0FLUlftyemu+IS99oDEdfHCI4N221jbItCxjPukgo=; b=GciDIm+SrpQh5V8+P5OT9SmFpCasSJJVaF+J2w6KH52+4uQ50zBo+f+iJoFYI62f/w +nuMRqR62BKxcdxHkOWJt3etkeBq2TIstJDtWDHk0JwJPHy247mGWsUvtuCSEP+QY6Oa rdRIl+NQZiU636JrdGem313oiTmEULteUO+Mru27dFyrTNQsCS3TN56giaeF3em9A8O7 Ln2D5GSNjy7QpQwOTH/gMCa4UVxtvZ8vNuNEQIm9mKMCTSxTVYIu6truM1Ms6CPonu1T rswTGfdBq+y64JXkS1X2r2v45OpRdGGAypz+WpNZcQBeorEpm658G1SF37ofgBFekSiD stDA== X-Gm-Message-State: AOJu0Yz2VAlN5XaEi0P//vdCUa7ykpgWrxWvP9zuhThVaPpn4hhTUWug 0kFjgrT1DtemGPPg1gXrgv8YXJNNQjUWN78w9AWNgKGu0/bty9oz3vQGNVuaNElhdTqcFcJr1rP tbNKRV104k3Zozt8FEnnjIN217PQxWQ== X-Google-Smtp-Source: AGHT+IFVDmlBzsUH1QrCxySeA+IXPQXvLibqlrJFoD9NrTx3rJ8KNjG2dA1n4mwnLnBis+/dGmDSryjQOmiODhqI/U8= X-Received: by 2002:a17:906:c112:b0:a9e:7ca7:78b1 with SMTP id a640c23a62f3a-a9eeff0ea38mr613883666b.23.1731158926179; Sat, 09 Nov 2024 05:28:46 -0800 (PST) List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org MIME-Version: 1.0 References: <087cf5ee-186a-41ee-93ed-154588964d41@smo.de> <58157db8-7af9-41cd-9fa1-5f9677878f89@nomadlogic.org> In-Reply-To: <58157db8-7af9-41cd-9fa1-5f9677878f89@nomadlogic.org> From: Richard Susgin Date: Sat, 9 Nov 2024 08:28:34 -0500 Message-ID: Subject: Re: Firefox and Thunderbird freeze system causing a reboot To: Pete Wright Cc: stable@freebsd.org Content-Type: multipart/alternative; boundary="000000000000d842bd06267ad81b" X-Spamd-Result: default: False [-3.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.978]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20230601]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; RCVD_TLS_LAST(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; ARC_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; DWL_DNSWL_NONE(0.00)[gmail.com:dkim]; TAGGED_FROM(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; TO_DN_SOME(0.00)[]; FROM_HAS_DN(0.00)[]; MISSING_XM_UA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; MID_RHS_MATCH_FROMTLD(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; MLMMJ_DEST(0.00)[stable@freebsd.org]; RCVD_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_NONE(0.00)[2a00:1450:4864:20::62c:from] X-Rspamd-Queue-Id: 4XlxTq75N5z40Nm X-Spamd-Bar: --- --000000000000d842bd06267ad81b Content-Type: text/plain; charset="UTF-8" Hello, curious situation with Mozilla? I am not developing or debugging at the moment but merely just using. Last week i updated from FreeBSD13.1 to 13.4. Everything working in 13.1 but my FireFox so outdated it was being rejected. After installing everything from packaging and getting Xorg working everything seemed fine. XFCE installed and ran with a few tweaks. Both FF and Thunderbird would not start unless safe mode was invoked. I disabled composting in both and they start and work perfectly sans acceleration. So after checking around i find numerous posts about failing graphics stacks not being able to connect. This may not affect u but it is definitely a thing. Is this the end of Xorg and should we be using wayland? Rick On Thu, Nov 7, 2024, 5:58 PM Pete Wright wrote: > > > On 11/7/24 14:19, Philipp Ost wrote: > > Hi everyone, > > > > I have a curious situation with my system since updating to 14.2-STABLE > on > > Tuesday, 5.11.'24: both Firefox and Thunderbird cause the system to > freeze > > which then triggers and automatic reboot. This doesn't happen > immediately, > > though. It takes at most 2:15 minutes until this freeze and reboot cycle > > happens. No user-interaction is taking place during that time. > > > > The machine is running FreeBSD 14.2-STABLE stable/14-n269500- > > cdffbea57c0d amd64. > > Firefox is at version firefox-132.0.1_2,2 and Thunderbird at > > thunderbird-128.4.1_1. > > > > Other gtk3-based programs do not show this behaviour, i.e., Inkscape, > > Darktable, GIMP, EOG, Filezilla, Gnumeric. > > > > I (re-)built both Firefox and Thunderbird with debugging symbols. Console > > output of both Firefox and Thunderbird (when being started from an xterm) > > can be found here: > > philippost.de/firefox-debug-console-output > > philippost.de/thunderbird-debug-console-output > > > > In addition, I tried running them under truss(1), but from skimming > through > > both logs nothing immediately stood out at what could cause this. > > > > Also, there's nothing to be found in the logs at all. > > > > Did anyone else observed this? How do I go about debugging this? > > > > I am at a loss at how to proceed and appreaciate any help in trying to > > figure this out. > > I use both firefox and thunderbird pretty heavily on my workstation > (14.1) and laptop (current) and have not had any issues. a couple > thoughts though to help you debug this: > > 1. maybe run a memory test and check the SMART status of your disk(s). > i've seen behavior like this with flaky hardware in the past, and both > of those apps are extremely memory hungry > > 2. are you getting core's after rebuilding debug builds? if so what > does backtrace show? > > 3. is this a low memory system? when i was debugging a memory leak in > firefox a while ago i wrote a wrapper that invoked it via limits(1). > > > -pete > > -- > Pete Wright > pete@nomadlogic.org > > > --000000000000d842bd06267ad81b Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable

Hello, curious situation with Mozilla?=C2=A0 I am not develo= ping or debugging at the moment but merely just using. Last week i updated = from FreeBSD13.1 to 13.4. Everything working in 13.1 but my FireFox so outd= ated it was being rejected. After installing everything from packaging and = getting Xorg working everything seemed fine. XFCE installed and ran with a = few tweaks. Both FF and Thunderbird would not start unless safe mode was in= voked. I disabled composting in both and they start and work perfectly sans= acceleration. So after checking around i find numerous posts about failing= graphics stacks not being able to connect. This may not affect u but it is= definitely a thing.
Is this the end of Xorg and should we be using wayland?
Rick


On Thu= , Nov 7, 2024, 5:58 PM Pete Wright <pete@nomadlogic.org> wrote:


On 11/7/24 14:19, Philipp Ost wrote:
> Hi everyone,
>
> I have a curious situation with my system since updating to 14.2-STABL= E on
> Tuesday, 5.11.'24: both Firefox and Thunderbird cause the system t= o freeze
> which then triggers and automatic reboot. This doesn't happen imme= diately,
> though. It takes at most 2:15 minutes until this freeze and reboot cyc= le
> happens. No user-interaction is taking place during that time.
>
> The machine is running FreeBSD 14.2-STABLE stable/14-n269500-
> cdffbea57c0d amd64.
> Firefox is at version firefox-132.0.1_2,2 and Thunderbird at
> thunderbird-128.4.1_1.
>
> Other gtk3-based programs do not show this behaviour, i.e., Inkscape,<= br> > Darktable, GIMP, EOG, Filezilla, Gnumeric.
>
> I (re-)built both Firefox and Thunderbird with debugging symbols. Cons= ole
> output of both Firefox and Thunderbird (when being started from an xte= rm)
> can be found here:
> philippost.de/firefox-debug-console= -output
> philippost.de/thunderbird-debu= g-console-output
>
> In addition, I tried running them under truss(1), but from skimming th= rough
> both logs nothing immediately stood out at what could cause this.
>
> Also, there's nothing to be found in the logs at all.
>
> Did anyone else observed this? How do I go about debugging this?
>
> I am at a loss at how to proceed and appreaciate any help in trying to=
> figure this out.

I use both firefox and thunderbird pretty heavily on my workstation
(14.1) and laptop (current) and have not had any issues.=C2=A0 a couple thoughts though to help you debug this:

1. maybe run a memory test and check the SMART status of your disk(s).
i've seen behavior like this with flaky hardware in the past, and both =
of those apps are extremely memory hungry

2. are you getting core's after rebuilding debug builds?=C2=A0 if so wh= at
does backtrace show?

3. is this a low memory system?=C2=A0 when i was debugging a memory leak in=
firefox a while ago i wrote a wrapper that invoked it via limits(1).


-pete

--
Pete Wright
pete@nomadlogic.org


--000000000000d842bd06267ad81b-- From nobody Sun Nov 10 20:22:57 2024 X-Original-To: freebsd-stable@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XmkdY4Lf5z5cCrJ for ; Sun, 10 Nov 2024 20:23:13 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic308-55.consmr.mail.gq1.yahoo.com (sonic308-55.consmr.mail.gq1.yahoo.com [98.137.68.31]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4XmkdW6d6mz4WTj for ; Sun, 10 Nov 2024 20:23:11 +0000 (UTC) (envelope-from marklmi@yahoo.com) Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=DKDokpCe; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.68.31 as permitted sender) smtp.mailfrom=marklmi@yahoo.com; dmarc=pass (policy=reject) header.from=yahoo.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1731270189; bh=MWSLkfBsNGKQsUP2zIpg+NYLxCmQks2WsyI4WUe1G1c=; h=From:Subject:Date:Cc:To:References:From:Subject:Reply-To; b=DKDokpCenE35Diwpigtdu3nAd3qXXgWcIxL+TN5R1Zr2nAyT+FhbheThhAxV74b+0oTkr4VbyUewsq2k3k3Q8D371QoIL8gd+3JU2Lzdq2kec+wuGXXyBUU63Y8EhW74TnLuewz0VLlXeBtrbg7qbg5rErQFbJMpYwH0Eh5/E1KlFifu2NwDvfpDWyJuDpfT5AVQo5JJ6D5A8jAqfujpctjGJIB2lXcksn01zmE0dUP2YA6jk4u7i8/+i7d3w+/Z15YYZW6tNEJDuqvYrEGoc8vysy6SuqOdRvb3KVpbq8NocjJuj8KT2y6ISKaOeXv2det9CfG3r0ks4ftxliKClg== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1731270189; bh=NVVy0q/mb6KnHwLxQQYl1tGf/MytH/Q3UPVYNiA/uTJ=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=ZvaI3m2zHldzRfJ2PEBcBD4alO2GSHGhQrQeZFZvg0z7mRqzxH5MrfgftI6CtxpIrCsLE8+C8j9B/MDiTmbSjsRTt7Kepg7kJ64hg/1zLtgMPRFk/rj2AzfiQrszSYOxYOevrzczvp2y7jdgRvoGh6D2MpLcHhlMvkF6i7Oimppex3Mh+S9mfpheVeWMzLg0aWQMaPvEqKk6WdYmMqKfAF5l9Zhc5DLMAduoBsfyC+uvR84+4puO8IkdxN8jkoYTWquF9XVeqarj2eIoz3yJSSr0rnbXVCNpfWDCwGs1RPOE0Q5AKVKYq29+oe48mrGkIev5fUF8aMV2ewovb2W06Q== X-YMail-OSG: XYedeZsVM1mVkEU8f0vxplTfTJzoh_aE.RCHXAWUfICl9boDOlODpqZmGiQDvXr aiaKkNQPpZOc88SJAMB7WjlChQouZgOqeAPaByO.7RFyRoT4qTawa0IWZvbRRaKKhXI4Z9SyGFNq XHL6JBLnbe8G4.8LkneMWOAq0sRVOMttyVggMjrwE57MUy2I4g5ZOwOrxD0r2jraDWYx9GzSi_GD W3.4IbQMJhnMstNgc6rguOm5_yhmEa3oPVE.pKF7_uGVPuQk_U5N8_at855YOYAOHfkgh0nqNlrD 6XElbywCYrW.g_vfKDmM4nkQxx6tWXs0LdtjS7hwkzEH_QN5CbPo9Gwdp3u7wivC5Ifu2x3Ty4uY ABfWSzw2DK5hCbOmzuZua9ibwlE7jInTjUqG6DctUxrJ9sVl70ER0N_JthZFFSQtARFCFw65LhNV z5s36XKj38oE4_30gR_KxrNSTGDQGO0PDUXQ5QL3_go7MRSjgQUf_293NZA7XswZWZ_Xg_mLPhsL 7JyzAovXBz55ium2Rb7IyM1soT275EMgqMuUuzb1f.WW2c8u2F8ILQce1MvCfvDGjUQh.Q1QuZk_ Ip.Bfp9aisOwao64Srs2V61VQquoZs94t4CJwALt0qQZIkszT.Ks3O5FEP2j3nCxtofyydg1wlgA yV_q2ew00_UyI70AfheGMPJK.NyMxyCU4xVi1S1tqwLgqKT2RYtPcnxMZAst4RJGfBIGkmp9d7vR .miNjWMMbt4jvxfjZv2wnUfrZykZQsdFJPMdDdP0p2.d7hmiqrman7wnImtt7d0WatQSFHDFQyCN 5bE5Q7S.eIfn1d5WU37JHjzEcONni9vhWUf14X5l.rom4JlJcL4sh4fLpYifxw.6WuHKuV3CAZ2x HNSwSdxgEx.tlOgzC92mUPIw9j7QPJcfCMUzXsIgRFh1ys6FwYrxBQFJMGJW.N3dbMy.BfhRqA7t HOGMw27zj2ALe1T_8GfspPtldBdoI9TlUucJ1nQcyNL4_hEUwOrCWmp4RHJ8hqsjqN_Xe8i2BN4_ .PR24czzM_51Rma00OLVRKV2CgJQJvF.bP._MT3MHu0Lx.bCBZIr6GVr48vnOfIEeYVgtJXpmwUj fEzhnJFfXStZFPJPr7F20jJXQMHp24DACIGpvlW8WcKndkfPfXNa8DOxMJxpmSVeRQ9iClACBa4p 2QmCmN1_PQL6hXTI5DtriCdbxxeStMCooRsSks9onJu_Z5dSplKILTlRF2CEBYt_xtX9ciN3fNIg qOYRxVCGSXzsiEjhCV41VYurLPnJ7sYFqKgLUu8dhPNauPpjl7EFd9a7Vq.g1HpIEL4pf4UZ.IgH qj7xgH22LOChiPrfk3hxkLT5kd_ADIoEdvqX2hnSRJjvQgVbrU0.0DW6xpyhPz1RP3g8YkQicsH3 M_svs5dTPLQW4_TYqnP_wQ2A.K66tczNtGspg3PKJ0DbN3SiEdGc_Zj3fiBW_mU0DurC1nxX5Jc5 rGxZU33VGpPakomEOK9DoG2pdIzSf7F70Zp6AklrxNSOPukcKIUB4DFMSdXFXa6Idoh7axj2.PY5 bcuqkCla1FNDGsv8hyjanggk1uGhFijMPXTyt4xPjvxoBioDEp0g88D_tna4SmMpx7YkVo7Fft5T 7ErObCvhOWmr1B5LEAeSO8Of1vbFE25AI5bH3aQa6vcYy905hEYT33r.hTW_ZJu79KZDq4HSGzqo y6.KsIRJrxT6W5uAkBZ4MdYsrlbMVxEd41MLo6FlCUsJ50m6qc6dl.48C5LFkVzYjlvgf2WkKEaq O57YRAVMHIEMFFf00qLsT9d2Ukl85nR3m4H1xnkUn3NZTa4NS6ToRJrjRmGroFDQhBYzMAjSKUlb uqPZJ5B5my8icRxOlpf3Yil9Cz6j0_Q8GRiY7uKSnJMivn22ogba_9D0pFe.7p5WgrKBCHv9mW7j k3jwFmNwqJXN4scMMViO5idEycMTgII.VRszeQAJ6CcbqEwZWE7Vimx9PtHW6JcSS_bMrKgbHlIQ ngLsDJ_BPxSPOxmswG22WD_kzKQSzg7XvPZ88mKyG5PrFEyqQmNBEXXs8dIZMiNHcSEnOlh4XPPa EVnNrZ96ekI8cHj3T03qabFekTLVfeAtjcpj1D1sc_WLBfHyl_Z5D2CJM_SSMdIIipO4EmdG0Tg0 sn6NO_kmaj6eqYHXl6jjUI8dfV2bVv_bn5.4BxqmDEWbnGQX0fAyDOe8i3IoRdb8Z10z99rcTrku IWewdRiFyHset00wuD0b24D7qVaSPezCoZIQ.yg6C5sY8GCyCziQUPDiAO08yCGiZvczxwo3Gaz0 XF89Bzn68A2vHWbE- X-Sonic-MF: X-Sonic-ID: 5277974d-fc01-4119-9fbd-d8f5eb5c43c9 Received: from sonic.gate.mail.ne1.yahoo.com by sonic308.consmr.mail.gq1.yahoo.com with HTTP; Sun, 10 Nov 2024 20:23:09 +0000 Received: by hermes--production-gq1-5dd4b47f46-qfm2r (Yahoo Inc. Hermes SMTP Server) with ESMTPA ID f9f6c9021863f87c751ad60e9fdc089f; Sun, 10 Nov 2024 20:23:08 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable List-Id: Production branch of FreeBSD source code List-Archive: https://lists.freebsd.org/archives/freebsd-stable List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-stable@freebsd.org Sender: owner-freebsd-stable@FreeBSD.org Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3776.700.51\)) Subject: "man loader.efi" and comconsole vs. eficom for aarch64 for 14.* and later Message-Id: <3D054DF2-843C-4270-8EE5-38534C873B50@yahoo.com> Date: Sun, 10 Nov 2024 12:22:57 -0800 Cc: Warner Losh To: Current FreeBSD , FreeBSD-STABLE Mailing List X-Mailer: Apple Mail (2.3776.700.51) References: <3D054DF2-843C-4270-8EE5-38534C873B50.ref@yahoo.com> X-Spamd-Result: default: False [-4.00 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; MIME_GOOD(-0.10)[text/plain]; DKIM_TRACE(0.00)[yahoo.com:+]; TO_DN_ALL(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; MIME_TRACE(0.00)[0:+]; RCPT_COUNT_THREE(0.00)[3]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; MLMMJ_DEST(0.00)[freebsd-stable@freebsd.org]; APPLE_MAILER_COMMON(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.68.31:from]; RCVD_IN_DNSWL_NONE(0.00)[98.137.68.31:from] X-Rspamd-Queue-Id: 4XmkdW6d6mz4WTj X-Spamd-Bar: --- # man -K comconsole /usr/share/man/man8/loader.8.gz: console variable, or set it to = serial console (=E2=80=9Ccomconsole=E2=80=9D) if the /usr/share/man/man8/loader.efi.8.gz: work) and =E2=80=9Ccomconsole=E2=80= =9D for the serial on COM1 at the default baud rate. /usr/share/man/man8/loader.efi.8.gz: =E2=80=9Ccomconsole=E2=80=9D. = The default port is COM1 with an I/O address of 0x3f8. /usr/share/man/man8/loader.efi.8.gz: comconsole_port is used to set = this to a different port address. /usr/share/man/man8/loader.efi.8.gz: comconsole_speed is used to set = the of the serial port (the default is /usr/share/man/man8/loader.efi.8.gz: 9600). If you have console set = to =E2=80=9Cefi,comconsole=E2=80=9D you will get output /usr/share/man/man8/loader_4th.8.gz: console variable, or set it to = serial console (=E2=80=9Ccomconsole=E2=80=9D) if the /usr/share/man/man8/loader_lua.8.gz: console variable, or sets it to = serial console (=E2=80=9Ccomconsole=E2=80=9D) if the /usr/share/man/man8/loader_simp.8.gz: console variable, or set it to = serial console (=E2=80=9Ccomconsole=E2=80=9D) if the /usr/share/man/man5/loader.conf.5.gz: console = (=E2=80=9Cvidconsole=E2=80=9D) =E2=80=9Ccomconsole=E2=80=9D selects = serial console, # man -K eficom # Note: The above is for both main and stable/14 . No mention of eficom or in what types of contexts it should be used vs. not. But: #if defined(__aarch64__) && __FreeBSD_version < 1500000 static void comc_probe_compat(struct console *sc) { comc_probe(&eficom); if (eficom.c_flags & (C_PRESENTIN | C_PRESENTOUT)) { printf("comconsole: comconsole device name is = deprecated, switch to eficom\n"); } /* * Note: We leave the present bits unset in sc to avoid = ghosting. */ } #endif There are other places with the documentation issue, for example https://wiki.freebsd.org/HyperV references: QUOTE Enable the serial in the VM. Below is the example of FreeBSD VM. =E2=80=A2 echo 'console=3D"comconsole"' >> /boot/loader.conf END QUOTE I got into this from trying to get a Windows Dev Kit 2023 running Windows Pro 11 Hyper-V to be operational for running FreeBSD. Its output stops after the mask line for the efi buffer reporting. (Hyper-V indicates 12% cpu usage. 1 core of 8 busy?) I was looking for any extra instructions that I'd not previously found. (I had remembered that eficom activity had happened --but not all the detail.) =3D=3D=3D Mark Millard marklmi at yahoo.com