From owner-freebsd-stable@freebsd.org Sun Dec 23 18:25:39 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AF998134140D for ; Sun, 23 Dec 2018 18:25:38 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.infracaninophile.co.uk (smtp.infracaninophile.co.uk [IPv6:2001:8b0:151:1:c4ea:bd49:619b:6cb3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.infracaninophile.co.uk", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BFABB87931 for ; Sun, 23 Dec 2018 18:25:37 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from liminal.local (unknown [IPv6:2001:8b0:151:1:d943:4eec:c8f0:76ae]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: m.seaman@infracaninophile.co.uk) by smtp.infracaninophile.co.uk (Postfix) with ESMTPSA id C1E12D33B for ; Sun, 23 Dec 2018 18:25:34 +0000 (UTC) Authentication-Results: smtp.infracaninophile.co.uk; dmarc=none (p=none dis=none) header.from=FreeBSD.org Authentication-Results: smtp.infracaninophile.co.uk/C1E12D33B; dkim=none; dkim-atps=neutral Subject: Re: Upgrade to FreeBSD 12.0 breaks SSHD To: freebsd-stable@freebsd.org References: From: Matthew Seaman Openpgp: preference=signencrypt Autocrypt: addr=matthew@FreeBSD.org; prefer-encrypt=mutual; keydata= mQINBFJIL80BEADi7/VbnnErDU6pjEhI/SzEZ/HbDRkJ5g7HroAtqIRm6nj8ZwOAgZ/2ZnWn 5F+fXTuLsG0FLNtkd17FoVcuCi5e/GPliXI5cmamV7E1Yz4T8UsJ7RQolimyxVexccKd16Tc AA7B9bFlJSKkBUSD0buj7VjT07xWhRzu6Vgi5r0UjLALYJz977uZA0F1aOGOXREDEAOhdcNc kSNjynqAwDA6dCT1Elpi4key1fYjv4jyDF+GU/YXul2Y/rguA8FCkHd9vyym5eAsLQ5mG00V V9fkEHIpH5KorNVnl/ufHXnkZqmHAZVpFDcrshb7aZ/pL45PXyWgLj+e6etelgj3a2bZi0JF cVdXCnBZVP2oIyYblM11ugTbfCwodORU8a5KfPeztMdAtDr4e+32NTrPdPi5rLT+GUsYz+PL 3A3m3u8bdsFp40DlIrBtSByVjqERxcfhphrEB4J8BXHUG7OAtXkZMlW/PGKDwXJq0O6Z5Tcg YHAoEiSWbXiexHgXNJyP+sqnIlhLWhSJGeJ+C83wqI6oYlZUCW00NkPxcIHnQPV/z+5wQVci TMyaWC2YCIHz4Ljs+TnwWMz0E8PNFDfHVbQ0W4PRGV7gRAqxfL+yKufauIEGbEq8rNDbSwL3 bcUCxR4ZDlaUEUwT4J8naf7rjdgiEYHs2Ig3jeK1+ER4FPG1sQARAQABtDBNYXR0aGV3IFNl YW1hbiA8bS5zZWFtYW5AaW5mcmFjYW5pbm9waGlsZS5jby51az6JAlcEEwEKAEECGwMFCwkI BwMFFQoJCAsFFgIDAQACHgECF4ACGQEWIQRyz6whebywJLW1RZADb2ye5/OevwUCWttU4QUJ DFmAlAAKCRADb2ye5/Oevwb5EACipbOazgwl5IbqkQI4gELpCh5dqDASS9DQqAD35n/cI91P 0lrYcdyCQbOXadQi5bswnP4AcJqX83mITXbcApDdxVxHujw7VODI069eV3/I9Qz72mHYYAAj w0CHNx4bKED2YCSVS6+jV5hq2sywNEUxL+4I218Oc+IsLts62m4tQ8UxX9fQ2H1kQOvdrYpj x7je5qJX/yujLc+9WWZ8ZBSdP/HVJUEdRgQotwAlgfMp3mRQEE73MAJisG/olj/dSxd+oHIP NbJt1yxMqhZekuEGqZpm3tWvqYgpGcEXdhphJSxeK6oLpTLghuAb7/WdOBrpfL7c2OQYBgOw DK+7Io9NBt/d/rCxL39jmUONW8ohrhnNQ2SALnyYTvZgruxA4tXxOOyM9up0/8mB5E8YC9ML 5YuxRPNTXYeWCexa0zktnkCgT7PhS33evf5gsA0B9Snv7TFCFN9adPAdHlsppZIWfTHDG8e2 Jik8PmvsUG34XNif5k6Ui3++2ZA8ZoKvOyLeomuno1hN8yk1APw8SbX1SPNz9UVbl8W/YgGj 3GhYOuQt4HcMiLyTby6R4lC4nsBaHS1MX+57f6Zxzf2wNjSKxiJK9qS7azbu/GxpafNhbz1Z +iUDIaJkRWA1Gs8C7SMcfVsI5zDtvqHGYtTCgooVMYJ6vRyB68M4bljUYMxRTrkCDQRSUUGj ARAAsPHwcnupWuOqYbboiYwZnd6dNRSUzMxIXN8vkdkrDfw7DvV9WYuAC9IGJ310N0otfh9A zGDiCPRbKl0YayJ2BIgsFzyAavA/kCCRLP5hMZ1mKkZ4K8Fs16EvtmarzPibSBfDQ0wcwzNf nSL2gZVG1JwRHHZ9TtiUsuAIh0R/qRh9+8AcFkS5Pfxb1PzJC/YuWOdlj6cO58u+2FfmNiGm oB6kl1LahmbtGgO8GRInkOYUYlWSUAA4Flw4FzWHBkEGv/STAp++KAZu2Tdl5UZH9iXm+Hsf 4sqt+/ILJketmO2RK2o2ECVwE2a/hQdOjjqmcscd1M5znweKSCk6dR/K4Cv05bZ7KVRCm2vK vuEBpltm/43/ls7OnFwz1UVswX9ch9t5tgSwbGxtTWJ/Mr3ybCz0EE4WaJBI8HTuVZWaJwXM ozz26BZCOV56flkZjDuyRhvRjZG+QhdbbumBDpa6wu3MCjSG8wn4RlNjuQdjDCo6bdqyovGg f8RW6UNCmStZkpTZYZfs8MTEcltmaFiJQjnY39pWa+Fp0aWwcwOVlAkp2wX6FzQeIEbPW515 vAlCjXneJIN7jss4Y2QJtFFQaCw0c+NloESFFhCLvYBhMPf2kccnDu25VRupkLp6njQs94Nf jtSb8mzOa2EhAHY81pRfdetOPosi23P6zIGKLXkAEQEAAYkEuwQYAQoAJgIbAhYhBHLPrCF5 vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG8mAonBvSAEGQEKAGYFAlJRQaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDY1M0E2OEI5 MTNBNEU2Q0YzRTFFMTMyNkJCMjNBRjUxOEUxQTQwMTMACgkQuyOvUY4aQBNlUBAAlCLRtOug Y70Q3lkGsFSNJZm9oqPJGorOsH+emDdsiZSe5Ut5P2MG+XlIofQOfxvupltzw2pFuJOvHEMS 0rod6lLJ6joInhf0ZQH3P6jF/d2Y8iR9+2nqBtUf27OsHVLRMd/5WHVgyMjjyNBq0urIdv4E wV8Y9CDtGBGeiYyMstaBxHdEH+oM9VZB92lv485p4V8t8k1BgNn7UjQzOMBlITAB7WsUcXGi zTjMMe1tX/IT+f00I4PWAn3w5q8ldvtsWf+muVpIaGpZBMrxBEPxYBD3WGMxiymthQQxgZAB 03GatfLjzixld5Zn8WuGiPOxOTBkJAudhxPvfkO+3jgLGSa7TN46HgNH36OdeEr4SMdspR0i 0lmW1hwHmpmyw3XYLy4BwmhuV9z1XQN3qab8FBxOpxcCxnbO4HoDgXAahQbRNSA7umzz+I7S UcZVnCCG3hCG4BLxklZhBw4RmUtRHiL8vu+MPKrcBnbZ8uJ2s3E6mhB0yM0UnA3pYhAysgwB q3n9jLYN0atzVmHL8Fxjyc7z1EJPgqFdfHfMYl/eLYmCuGNfMsSGlH9O7tWoE10qkDlLmNB7 jbiJNgTf9rc50QKKUqumqp4a1UMEnt+7yf//JqUD7Jf0iJrglLgUyPKSY5te9rJqHPy1wIXT 6pChY5ic8jmtXKsCZaaxL8rEsq0JEANvbJ7n856/RNkQAKiZK5wNuRyNJS21MUJxnP7biEW4 1QuGhV/7Ryw5XXIor8H7SZHCnVR1fCYnJWRwRYn0SyZGoERW/57rgibf8/gkPw741AkCKOhL TDNgvNriEjfWj3I0X6M90AZXhcnGVJTS/moV65g4lUo6jX1GiJyTCD4b9SLyNDzPgiWO2I3W R+Xf/W81PK1820CN7HpIZUrLfGF+Nr6kXUxeOeSpi7ZMB/p3e7ZSzY0Lp7PFqGfL9N1Jg26X 8DVaf/Em0AorutLx84DqqMfO02ySaCq0B83VYzbNB3Ascy4c2JNIvwMiyUbsOEzDKkqB3sYb 0iJtnty9DKvMaLps00eM1+GcYpLsspY4NZQeJTVC+WetRqzFM4k2JH1q3hwymYgIsxDam6kn U3m0bN19WLQYmS5HLPZbkmtpm3P49g6KLFxZHzklS7x8VUOMJ3O97xXScBC9bePB3tqQRDSs wX3YmIywTYVInEeFleNaXH3UoS3Dhw7KP3i/BNreWDM+oZhbc2OkgWzQzXfT+l17EcP9/xML 0CIgM/cJPwMOrKrdqgfL6zAYDUK0IGFgRoxgnAbnpPHCr7ykrELNLbGtnzchzCxnbIyrSVAb m+Dm5MnjQRiNFXbuvpkuVVFqo6a0OhX1cwTuCIzSEfSggRaOOEqXTk559dDOXDqVx9lVKniK vbGzkmhAuQINBFJRQiABEADC0axEKC09VCYGgsH20lUwtAXd6VUVCNENBlW+MXQYsKfCLqO+ XP6vM0pA+sSswaBeSB/Eu3XgdKhuYGKHqAOo4wyKvwk3h9IWmgVNMM8ZQFi/PP2ya56/tuWZ 7kkG2M2OfWQpnBHa97wSN0KWDjZHrQXQMggDq5EqimNc2+hFaB2zIGrP0tjXVrHLJEmJRLq2 ugTxpGKLlNOtBNEsWmiN+MafXpKM6HLDq1scCvrhRICheBsnGtcyGaErwpjNaLA70I0+B552 DfTj+PICOGCMnp4jlP6rmVG7RifZoE5DrkcdTim/IU0pLaO/Epts5lwDodEOW9CKQFH8dswT bp6xhKJf+y1dIwhoOIkEUspoME3rgLtn72+QQW4jw/4pjA7MQu9VOF9bUN/nxTfyn/Rct3Bq sBZPJURdorewPgoBsPxMaA7t8JRoRyuVwXGMacw+wdmv2lldsdUOGokSCB596FoXAcKWndiY dgNjMWJaODy2va9Vlv65hGQRXWcoI2ytMCSwSzslly+V+0jo0ZWoUpd+6BuYRvG1QUW5/Fco aPPJsr/UfU0jzg6bCAw/xw1nuGaiZTqNiNjklrGIKyi0UyY28DGGADn3j9obY7pOrI9nFicc NtxURyhmgHP9tiTYNTVaGPyJh+WV3ZH/Yb7TStZadLoWb5vXAs0DQj+qnQARAQABiQI8BBgB CgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbqkACgkQA29snufznr9M zBAAvn4C8wWYyiObQbqgaAm8GjqlSi0lGEv7ydmcu2ElAAyD0dnxbEMKEGgBpQumGD8/1pdZ FYw3EIKWiazpvMVw+6fFz9GZdviuM1refUYm3duDejaNoH75zmIG9LRTOJ6RBkPd3oQznT40 X5K+ARqLaJDPAzjb6DH7HYINlvNvf89M4CVN0gofv7dcCqtBTF8CtXB3iG0cFAis/12PwpfH 3YzWq529jnJJCLChTD5eEBi2JNLzQRHMeqy8D4Bnkb+Ahkwgbzs5GXGYaXoZeyFKThTAK/sg eJ9Cz15azfKW+EWMUOcvCurqz2QajlLe04N9mU4vPp92VTo274CtfIg/shSguYXnEZ0I/sz3 VFn3Kn2bRYeRu6PyusNUsQ397Uw5wDVmqzQqz+MnOkP6xAJjOvnD05cdj17G4rJ8gTgmzDSA 6v0AfzhUygy6Qf0UgrWrFaFIL4zQWsp9sap/QTMm92SBhLOE/Kc7nkkueEeVp0TtbkWByxLq 77Gbp0m4iZB8zylaac118hY+/vJ87aTuKF4CiCcezaI5FMg8/VVczO7/LV/n8Uu8QUOYEatR cfOB2JNXxpI/LqXVzvXpUidJbwpXY2aZprgzGhahBocuRL9jY8qp4in5CkhyU+rZyHkpQMHI +i45KRHO5GDSDMQcDF2LYGRbDUMg7G1MYTJwzsG5Ag0EUkgvzQEQANi5h27KsPhVw6AKlUo8 htPapW7b4RS26/z2pJe1IJ+lejrD5LveuRxdO3V+5hxqdBMEYNuQRmOlgsjiXkM5XFIgBeEF VGBaDv5yKPZXNfqIJC2nNehcR+rWHq84yrVb/MAvEvfQTvn3GeCTDd51xYnZYVO0An44TLLe 9cKL/i5d4I7flz/NK4DMpSqBRs0z7Tj9uF22LtYDJhNnQPolF4f+ADRLGMsbNHpCKwLcuzCR NlWN+eTY9peGZEfDoJT39u4wdg2ut9aSTv3B+l5HHkfYSS2gNf5yQ3YOVbQp/D6vZvNBCS0n Y5G5ApFil2ZAdoqfllqeQ74eH/dEPqOK1LCiBznKPHoLvTAJgA9v+Lhb9qw1jbIVD56Y88ZW c2iONscDlN2dboAYXGu3pcc8KNFkfc/j3MKRfq6N2l+t/n4ueebtLZypDJ3v9X7cQAkaW90R DhEuPpvvd+MEZGDYH3ZtIokqXZ3G3yiAy4M4TGXg4jX2pQ8ccXciimcp3DaXvqcV/SKnF20Q l6lm0r9sNp8ZBWUkLeMnDnpMdSjlONGuG9TsM50gaDi+kJuy9/fnlA0UGMpQNmBc1wsNAHl/ Q3ObZHUQtsZZN0gYEusDHpNC87SHodMS5YTc/eKx02asEoIoue/vUejkI6dvHWZv93+13y3c ZBhHyfF6SEr5dNkjABEBAAGJAjwEGAEKACYCGwwWIQRyz6whebywJLW1RZADb2ye5/OevwUC WttVSQUJDFmA/AAKCRADb2ye5/Oev9SOD/48JvgAf/PkjW0+TTE5vDaqdlEmNBu3K/vFX4T7 u0YT+qzLGUGYUvISiti9Dl7dV8kTg/Yr20EbHpj2a1Iys03YbR3mn/p6dv9abyqkaSESHN/g PPk1rlEi/j3lyoQsjDN6bpBEwT7Kbgri+Lwtkwp0vGm8I5AOguGlnCuNqsJ2jnHJ6YnEaKKp imIkr8wJVWxmx0OfnZxWrhMr5txD2DG675r1/IyOkU6SnApoD15+fJQmrsSmCKo3cZUMvM5Q 9lUJgdKuC89jJ1NujCzk7SC/EP6xSW0KFGzpqK0leIfh1riQ8DNs9CWreLANKtq35qbDUeGy BHwki0krsRRuNfg+0c+Rc5XOl+vuGmwfblKguIkAKSMSsjslXHqom+9s+mhOqJUSjAHsazlL BkVn00DfooDQBeeOwDlRwmQi+xcV3FomZMf5+4ARmsfzGtRIiJp5pfjek/P9vjeW+UqlE2az teXCmaK0G2LaLVVNnJzrUVQAqpA5eMtd3Ay8IGlhbrfznmAplgUH0aYhR1twIbUF8MeyQYIH fofR+lOnp3/vufJFZWve4S6tbK/OA69+Xr4wKAG95XBw03qZtPFbWu9yk5AYuS02U4akBhFv NfSx4Bs2rcrXZh63VBrlNqecueJdOQiQuY6nGoUa5fiE9glZF5ib9PVa522bBwaI2mW1tbkC DQRSUUKTARAAt6FH3HbDFoumOWUuJlDgOQs3wdp2n3IKv7gqzbDdgaoWW7hDTvjO0Cb6p2PG UKEoxMQQoIdDO0pQ9rgr4Sh4VSVC9WMO/fUwqdrIs2nACIg4OwvNhIccW08S+N72f+yuXWOQ /dv79cwruE26/BEXgIP09MYcOWwcUCXzOoUR3er+jzcsN9uFjcsBVUJLIEru1askHRzCUa5P 9S9GAFBwN49HC5IJWEzdLP27FjjOG5UG3+QZahHrjG1i6S3bIYXtaGsqNyfkp9Is7Wpj2kk+ s9Ua+YMG/V5YVlbANIexa1yr75p1W9biqXpCWnB3TaHSfI0G1t9w8K2qhR/Z1/YLIcRzZ2aH JnvbzJYw5Cs1jfNpFytbASsxj0rbReouftlBvVWFRxsZ+oG1ZXL64/SVKMZAnfBNxd1uajp+ HtoQtYoTu88la6zcdnAhOD5JdOntN2VF8iQnDfPgkidfuSZ1C059xaRPTSRJBgMRDtOlDxgz 7Pxx/7L2jwxRY1dq6NGioflY7CCpGc7bi1K6xnf3lBL8X2nGpRAVsg9Lx1ShIWkgNbTAcPXp XcXlJ1xqz8HS8Twadh6gIfk/RNchBIED9lkVCKHYp/XQb8T8vMwn/kTWUm5WlPkQUFQN4D1b 6+dJw4bwn/wiRS8did1MU1OytJB6tljfEUCx0uKkzqr+33MAEQEAAYkEuwQYAQoAJgIbAhYh BHLPrCF5vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG42AonBvSAEGQEKAGYFAlJRQpNfFIAA AAAALgAoaXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp5OdNFg// ZqeVdGoKkMvALPzZjGz84+6l0kcMxSN4TfWmec0YpSmDEzCw4/SZoGqHlZb8lcTevmNrNXg6 c+wVw6P+Ycl20Nzb98Kt9C5sz+zGVmPPK+3O9gaPnEqlIKnnbxKXXNHQdd8Mf0UTpifMqX0I kWOqhe/tQKGoQ9+feKvLIaToIe/NjosW6vJ9YAgFqZ0015zwbElhMNFmgDMOI2SgjBZ9ngP1 U82Mqb7/7G9GxHtnwuJBSnPJgN8tav2O9uWPC0N8deyZBH4y9ERBPTFMc46wjkW030olcq7g 4hZ55rpPIEyGQZCq4u1gGibbiQJZEyUQT7BJm70/PeUr3uNjPlQODV/lF5TBvqGHEmlSQfo6 Yb/QQx07CK9bvhUSO2XP3ybS8JwoMZlgZzZcjiPiQF9ot6152/Cp/XrsKgtk+fg5ARZpyywR lQk1JCHRZvhgXIxqNYA04uwdPFcLI4vPiDaLS8mhXHLRZsSpHmIBqqrnam5Lq7iDc39UZrSJ MM40oy3iAOI2B7AOCbzxRuEplJd3E/tEqrnFGcPVN+h52ka74lEyfkwA2RrASWJJcXLN3/Vs izEj8okepefzjU/UPnU8sirzeWWo8Z4uKddovk//NwAPUJbee4vZLjYE6MWdpEoZP9CZXbtI PWuc9Djg16aHOgv44JPokDMaHA27A4rw2KwJEANvbJ7n856/SPkP/1bGUde7lnRTNd8c0ZrU tEi+OOibKyh7BjLUpzlihj3rGl9ljAF0eCdBrL1We3MDDcyi+XO7VZLiecZTlG6LLXFvEFjY pyPRx3bXlWk1/ahEiBoLWxedseNdFrO+H5XX6ODmKFFLhXgpsXnAxtM6Mxmrx0CGW4qzfUi7 Vsqj86gqlcet0/k5RqPMAhrGX5fNnQNWSAwumeFKM8UgDpKY0u7M2tS07B0ozXOSpqGTSJhX 6Ld2Nl95CL3wbSGuh1pDUOysAnzK5Rl/OQ9LtYpWomAKg6yn7gKYij5XmekAg/E+ybr5Gyx2 PgMQUGtuNmBRWP1qKtVUbrOekiuNz7kpdrP7M2O7i/cxWjGpVtjDNWuGkFgY3c+sKKawBma8 1K4rg044nkGwFX98vfEHVGu+HOd3D+Mv47nv4LQvzynBG/YflwaPmLhpw7HCPvpa4W7y8+5A KxDqWlM2NvrLwmwbmz9dQMGtjnNRm4uHfPX8AyzBoMtDrxNLIvDYlLqh+G2Q1shNNNdRNXn9 Z1pvri6KAHmH9GlISuM/jQfItout+Gtx9QUlNX3aIsdScTLA3jnMOpHcALCGI+XMiBNaVuYU xHgHh+MNYhmjQZZqASBCvVj1HyibDPZa/iQ4DBGBRlJb+8saPPqYVDQhosWSF20aJKwepZII OFjpMgmCIqZAnqK4uQINBFJRQrgBEADUWFag56O3CaycayGght1rYWYz7P9/3s7OlqAuEAId 8/kSz8jXzAb/Qb6t0247a2MD0gxnjgZQy2OiQOsOTrc31L6tUrLVATL5Q3oKIh9hOlNMA+cR jsgY3UmMaSw+Gftp64EJDBQwBXWT7CSUEJw4PqzwMPiTHRkmqQfzdfNagFJVqZ0e+cznoLzI 9WvkccwLW1kicBYEysX5yOXUQ9/PcKqRWcbxLFznJ16JsxL1DeUct5WRWUxECY2rM0t+AkNR a3NpzskiMUSzFhiGmJo9yyy1RS4drjMhEn/IcM1sO21ZF/WWuUVkul65qngFnaFDDRQ5lU3A agWhLhmppmK/yabSVfqz38B1APoBWuldYprslTbAOJrL2xFtiH7m9VYbP2aGdwr9V/C27kiN Wnm/lYzP9Z+dTFkxw2V+BOjiLWzDDD6pEE7YDhiPyoopadOyXtoJf3aK1OI+DBu3piBA/CDD DvavruM+3mjxUxcOo8w8rMaJzDUDLG0yOyhKWef3UW5ly3CKXe8+m/MZe0GavNBJt0ObLQpP mnn9b2kP/xS0ssszo8uzlfSMiGi9AedAoRQ7vFXfI0MBb0M8gJ6Ht/+j1b5Al9ABeeA3PRuu +aBJwBRdFp4AV5BsCa0Qb3aqVJUPuBvtY56aWWB9sSfQ1qeu/loRxkJbHhaPJswscQARAQAB iQI8BBgBCgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbhEACgkQA29s nufznr+YBw//TJtAC9d/FYQQHKQg/QOEkcAL8Qx4HA2SICnhKqv64jPcYIUYocOO8Qayh+IV Da6MGkbsWdweUFuexMsW+17dqETfQjUApx32TUwF44WgIEfARLW2zRdRcXfsT4A2sQJCvNJr JnH3lywiJi+V848Q4sC3sSJREpcJd07oc2jxSKZyYZ1DBPfK1MyiwcBt2uFCTXdyFMham2aY LDP2JYvFP08tjTUAIKhe4B0bPTtldCf5sH5q8xrpaHnKHf0n7qMmK7NtGW/9R6WiCruiNsLn O95fms1tzKKfA4QXIYCEWl8XsRKwp51HZDjQu/KxPsjm6BL4eThnae9t3Zs5J0LiPxoFbN+p W7anft3YCeezB8+gus7I1Rn5yJMRyYRRVHtZZTBDQfoDqHgLY14GYtFGOT0IR/OuAzYM1CoM vVExgqVWixDwF5RH1OHO1TANqTGcrRm1lvasCWIphpoQVtkN4/PXGa+NhzsRmr/c5OUYxQNr oE8cdsK8mOIBRz9D2JpF7d2nr1X+vA4zk2JL61aCnc62BfSYNZWhCcOPJZUhFT9BqAkew0kk JzQ3jwHGAhfcfozTHoFsD08qAW0OUriEtH+EOXl+dYbjlNUjFPjJu49cZbtp/1TpsYOBdME1 QLM1TPanYXa7tb+IrRZN+Oi9i9VVym16DK7q21k3j0qRC0s= Message-ID: Date: Sun, 23 Dec 2018 18:25:34 +0000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.3.3 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="k0r0whD56D4yZ6ZyAzqruqD25jOPFpKhB" X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 23 Dec 2018 18:25:39 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --k0r0whD56D4yZ6ZyAzqruqD25jOPFpKhB Content-Type: multipart/mixed; boundary="RHWT12GKVqeYibqxEmIWk411f5mGY8J4Q"; protected-headers="v1" From: Matthew Seaman To: freebsd-stable@freebsd.org Message-ID: Subject: Re: Upgrade to FreeBSD 12.0 breaks SSHD References: In-Reply-To: --RHWT12GKVqeYibqxEmIWk411f5mGY8J4Q Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable On 21/12/2018 17:10, Andrea Brancatelli wrote: > Hello.=20 >=20 > Just a quick head up.... Today we update a FreeBSD 11.2 to 12.0 machine= > and our SSHD got broken.=20 >=20 > The problem is with HMAC line in the config file, specifically the > hmac-ripemd160 value. It was legit in 11.2 (and I suspect > default-enabled for a previous FreeBSD version because never in the > world we would change that line - I don't even knot what's for) but it > doesn't work anymore in 12.0.=20 >=20 > So as a check, before upgrading check your /etc/ssh/sshd_config.=20 >=20 This should have been high-lighted for you when you ran etcupdate(8) or mergemaster(8) as a routine part of your upgrade procedure. If you never modified anything to do with the MACs setting in /etc/ssh/sshd_config then either of those two programs would automatically remove hmac-ripemd160 for you, or else they should show a merge conflict for you to resolve. I recommend using etcupdate(8) as it minimizes the effort needed to merge in updates to your /etc files. It takes two steps: 1) jJust run etcupdate(8) without arguments. It will do a three-way merge between the previous default and current default contents of /etc and your actual /etc and automatically upgrade everything it can. It will then print out a list of the files it modified, each with a single character indicator shown how the file was dealt with. 2) If anything was listed with flag 'C' (meaning "conflict") then you need to run a second step to resolve the conflicts: # etcupdate resolve Edit each of the files presented to remove the conflicts and provide the correct settings for your system. Cheers, Matthew --RHWT12GKVqeYibqxEmIWk411f5mGY8J4Q-- --k0r0whD56D4yZ6ZyAzqruqD25jOPFpKhB Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEGfFU7L8RLlBUTj8wAFE/EOCp5OcFAlwf0x5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp 5OfiDg/+LwX8/wZJ2y6ogCqPGD6fZphfvYPXCOF+21J+sYSNjSklGNiH0uQWCap7 U1KP09kWftDunBIW4fTqi5oZuFZ4HwaBBzHsZDKmbGJJJBD0HgDHsl7ooUIfXyPx B2+KhFNmXZBqzgQIRG+7hTw8pWrxinihNiI4TtdmoalLI6yxlF0Z92kOk+PdMijW U+rqYc2Nz7haeMSfOdhhyEcDLN2Sfo7yVJH2x23dqSkNB7oyoH0U0R5nk2wo6A/t tZMTSSkn2taDXv8mCaLQT2YhyAH+pvypN86ZYW4LmU1MSPRFw0HeNP9IhxK4jgeZ iIsh0MMIJNaXz97gfHYVKnq+dVK4YqEteXJ09gAAjPBqv0H9AUs35HuP5SeGr/sv k4G5ixTcuCdkEZ2aqNXpkMEtJeeKM1ain15NBQsCIoOHfpneOlSxY2LWSgw3fuuj kMghTLWuNkEpeUWFmzed0wrXeRWvEisCUuoCTjMml6RjY+zC5GJo+3Tn9DJc5DHU bY1wNpnruIMIX9dKSOODL3ijj0tZvQz8cVkVpJ2fMFum66i0sgmei+PJ2i0IvqwB Lxi2UYg0OrwrKOZIWPPrvDOGNLHjkpUJM/SHHwgn3U0j5HBQ/XhQ4w/tLHvkla+n PwyCfZep2aYVHpVZGlvpQvLbJ3H2DNchMMjib5oZIfsVPRpyeBk= =a7NI -----END PGP SIGNATURE----- --k0r0whD56D4yZ6ZyAzqruqD25jOPFpKhB-- From owner-freebsd-stable@freebsd.org Sun Dec 23 21:00:28 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A8C4F1347AE5 for ; Sun, 23 Dec 2018 21:00:28 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 45F8E8DD87 for ; Sun, 23 Dec 2018 21:00:28 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: by mailman.ysv.freebsd.org (Postfix) id 09C051347AE2; Sun, 23 Dec 2018 21:00:28 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EC7451347AE1 for ; Sun, 23 Dec 2018 21:00:27 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8DFB48DD81 for ; Sun, 23 Dec 2018 21:00:27 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id D6D8113152 for ; Sun, 23 Dec 2018 21:00:26 +0000 (UTC) (envelope-from bugzilla-noreply@FreeBSD.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wBNL0Q5e021164 for ; Sun, 23 Dec 2018 21:00:26 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Received: (from bugzilla@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wBNL0QV8021162 for stable@FreeBSD.org; Sun, 23 Dec 2018 21:00:26 GMT (envelope-from bugzilla-noreply@FreeBSD.org) Message-Id: <201812232100.wBNL0QV8021162@kenobi.freebsd.org> X-Authentication-Warning: kenobi.freebsd.org: bugzilla set sender to bugzilla-noreply@FreeBSD.org using -f From: bugzilla-noreply@FreeBSD.org To: stable@FreeBSD.org Subject: Problem reports for stable@FreeBSD.org that need special attention Date: Sun, 23 Dec 2018 21:00:26 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 23 Dec 2018 21:00:28 -0000 To view an individual PR, use: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id). The following is a listing of current problems submitted by FreeBSD users, which need special attention. These represent problem reports covering all versions including experimental development code and obsolete releases. Status | Bug Id | Description ------------+-----------+--------------------------------------------------- New | 230620 | "install -d" issue 1 problems total for which you should take action. From owner-freebsd-stable@freebsd.org Tue Dec 25 06:57:25 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 744C01342818 for ; Tue, 25 Dec 2018 06:57:25 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: from mail-it1-x12c.google.com (mail-it1-x12c.google.com [IPv6:2607:f8b0:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 448528B433 for ; Tue, 25 Dec 2018 06:57:24 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: by mail-it1-x12c.google.com with SMTP id i145so17741109ita.4 for ; Mon, 24 Dec 2018 22:57:24 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=y+zSHpTdNZkFLljDCHEGb9e/wOHn5FUihNOcaXceAZk=; b=JdNDQXLBsnlhMZ5fn3hgKOw1jQ66ZZ5oZtsOOTfa4O4v3PNgHcEbEICDe1iMm05bJj hKW2lra+kt5HsjoEhzSA8sMAE49ge9cHsAU5PDJ04oLWnqOGfXhAOW+5e5Kjqb7/58hG LSE24fh4l032skR2K2tvRxJa14FlbzVK1XX/U1B1Y4LhhN7s6muUmX4urKSKcg6q1M1s RT3KusVD94p8E5vkGOgcXNpxB26ePKywY66Tg+Sf8SLL6EBJVlJhEMfdj0fACTHTDPWM eIwonXGIyGHchu6L47o4dUKFy3MPEYz/1RslCpNpvjLAhITU5SKWbbz0qzClSbTeNZ/N cNkw== X-Gm-Message-State: AA+aEWbMYi7MQjAwJMknkXWt+QX27x+cl+N4ox8979ew4/7t40q7Rpig X2cGjGlrvoGZTrAGGuAO3+kpRxgBbA+J5TsnqA7I9mfnUMe82Q== X-Google-Smtp-Source: AFSGD/XBQW6Y4R4c2BjvWieZoJ4XKrYvZjTn7EhT0xpKYJV6E9rtnr+Da9kg/A5OlnE+P3p4sqwm7I0B/m9C7dRCN04= X-Received: by 2002:a02:152:: with SMTP id c79mr10180644jad.138.1545721042913; Mon, 24 Dec 2018 22:57:22 -0800 (PST) MIME-Version: 1.0 From: =?UTF-8?B?SnVyaWogS292YcSNacSN?= Date: Tue, 25 Dec 2018 07:57:11 +0100 Message-ID: Subject: Kernel panic on 11.2-RELEASE-p7 To: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: 448528B433 X-Spamd-Bar: ------ X-Spamd-Result: default: False [-6.53 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[ocpea.com:s=google]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE(-2.55)[ip: (-9.34), ipnet: 2607:f8b0::/32(-1.85), asn: 15169(-1.48), country: US(-0.08)]; DKIM_TRACE(0.00)[ocpea.com:+]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[c.2.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.96)[-0.963,0]; DMARC_POLICY_ALLOW(-0.50)[ocpea.com,reject]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 25 Dec 2018 06:57:25 -0000 Dear list, I hope I am posting this to the correct list - if not, I apologize (and please advise where to post this instead). Today I experienced a kernel panic on a (physical) server, running Freebsd 11.2-RELEASE-p7 with GENERIC kernel, ZFS root: Fatal trap 9: general protection fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff82299013 stack pointer = 0x28:0xfffffe0352893ad0 frame pointer = 0x28:0xfffffe0352893b10 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 9 (dbuf_evict_thread) trap number = 9 panic: general protection fault cpuid = 0 KDB: stack backtrace: #0 0xffffffff80b3d577 at kdb_backtrace+0x67 #1 0xffffffff80af6b17 at vpanic+0x177 #2 0xffffffff80af6993 at panic+0x43 #3 0xffffffff80f77fdf at trap_fatal+0x35f #4 0xffffffff80f7759e at trap+0x5e #5 0xffffffff80f5808c at calltrap+0x8 #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 #8 0xffffffff80aba093 at fork_exit+0x83 #9 0xffffffff80f58fae at fork_trampoline+0xe I have used "crashinfo" utility to generate the text file which is available at this URL: http://www.ocpea.com/dump/core.txt At the time of the crash, the server was probably under more intensive I/O load (scheduled backup with rsync). This is a production server, so naturally, all advice is deeply appreciated. :) Kind regards, Jurij From owner-freebsd-stable@freebsd.org Tue Dec 25 20:39:19 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0A105135B610 for ; Tue, 25 Dec 2018 20:39:19 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 28107890FE for ; Tue, 25 Dec 2018 20:39:17 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id D3626135B60B; Tue, 25 Dec 2018 20:39:16 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 48BD6135B608; Tue, 25 Dec 2018 20:39:16 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 10150890F9; Tue, 25 Dec 2018 20:39:15 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mail-wr1-x430.google.com with SMTP id v13so14270028wrw.5; Tue, 25 Dec 2018 12:39:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :mime-version:content-disposition:user-agent; bh=p8j7FGytMgce/A838Q9WfXxBPVOhCaK8zg5FPlZSgak=; b=Y0U7EIp2G1lOzI70TKIfFGiZlJS1sdyACrqfcQ4dLtmzTOOTBLD15y0xB33PjUSIec shofDNlqAHDnBsxwh4VmcxTYF5qDeq7YCQGspY2jRreQ0D9IR0Nti4GF8ILH7v7BHBwj NVtzR4TgueMKknPryNz6NO7WHS1mHF7JCB2/1i0RFgpAtB0jrDPzSSeW16JJJjKCVm2x PBOM5lwTjGRf8f1PyuCy5ZIxpWsstOIyUz8QEKBbpdDAgYsm0/T9eb1QG8zv7SOA2sGN ZWhQxWJYJSzyoEWEksg10uaw+rffCvr+sj5u3svf3ltv/RcR8p5YgZpeeOk1/5y+Ull/ JWFw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mail-followup-to:mime-version:content-disposition:user-agent; bh=p8j7FGytMgce/A838Q9WfXxBPVOhCaK8zg5FPlZSgak=; b=QlnkEMpRIDU5VVSwYB1GzGCvwzkGP6PtPRx59DvufnwdTwUduavI1ctCcIuS3YUxdm Qpfc6mKmLV+BiR5hqgXF4LEgmlzt+Gic8QvhzbH1pBThWQD+/aJpROm37oBC7+hlWKZs s+iP8mEGAOt5E3XnWq7lnysU1ZpfVO4g4g4Stet9qO41REAIzmLozIeqf+pF+vMURXSv lLfU/+6pBp4gZn7cv9HD9vlHJhAjXb0oOfHyMjw/lPhP59jy5MNr4kAMPWezPZ/B0Yr2 gT3WNqIAODHfWCLkaXsqawOkWnSli2ONV7LnLVlmxBUeGnHKKMt0qM5sWaQj1iNTE7xQ 7KpQ== X-Gm-Message-State: AJcUukeuEhrcHbdjLtEpYRXQwcH8GiR0VjVfbMJSfCGmRjt3V90waZip jc/7mQdFRY9mc54RDGjzfty1ZC40 X-Google-Smtp-Source: ALg8bN4sTkbm2IIL/iJIuE6b0RZQaFLx9aRkF7oBnumqUY7Vn0CSzSgDdWKpKZP8AZN8iZLdE3FEgA== X-Received: by 2002:adf:fe8f:: with SMTP id l15mr15629237wrr.313.1545770352033; Tue, 25 Dec 2018 12:39:12 -0800 (PST) Received: from v2 (cpc92302-cmbg19-2-0-cust461.5-4.cable.virginm.net. [82.1.209.206]) by smtp.gmail.com with ESMTPSA id h16sm59549319wrb.62.2018.12.25.12.39.10 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 25 Dec 2018 12:39:10 -0800 (PST) Sender: =?UTF-8?Q?Edward_Tomasz_Napiera=C5=82a?= Date: Tue, 25 Dec 2018 00:00:01 +0000 From: Edward Tomasz =?utf-8?Q?Napiera=C5=82a?= To: hackers@freebsd.org Cc: current@freebsd.org, stable@freebsd.org Subject: FreeBSD Quarterly Status Report - Third Quarter 2018 Message-ID: <20181225000001.GA16548@v2> Mail-Followup-To: hackers@freebsd.org, current@freebsd.org, stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="huq684BweRXVnRxX" Content-Disposition: inline User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: 10150890F9 X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=Y0U7EIp2; spf=pass (mx1.freebsd.org: domain of etnapierala@gmail.com designates 2a00:1450:4864:20::430 as permitted sender) smtp.mailfrom=etnapierala@gmail.com X-Spamd-Result: default: False [-7.32 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.93)[-0.929,0]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[trasz@freebsd.org,etnapierala@gmail.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[trasz@freebsd.org,etnapierala@gmail.com]; FORGED_RECIPIENTS(0.00)[hackers@freebsd.org ..,hackers@freebsd.org ...]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; IP_SCORE(-2.58)[ip: (-9.63), ipnet: 2a00:1450::/32(-1.71), asn: 15169(-1.48), country: US(-0.08)]; RCVD_IN_DNSWL_NONE(0.00)[0.3.4.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 25 Dec 2018 20:39:19 -0000 --huq684BweRXVnRxX Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable FreeBSD Project Quarterly Status Report - 3rd Quarter 2018 With FreeBSD having gone all the way to 12, it is perhaps useful to take a look back at all the things that have been accomplished, in terms of many visible changes, as well as all the things that happen behind the scenes to ensure that FreeBSD continues to offer an alternative in both design, implementation, and execution. The things you can look forward to reading about are too numerous to summarize, but cover just about everything from finalizing releases, administrative work, optimizations and depessimizations, features added and fixed, and many areas of improvement that might just surprise you a little. Please have a cup of coffee, tea, hot cocoa, or other beverage of choice, and enjoy this culmulative set of reports covering everything that's been done since October, 2017. --Daniel Ebdrup __________________________________________________________________ FreeBSD Team Reports * Continuous Integration * Core Team * Ports Collection * Release Engineering Team * The FreeBSD Foundation Projects * 32-bit compatibility and other ABI cleanups * 4G/4G address space split for i386 * ACPI NVDIMM driver * Boot Loader * Building FreeBSD on non-FreeBSD hosts * Device Mode USB * ENA FreeBSD Driver Update * FreeBSD Graphics Team * FreeBSD/DTrace * ifuncs * Intel Work on Core Enabling and Security * Large scale package building * LLVM 7.0 - Sanitizers support improvements / Static code analysis * Performance improvements * Save/Restore/Migration support in bhyve * SMAP * String functions on the amd64 architecture * Usermode mapping of PCI BARs Architectures * Allwinner SoC Support * Armada 38x FreeBSD support * ARMv6 and ARMv7 image now use EFI loader * DTS Update * FreeBSD on POWER9 * FreeBSD on PowerNV (ppc64) * FreeBSD on RISC-V * PINE64-LTS Image * PocketBeagle Support * RPI Firmware/DTB/U-Boot Update Ports * KDE on FreeBSD * Puppet * scarab: CLI tool for Bugzilla-related workflows Documentation * Cleaning up the Wiki * Quarterly Reports Third-Party Projects * HardenedBSD 2018Q3 Update __________________________________________________________________ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. Continuous Integration Links FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org/ FreeBSD Jenkins wiki URL: https://wiki.FreeBSD.org/Jenkins freebsd-testing Mailing List URL: https://lists.FreeBSD.org/mailman/listinfo/freebsd-testing freebsd-ci Repository URL: https://github.com/freebsd/freebsd-ci Contact: Jenkins Admin Contact: Li-Wen Hsu The FreeBSD CI team maintains continuous integration tasks for FreeBSD. The CI system regularly checks the changes committed to the project's Subversion repository can be successfully built, and performs various tests and analysis with the build results. The CI team also maintains the archive of the artifact built by the CI system, for the further testing and debugging needs. Starting from June 2018, the project is sponsored by the FreeBSD Foundation in hardware and staff. For more details of the sponsored projects, please refer to: https://www.freebsdfoundation.org/news-and-events/newsletter/freebsd-fo undation-update-september-2018/ In addition to that, we also helped checking regressions for OpenSSL 1.1.1 update and test continuously for 12-STABLE branch. We had meetings and working groups at two developer summits during 2018Q3: * BSDCam 2018 * EuroBSDCon 2018 Work in progress: * Fixing the failing test cases and builds * DTrace test * ZFS test * GCC build * Adding drm ports building test against -CURRENT * Adding tests for selected project branches, e.g.: clang700-import * Adding new hardware to the embedded testbed * Implementing automatic tests on bare metal hardware * Planning running ztest and network stack tests __________________________________________________________________ Core Team Contact: FreeBSD Core Team Much of Core's focus for the past months has been on three items: 1. Coordination between different groups to support the upcoming 12.0 release. The timing of the OpenSSL 1.1.1 release posed challenges, the new OpenSSL version included API changes, many components of the base system and ports required changes. Staying with the older OpenSSL in 12.0 was not a feasible option, because it would have meant backporting many changes to a version of OpenSSL that would be unmaintained by the upstream source. 2. Discussions with the release engineering team and Scott Long about updating the FreeBSD release process. Topics for exploration include: * having more frequent point releases * changing the support model * revising and improving the tooling used to manage the tree and releases * additional topics as they are discovered 3. Gathering information to make decisions more data-driven. For example, we are planning developer and user surveys. If there are questions that you think should be added to the survey, please discuss them on freebsd-arch@. We are exploring ways for automated user-driven hardware usage data to understand the changing ways our software is used and to target better hardware support. Here are other noteworthy events (in chronological order) since the last quarterly report. 2017 Q4 * Sean Eric Fagan's (sef@) commit bit was reactivated with a period of re-mentoring under Alexander Motin (mav@). * The MIPS architecture was promoted to tier 2 status. * Core approved changes to the Code of Conduct. * All fortune data files, except freebsd-tips, were removed in r325828. * Core approved the adoption of a policy requiring any license exceptions to be recorded alongside code. * Gordon Tetlow (gordon@) became the new security officer. * Core approved the use of SPDX tags. 2018 Q1 * Jeb Cramer (jeb@) was awarded a src commit bit under the mentorship of Sean Bruno (sbruno@) and Eric Joyner (erj@). * Members of the CoC Review Team were approved. The membership is to be reviewed once per year. * A vendor commit bit was awarded to Slava Shwartsman (slavash@) of Mellanox Technologies under the mentorship of Konstantin Belousov (kib@) and Hans Petter Selasky (hselasky@). * Walter Schwarzenfeld was awarded project membership. * Brad Davis (brd@) was awarded a src commit bit under the mentorship of Allan Jude (allanjude@) with Baptiste Daroussin (bapt@) as co-mentor. * Vincenzo Maffione (vmaffione@) was awarded a src commit bit under the mentorship of Hiroki Sato (hrs@). * Ram Kishore Vegesna (ram@) was awarded a src commit bit under the mentorship of Kenneth D. Merry (ken@) and Alexander Motin (mav@). 2018 Q2 * Tom Jones (thj@) was awarded a src commit bit under the mentorship of Jonathan T. Looney (jtl@). * Matt Macy's (mmacy@) commit bit was restored under the mentorship of Sean Bruno (sbruno@). * Breno Leitao (leitao@) was awarded a src commit bit under the mentorship of Justin Hibbits (jhibbits@) with Nathan Whitehorn (nwhitehorn@) as co-mentor. * Leandro Lupori (luporl@) was awarded a src commit bit under the mentorship of Justin Hibbits (jhibbits@) with Nathan Whitehorn (nwhitehorn@) as co-mentor. * The handover from the ninth to the tenth elected Core team took place. The tenth Core members are: Allan Jude (allanjude@), Benedict Reuschling (bcr@), Brooks Davis (brooks@), Hiroki Sato (hrs@), Warner Losh (imp@), Jeff Roberson (jeff@), John Baldwin (jhb@), Kris Moore (kmoore@), and Sean Chittenden (seanc@). * Joseph Mingrone (jrm@) was appointed the Core secretary under mentorship of the retiring Core secretary, Matthew Seaman (matthew@). * The new team liaisons were decided. portmgr: Sean, doceng: Hiroki, secteam: Brooks, re: John, clusteradm: Allan, CoC: Warner, Foundation: Benedict, bugmeister: John, CI: Sean. * David Maxwell (dwm@) was awarded project membership. * Daichi Goto's (daichi@) commit bit was reactivated with a period of re-mentoring under George Neville-Neil (gnn@). * A vendor commit bit was awarded to Ben Widawsky (bwidawsk@) of Intel under the mentorship of Ed Maste (emaste@). 2018 Q3 * Core decided to begin meeting twice per month in an attempt to catch up with many new agenda items. * Li-Wen Hsu (lwhsu@) was awarded a src commit bit under the mentorship of Mark Johnston (markj@) with Ed Maste (emaste@) as co-mentor. * Samy al Bahra was awarded project membership. * George Neville-Neil (gnn@) was approved to begin co-mentoring Vincenzo Maffione (vmaffione@). __________________________________________________________________ Ports Collection Links About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to ports URL: https://www.FreeBSD.org/doc/en_US.ISO8859-1/articles/contributing/= ports-contributing.html FreeBSD ports monitoring URL: http://portsmon.FreeBSD.org/index.html Ports Management Team URL: https://www.FreeBSD.org/portmgr/index.html FreeBSD portmgr (@freebsd_portmgr) URL: https://twitter.com/freebsd_portmgr/ FreeBSD Ports Management Team (Facebook) URL: https://www.facebook.com/portmgr FreeBSD Ports Management Team (Google+) URL: https://plus.google.com/communities/108335846196454338383 Contact: Ren=C3=A9 Ladan During the first quarter of 2018, the number of ports grew to almost 32,000. In 2018Q1, there were 2,100 open PRs with fewer than 600 unassigned. There were 7,900 commits from 169 committers. Compared to last quarter, the number of commits grew by 18% and the number of PRs dropped by 25%. Those are some good numbers! During the 2018Q2 and 2018Q3 quarters, the number of ports grew to just under 34,000. The number of open PR grew to almost 2,500 with fewer than 600 of those unassigned. A total of 175 committers made almost 14,200 commits. Compared to the first quarter, the number of commits dropped by 10% and the number of PRs grew by 19%. During the last three quarters, portmgr took twelve commit bits in for safekeeping: daichi@, deichen@, ian@, junovitch@, kevlo@, maho@, nemysis@, pawel@, rea@, tabthorpe@, vg@, and wxs@. Portmgr welcomed thirteen new committers in 2018Q2 and 2018Q3: * Devin Teske (dteske@) * Eric Turgeon (ericbsd@) * Fernando Apestegu=C3=ADa (fernape@) * Fukang Chen (loader@) * Gleb Popov (arrowd@) * Jesper Schmitz Mouridsen (jsm@) * John Hixson (jhixson@) * Kevin Bowling (kbowling@) * Koichiro IWAO (meta@) * Mateusz Piotrowski (0mp@) * Matthias Fechner (mfechner@) * Sergey Kozlov (skozlov@) The following committers returned after a hiatus: * Ion-Mihai Tetcu (itetcu@) * Kevin Lo (kevlo@) * Sean Chittenden (seanc@) During the last three quarters, Antoine Brodin (antoine@) ran no fewer than 113 exp-runs against the ports tree. These runs were executed to test updates, perform cleanups, and make improvements to the framework and the base system. Most of the runs were for port upgrades, but others include LLD progress, changes to the default port versions, improved support for armv6, armv7, and RISC-V architectures, removed old base system functionality, new USES, and better matching pkg-plist with Makefile options (DOCS and EXAMPLES). Five new USES values were introduced: * apache: handle dependencies on the Apache web server and modules * eigen: automatically depend on math/eigen2 or math/eigen3 * emacs: handle dependencies on the Emacs editor and modules. * gl replaces the old USE_GL from bsd.port.mk * qt-dist, qt:4 and qt:5 replace the old USE_QT from bsd.qt.mk The EXTRA_PATCHES functionality has been extended to support directories, where it will automatically apply all patch-\* files to the port. Ports using USES=3Dphp:phpize, php:ext, php:zend, and php:pecl have been flavored and packages are now automatically built for all versions of PHP that are supported (5.6, 7.0, 7.1 or 7.2). 2018Q3 had updates of major ports: pkg 1.10.5, Chromium 65.0.3325.181, Firefox 59.0.2, Firefox-ESR 52.7.3, Ruby 2.3.7/2.5.1 and Qt5 5.9.4. The default version of PHP was changed from 5.6 to 7.1. The former version of PHP is no longer supported by the developers. The default versions of Samba and GCC are now respectively 4.7 and 7. The Xorg ports have been reorganized and there have been changes to net/openntpd. Please review the UPDATING file for relevant details. Open tasks: * The number of commits dropped somewhat over the last three quarters, leaving more PRs unresolved. If possible, please pick up some PRs and improve everyone's experience. __________________________________________________________________ Release Engineering Team Links FreeBSD 10.4-RELEASE announcement URL: https://www.FreeBSD.org/releases/10.4R/announce.html FreeBSD 11.2-RELEASE announcement URL: https://www.FreeBSD.org/releases/11.2R/announce.html FreeBSD 12.0-RELEASE schedule URL: https://www.FreeBSD.org/releases/12.0R/schedule.html FreeBSD development snapshots URL: https://download.FreeBSD.org/ftp/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team responsibilities include: * setting and publishing release schedules for official project releases of FreeBSD * announcing code slushes, freezes, and thaws * maintaining the respective branches for all supported releases The FreeBSD Release Engineering Team, led by Marius Strobl, completed the 10.4-RELEASE in early October 2017. FreeBSD 10.4-RELEASE was the fifth release from the stable/10 branch, which built on the stability and reliability of 10.3-RELEASE. The FreeBSD 11.2-RELEASE cycle started April 20, 2018 with the announcement of the code slush. The first stage progress was continued throughout the rest of the quarter with the code freeze, followed by three BETA builds, three RC builds, and the final release build was announced June 27, 2018. The FreeBSD Release Engineering Team started the 12.0-RELEASE cycle August 10, 2018 with the announcement of the code slush. The code freeze followed on August 24, 2018. The tentative date for the stable/12 branch was expected to be September 21, 2018. Due to unforeseen circumstances with upstream code that was necessary to include in 12.0-RELEASE, the tentative release schedule needed to be adjusted several times. The API changes in the updated version of the upstream code required changes to be made for all base system utilities that linked with the upstream code. By the end of the 2018Q3 quarter, the stable/12 branch had not been created due to this delay. Throughout the remainder of 2018Q3, several development snapshots builds were released for the head, stable/11, and stable/10 branches. Much of this work was sponsored by the FreeBSD Foundation. __________________________________________________________________ The FreeBSD Foundation Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage software development projects, conferences and developer summits, and provide travel grants to FreeBSD contributors. The Foundation purchases and supports hardware to improve and maintain FreeBSD infrastructure and provides resources to improve security, quality assurance, and release engineering efforts; publishes marketing material to promote, educate, and advocate for the FreeBSD Project; facilitates collaboration between commercial vendors and FreeBSD developers; and finally, represents the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. Here are some highlights of what the FreeBSD Foundation did to help FreeBSD last quarter: Partnerships and Commercial User Support As a 501(c)(3) non-profit, we don't directly support commercial users, but we do work with them to understand their needs and help facilitate collaboration with the community. Last quarter we met with a few key FreeBSD users and supporters, to discuss pain points, how they can contribute back to FreeBSD, and what technologies they would like to see supported, to support FreeBSD over more of their technologies and products. As many of you know, we formed a partnership with Intel around one and a half years ago. Since then the people we worked directly with left the company, but it moved us into a new relationship with their Open Source Technology Center (OTC). We are very encouraged that Intel has dedicated additional resources from the OTC to work on FreeBSD in addition to existing resources from the networking group and other technologies such as QuickAssist. Much of the work has been focused on security and OS mitigations but we're also focusing on other areas such as power management and persistent memory. In May and again in July we traveled to Intel's Hillsboro campus to meet with management and engineers from OTC and the networking team. We presented an overview of the project and Foundation and also discussed key markets and vendors who use FreeBSD in their products or services and their future requirements. Intel was also interested in learning more about who contributes to FreeBSD. Along those lines we've done some work with OTC to create scripts and organizational mappings to answer that question. Note that we do need developers to help us update and maintain the organizational mappings as we understand that developers do tend to move around and contractors are often working on behalf of multiple organizations. Fundraising Efforts Our work is 100% funded by your donations. As of September 30, we raised $328,482. Our 2018 fundraising goal is $1,250,00 and we are continuing to work hard to meet and exceed this goal! Please consider making a donation to help us continue and increase our support for FreeBSD: https://www.FreeBSDfoundation.org/donate/. We also have a new Partnership Program, to provide more benefits for our larger commercial donors. Find out more information at https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-progra m/ and share with your companies! OS Improvements The Foundation improves the FreeBSD operating system by employing technical staff to maintain and improve critical kernel subsystems, add features and functionality, and fix problems. This also includes funding separate project grants like the arm64 port, porting the blacklistd access control daemon, and the integration of VIMAGE support, to make sure that FreeBSD remains a viable solution for research, education, computing, products and more. We kicked off or continued the following projects last quarter: * OpenZFS RAID-Z Expansion project * Headless mode out-of-the-box for embedded ARM boards like the Beaglebone Black * Performance and scalability improvements Having software developers on staff has allowed us to jump in and work directly on projects to improve FreeBSD such as: * ZFS improvements * New Intel server support * kqueue(2) updates * 64-bit inode support * Stack guard * Kernel Undefined Behavior Sanitizer * Toolchain projects * i915 driver investigation * NVDIMM support in acpiconf(8) * Continuous integration dashboard (web page and physical hardware) * FAT filesystem support in makefs(8) Continuous Integration and Quality Assurance The Foundation provides a full-time staff member who is working on improving our automated testing, continuous integration, and overall quality assurance efforts. Foundation employee Li-Wen Hsu set up new CI servers to speed up amd64 build and test jobs, to reduce the latency between changes being committed and results being available. Li-Wen also set up a staging / development server in order to test changes to the CI system itself without affecting production results. We have also started a small hardware test lab, currently connected to the staging server, that tests the full boot and test cycle on physical hardware. In the near future additional hardware devices will be added, and this will migrate to the production CI server. Release Engineering The Foundation provides a full-time staff member to lead the release engineering efforts. This has provided timely and reliable releases over the last five years. Foundation employee Glen Barber continued leading the efforts on the upcoming 12.0-RELEASE. For details surrounding the work involved and progress thus far on 12.0-RELEASE, please see the FreeBSD Release Engineering Team section of this quarterly status report. Supporting FreeBSD Infrastructure The Foundation provides hardware and support to improve the FreeBSD infrastructure. Last quarter, we continued supporting FreeBSD hardware located around the world. FreeBSD Advocacy and Education A large part of our efforts are dedicated to advocating for the Project. This includes promoting work being done by others with FreeBSD; producing advocacy literature to teach people about FreeBSD and help make the path to starting using FreeBSD or contributing to the Project easier; and attending and getting other FreeBSD contributors to volunteer to run FreeBSD events, staff FreeBSD tables, and give FreeBSD presentations. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, to work together on projects, and to facilitate collaboration between developers and commercial users. This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. Check out some of the advocacy and education work we did last quarter: * Organized and ran the Essen FreeBSD Hackathon in Essen, Germany * Participated in the FreeBSD Developer Summit BSDCam, in Cambridge, England * Represented FreeBSD at the ARM Partner Meeting * Presented and taught about FreeBSD at SdNOG 5 in Khartoum, Sudan * Exhibited and gave a talk at OSCON 2018 in Portland, OR * Exhibited at the 2018 Grace Hopper Celebration and sponsored as a Silver Non-Profit Sponsor * Exhibited at COCON 2018 in Taipei, Taiwan * Sponsored and gave presentations and tutorials at EuroBSDCon in Bucharest, Romania * Organized and ran the Bucharest FreeBSD Developer Summit * Sponsored the 2018 USENIX Security Symposium in Baltimore, MD as an Industry Partner * Provided FreeBSD advocacy material * Sponsored the 2018 USENIX Annual Technical Conference in Boston, MA as an Industry Partner * Sponsored the OpenZFS Developer Summit as a Silver Sponsor * Presented and taught about FreeBSD at SANOG32 in Dhaka, Bangladesh * Sponsored the SNIA Storage Developer Conference 2018 as an Association Partner * Provided 11 travel grants to FreeBSD contributors to attend many of the above events. We continued producing FreeBSD advocacy material to help people promote FreeBSD around the world. Read more about our conference adventures in the conference recaps and trip reports in our monthly newsletters: https://www.freebsdfoundation.org/news-and-events/newsletter/ We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. Last quarter we published the July/August issue that you can find at https://www.FreeBSDfoundation.org/journal/. You can find out more about events we attended and upcoming events at https://www.FreeBSDfoundation.org/news-and-events/. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to http://www.FreeBSDfoundation.org to find out how we support FreeBSD and how we can help you! __________________________________________________________________ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. 32-bit compatibility and other ABI cleanups Contact: Brooks Davis As part of maintaining an external ABI (application binary interface) compatibility layer, I've been improving FreeBSD infrastructure, primarily the 32-bit compatibility layer. One of FreeBSD's strengths is that we can easily support many ABIs. This includes support for a.out format executables (vs the standard ELF), support for i386 on amd64, the Linux emulation layer, etc. This infrastructure has existed for decades and not every design decision has stood the test of time. Support has also been incomplete in a number of areas (e.g. network management under 32-bit emulation). Committed improvements include: * Improved ioctl and sysctl support to allow ifconfig and netstat to work in 32-bit compat mode. * Migration from a model of translating ioctl commands and data structures at the kernel boundary to translating where the commands are processed. This is a correctness improvement (`ioctl` commands do not have meaning outside the specific file descriptor in question) and improves code reusability (my out-of-tree work will soon include a 64-bit compatibility layer.) * Simplifications of the generic ELF process execution path by Ed Maste, John Baldwin, and myself. A number of simplifications including minor speedups have been committed. Portions of this work were developed by SRI International and the University of Cambridge Computer Laboratory (Department of Computer Science and Technology) under DARPA/AFRL contract FA8750-10-C-0237 ("CTSRD"), as part of the DARPA CRASH research programme and under DARPA contract HR0011-18-C-0016 ("ECATS"), as part of the DARPA SSITH research programme. Work in progress includes cleanups to the APIs used by the kernel when creating processes and continued ioctl improvements. Work is also underway to generate the 32-bit system call list from the "default" list. The remaining ioctl commands handled in sys/compat/freebsd32/freebsd32_ioctl.c need to be migrated to the point of implementation. Help with the latter would be appreciated. __________________________________________________________________ 4G/4G address space split for i386 Contact: Konstantin Belousov Most 32-bit FreeBSD architectures, including i386, started to suffer from the rapid growth of the size of software during the past decade. When a 32-bit address space is enough space for a given task, 32-bit mode still has an intrinsic advantage over 64-bit mode, due to less memory traffic and more economical use of caches. It has grown harder to provide the self-hosting i386 system build due to the increase in size of the build tools. The FreeBSD i386 kernel, prior to the 12.0-RELEASE version, split the 4GB address space of the platform into 3GB (minus 4MB) accessible to userspace accesses and 1GB for kernel accesses. Neither kernel nor userspace could access a full 4GB address space. Programs that require very large virtual address spaces, such as clang when compiling or lld when linking, could run out of address space: 3GB of address space was insufficient for their operation. The kernel also had trouble fitting into the traditional 1GB limitation of address space with the modern sizing for network buffers, ZFS and other KVA-hungry in-kernel subsystems. In FreeBSD 12, the i386 architecture has been changed to provide dedicated separate address spaces for userspace and kernel, giving each mode full access to 4GB (minus 8MB) of usable address space. The userspace on the i386 architecture now has access to the same amount of address space as the compat32 subsystem in the amd64 architecture kernel. The increase in kernel address space enables further growth and maintainability of the i386 architecture. The split 4GB/4GB user/kernel implementation uses two page directory entries (PDEs) shared between modes: one for mapping the page table, another for the mode switching trampoline and other required system tables. The required system tables, which must always be mapped, regardless of kernel or user mode, includes such things as the GDT/IDT/TSS entries. Significant changes were made to the locore code. The page table creation portion of the code was completely rewritten from assembly to C, improving readability and maintainability of the code. Because the user address space is no longer shared with the kernel, the copyout(9) functions were rewritten to make a transient mapping of userspace pages for the duration of any needed accesses. The initial implementation used the vm_fault_quick_hold_pages() framework, but this was later optimized by temporarily switching to user mode mappings from a trampoline, and then using hand-written assembler routines to perform a faster small block copy operation. Future plans for the ongoing maintenance of i386 include making the i386 pmap capable of runtime selection of the PAE or non-PAE page table format and supporting NX (no execute) mappings for regular i386 kernel. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ ACPI NVDIMM driver Contact: Konstantin Belousov NVDIMM is a technology which provides non-volatile memory with access characteristics similar to regular DRAM, which is the technology that implements the normal memory address space of a host. There are ACPI and UEFI specifications that define platform independent ways to detect and enumerate the presence of NVDIMMs. These specifications allow the retrieval of most of the data needed to allow proper application use of the NVDIMM storage. A new FreeBSD driver parses the ACPI NFIT table which lists NVDIMMs, their operational characteristics, and the physical address space where the NVDIMM memory is accessible. The driver presents each address region as two devices: One device allows userspace to open(2) a devfs node, which can be read/written/mapped from the application. This mapping is zero-copy. The second device is a geom disk(9), which makes it possible to use NVDIMM for the backing storage for a normal FreeBSD filesystem, such as UFS, ZFS, or msdosfs. Note that buffer cache/mapping of files from a traditional filesystem created over NVDIMM causes an unneeded double-buffering. Empirically, on typical modern hardware, NVDIMM regions are located far from the regular DRAM backed memory in the address space, and have attributes that are not compatible with regular DRAM memory. This makes it unfeasible to extend the kernel's direct map to provide the kernel mappings for the NVDIMM regions. A new pmap KPI was designed, pmap_large_map(9), which allows efficient mapping of very large physical regions into the KVA. The new code has some optimizations to the cache flushing operations over the mapped regions, which is needed to efficiently support bio flushes from a filesystems using the NVDIMM storage. The NVDIMM driver is the first user of the new KPI, but the new KPI might also be useful for the NTB driver. TODO: * Intel is currently working on extending the driver to support UEFI namespaces. * A DAX-capable filesystem is needed, which solves the issue of double-buffering. Our tmpfs already provides VM facilities which allows it to avoid double-buffering for mmap, which can be reused there. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Boot Loader Contact: Warner Losh Contact: Kyle Evans Contact: Toomas Soome The FreeBSD boot loader lives in src/stand (prior releases had it in sys/boot and lib/libstand). It covers all the code that the project provides that interacts with the hardware before the kernel starts. The LUA interpreter added earlier in 2018 was made default in 2018Q3. Due to undiagnosed booting issues, the LUA interpreter has been disabled on sparc64 and all powerpc. The LUA interpreter is scheduled to replace the FORTH interpreter entirely in FreeBSD 13, although the FORTH interpreter will remain available as a build option in FreeBSD 12. The plans are not to remove the FORTH loader for about a year after 12.0 release, or approximately January 2020. Platforms not currently working with the LUA interpreter have until that date to resolve the issues. At this point, the LUA scripts implement everything that the FORTH scripts did. Where there was ambiguity in the spec, or where the FORTH scripts were more forgiving than was strictly documented, every effort has been made to improve the documentation and follow the old FORTH behavior, or document the new behavior where the old behavior was clearly a bug. It's anticipated that no further changes to the FORTH loader or the FORTH scripts will happen. They are quite mature and bullet proof at this point and it's unlikely that an undiscovered bug will need to be fixed before retirement. Other work in progress includes Toomas Soome's port to OpenIndiana. In addition to porting, he's enhanced the code in a number of ways (both in the block layer, and UEFI). Many of his improvements have been committed to FreeBSD, though a few remain and hopefully will be entering the tree soon after the freeze lifts. UEFI booting has been greatly enhanced. There are still some machines that have issues with the default BootXXXX variables or something else in the environment that are being investigated. We hope to understand the problems well enough to provide a fix for FreeBSD 12.0. Ian Lepore has reworked the GELI support so that it is architecture independent and can be used on any architecture we support. There are also efforts underway to support booting signed images, improved crypto booting options, and implement Multiboot 2.0 support. __________________________________________________________________ Building FreeBSD on non-FreeBSD hosts Links Wiki =20 URL: https://wiki.FreeBSD.org/BuildingOnNonFreeBSD GitHub project URL: https://github.com/arichardson/freebsd/tree/crossbuild-aug2018 Contact: Alex Richardson Currently FreeBSD can only be built on a FreeBSD host. However, most free CI tools only allow building on Linux or macOS and therefore can not be used for building the FreeBSD base system. It is sometimes useful to cross-build FreeBSD for a remote machine or an emulator even if the build machine is not running FreeBSD. The goal of this project is to allow building FreeBSD on both Linux and macOS hosts and in the future it may be extended to allow compiling on a Windows host. This work originates from the CHERI project and was motivated by multiple cases of people wanting to try out CheriBSD but not being able to compile it since they did not have a FreeBSD system available for compiling. Once completed this project will also allow developers to contribute to FreeBSD even if they don't have access to a FreeBSD build system. The current set of patches for this project can be found on GitHub. With the current prototype it is possible to compile both world and kernel for architectures that use the clang compiler and for MIPS64, which uses gcc. However, some options such as LOCALES are not supported yet and require further changes before the bootstrap tools can be built on Linux/macOS. Some changes required for building on non-FreeBSD have already been merged to HEAD but there are still a rather large number of changes that need review. If you are interested in getting this into HEAD and would like to help, please try the current prototype and report any issues to arichardson@FreeBSD.org. If you can help with reviewing the changes please contact arichardson@FreeBSD.org to be added to any pending Phabricator reviews. __________________________________________________________________ Device Mode USB Links Handbook chapter URL: https://www.FreeBSD.org/doc/en_US.ISO8859-1/books/handbook/usb-dev= ice-mode.html Contact: Edward Tomasz Napierala Many embedded boards include hardware which supports device side USB - the ability for the board to present itself to another system as a USB drive, network adapter, or a virtual serial port. The FreeBSD USB stack has supported this functionality for quite some time, but it has not been used to its fullest extent. The goal of this project was to fix that - to document the functionality, possibly fix some bugs, and to make it easy to use, automating it as much as possible. Starting with FreeBSD 12.0, this functionality is enabled out of the box. This means you can connect your BeagleBone Black's (using its USB client socket) or a Raspberry Pi 0 (using the On-The-Go (OTG) port) to your laptop, and you'll get a virtual USB serial port, which serves as a system console, with getty(8) waiting for you to log in. This means you no longer need to look for a keyboard and a screen, or mess with the console cables just to configure your system. You can also switch it to provide network interface, or present itself as a USB drive - it's all documented in the FreeBSD Handbook. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ ENA FreeBSD Driver Update Links ENA README URL: https://github.com/amzn/amzn-drivers/blob/master/kernel/fbsd/ena/R= EADME Contact: Michal/ Krawczyk ENA (Elastic Network Adapter) is the smart NIC which is used in the virtualised environment of Amazon Web Services (AWS). It supports multiple queues and can handle up to 25 Gb/s, depending on the instance type on which it is used. Since last report, ENA versions v0.8.0 and v0.8.1 have been released, which introduced many bug fixes, new features, optimization, stability and error recovery improvements. The last is especially important on the AWS, where the instances have to be reliable as they may be running very sensitive functions and the down time of the VM should be reduced to minimum. The v0.8.0 and v0.8.1 release patches included: * Upgrade of the HAL to version v1.1.4.3 * Improvement to the reset routine - the driver is now triggering reset from more fault points and is passing the reset reason to the device, which can perform the reset adequately to the encountered error. * Device statistics (like global Tx and Rx counters) are no longer read directly from the device. The only exception is Rx drops, which are still read using the AENQ descriptor. * The RX Out Of Order completion feature was added, which enabled to cleanup the RX descriptors out of order by keeping trace of all free descriptors. * RX ring is now being monitored, to prevent the ring from stalling. * Error handling paths were reworked and fixed. * Driver was covered with branch prediction statements, to make the most of this CPU feature in the hot paths. * Fix handling of the DF flag in the IP packets. * Add dynamic logging and reduce number of messages being printed by the driver. * MTU configuration now is being verified using the device capabilities instead of a constant value. * Do not pass packet header length hint to the device, because for the chained mbufs it may be problematic to determine header length, if the header is split into multiple segments. This project was sponsored by Amazon.com Inc.. __________________________________________________________________ FreeBSD Graphics Team Links Project GitHub page URL: https://github.com/FreeBSDDesktop Contact: FreeBSD Graphics Team Contact: Niclas Zeising The FreeBSD X11/Graphics team is responsible for the lower levels of the FreeBSD graphics stack. This includes graphics drivers, graphics libraries such as the MESA OpenGL implementation, the X.org xserver with related libraries and applications, and Wayland with related libraries and applications. There have been a lot of changes since the last report. The most important one is the change of driver distribution and updates. On FreeBSD 11.2 and later modern graphics drivers using the Linux KPI subsystem are found in ports. These give much improved support for Intel and AMD graphics hardware, however, they are currently only available for amd64. The legacy drivers available in the FreeBSD base system are also available in the ports tree, since they cause issues with the new drivers. They will remain in tree for 11.2 and 12, but work is on-going to have them removed for 13, except for arm. The easiest way to install the new drivers is to install graphics/drm-kmod which will install the correct driver depending on your architecture and FreeBSD version. There have been changes to the ports as well. Most notably is the changed handling of OpenGL dependencies, which has moved to USES instead of being handled directly in bsd.port.mk. Other big infrastructure changes is the move from individual \*proto packages to xorgproto, and turning that into a build time dependency. Many thanks to portmgr for help with exp-runs for these changes. There have been updates to applications and libraries as needed. On the project management side, there is ongoing work to set up a more efficient way of working, including bi-weekly conference calls to discuss the current works in progress. Notes from these conference calls will be posted on the mailing list. Looking forward, the current major work in progress is to update the graphics driver to be on par with Linux 4.17. The code is merged, but patching and bug fixing is ongoing. There is also work to port the VMware guest graphics driver, vmwgfx, to FreeBSD and to the Linux KPI, to get better graphics support in VMware. Lastly, on the driver side is to get the new graphics drivers to work on i386 as well. Experimental support for this exists in the code repository, but is not yet merged to the FreeBSD ports tree. In userland, the biggest things happening is the update of the input stack, including libinput and supporting libraries. Work is also ongoing on updating MESA libraries. On the project management side, the most important tasks is to continue to work on the team, and how we work internally. We are also working on setting up a list of requirements for testing, so that we can be reasonably assured that updates won't cause regressions. People who are interested in helping out can find us on the x11@FreeBSD.org mailing list, or on our Gitter chat: https://gitter.im/FreeBSDDesktop/Lobby. We are also available in #freebsd-xorg on EFNet. We also have a team area on GitHub where our work repositories can be found: https://github.com/FreeBSDDesktop __________________________________________________________________ FreeBSD/DTrace Contact: George Neville-Neil Contact: Domagoj Stolfa DTrace is a whole-system debugging tool in FreeBSD and is one of the actively supported projects during the past year. A research prototype of a distributed version of DTrace and a version of DTrace that can trace bhyve virtual machines from the host FreeBSD system are currently under development at the University of Cambridge as a part of the CADETS project. Recent developments include the creation of dlog, an in-kernel DTrace consumer which is able to publish to Kafka, and improvements to early boot and shutdown tracing. On the virtualisation front, improvements were made in the ability to dereference and follow pointers inside guests from the host in the probe context by implementing a nested page table walk inside DTrace for Intel architectures. The CADETS project has started formalizing DTrace in HOL4 which enables automated test generation, high assurance of DTrace implementations in terms of adherence to the specification and exploration of all allowable behaviors for a given D script. Currently, the formal model contains most of DIF instructions and a code generator for them, providing the ability to run DIF programs specified using the model using FreeBSD's DTrace implementation. As a result of all of this, a number of changes were upstreamed to the FreeBSD auditing subsystem and new variables such as jid and jailname were added to DTrace which can be accessed from D scripts. OpenDTrace Specification 1.0 has been published which covers the internal workings of DTrace in general, and its adaptation to various operating systems in particular. This work was sponsored by AFRL/DARPA through the CADETS project. Ruslan Bukin (br@) has added C-compressed ISA extension support to the RISC-V FBT provider as a part of the ECATS project. Mark Johnston (markj@) has done some work to fix interactions between FBT and ifuncs. ifuncs are a toolchain feature which allow programmers to select a function's implementation at boot-time, rather than at compile-time. For instance, on amd64, memcpy() is an ifunc and may be implemented by either memcpy_erms() or memcpy_std(). FBT created probes for the implementation functions, but we needed some extra support to ensure that fbt::memcpy:entry continues to work as expected. Similar work is needed for the PID provider, but is still pending. Microsoft showed a working demo of DTrace, which was ported from FreeBSD. Added to FreeBSD base in 11.2, dwatch is a new DTrace tool, developed by Devin Teske (dteske@), for automating complex queries for data and surgically tapping the kernel. In base there are 85 profiles for interpreting domain-specific data with another 17 available from ports making a total of over 100 different pipelines from which you can extract data in multiple formats. dwatch also simplifies observation of over 100,000 probe points available in FreeBSD, making it easy to find any process, thread, or jail triggering any probe. On top of all that, dwatch profiles can leverage higher-level languages such as python, perl, sh, and many more. __________________________________________________________________ ifuncs Contact: Konstantin Belousov Contact: Ed Maste Contact: Mark Johnston Contact: Mateusz Guzik An ifunc is a special construct in an ELF object, which allows for the selection of the implementation for the given symbol at runtime, when the ELF module gets the final relocations applied. The selection of which code to use is governed by the small piece of user provided code, attached to the symbol, the so called resolver function. Ifuncs provide a convenient way to select between different machine-specific implementations of the parts of the code, without the ugliness and unsafety of the alternative approach, which is runtime patching. Ifuncs require support both from the static linker ld(1), and from the runtime linker for the corresponding execution environment. On FreeBSD, with the switch from the ancient GPLv2 licensed BFD-based ld(1) to either in-tree LLD or external modern BFD ld, the use of ifuncs become possible. Runtime linkers for ifunc support exists for the following environments: * i386, amd64, and arm64 kernels * usermode dynamic linker ld-elf.so.1 on i386 and amd64 * static binaries startup code for i386 and amd64 The use of ifuncs were previously applied for optimization of the following areas of the amd64 kernel: * context switching code, instead of huge number of runtime checks (PTI vs non-PTI, PCID or not, is INVPCID instruction supported for PCID) now uses set of mode-specific routines, see pmap_activate_sw(). Besides removing checks at runtime, it also makes the code much more cleanly structured and readable. * TLB and cache flush implementation. * memcpy/memmove, copyin/copyout variants selection for ERMS and SMAP. * FPU state save and restore, depending on the support for AVX or not, this is also used on i386. For amd64 userspace, we currently use ifunc for optimization of the architecture dependent TLS base set and get functions. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Intel Work on Core Enabling and Security Contact: Ben Widawsky A new team has been formed within Intel to help with side channel security mitigations as well as core enabling. They are evaluating work from all areas except networking. The team is currently focusing on two areas: 1. Power Management improvements 2. NVDIMM namespace support The ultimate goal of the power management work is to get runtime power management to hit "opportunistic idle". What this means is when devices are idle, the OS will power them down, and when everything goes idle certain SoCs will allow you to hit very low power states across the platform. FreeBSD currently doesn't have any notion of runtime power management, and many devices don't properly implement suspend and resume. In addition, some preliminary work is in process as it was thought to help when eventually enabling opportunistic idle. That preliminary work has been happening and is now up for review: * https://reviews.FreeBSD.org/D17675 * https://reviews.FreeBSD.org/D17676 NVDIMM namespace support has also been put up for review. ACPI spec defines namespaces as a way of partitioning the device into separate labels. The current work will integrate with geom(4). How these are used is application dependent. This work is up for review as well: https://reviews.FreeBSD.org/D17619 The team has additionally taken on smaller tasks like porting turbostat(8), working on git svn init scripts, some small modifications to acpi tooling, and an effort to create a port PMDK. __________________________________________________________________ Large scale package building Contact: Mateusz Guzik Building packages on a 128-thread machine with poudriere exhibits some bottlenecks. See the October FreeBSD Foundation Newsletter for a short write-up: https://www.freebsdfoundation.org/news-and-events/newsletter/freebsd-fo undation-update-october-2018/ One encountered problem stems from process handling. The standard process life cycle on UNIX-like systems looks like this: * a process is created with fork(2) * it can do regular work or execve(2) a new binary * it exits, becoming a zombie * the parent collects the exit code and removes the zombie There are other variations (e.g. vfork(2) can be used instead of fork). When you type 'ls' into your shell, it will typically vfork a new process which will then execve /bin/ls. All this is guarded with several global kernel locks, but the granularity can be significantly improved. A different problem stems from pipes. Pipes are used all the time, e.g. "du -s | sort -n" creates a pipe whose one endpoint is standard output for du and another is standard input for sort. By default the pipe can hold up to 16KB before it gets filled up. The kernel dedicates part of its virtual address space to hold pipe buffers and allocates/deallocates physical pages as pipes get created/destroyed. This induces TLB invalidation requests to other CPUs, which causes an unnecessary slowdown. An easy way out is to cache a certain number of buffers. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ LLVM 7.0 - Sanitizers support improvements / Static code analysis Links Release notes URL: http://releases.llvm.org/7.0.0/docs/ReleaseNotes.html Contact: David Carlier In order to increase the FreeBSD tooling to uncover code bugs in the userland, further compiler-rt components support and static code analysis improvements had been added since the last 6.0 version. Starting with the sanitizers, Memory Sanitizer (for amd64) mainly to detect unitialized pointers. There is also a simple W^X paging requests detection available from most of sanitizers. Also libFuzzer support finally had been possible. It allows code to be tested with random values from corpus inputs. Mutation and combination algorithms of those random inputs can be overwritten. Can also be used in addition to ubsan, asan, msan and so on. At last, the X-Ray instrumentation feature is also supported. It is mainly about performance profiling purposes for a reasonable performance runtime cost. In the static code analysis department, reliable strlcpy (unfortunately strlcat did not get merged in due time for the release) wrong usage cases are now covered and W^X code detection tooling had been added. At the moment, this 7.0 version is imported by Dimitry Andric, within its own git branch available only for FreeBSD after 12 releases. __________________________________________________________________ Performance improvements Contact: Matthew Macy FreeBSD 12 saw the introduction of a number of performance improvements: * The introduction of the new synchronization primitive epoch(9) to replace the use of reader locks for providing existence guarantees for data structures. * epoch(9) was used to provide an 85+% reduction in the overhead of pcb lookup in high core count systems. * epoch(9) was used to provide an 85+% reduction in UDP send overhead on high core count systems. See the link for a bit more detail: http://scalebsd.org/blog/2018/06/16/UDP-and-epoch-for-liveness-guar antees * System call overhead is now half that of FreeBSD 11. * UNIX sockets now scale near linearly (previously maxed out at 3-4 threads). * The NUMA work has lead to a 20x-80x improvement in the scalability of page fault handling. __________________________________________________________________ Save/Restore/Migration support in bhyve Links Github repository for the save/restore and migration features URL: https://github.com/FreeBSD-UPB/freebsd/tree/projects/bhyve_migrati= on Github wiki - How to Save and Restore a bhyve guest URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Save-and-Restore-a-vir= tual-machine-using-bhyve Github wiki - How to Migrate a bhyve guest URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Virtual-Machine-Migrat= ion-using-bhyve Github wiki - Suspend/resume test matrix URL: https://github.com/FreeBSD-UPB/freebsd/wiki/Suspend-Resume-test-ma= trix Contact: Elena Mihailescu Contact: Darius Mihai Contact: Sergiu Weisz Contact: Mihai Carabas The Save/Restore feature is a facility to suspend and resume guest virtual images that has been added to the FreeBSD/amd64's hypervisor, bhyve. The bhyvectl tool is used to save the guest virtual machine into three files: * a file for the guest memory * a file for state of each device / CPU state * a file that has metadata that is used in the restore process To suspend a bhyve guest, the bhyvectl tool must be run with the --suspend option followed by the guest name. To restore a bhyve guest from a checkpoint, one simply has to add the -r option followed by the main state file (the same file that was given to the --suspend option for bhyvectl) when starting the VM. The Migration feature uses the Save/Restore implementation to migrate a bhyve guest from one FreeBSD host to another FreeBSD host. To migrate a bhyve guest, one needs to start an empty guest on the destination host from a shared guest image using the bhyve tool with the -R option followed by the source host IP and the port to listen to migration request. On the source host, the migration is started by executing the bhyvectl command with the --migrate option, followed by the destination host IP and the port to send to the messages. New features added: * Create the socket connection between source and destination hosts * Migrate the guest state via sockets * Separate the suspend/resume/migration code from the bhyverun.c and bhyvectl.c and added two new files for them: migration.c and migration.h * Added save/restore state for xhci * Added save/restore state for fbuf * Fix vhpet restore state issues (timers related) * Add partially support for suspending and resuming a Linux guest Future tasks: * Check if live migration can be implemented using the FreeBSD's Copy-on-Write mechanism * Add live migration support by using EPT (Intel) * Add live migration support by using NPT (AMD) * Add suspend/resume support for nvme * Add suspend/resume support for virtio-console * Add suspend/resume support for virtio-scsi * Fix restore timers issues * Fix suspending bhyve - threads issues * Fix suspending bhyve - mutexes issues * Add suspend/resume support for Windows guests This project was sponsored by Matthew Grooms, and iXsystems. __________________________________________________________________ SMAP Contact: Konstantin Belousov Support for SMAP (Supervisor-Mode Access Prevention), has been added to the amd64 kernel. The SMAP feature makes any access from the supervisor mode to the pages accessible to user mode cause a fault, unless the %eflags.AC bit is set at the time of the access. The SMAP implementation uses the ifunc framework to avoid checking for the SMAP capability of hardware on each call to copyout(9) and other functions. In the amd64 architecture, FreeBSD has a common address space between the kernel space and user space. Enabling SMAP virtually splits the shared address space into two disjoint address spaces, which have different access criteria. This splitting of the address space provides a relatively low-overhead way of catching direct accesses from kernel to usermode, when not using the copyout(9) family of functions. The copyout(9) family of functions are permitted direct access to user space. Any direct access from kernel mode to user address space that isn't performed through the copyout(9) family of functions indicates a potential programming error. It is interesting that very few bugs were found in the FreeBSD kernel after the SMAP feature was enabled. One issue that was identified existed in the pci(9) user driver. Enabling the SMAP feature identified at least two ports, VBox and acpi_call, which appeared to access userspace in an unsafe manner. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ String functions on the amd64 architecture Contact: Mateusz Guzik Functions like memset, memmove and memcpy are very frequently used by virtually all programs. They can be optimized in various ways, but FreeBSD uses very rudimentary implementations using rep movsq/stosq. rep prefix has high startup latency which is overly expensive when dealing with small sizes. Short term goal of this project is to implement faster variants for the kernel and import them into libc. The main speed up comes from not using rep for small sizes (< 256) and from aligning target buffers to 16 bytes when rep is used. On top of that runtime detection of the Enhanced REP MOVSB/STOSB extention can be used to only use rep movsb/stosb. Mid term goal extends userspace. SIMD extensions can be used to make these functions faster. They can't easily be used in the kernel: SIMD registers are not saved on transitions user<->kernel for performance reasons. Thus any use would have to take care of saving these registers, which can consume any advantage from using them in the first place. This is not a concern for userspace code. There is a BSD-licensed implementation in bionic: https://android.googlesource.com/platform/bionic/+/master/libc/arch-x86 _64/string/ which with some modifications can be used in libc later on. See the Intel Optimization Manual for reference: https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64 -ia-32-architectures-optimization-manual.pdf This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Usermode mapping of PCI BARs Contact: Konstantin Belousov Modern PCI(e) devices typically define memory-mapped BARs (Base Address Registers) to make a memory region available to the device. Each BAR has a separate page-aligned boundary and memory region associated with it. This is enforced by the need of hypervisors to provide the pass-through using VT-d, which operates with memory and has the granularity of one page for access control. As is, it also means that the BARs have a suitable configuration for providing access to usermode, controlling access by the normal page tables. Linux already gives a way for userspace mapping of BARs using sysfs. Of course, if a userspace program has enough privileges, it can read a BAR, determine the physical address of the mapping as seen by CPU, and use mem(4) (aka /dev/mem) to mmap() that region of memory. This is very cumbersome, and leaves many unresolved issues. For example, a BAR might be not activated, which would require involvement of the IOMMU on some architectures. Also this rude approach makes it very hard to create mappings with the correct caching attributes. The FreeBSD pci(4) driver was enhanced to support such mappings, and pciconf(8) utility was extended to use the new support. See pci(4) for PCIOCBARMMAP ioctl(2) request description for details, and pciconf(8) for the -D switch. TODO: automatically activate the BAR on mapping, this is not done yet. There is a problem with avoiding the resource conflicts on possible future attachmens of the kernel driver. This project was sponsored by The FreeBSD Foundation, and Mellanox Technologies. __________________________________________________________________ Architectures Updating platform-specific features and bringing in support for new hardware platforms. Allwinner SoC Support Contact: Emmanuel Vadot * SPI driver added for A64 SoC * Thermal driver added/fixed for A64/H3/H5 SoCs * Lot of bugs where fixed in the mmc driver, stability should be better * New driver for AXXP803 which is the power chip companion of the A64 SoC * Add overlays to use another timer controller as the default one in A64 if faulty These overlay is enabled in the PINE64/LTS images by default __________________________________________________________________ Armada 38x FreeBSD support Links PRODUCT BRIEF URL: https://www.marvell.com/documents/egrkpyqzpoebxblyeept/ Contact: Marcin Wojtas Contact: Patryk Duda Contact: Rafal/ Kozik The Marvell Armada 38x is a very poplular ARMv7-based dual core SoC. Thanks to the multiple low and high speed interfaces the platform is used in a wide range of products, such as Network-Attached Storage (NAS), Wi-Fi Access Point (WAP) and others. Since last report, remaining Armada 38x support was integrated to HEAD, which can now compile with the armv7 GENERIC config and use unmodified sys/gnu/dts device trees. The details are as follows: * GENERIC config * Introduce a vast rework of the sys/arm/mv directory for arm and armv7 platforms. * Enable PLATFORM support for Marvell ARMv7 SoCs, which can now can boot with GENERIC kernel. * Base on dynamic detection of SoC type and device tree instead of using ifdefs and enable more flexible environment for maintaining Marvell platforms. * sys/gnu/dts device trees * Improve platform code and the drivers (e.g. CESA, PCIE, GPIO) to properly work with original Linux device trees. * GPIO * Add multiple fixes and improvements to the sys/arm/mv/gpio.c * Rework driver to properly integrate with HEAD GPIO frameworks (main and gpioled) * Enable support for both old and Linux GPIO device tree bindings, so that multiple controllers can be used. This project was sponsored by Stormshield, and Semihalf. __________________________________________________________________ ARMv6 and ARMv7 image now use EFI loader Contact: Emmanuel Vadot Instead of using the ubldr version of the loader which uses the U-Boot API, all images now use loader.efi as their primary FreeBSD loader. This allow us to have a common boot path for all arm and arm64 images. __________________________________________________________________ DTS Update Contact: Emmanuel Vadot DTS files (Device Tree Sources) were updated to be on par with Linux 4.18 for the 12.0 release. The DTS are now compiled for some arm64 boards as the one present in U-Boot are now always up-to-date. __________________________________________________________________ FreeBSD on POWER9 Contact: Matthew Macy Once Justin Hibbits largely stabilized the powerpc64 port on the POWER9 based Talos II I decided to procure one. I've been slowly working towards taking powerpc64 to parity with amd64. I've been working in an out of tree GitHub project - in part to eliminate the need to continue to support the 11 year old in tree gcc4. Progress so far: * Adapted lock_delay to use POWER's SMT scheduling hints rather than using the yield hint from an older ISA * Added ifunc support * Ported the amd64 pmap so FreeBSD can use POWER9's new radix tree page tables. This will give us superpages mostly for free. * Reduced the overhead of copyinout primitives for radix. * Converted the copyinout primitives to ifuncs to switch between the old and the new at initialization time. * Converted pmap to use ifuncs to eliminate the overhead of kobj dispatch. * Hot patch out trap handling paths only needed by the older hashed page table support. Work in Progress: * NMI semantics: NMIs need to be emulated by only soft disabling interrupts, disabling interrupts blocks all interrupts except machine check exceptions and system resets. * Superpage support: Superpages work in the functional simulator running SMT4 but currently crash on real hardware due to incomplete page walk cache / TLB invalidation. * Kernel minidump - with radix MMU enabled minidump support was a fairly straightforward port but time needs to be spent on test / debug. * EARLY_AP_STARTUP - preliminary patches exist, but this is more work on !x86 architectures due to IPI setup not being tied to the CPU code. A list of the other items needed to achieve kernel feature parity with a (wishful) list of milestones can be found at: https://github.com/POWER9BSD/freebsd/projects/1 __________________________________________________________________ FreeBSD on PowerNV (ppc64) Contact: Patryk Duda Contact: Wojciech Macek Contact: Michal Stanek Contact: Nathan Whitehorn Semihalf is happy to announce that FreeBSD is now running on IBM POWER8. This project is a continuation of work done by Nathan Whitehorn who provided basic support for a PowerNV emulator. The IBM POWER8 family of CPUs offers superior performance compared to previous Power series. It provides complete NUMA support with up to 192 cores in a two socket system (up to 8 threads per core). All IO communication is handled by integrated PCIe interface equipped with multiple IOMMU engines. The support for POWER8 system running FreeBSD in Non-Virtualized environment contains: * Generic driver for OPAL hypervisor * kboot loader modifications to allow Little-Endian loader to load a Big-Endian kernel ELF * skiboot update for ELF-parser allowing it to understand FreeBSD kernel file format * Basic support for PowerNV architecture, including modes of operation, MMU, interrupt controller * SMP operation (tested with 128 CPU configuration) * PHB subsystem driver, including IOMMU mapping for external buses * PCIe host controller driver * USB-3.0 XHCI driver * Reworked drivers to be Big-Endian compatible: * Chelsio cxgbe(4) 10/25G network adapter * NVMe SSD drive All work has been merged into HEAD and will be included in FreeBSD 12.0-RELEASE. Sponsors: IBM, FreeBSD Foundation, QCM Technologies, Semihalf, Limelight Networks. The project is kindly initiated and supported by Limelight Networks (Kevin Bowling). __________________________________________________________________ FreeBSD on RISC-V Contact: Ruslan Bukin FreeBSD/RISC-V has been one of the actively supported projects during the past year. On a compiler front we have upstreamed FreeBSD OS-dependent bits for GNU toolchain. It was updated to GCC 8.1 and Binutils 2.30. FreeBSD packages are available. FreeBSD Testsuite and required dependencies were successfully built for RISC-V and we did a test run: 152 tests failed out of 5186, which demonstrates a very good result for initial run and reveals areas to work on. We have added support for compressed ISA extension to KDB debugger and DTrace FBT provider enabling C-compressed kernel and userland by default. The output of disassembling instructions in KDB is looking similar to objdump. QEMU has updated to latest privilege spec allowing us to bring up FreeBSD on it. The emulation is quite fast: it takes one second only to boot FreeBSD to single-user mode in QEMU: https://www.youtube.com/watch?v=3DFnWpRBaWF18 Platform-Level Interrupt Controller (PLIC) driver was added. Interrupt support was converted to INTRNG. PLIC is used in QEMU for virtio network and block devices. With these changes, a full FreeBSD distribution can now be booted in QEMU. Network virtualization support (VIMAGE) was fixed and enabled by default now. In order to support RocketChip and derivatives we had to work on A(accessed), D(dirty) PTE (page table entry) bits management. We have successfully tested this on a lowRISC board and it is booting to multiuser just fine. lowRISC UART driver was added. Superuser-User-Modify (SUM) bit in status register is now used: kernel can access userspace only within certain functions that explicitly handle crossing user/kernel boundary. __________________________________________________________________ PINE64-LTS Image Contact: Emmanuel Vadot We now produce an image for the PINE64-LTS. This image works on the PINE64-LTS and the Sopine with Baseboard. __________________________________________________________________ PocketBeagle Support Links Pocket Beagle URL: https://www.beagleboard.org/pocket Contact: Emmanuel Vadot Contact: Tom Jones The Pocket Beagle is the latest member of the BeagleBoard family. Support for it was added and the Beaglebone image can be used on it directly. __________________________________________________________________ RPI Firmware/DTB/U-Boot Update Contact: Emmanuel Vadot Contact: U-Boot mailing list The RaspberryPi firmware loads the DTB from the FAT partition based on the model. U-Boot now uses this DTB and passes it to the FreeBSD loader/kernel instead of using the DTS embedded in U-Boot. This allow the FreeBSD Kernel to use the RaspberryPi Foundation provided DTB overlays to enable HATs. The overlays can be obtained by installing the rpi-firmware package. A new U-Boot port for the W variant of the RPI0 was committed as u-boot-rpi-0-w. Some experiments started by Edward Tomasz Napierala (trasz@) have shown that we could possibly produce a generic image for all armv6 RPI (RPI-B, RPI0 and RPI0W). __________________________________________________________________ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. KDE on FreeBSD Links KDE FreeBSD URL: https://FreeBSD.kde.org/ Contact: Adriaan de Groot Contact: Tobias C. Berner KDE FreeBSD is responsible for the ports of the Plasma5 and KDE4 desktops, and all associated applications. Further we also manage the Qt4 and Qt5 ports, as well as CMake. We also care for the FreeBSD builders for KDE's upstream CI on build.kde.org. Since the last status report a lot of things have changed. First and foremost, the Plasma5 Desktop and the Qt5 based KDE Applications have finally made their way into the official ports tree after lingering for multiple years in our development repository. Secondly KDE4 has been marked deprecated and will be removed at the end of the year. With Qt4 following no later than the next year (due to the exponentially increasing burden of maintenance). On a more technical side, bsd.qt.mk has been replaced by qt.mk and qt-dist.mk. The porter's handbook is being updated (with thanks to Tobias Kortkamp). Further we have been keeping CMake and Qt5 and almost every other port under our control up to date. SDDM has been updated to the next-to-latest release with backported security fixes. One big issue we have is www/qt5-webengine, which requires too much time to keep up to date, as the underlying chromium is in need of many patches, which change with every release. Another upcoming issue is the way in which FreeBSD's libinput lags behind. This blocks future updates to KDE Plasma as well as Wayland improvements. Thankfully x11@ is looking at this issue already, so it should be fixed soon -- for the meantime people who want to give the latest KDE Plasma Desktop a try can use the appropriate branch from our GitHub. People who are willing to contribute can find us on #kde-freebsd on freenode, the kde@FreeBSD.org mailing list. Further, we accept pull-requests and contributions on github.com/freebsd/freebsd-ports-kde. __________________________________________________________________ Puppet Links PuppetLab's FreeBSD slack channel URL: https://puppetcommunity.slack.com/messages/C6CK0UGB1/ BSDCan 2018: IT automation with Puppet URL: https://www.bsdcan.org/2018/schedule/events/930.en.html Contact: Puppet Team Since our last status report last year, the puppet@ team regularly updated the Puppet ports to catch on upstream releases. We have also held a Puppet talk at BSDCan. More recently, Puppet 6 was released, and a bunch of new ports appeared in the FreeBSD ports tree: sysutils/puppet6, sysutils/puppetserver6, databases/puppetdb6 being (obviously) the main ones. In this update, the Puppet language has not been heavily modified. As a consequence, upgrading from Puppet 5 to Puppet 6 is an easy task compared to the experience you may have encountered from previous major version bumps. If you are still using Puppet 4, we recommend to schedule an upgrade soon: Puppet 4 is expected to be EOL by the end of 2018. Because distributing Marionette Collective modules via Puppet is more efficient than using packages, the sysutils/mcollective-\*-{agent,client} ports have been deprecated. Marionette Collective itself being phased out by PuppetLabs, the sysutils/mcollective port is expected to be deprecated at some point in the future, but we plan to keep it until an alternative is available. This alternative, called Choria, is in active development by R.I.Pienaar the original author of Marionette Collective. We are actively working with him to support FreeBSD out of the box, and will commit sysutils/choria to the tree as soon as it is considered a drop-in replacement for Marionette Collective. __________________________________________________________________ scarab: CLI tool for Bugzilla-related workflows Links GitHub repo URL: https://github.com/gonzoua/scarab Contact: Oleksandr Tymoshenko scarab is a CLI tool that makes some of Bugzilla functionality available from the command line. Normally users interact with the bugtracker using a web browser but for certain workflows, Web UI may be more of an obstacle than help requiring to perform more steps compared to CLI tool. Bugzilla provides XML-RPC interfaces that can be used for automation/integration and there are several CLI tools like pybugz that can be used with bugs.FreeBSD.org as-is. They are generic one-size-fits-all tools which mean they can do a lot of thing at the cost of more complex CLI. scarab was created to be more specialized and less complex with following principles in mind: * Be an auxiliary tool, not a replacement for the web UI * Move complexity to a configuration file, keep arguments as simple as possible * Optimize for most common/tedious tasks Based on my experience with Bugzilla following tasks were identified as candidates for inclusion in the first release of the tool: * Downloading attachment on host machine and copying it to devbox * Creating a file on the devbox and copying it to a host machine to be attached through Web UI * Creating PRs with common fields' values First two operations were implemented as files, fetch, fetchall, attach commands of the tool. The third operation was implemented by introducing PR templates, set of predefined field/value pairs, that can be combined run-time to provide higher flexibility. More information and usage examples can be found in the config file example __________________________________________________________________ Documentation Noteworthy changes in the documentation tree or new external books/documents. Cleaning up the Wiki Links Wiki Fixit Group Website URL: https://wiki.FreeBSD.org/WikiFixitGroup/ IRC channel =20 URL: irc://freebsd-wiki@irc.freenode.net Contact: The FreeBSD Wiki used to be a scratch pad for the FreeBSD developers to organize projects, store notes and publish articles that were about to be added to the handbook. Recently, however, the FreeBSD wiki started to attract more and more people from the wider FreeBSD community, which resulted in a change of the character of the wiki. As a result we decided to discuss the future of the tools we want to use for documentation in FreeBSD (one of such discussions was held during BSDCam 2018, you may see some notes here). The general conclusion is that wiki is a great tool for what it was meant for: organizing projects and notes in the community of developers. We should not move all our documentation (especially handbooks) to Wiki as the quality and maintainability would suffer. On the other hand, the current workflow of submitting documentation patches, which involves checking out the doc tree and patching XML files is not ideal for many end users. This is why we are trying to approach the problem from various directions: 1. The wiki is being cleaned up of old content. We are trying to define a clear hierarchy of subpages and categories to make navigating the wiki easier. 2. Some articles from the wiki are going to be migrated to either the doc tree or manual pages. __________________________________________________________________ Quarterly Reports Contact: Edward Tomasz Napiera=C5=82a Contact: Mateusz Piotrowski <0mp@FreeBSD.org> The Quarterly Reports have been resurrected after almost a year long hiatus. The old workflow, which consisted of users submitting XML-formatted entries, which would then get hand-assembled into DocBook, was replaced with a new one, using Markdown instead. The XML submission form was replaced with GitHub Pull Requests. This should make submissions and editing much easier and user-friendly. __________________________________________________________________ Third-Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. HardenedBSD 2018Q3 Update Contact: Shawn Webb Our last report was June 2017. A lot has transpired since then. In this status report, we will attempt to briefly cover all the progress we've made, including the few commits that made it upstream to FreeBSD. On 01 Jul 2018, we switched back to OpenSSL as the crypto library provider in base. We did this because we lack the resources and the documentation for properly supporting LibreSSL in base. We still maintain LibreSSL in base; however, OpenSSL is simply the default crypto library (aka, WITHOUT_LIBRESSL is the default). We look forward to building a development community around LibreSSL in HardenedBSD such that we can re-enable LibreSSL by default, providing enhanced security for our users through the rejection of software monocultures. Cross-DSO Control Flow Integrity (Cross-DSO CFI) is an exploit mitigation from llvm that provides forward-edge protections across shared library and application boundaries. With HardenedBSD 12-STABLE, we launched non-Cross-DSO CFI support in base. Meaning, CFI is only applied to applications and not shared libraries. Along with SafeStack, which provides backward-edge protections, Cross-DSO CFI requires both ASLR and W^X for effectiveness as they store crucial metadata needing protection. HardenedBSD expertly, efficiently, and robustly fulfill those requirements through its PaX ASLR and PaX NOEXEC implementations. Over the past two years, we have slowly worked on Cross-DSO CFI support in HardenedBSD. In mid-2018, we made enough progress that we could publish an alpha Call-For-Testing (CFT). We need to integrate the Cross-DSO CFI support with the RTLD such that function pointers resolved through dlopen(3)/`dlsym(3)` work properly with the cfi-icall scheme. We also need to perform experimental package builds, find breakages, and fix those breakages. We hope to officially debut Cross-DSO CFI in the latter half of 2019 with the possibility of pushing back to 2020. HardenedBSD remains the first and only enterprise operating system to use CFI across the base set of applications. On 20 Aug 2018, we launched a new tool called hbsdcontrol(8) to toggle exploit mitigations on a per-application basis. hbsdcontrol(8) uses filesystem extended attributes and is the preferred method for exploit mitigation toggling for those filesystem that support extended attributes (UFS, ZFS). Our original utility, secadm, should be used with filesystems that do not support extended attributes (NFS). In September 2018, the HardenedBSD Foundation Corp became a 501(c)(3) tax-exempt, not-for-profit organization in the USA. This means that donations by US persons are eligible for tax deductions. The creation of the HardenedBSD Foundation will ensure that HardenedBSD remains successful long-term. We look forward to working with the BSD community to provide an open source, clean-room reimplementation of the grsecurity patchset based on publicly-available documentation. We assisted Kyle Evans with the new bectl(8) utility, primarily enhancing jail support and fixing regressions. We are grateful for Kyle Evans' assistance in landing the enhancements upstream in FreeBSD and his overall responsiveness and helpfulness. Relevant commits for the bectl(8) are: * r339047 * r338221 * r337993 * r337947 We taught bhyve(8) how to live in a jailed environment, allowing users to jail the hypervisor. We hardened the virtual address space of bhyve(8) by using guard pages. This work made it upstream to FreeBSD. We are grateful to those in FreeBSD who provided insight to increase the quality and efficiency of our patches. __________________________________________________________________ --huq684BweRXVnRxX Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGmBAEBCgCQFiEEbvjBe1hu6u1NeinjJCKD+Vwk/7oFAlwhcwFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDZF RjhDMTdCNTg2RUVBRUQ0RDdBMjlFMzI0MjI4M0Y5NUMyNEZGQkESHHRyYXN6QGZy ZWVic2Qub3JnAAoJECQig/lcJP+6yekIAIrvD49Qj8sSNEfblE+V3uEOIsgypSPt mjIxBkl93FV99IzTv/YlZ8in174opyNr35lHf7+T1doy2HW0vENYmQ5ONbrFv8kd nBI8XRQsrZHCADu2/fK+WpHAbl7ZYzAWTzOr/Aje7smQqA7WViEQrnTF/8aawblE YITuuiSvGmEBbHSdIR6QLTaPafcLGge0A5XFmFxNW5XPR3o0hRzTDOclPTiJ6CVf rMpSUO/OrvRVdiJ7BVrDl/li3HXZnloQ23wu5qknSLcFJ+1eZ6wPJfgaOOmVBUCd 0XDTMnnSDWg9Gv8kXnqdsio+MtoUd+GtMZowMlVFOsTSgKoh1wdYV2k= =TpVf -----END PGP SIGNATURE----- --huq684BweRXVnRxX-- From owner-freebsd-stable@freebsd.org Wed Dec 26 13:29:25 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F1F001351815 for ; Wed, 26 Dec 2018 13:29:24 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 71FDC83302 for ; Wed, 26 Dec 2018 13:29:24 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 32B571351814; Wed, 26 Dec 2018 13:29:24 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0D6231351813 for ; Wed, 26 Dec 2018 13:29:24 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5417E83301 for ; Wed, 26 Dec 2018 13:29:22 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBQDTEOU014514 for ; Wed, 26 Dec 2018 13:29:14 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBQDTE9Y014513 for stable@freebsd.org; Wed, 26 Dec 2018 05:29:14 -0800 (PST) (envelope-from david) Date: Wed, 26 Dec 2018 05:29:14 -0800 From: David Wolfskill To: stable@freebsd.org Subject: firefox-64.0_3,1 SEGV in stable/12 @r342472 Message-ID: <20181226132914.GF1190@albert.catwhisker.org> Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="EQULBRs4nj4AMCRW" Content-Disposition: inline User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: 5417E83301 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 198.144.209.73 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-4.04 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[stable@freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:198.144.209.73]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[catwhisker.org]; MX_GOOD(-0.01)[mx.catwhisker.org]; NEURAL_HAM_SHORT(-0.96)[-0.957,0]; RCVD_IN_DNSWL_NONE(0.00)[73.209.144.198.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:7961, ipnet:198.144.192.0/19, country:US]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-3.68)[ip: (-9.72), ipnet: 198.144.192.0/19(-4.76), asn: 7961(-3.81), country: US(-0.08)]; REPLYTO_EQ_TO_ADDR(5.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Dec 2018 13:29:25 -0000 --EQULBRs4nj4AMCRW Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable It's OK in stable/11, both @r342455 (yesterday) and @r342473 (today). It was OK in stable/12 @r342458 (yesterday), but reports a segmentation violation and exits when I'm running stable/12 @r342472 (just built this morning). My ports are all built under stable/11, and I have misc/compat11x installed for times I'm running something beyond stable/11. (I've been tracking head and recent stable daily, updating ports that have updates daily -- but ports updates only done under oldest stable I track -- for several years. Details may be found at .) For the last 1.5 weeks or so, I have been running stable/12 on the laptop during day-to-day use, as a part of additional testing before migrating my "production" machines here at home from stable/11 to stable/12. Firefox has been fine in stable/12 up to this morning. Files changed in stable/12 his morning: Command: svn update /S3/usr/src Updating '/S3/usr/src': U /S3/usr/src/share/man/man4/cyapa.4 U /S3/usr/src/share/man/man4/isl.4 U /S3/usr/src/sys/cam/scsi/scsi_da.c U /S3/usr/src/sys/dev/iwi/if_iwi.c U /S3/usr/src/sys/net80211/ieee80211_node.c U /S3/usr/src/sys/netpfil/pf/pf.c U /S3/usr/src/usr.sbin/ctladm/ctladm.c U /S3/usr/src Updated to revision 342541. [Yes, the above says "Updated to revision 342541" -- that's the last commit to the repository. r342472 is the last commit to stable/12; r342541 is to head, and is thus not especially relevant to this discussion. Please see for further information on making that distinction more readily accessible.] Peace, david --=20 David H. Wolfskill david@catwhisker.org Yes, Mr. Trump, your behavior IS a disgrace -- to put it very nicely. See http://www.catwhisker.org/~david/publickey.gpg for my public key. --EQULBRs4nj4AMCRW Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwjgipfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PcmHuwf+KF6ZxYCvn7hofOg6gCuoJIoDVR5CkSZ6DyKczF1lVrI8vQwomKMWrX6Q TudkNFQOAw/xK+Gk9UKTCzqO3yzLecMNzhW2GGP7EZl4Nwk1hWu1ns7ZAaAb935h BxZSzIcsk25OoXqzz+Blhai4zGg5dKyN4hNy1mACWCsrLK9JAG/Q8qV2Fq80R0r9 kV75EnFRsJJiDu4wxv32i0NLp8yPX6IXdave3ojputFuEXfJDbi6wyYwudjP5cUo vMKbJsiiavwtJP6ohZfkvhvJVFUBfXwx3YPRdEEb0qTg5jOGwvnXeFJQG/peu/xG xyxtBHQ81iE4FyebSjL36qDQMDwdwg== =unml -----END PGP SIGNATURE----- --EQULBRs4nj4AMCRW-- From owner-freebsd-stable@freebsd.org Wed Dec 26 13:48:33 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5625B13522E0 for ; Wed, 26 Dec 2018 13:48:33 +0000 (UTC) (envelope-from mitya@cabletv.dp.ua) Received: from mail.cabletv.dp.ua (mail.cabletv.dp.ua [193.34.20.8]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A02CA83F8E for ; Wed, 26 Dec 2018 13:48:31 +0000 (UTC) (envelope-from mitya@cabletv.dp.ua) Received: from [193.34.20.2] (helo=m18.cabletv.dp.ua) by mail.cabletv.dp.ua with esmtp (Exim 4.80.1 (FreeBSD)) (envelope-from ) id 1gc9Xp-000BVN-TZ for freebsd-stable@freebsd.org; Wed, 26 Dec 2018 15:48:21 +0200 To: freebsd-stable@freebsd.org From: Mitya Subject: Failed to biild world in r342545 Message-ID: <26e6b029-1b0b-9d66-1a90-0fc64b889f8a@cabletv.dp.ua> Date: Wed, 26 Dec 2018 15:45:49 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 Content-Language: en-US X-Rspamd-Queue-Id: A02CA83F8E X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of mitya@cabletv.dp.ua designates 193.34.20.8 as permitted sender) smtp.mailfrom=mitya@cabletv.dp.ua X-Spamd-Result: default: False [-1.90 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.86)[-0.863,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:193.34.20.0/21]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[cabletv.dp.ua]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.85)[-0.847,0]; RCVD_TLS_LAST(0.00)[]; NEURAL_SPAM_SHORT(0.31)[0.309,0]; RCVD_IN_DNSWL_MED(-0.20)[8.20.34.193.list.dnswl.org : 127.0.9.2]; MX_GOOD(-0.01)[mail.cabletv.dp.ua]; IP_SCORE(0.01)[country: UA(0.04)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:30779, ipnet:193.34.20.0/22, country:UA]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Dec 2018 13:48:33 -0000 12.0-STABLE FreeBSD 12.0-STABLE r341991 GENERIC  amd64 1 trouble. Part of "mount -v" tmpfs on /tmp (tmpfs, local) /tmp/obj on /usr/obj (nullfs, local) /usr/src# make -j 8 buildworld && make installworld installing DIRS BINDIR install  -d -m 0755 -o root  -g wheel  /boot objcopy -S -O binary boot1.out boot1 objcopy -S -O binary boot2.out boot2.bin btxld -v -E 0x2000 -f bin -b /usr/obj/usr/src/amd64.amd64/stand/i386/btx/btx/btx -l boot2.ldr -o boot2.ld -P 1 boot2.bin make[6]: exec(btxld) failed (No such file or directory) *** Error code 1 Also not founding `ls`, `dd` and `xz`. Adding them into this list in /usr/src/Makefile.inc1solve problem: ITOOLS= [ awk cap_mkdb cat chflags chmod chown cmp cp \         date echo egrep find grep id install ${_install-info} \         ln make mkdir mtree mv pwd_mkdb \         rm sed services_mkdb sh sort strip sysctl test true uname wc ${_zoneinfo} \         ${LOCAL_ITOOLS} 2 trouble. Part of "mount -v" tmpfs on /tmp (tmpfs, local) /tmp/obj - ordinary directory /usr/src# make -j 8 buildworld MAKEOBJDIRPREFIX=/tmp/obj gzip -cn /usr/src/share/man/man4/tap.4 > tap.4.gz --- all_subdir_rescue --- cc: error: no such file or directory: '/tmp/obj/usr/src/rescue/rescue//usr/src/bin/cat/cat.o' --- all_subdir_usr.bin --- --- .depend --- If I build and install sources on same hard disk - all ok From owner-freebsd-stable@freebsd.org Thu Dec 27 01:46:06 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D42D7133DFC3 for ; Thu, 27 Dec 2018 01:46:05 +0000 (UTC) (envelope-from walterp@gmail.com) Received: from mail-io1-xd30.google.com (mail-io1-xd30.google.com [IPv6:2607:f8b0:4864:20::d30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EA0EE77E8E for ; Thu, 27 Dec 2018 01:46:04 +0000 (UTC) (envelope-from walterp@gmail.com) Received: by mail-io1-xd30.google.com with SMTP id a2so1107480iok.7 for ; Wed, 26 Dec 2018 17:46:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=55xKE0MvpN3dJQLorGYoAWfXEVoymA/+533xAByyWbI=; b=oHbmLnhRFlr08vB5SIbNjEnXCCtPJBFYdeXw141U6jq6mEsth6Qq+Fk+amrujq0zXx zU424JJR34LAXQfKBBqGjoZHQR5vjYDgCMlYQ1iI/lGgDVIF0CfSkE7TkwuvXwgKmKSk IkogAe6zgGk4/uSCNon5Qn2eUneZc3lpXUgAEZB362C0dFwKiiCECjJ7drkAqA1xdP4c Jlc8boHCkUtBWnxkTqfUMglU5Zcw8w2gpYXbBwJ+6H9qibjdW+8hsf8t4xm4FiLUqzpk KWAPPpQ3quxWoC/9T0fDd42pw17bzAjnZVih9jm/qNXFbnTsTVdI2jY9ek7BGDLajmIC 1yBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=55xKE0MvpN3dJQLorGYoAWfXEVoymA/+533xAByyWbI=; b=SdLl6nNugJHdwecYALsvHJNxtOvIrJ7q/zvMx2XH9hsyPgnDvaITGy5VYDny8ANqIG iWimO5eUZTiChui0gYZVuSIXpro3kKzH9wHS32BZ7GyGDac2bM+3aiTWPoLqhwPjchKj VNGqYSFphzksqqzO0a8wK/hImhbv8BY7Geq/lqFY990hq9KzLIBBPUL3oV4dUzB1CfgN Dv40BuBHpMNv8gFYutL0rqexhNh21TY0zRyDkD2PRb01hrzyZddzuS636qeVAtIZg09m agZY+Sr1SXqB/AhgFseygZO3ShNEOhmujpefc1O7iiK/J621VFKQOTM+vW3OV0KJEqGk vxKQ== X-Gm-Message-State: AJcUukfwo4p5kb5fkjbH+odZ6rgzJzE5GZwd1bK90kmZH7YRrYl1VcbE pUQipXlZe7EDgqoOSG0iPfgzPdjlZQIxRPZ4N8FKwRQO75s= X-Google-Smtp-Source: ALg8bN4vRgqPeNGu0umxswlykw1TTSPBrH2uVm1kIpo74JOjyHU0mc6tXqTqGjnVz7VgiMhwCHSsM6jeMgyoBd2BTNM= X-Received: by 2002:a6b:e019:: with SMTP id z25mr11447882iog.237.1545875164036; Wed, 26 Dec 2018 17:46:04 -0800 (PST) MIME-Version: 1.0 From: Walter Parker Date: Wed, 26 Dec 2018 17:45:53 -0800 Message-ID: Subject: Pkg dependency strangeness To: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: EA0EE77E8E X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=oHbmLnhR; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of walterp@gmail.com designates 2607:f8b0:4864:20::d30 as permitted sender) smtp.mailfrom=walterp@gmail.com X-Spamd-Result: default: False [-6.42 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_TLS_LAST(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[0.3.d.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; IP_SCORE(-2.50)[ip: (-9.06), ipnet: 2607:f8b0::/32(-1.87), asn: 15169(-1.49), country: US(-0.08)]; NEURAL_HAM_SHORT(-0.91)[-0.910,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 01:46:06 -0000 I've just upgraded an existing FreeBSD 11.1 system with php56 to FreeBSD 11.2 and php72. In order to do this, I used a mix of ports and packages to delete php56 and all of the php56 extensions and replace them with php72 and php72 extensions. Everything is working now, but when I try to install anything using pkg, it wants to reinstall php56 and serveral php56 extensions. This happens for packages that don't have php56 as a dependency. For example pkg install alpine gives The following 11 package(s) will be affected (of 0 checked): New packages to be INSTALLED: alpine: 2.21.9999 php56-session: 5.6.39 php56: 5.6.39 php56-xmlrpc: 5.6.39 php56-xml: 5.6.39 postgresql95-client: 9.5.15_2 php56-pgsql: 5.6.39_1 php56-mbstring: 5.6.39 php56-json: 5.6.39 php56-pdo_pgsql: 5.6.39_1 php56-pdo: 5.6.39 Number of packages to be installed: 11 How do I tell pkg that I don't want php56 reinstalled? Thank you, Walter -- The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. -- Justice Louis D. Brandeis From owner-freebsd-stable@freebsd.org Thu Dec 27 13:07:09 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ACFEC135E8DC for ; Thu, 27 Dec 2018 13:07:08 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.infracaninophile.co.uk (smtp.infracaninophile.co.uk [IPv6:2001:8b0:151:1:c4ea:bd49:619b:6cb3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.infracaninophile.co.uk", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A381172BEA for ; Thu, 27 Dec 2018 13:07:07 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from liminal.local (unknown [IPv6:2001:8b0:151:1:f1e4:e14e:cc4a:f745]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: m.seaman@infracaninophile.co.uk) by smtp.infracaninophile.co.uk (Postfix) with ESMTPSA id 0AFC1DBC2 for ; Thu, 27 Dec 2018 13:07:05 +0000 (UTC) Authentication-Results: smtp.infracaninophile.co.uk; dmarc=none (p=none dis=none) header.from=FreeBSD.org Authentication-Results: smtp.infracaninophile.co.uk/0AFC1DBC2; dkim=none; dkim-atps=neutral Subject: Re: Pkg dependency strangeness To: freebsd-stable@freebsd.org References: From: Matthew Seaman Openpgp: preference=signencrypt Autocrypt: addr=matthew@FreeBSD.org; prefer-encrypt=mutual; keydata= mQINBFJIL80BEADi7/VbnnErDU6pjEhI/SzEZ/HbDRkJ5g7HroAtqIRm6nj8ZwOAgZ/2ZnWn 5F+fXTuLsG0FLNtkd17FoVcuCi5e/GPliXI5cmamV7E1Yz4T8UsJ7RQolimyxVexccKd16Tc AA7B9bFlJSKkBUSD0buj7VjT07xWhRzu6Vgi5r0UjLALYJz977uZA0F1aOGOXREDEAOhdcNc kSNjynqAwDA6dCT1Elpi4key1fYjv4jyDF+GU/YXul2Y/rguA8FCkHd9vyym5eAsLQ5mG00V V9fkEHIpH5KorNVnl/ufHXnkZqmHAZVpFDcrshb7aZ/pL45PXyWgLj+e6etelgj3a2bZi0JF cVdXCnBZVP2oIyYblM11ugTbfCwodORU8a5KfPeztMdAtDr4e+32NTrPdPi5rLT+GUsYz+PL 3A3m3u8bdsFp40DlIrBtSByVjqERxcfhphrEB4J8BXHUG7OAtXkZMlW/PGKDwXJq0O6Z5Tcg YHAoEiSWbXiexHgXNJyP+sqnIlhLWhSJGeJ+C83wqI6oYlZUCW00NkPxcIHnQPV/z+5wQVci TMyaWC2YCIHz4Ljs+TnwWMz0E8PNFDfHVbQ0W4PRGV7gRAqxfL+yKufauIEGbEq8rNDbSwL3 bcUCxR4ZDlaUEUwT4J8naf7rjdgiEYHs2Ig3jeK1+ER4FPG1sQARAQABtDBNYXR0aGV3IFNl YW1hbiA8bS5zZWFtYW5AaW5mcmFjYW5pbm9waGlsZS5jby51az6JAlcEEwEKAEECGwMFCwkI BwMFFQoJCAsFFgIDAQACHgECF4ACGQEWIQRyz6whebywJLW1RZADb2ye5/OevwUCWttU4QUJ DFmAlAAKCRADb2ye5/Oevwb5EACipbOazgwl5IbqkQI4gELpCh5dqDASS9DQqAD35n/cI91P 0lrYcdyCQbOXadQi5bswnP4AcJqX83mITXbcApDdxVxHujw7VODI069eV3/I9Qz72mHYYAAj w0CHNx4bKED2YCSVS6+jV5hq2sywNEUxL+4I218Oc+IsLts62m4tQ8UxX9fQ2H1kQOvdrYpj x7je5qJX/yujLc+9WWZ8ZBSdP/HVJUEdRgQotwAlgfMp3mRQEE73MAJisG/olj/dSxd+oHIP NbJt1yxMqhZekuEGqZpm3tWvqYgpGcEXdhphJSxeK6oLpTLghuAb7/WdOBrpfL7c2OQYBgOw DK+7Io9NBt/d/rCxL39jmUONW8ohrhnNQ2SALnyYTvZgruxA4tXxOOyM9up0/8mB5E8YC9ML 5YuxRPNTXYeWCexa0zktnkCgT7PhS33evf5gsA0B9Snv7TFCFN9adPAdHlsppZIWfTHDG8e2 Jik8PmvsUG34XNif5k6Ui3++2ZA8ZoKvOyLeomuno1hN8yk1APw8SbX1SPNz9UVbl8W/YgGj 3GhYOuQt4HcMiLyTby6R4lC4nsBaHS1MX+57f6Zxzf2wNjSKxiJK9qS7azbu/GxpafNhbz1Z +iUDIaJkRWA1Gs8C7SMcfVsI5zDtvqHGYtTCgooVMYJ6vRyB68M4bljUYMxRTrkCDQRSUUGj ARAAsPHwcnupWuOqYbboiYwZnd6dNRSUzMxIXN8vkdkrDfw7DvV9WYuAC9IGJ310N0otfh9A zGDiCPRbKl0YayJ2BIgsFzyAavA/kCCRLP5hMZ1mKkZ4K8Fs16EvtmarzPibSBfDQ0wcwzNf nSL2gZVG1JwRHHZ9TtiUsuAIh0R/qRh9+8AcFkS5Pfxb1PzJC/YuWOdlj6cO58u+2FfmNiGm oB6kl1LahmbtGgO8GRInkOYUYlWSUAA4Flw4FzWHBkEGv/STAp++KAZu2Tdl5UZH9iXm+Hsf 4sqt+/ILJketmO2RK2o2ECVwE2a/hQdOjjqmcscd1M5znweKSCk6dR/K4Cv05bZ7KVRCm2vK vuEBpltm/43/ls7OnFwz1UVswX9ch9t5tgSwbGxtTWJ/Mr3ybCz0EE4WaJBI8HTuVZWaJwXM ozz26BZCOV56flkZjDuyRhvRjZG+QhdbbumBDpa6wu3MCjSG8wn4RlNjuQdjDCo6bdqyovGg f8RW6UNCmStZkpTZYZfs8MTEcltmaFiJQjnY39pWa+Fp0aWwcwOVlAkp2wX6FzQeIEbPW515 vAlCjXneJIN7jss4Y2QJtFFQaCw0c+NloESFFhCLvYBhMPf2kccnDu25VRupkLp6njQs94Nf jtSb8mzOa2EhAHY81pRfdetOPosi23P6zIGKLXkAEQEAAYkEuwQYAQoAJgIbAhYhBHLPrCF5 vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG8mAonBvSAEGQEKAGYFAlJRQaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDY1M0E2OEI5 MTNBNEU2Q0YzRTFFMTMyNkJCMjNBRjUxOEUxQTQwMTMACgkQuyOvUY4aQBNlUBAAlCLRtOug Y70Q3lkGsFSNJZm9oqPJGorOsH+emDdsiZSe5Ut5P2MG+XlIofQOfxvupltzw2pFuJOvHEMS 0rod6lLJ6joInhf0ZQH3P6jF/d2Y8iR9+2nqBtUf27OsHVLRMd/5WHVgyMjjyNBq0urIdv4E wV8Y9CDtGBGeiYyMstaBxHdEH+oM9VZB92lv485p4V8t8k1BgNn7UjQzOMBlITAB7WsUcXGi zTjMMe1tX/IT+f00I4PWAn3w5q8ldvtsWf+muVpIaGpZBMrxBEPxYBD3WGMxiymthQQxgZAB 03GatfLjzixld5Zn8WuGiPOxOTBkJAudhxPvfkO+3jgLGSa7TN46HgNH36OdeEr4SMdspR0i 0lmW1hwHmpmyw3XYLy4BwmhuV9z1XQN3qab8FBxOpxcCxnbO4HoDgXAahQbRNSA7umzz+I7S UcZVnCCG3hCG4BLxklZhBw4RmUtRHiL8vu+MPKrcBnbZ8uJ2s3E6mhB0yM0UnA3pYhAysgwB q3n9jLYN0atzVmHL8Fxjyc7z1EJPgqFdfHfMYl/eLYmCuGNfMsSGlH9O7tWoE10qkDlLmNB7 jbiJNgTf9rc50QKKUqumqp4a1UMEnt+7yf//JqUD7Jf0iJrglLgUyPKSY5te9rJqHPy1wIXT 6pChY5ic8jmtXKsCZaaxL8rEsq0JEANvbJ7n856/RNkQAKiZK5wNuRyNJS21MUJxnP7biEW4 1QuGhV/7Ryw5XXIor8H7SZHCnVR1fCYnJWRwRYn0SyZGoERW/57rgibf8/gkPw741AkCKOhL TDNgvNriEjfWj3I0X6M90AZXhcnGVJTS/moV65g4lUo6jX1GiJyTCD4b9SLyNDzPgiWO2I3W R+Xf/W81PK1820CN7HpIZUrLfGF+Nr6kXUxeOeSpi7ZMB/p3e7ZSzY0Lp7PFqGfL9N1Jg26X 8DVaf/Em0AorutLx84DqqMfO02ySaCq0B83VYzbNB3Ascy4c2JNIvwMiyUbsOEzDKkqB3sYb 0iJtnty9DKvMaLps00eM1+GcYpLsspY4NZQeJTVC+WetRqzFM4k2JH1q3hwymYgIsxDam6kn U3m0bN19WLQYmS5HLPZbkmtpm3P49g6KLFxZHzklS7x8VUOMJ3O97xXScBC9bePB3tqQRDSs wX3YmIywTYVInEeFleNaXH3UoS3Dhw7KP3i/BNreWDM+oZhbc2OkgWzQzXfT+l17EcP9/xML 0CIgM/cJPwMOrKrdqgfL6zAYDUK0IGFgRoxgnAbnpPHCr7ykrELNLbGtnzchzCxnbIyrSVAb m+Dm5MnjQRiNFXbuvpkuVVFqo6a0OhX1cwTuCIzSEfSggRaOOEqXTk559dDOXDqVx9lVKniK vbGzkmhAuQINBFJRQiABEADC0axEKC09VCYGgsH20lUwtAXd6VUVCNENBlW+MXQYsKfCLqO+ XP6vM0pA+sSswaBeSB/Eu3XgdKhuYGKHqAOo4wyKvwk3h9IWmgVNMM8ZQFi/PP2ya56/tuWZ 7kkG2M2OfWQpnBHa97wSN0KWDjZHrQXQMggDq5EqimNc2+hFaB2zIGrP0tjXVrHLJEmJRLq2 ugTxpGKLlNOtBNEsWmiN+MafXpKM6HLDq1scCvrhRICheBsnGtcyGaErwpjNaLA70I0+B552 DfTj+PICOGCMnp4jlP6rmVG7RifZoE5DrkcdTim/IU0pLaO/Epts5lwDodEOW9CKQFH8dswT bp6xhKJf+y1dIwhoOIkEUspoME3rgLtn72+QQW4jw/4pjA7MQu9VOF9bUN/nxTfyn/Rct3Bq sBZPJURdorewPgoBsPxMaA7t8JRoRyuVwXGMacw+wdmv2lldsdUOGokSCB596FoXAcKWndiY dgNjMWJaODy2va9Vlv65hGQRXWcoI2ytMCSwSzslly+V+0jo0ZWoUpd+6BuYRvG1QUW5/Fco aPPJsr/UfU0jzg6bCAw/xw1nuGaiZTqNiNjklrGIKyi0UyY28DGGADn3j9obY7pOrI9nFicc NtxURyhmgHP9tiTYNTVaGPyJh+WV3ZH/Yb7TStZadLoWb5vXAs0DQj+qnQARAQABiQI8BBgB CgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbqkACgkQA29snufznr9M zBAAvn4C8wWYyiObQbqgaAm8GjqlSi0lGEv7ydmcu2ElAAyD0dnxbEMKEGgBpQumGD8/1pdZ FYw3EIKWiazpvMVw+6fFz9GZdviuM1refUYm3duDejaNoH75zmIG9LRTOJ6RBkPd3oQznT40 X5K+ARqLaJDPAzjb6DH7HYINlvNvf89M4CVN0gofv7dcCqtBTF8CtXB3iG0cFAis/12PwpfH 3YzWq529jnJJCLChTD5eEBi2JNLzQRHMeqy8D4Bnkb+Ahkwgbzs5GXGYaXoZeyFKThTAK/sg eJ9Cz15azfKW+EWMUOcvCurqz2QajlLe04N9mU4vPp92VTo274CtfIg/shSguYXnEZ0I/sz3 VFn3Kn2bRYeRu6PyusNUsQ397Uw5wDVmqzQqz+MnOkP6xAJjOvnD05cdj17G4rJ8gTgmzDSA 6v0AfzhUygy6Qf0UgrWrFaFIL4zQWsp9sap/QTMm92SBhLOE/Kc7nkkueEeVp0TtbkWByxLq 77Gbp0m4iZB8zylaac118hY+/vJ87aTuKF4CiCcezaI5FMg8/VVczO7/LV/n8Uu8QUOYEatR cfOB2JNXxpI/LqXVzvXpUidJbwpXY2aZprgzGhahBocuRL9jY8qp4in5CkhyU+rZyHkpQMHI +i45KRHO5GDSDMQcDF2LYGRbDUMg7G1MYTJwzsG5Ag0EUkgvzQEQANi5h27KsPhVw6AKlUo8 htPapW7b4RS26/z2pJe1IJ+lejrD5LveuRxdO3V+5hxqdBMEYNuQRmOlgsjiXkM5XFIgBeEF VGBaDv5yKPZXNfqIJC2nNehcR+rWHq84yrVb/MAvEvfQTvn3GeCTDd51xYnZYVO0An44TLLe 9cKL/i5d4I7flz/NK4DMpSqBRs0z7Tj9uF22LtYDJhNnQPolF4f+ADRLGMsbNHpCKwLcuzCR NlWN+eTY9peGZEfDoJT39u4wdg2ut9aSTv3B+l5HHkfYSS2gNf5yQ3YOVbQp/D6vZvNBCS0n Y5G5ApFil2ZAdoqfllqeQ74eH/dEPqOK1LCiBznKPHoLvTAJgA9v+Lhb9qw1jbIVD56Y88ZW c2iONscDlN2dboAYXGu3pcc8KNFkfc/j3MKRfq6N2l+t/n4ueebtLZypDJ3v9X7cQAkaW90R DhEuPpvvd+MEZGDYH3ZtIokqXZ3G3yiAy4M4TGXg4jX2pQ8ccXciimcp3DaXvqcV/SKnF20Q l6lm0r9sNp8ZBWUkLeMnDnpMdSjlONGuG9TsM50gaDi+kJuy9/fnlA0UGMpQNmBc1wsNAHl/ Q3ObZHUQtsZZN0gYEusDHpNC87SHodMS5YTc/eKx02asEoIoue/vUejkI6dvHWZv93+13y3c ZBhHyfF6SEr5dNkjABEBAAGJAjwEGAEKACYCGwwWIQRyz6whebywJLW1RZADb2ye5/OevwUC WttVSQUJDFmA/AAKCRADb2ye5/Oev9SOD/48JvgAf/PkjW0+TTE5vDaqdlEmNBu3K/vFX4T7 u0YT+qzLGUGYUvISiti9Dl7dV8kTg/Yr20EbHpj2a1Iys03YbR3mn/p6dv9abyqkaSESHN/g PPk1rlEi/j3lyoQsjDN6bpBEwT7Kbgri+Lwtkwp0vGm8I5AOguGlnCuNqsJ2jnHJ6YnEaKKp imIkr8wJVWxmx0OfnZxWrhMr5txD2DG675r1/IyOkU6SnApoD15+fJQmrsSmCKo3cZUMvM5Q 9lUJgdKuC89jJ1NujCzk7SC/EP6xSW0KFGzpqK0leIfh1riQ8DNs9CWreLANKtq35qbDUeGy BHwki0krsRRuNfg+0c+Rc5XOl+vuGmwfblKguIkAKSMSsjslXHqom+9s+mhOqJUSjAHsazlL BkVn00DfooDQBeeOwDlRwmQi+xcV3FomZMf5+4ARmsfzGtRIiJp5pfjek/P9vjeW+UqlE2az teXCmaK0G2LaLVVNnJzrUVQAqpA5eMtd3Ay8IGlhbrfznmAplgUH0aYhR1twIbUF8MeyQYIH fofR+lOnp3/vufJFZWve4S6tbK/OA69+Xr4wKAG95XBw03qZtPFbWu9yk5AYuS02U4akBhFv NfSx4Bs2rcrXZh63VBrlNqecueJdOQiQuY6nGoUa5fiE9glZF5ib9PVa522bBwaI2mW1tbkC DQRSUUKTARAAt6FH3HbDFoumOWUuJlDgOQs3wdp2n3IKv7gqzbDdgaoWW7hDTvjO0Cb6p2PG UKEoxMQQoIdDO0pQ9rgr4Sh4VSVC9WMO/fUwqdrIs2nACIg4OwvNhIccW08S+N72f+yuXWOQ /dv79cwruE26/BEXgIP09MYcOWwcUCXzOoUR3er+jzcsN9uFjcsBVUJLIEru1askHRzCUa5P 9S9GAFBwN49HC5IJWEzdLP27FjjOG5UG3+QZahHrjG1i6S3bIYXtaGsqNyfkp9Is7Wpj2kk+ s9Ua+YMG/V5YVlbANIexa1yr75p1W9biqXpCWnB3TaHSfI0G1t9w8K2qhR/Z1/YLIcRzZ2aH JnvbzJYw5Cs1jfNpFytbASsxj0rbReouftlBvVWFRxsZ+oG1ZXL64/SVKMZAnfBNxd1uajp+ HtoQtYoTu88la6zcdnAhOD5JdOntN2VF8iQnDfPgkidfuSZ1C059xaRPTSRJBgMRDtOlDxgz 7Pxx/7L2jwxRY1dq6NGioflY7CCpGc7bi1K6xnf3lBL8X2nGpRAVsg9Lx1ShIWkgNbTAcPXp XcXlJ1xqz8HS8Twadh6gIfk/RNchBIED9lkVCKHYp/XQb8T8vMwn/kTWUm5WlPkQUFQN4D1b 6+dJw4bwn/wiRS8did1MU1OytJB6tljfEUCx0uKkzqr+33MAEQEAAYkEuwQYAQoAJgIbAhYh BHLPrCF5vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG42AonBvSAEGQEKAGYFAlJRQpNfFIAA AAAALgAoaXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp5OdNFg// ZqeVdGoKkMvALPzZjGz84+6l0kcMxSN4TfWmec0YpSmDEzCw4/SZoGqHlZb8lcTevmNrNXg6 c+wVw6P+Ycl20Nzb98Kt9C5sz+zGVmPPK+3O9gaPnEqlIKnnbxKXXNHQdd8Mf0UTpifMqX0I kWOqhe/tQKGoQ9+feKvLIaToIe/NjosW6vJ9YAgFqZ0015zwbElhMNFmgDMOI2SgjBZ9ngP1 U82Mqb7/7G9GxHtnwuJBSnPJgN8tav2O9uWPC0N8deyZBH4y9ERBPTFMc46wjkW030olcq7g 4hZ55rpPIEyGQZCq4u1gGibbiQJZEyUQT7BJm70/PeUr3uNjPlQODV/lF5TBvqGHEmlSQfo6 Yb/QQx07CK9bvhUSO2XP3ybS8JwoMZlgZzZcjiPiQF9ot6152/Cp/XrsKgtk+fg5ARZpyywR lQk1JCHRZvhgXIxqNYA04uwdPFcLI4vPiDaLS8mhXHLRZsSpHmIBqqrnam5Lq7iDc39UZrSJ MM40oy3iAOI2B7AOCbzxRuEplJd3E/tEqrnFGcPVN+h52ka74lEyfkwA2RrASWJJcXLN3/Vs izEj8okepefzjU/UPnU8sirzeWWo8Z4uKddovk//NwAPUJbee4vZLjYE6MWdpEoZP9CZXbtI PWuc9Djg16aHOgv44JPokDMaHA27A4rw2KwJEANvbJ7n856/SPkP/1bGUde7lnRTNd8c0ZrU tEi+OOibKyh7BjLUpzlihj3rGl9ljAF0eCdBrL1We3MDDcyi+XO7VZLiecZTlG6LLXFvEFjY pyPRx3bXlWk1/ahEiBoLWxedseNdFrO+H5XX6ODmKFFLhXgpsXnAxtM6Mxmrx0CGW4qzfUi7 Vsqj86gqlcet0/k5RqPMAhrGX5fNnQNWSAwumeFKM8UgDpKY0u7M2tS07B0ozXOSpqGTSJhX 6Ld2Nl95CL3wbSGuh1pDUOysAnzK5Rl/OQ9LtYpWomAKg6yn7gKYij5XmekAg/E+ybr5Gyx2 PgMQUGtuNmBRWP1qKtVUbrOekiuNz7kpdrP7M2O7i/cxWjGpVtjDNWuGkFgY3c+sKKawBma8 1K4rg044nkGwFX98vfEHVGu+HOd3D+Mv47nv4LQvzynBG/YflwaPmLhpw7HCPvpa4W7y8+5A KxDqWlM2NvrLwmwbmz9dQMGtjnNRm4uHfPX8AyzBoMtDrxNLIvDYlLqh+G2Q1shNNNdRNXn9 Z1pvri6KAHmH9GlISuM/jQfItout+Gtx9QUlNX3aIsdScTLA3jnMOpHcALCGI+XMiBNaVuYU xHgHh+MNYhmjQZZqASBCvVj1HyibDPZa/iQ4DBGBRlJb+8saPPqYVDQhosWSF20aJKwepZII OFjpMgmCIqZAnqK4uQINBFJRQrgBEADUWFag56O3CaycayGght1rYWYz7P9/3s7OlqAuEAId 8/kSz8jXzAb/Qb6t0247a2MD0gxnjgZQy2OiQOsOTrc31L6tUrLVATL5Q3oKIh9hOlNMA+cR jsgY3UmMaSw+Gftp64EJDBQwBXWT7CSUEJw4PqzwMPiTHRkmqQfzdfNagFJVqZ0e+cznoLzI 9WvkccwLW1kicBYEysX5yOXUQ9/PcKqRWcbxLFznJ16JsxL1DeUct5WRWUxECY2rM0t+AkNR a3NpzskiMUSzFhiGmJo9yyy1RS4drjMhEn/IcM1sO21ZF/WWuUVkul65qngFnaFDDRQ5lU3A agWhLhmppmK/yabSVfqz38B1APoBWuldYprslTbAOJrL2xFtiH7m9VYbP2aGdwr9V/C27kiN Wnm/lYzP9Z+dTFkxw2V+BOjiLWzDDD6pEE7YDhiPyoopadOyXtoJf3aK1OI+DBu3piBA/CDD DvavruM+3mjxUxcOo8w8rMaJzDUDLG0yOyhKWef3UW5ly3CKXe8+m/MZe0GavNBJt0ObLQpP mnn9b2kP/xS0ssszo8uzlfSMiGi9AedAoRQ7vFXfI0MBb0M8gJ6Ht/+j1b5Al9ABeeA3PRuu +aBJwBRdFp4AV5BsCa0Qb3aqVJUPuBvtY56aWWB9sSfQ1qeu/loRxkJbHhaPJswscQARAQAB iQI8BBgBCgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbhEACgkQA29s nufznr+YBw//TJtAC9d/FYQQHKQg/QOEkcAL8Qx4HA2SICnhKqv64jPcYIUYocOO8Qayh+IV Da6MGkbsWdweUFuexMsW+17dqETfQjUApx32TUwF44WgIEfARLW2zRdRcXfsT4A2sQJCvNJr JnH3lywiJi+V848Q4sC3sSJREpcJd07oc2jxSKZyYZ1DBPfK1MyiwcBt2uFCTXdyFMham2aY LDP2JYvFP08tjTUAIKhe4B0bPTtldCf5sH5q8xrpaHnKHf0n7qMmK7NtGW/9R6WiCruiNsLn O95fms1tzKKfA4QXIYCEWl8XsRKwp51HZDjQu/KxPsjm6BL4eThnae9t3Zs5J0LiPxoFbN+p W7anft3YCeezB8+gus7I1Rn5yJMRyYRRVHtZZTBDQfoDqHgLY14GYtFGOT0IR/OuAzYM1CoM vVExgqVWixDwF5RH1OHO1TANqTGcrRm1lvasCWIphpoQVtkN4/PXGa+NhzsRmr/c5OUYxQNr oE8cdsK8mOIBRz9D2JpF7d2nr1X+vA4zk2JL61aCnc62BfSYNZWhCcOPJZUhFT9BqAkew0kk JzQ3jwHGAhfcfozTHoFsD08qAW0OUriEtH+EOXl+dYbjlNUjFPjJu49cZbtp/1TpsYOBdME1 QLM1TPanYXa7tb+IrRZN+Oi9i9VVym16DK7q21k3j0qRC0s= Message-ID: Date: Thu, 27 Dec 2018 13:07:03 +0000 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.3.3 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="nIvibnJJ4DyE7DVgIQkuygkwbA3y99irD" X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 13:07:09 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --nIvibnJJ4DyE7DVgIQkuygkwbA3y99irD Content-Type: multipart/mixed; boundary="nunreQSESpXdmSrbTvo2W9YLjXhbZjYbe"; protected-headers="v1" From: Matthew Seaman To: freebsd-stable@freebsd.org Message-ID: Subject: Re: Pkg dependency strangeness References: In-Reply-To: --nunreQSESpXdmSrbTvo2W9YLjXhbZjYbe Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable On 27/12/2018 01:45, Walter Parker wrote: > I've just upgraded an existing FreeBSD 11.1 system with php56 to FreeBS= D > 11.2 and php72. >=20 > In order to do this, I used a mix of ports and packages to delete php56= and > all of the php56 extensions and replace them with php72 and php72 > extensions. Everything is working now, but when I try to install anythi= ng > using pkg, it wants to reinstall php56 and serveral php56 extensions. T= his > happens for packages that don't have php56 as a dependency. >=20 > For example > pkg install alpine >=20 As far as I can tell, this is nothing to do with alpine itself, which doesn't seem to depend on PHP at all. My guess is that you have some other PHP-based application installed which has an unmet dependency on php56. If you run 'pkg upgrade -n' without trying to install anything new, what happens? Also try 'pkg version -vRL=3D' Do you have any orphaned package= s? See if you can work out what it is you've installed that wants to pull in php56. Judging by the dependencies in your original post, it could be something like databases/phppgadmin or a similar PHP application that uses a postgresql back-end. I'm going to use phppgadmin as the example package in what follows: you should substitute the actual package or packages that are relevant in your case. What can happen is the pkg(8) fails to handle the change from an unflavoured PHP package to a flavoured one. It doesn't grok that an un-flavoured 'phppgadmin' package was essentially the same thing as 'phppgadmin-php56' and also that 'phppgadmin-php56' can be replaced by 'phppgadmin-php72'. You need to prod it into doing the right thing by making it install exactly the flavour of phppgadmin you want. So, assuming phppgadmin was the culprit, you simply need to run 'pkg install phppgadmin-php72' Cheers, Matthew --nunreQSESpXdmSrbTvo2W9YLjXhbZjYbe-- --nIvibnJJ4DyE7DVgIQkuygkwbA3y99irD Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEGfFU7L8RLlBUTj8wAFE/EOCp5OcFAlwkznhfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp 5Odw4A//XS8QzYr+6PlbRCIFWcYpZYKTClckPFi/rUnIV9KyhsguCcBS7scgBcKx 85RQArnCTpObcaaLctFtFzZzoj5AkQP7iHzVPVphmT36WnpeTaY3Og1LNrZqOJgF MVsrOf84ZKO5EyyCamWHkFe2G6srpb6kde5bqSFg3m9r/AWCnGHOux9VbF4cmtEQ ATRUjAwffjeSNGfbqQuWct6cU7Cve2VQscxO7F3IJobfVM2EIqqG/XWKPII6QruU WLkz/VRG/n5JFz0Rd9dH7m3biYP8C5uRV3sJVtJEXCnqiTeGubKqd9ty3KFCAHj6 8xMcP11DJ6aHb/IkQPxYgFNk5v0e4ujHALUVw+H879B8Gpe0PW2W4JwYeBUc0lWY FM5YyRp16HuA7ANV/e+yBUU8U/GQsHETwxWZ/WLEcSG+WYP8rqAbMII6fAzuA16R XMJK7lmpuCrz/rV/mJw7suZb0YqOZq3DSPMqtwhXtFSxJJmfDMEYAFkhMq6r4x+/ 4toj2LqJ8Ccz+vkAp86s9S61NkgQM5+Wbvu9rC+rKGA2YnaJ+8BDfOT0clmgZdio hXGXKLXfnm/sibm2r3fmTldRJfBo3Zr13ef0lHZsTY4utKgHQ6RATEB4yVe9AjK1 4vVqthHGP03FcogTLYdWQd54qIGOTk1cDIUJV/3JbUoiI6SekME= =TMbs -----END PGP SIGNATURE----- --nIvibnJJ4DyE7DVgIQkuygkwbA3y99irD-- From owner-freebsd-stable@freebsd.org Thu Dec 27 13:53:25 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 07F3B135FBAE for ; Thu, 27 Dec 2018 13:53:25 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 804837499F for ; Thu, 27 Dec 2018 13:53:24 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 43A1A135FBAD; Thu, 27 Dec 2018 13:53:24 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 08B0A135FBAC for ; Thu, 27 Dec 2018 13:53:24 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 917D87499E for ; Thu, 27 Dec 2018 13:53:22 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBRDrF2o033570 for ; Thu, 27 Dec 2018 13:53:15 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBRDrEYU033569 for stable@freebsd.org; Thu, 27 Dec 2018 05:53:14 -0800 (PST) (envelope-from david) Date: Thu, 27 Dec 2018 05:53:14 -0800 From: David Wolfskill To: stable@freebsd.org Subject: Success updating stable/11 to /12; a couple things to note Message-ID: <20181227135314.GW22302@albert.catwhisker.org> Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="6B5oiwbC31sfIr4n" Content-Disposition: inline User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: 917D87499E X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 198.144.209.73 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-4.08 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[stable@freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:198.144.209.73]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[catwhisker.org]; MX_GOOD(-0.01)[mx.catwhisker.org]; NEURAL_HAM_SHORT(-1.00)[-0.998,0]; RCVD_IN_DNSWL_NONE(0.00)[73.209.144.198.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:7961, ipnet:198.144.192.0/19, country:US]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-3.67)[ip: (-9.71), ipnet: 198.144.192.0/19(-4.76), asn: 7961(-3.81), country: US(-0.08)]; REPLYTO_EQ_TO_ADDR(5.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 13:53:25 -0000 --6B5oiwbC31sfIr4n Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I update my "production" systems here at home by use of a dedicated (non-production) "build machine," mounting its /usr/src & /usr/obj read-only via NFS and performing (essentially) "make installkernel" and "make installworld" -- details on the process may be found at I finally got my test machine operational again, and used it to test the above process for upgrading from stable/11 to stable/12. I'm happy to report success. :-) I did encounter some bumps along the way; perhaps pointing them out now may help someone else avoid them later on, so: * I needed to change the script I use for performing the "make installkernel" so instead of: make installkernel DESTDIR=3D${DESTDIR} it does: make LD=3Dld.lld installkernel DESTDIR=3D${DESTDIR} * I found that I actually needed to create the ntpd user on the running system prior to "make installworld" -- having run "mergemaster -U" against the target (DESTDIF) was insufficient. * I needed to tell the build machine to actually build the additional .cf files for the target systems. (Yes, I still use sendmail. Intentioanlly.) That last is probably not something many others would encounter... :-) For amusement, here are the "uname -a" outputs from "before" and "after": FreeBSD pogo.catwhisker.org 11.2-STABLE FreeBSD 11.2-STABLE #848 r342366M/= 342366: Sat Dec 22 03:35:40 PST 2018 root@freebeast.catwhisker.org:/com= mon/S1/obj/usr/src/sys/ALBERT amd64 FreeBSD pogo.catwhisker.org 12.0-STABLE FreeBSD 12.0-STABLE #63 r342545M/34= 2550: Thu Dec 27 03:50:26 PST 2018 root@freebeast.catwhisker.org:/commo= n/S3/obj/usr/src/amd64.amd64/sys/ALBERT amd64 (Note that I have not yet updated the installed ports; I have the misc/compat11x port installed (via a locally-built package). I expect to perform that part of the upgrade after a week or so of "shakedown.") Peace, david --=20 David H. Wolfskill david@catwhisker.org Yes, Mr. Trump, your behavior IS a disgrace -- to put it very nicely. See http://www.catwhisker.org/~david/publickey.gpg for my public key. --6B5oiwbC31sfIr4n Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwk2UpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PckSbAgAgcFumtc2sRltid7DOB085Ee0grqy0R7zZ4o/s68hmMETsYJ7HsyBf7YG S1O0R40b7bK+mBFp4UH2lrRKC0eUq+Kqc4a72QU+AE16O5jpjVGuCgajXp1cI01t IrAFVYZVFu8auOuyEbMss0LA1RoqM8h3OwIgW8KWrvwQpZkVpFp2s6LP+CCZ6n+m E8JxowdvYGxqlKVV3MHC2LaEhNIbKVAeia1cYh2WHC+TYVNYwWfwgo3kfuKbcejp oj6qq5P7nmGnRL3mmVC/ukrYei/JwqrmWh1b3OI4xNOLFwHMTgH9/V0ZXF23qsql pFMGhrmkPs3uyhjZc0jh97gfO9xJCQ== =/64y -----END PGP SIGNATURE----- --6B5oiwbC31sfIr4n-- From owner-freebsd-stable@freebsd.org Thu Dec 27 13:58:32 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 063DC135FD2F for ; Thu, 27 Dec 2018 13:58:32 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 7EECE74B3C for ; Thu, 27 Dec 2018 13:58:31 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 4296E135FD2D; Thu, 27 Dec 2018 13:58:31 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 051F2135FD2B for ; Thu, 27 Dec 2018 13:58:31 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D9E0674B38 for ; Thu, 27 Dec 2018 13:58:29 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBRDwR2o033602 for ; Thu, 27 Dec 2018 13:58:27 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBRDwR17033601 for stable@freebsd.org; Thu, 27 Dec 2018 05:58:27 -0800 (PST) (envelope-from david) Date: Thu, 27 Dec 2018 05:58:27 -0800 From: David Wolfskill To: stable@freebsd.org Subject: Re: firefox-64.0_3,1 SEGV in stable/12 @r342472 Message-ID: <20181227135827.GX22302@albert.catwhisker.org> Mail-Followup-To: David Wolfskill , stable@freebsd.org References: <20181226132914.GF1190@albert.catwhisker.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="0btr6/5+bhBdui6J" Content-Disposition: inline In-Reply-To: <20181226132914.GF1190@albert.catwhisker.org> User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: D9E0674B38 X-Spamd-Bar: --------- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 198.144.209.73 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-9.08 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:198.144.209.73]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[catwhisker.org]; MX_GOOD(-0.01)[cached: mx.catwhisker.org]; NEURAL_HAM_SHORT(-1.00)[-0.999,0]; RCVD_IN_DNSWL_NONE(0.00)[73.209.144.198.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:7961, ipnet:198.144.192.0/19, country:US]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-3.67)[ip: (-9.71), ipnet: 198.144.192.0/19(-4.76), asn: 7961(-3.81), country: US(-0.08)] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 13:58:32 -0000 --0btr6/5+bhBdui6J Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable After a refresh of stable/12 to r342545, I no longer see the issue. FWIW, ports updated yesterday were: Upgrade of eigen-3.3.5 to eigen-3.3.7 Upgrade of orc-0.4.25 to orc-0.4.28 Upgrade of ImageMagick6-6.9.10.16,1 to ImageMagick6-6.9.10.20,1 Upgrade of qt5-network-5.12.0_2 to qt5-network-5.12.0_3 and this morning: Upgrade of libatomic_ops-7.6.4 to libatomic_ops-7.6.8 Upgrade of boehm-gc-7.6.8_1 to boehm-gc-8.0.2 Upgrade of libva-2.3.0_1 to libva-2.3.0_2 Upgrade of ffmpeg-4.1_2,1 to ffmpeg-4.1_3,1 Installation of devel/libinotify (libinotify-20180201_1) Upgrade of openjdk8-8.192.26_1 to openjdk8-8.192.26_3 Upgrade of py27-sphinx_rtd_theme-0.4.0 to py27-sphinx_rtd_theme-0.4= =2E2 Upgrade of groff-1.22.3_1 to groff-1.22.4 Upgrade of mutt-1.11.1 to mutt-1.11.1_1 Peace, david --=20 David H. Wolfskill david@catwhisker.org Yes, Mr. Trump, your behavior IS a disgrace -- to put it very nicely. See http://www.catwhisker.org/~david/publickey.gpg for my public key. --0btr6/5+bhBdui6J Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwk2oNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PckARAgAgdy74fYqQPlCMR6RpirZth4B+mnGD2pSarkjPDkfAIrXt/mHOJhhoWS3 +LwMbYy+JWnqIq/x4Bs9jsUJODUjbSU6x8b46V0cumYqUW8m9tuieNVirhT90u0b DWwfOnxIDwT3IsG1wvPcEqqX+iSS2092+kHjaVBOGW2F86UcyoEBX3gD7VUNscQN krL6Jl7hdo/6OgkIGq/VzJOz3+8MRu5AFPCpX3VMTxdr4EUAbJ3P7NGreSZ1DbW8 JKAowFs9vzXck5LEA/ecMfrmTWFx6zSuBhR2TOMjIjQlUkswVKUv3iTxF0irGUkM LyfDq9XgEZFNkJtZbhb285D1roNwDA== =08+u -----END PGP SIGNATURE----- --0btr6/5+bhBdui6J-- From owner-freebsd-stable@freebsd.org Thu Dec 27 15:10:11 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 90A8A13621CC for ; Thu, 27 Dec 2018 15:10:11 +0000 (UTC) (envelope-from Mark.Martinec+freebsd@ijs.si) Received: from mail.ijs.si (mail.ijs.si [IPv6:2001:1470:ff80::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id D052C77AAC for ; Thu, 27 Dec 2018 15:10:10 +0000 (UTC) (envelope-from Mark.Martinec+freebsd@ijs.si) Received: from amavis-ori.ijs.si (localhost [IPv6:::1]) by mail.ijs.si (Postfix) with ESMTP id 43QYDH3H6xzqwL; Thu, 27 Dec 2018 16:10:07 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ijs.si; h= user-agent:message-id:references:in-reply-to:organization :subject:subject:from:from:date:date:content-transfer-encoding :content-type:content-type:mime-version:received:received :received:received; s=jakla4; t=1545923405; x=1548515406; bh=9vX BjbyJxmgGNNrLKyWenhQJ4QQ3yKh5nAypgqfB99I=; b=WFY8Anc7uBYNAeTXNKe Vw3WpU5m6U06zF+4EG1248QwP3jEIGHUrURtDEcUN0yz7KtM3KjP/23QKRHcWqcG 3Kf3tNYo0EeAhZ+whFD0RTQPayjMfWrzQXA9d5Tfd+wXmF7ArXKehN1fasaKlZPR weHRmFSoS/rf3EgWgZVVH4/s= X-Virus-Scanned: amavisd-new at ijs.si Received: from mail.ijs.si ([IPv6:::1]) by amavis-ori.ijs.si (mail.ijs.si [IPv6:::1]) (amavisd-new, port 10026) with LMTP id sDUiHtFxlSUM; Thu, 27 Dec 2018 16:10:05 +0100 (CET) Received: from mildred.ijs.si (mailbox.ijs.si [IPv6:2001:1470:ff80::143:1]) by mail.ijs.si (Postfix) with ESMTP id 43QYDD5375zqwD; Thu, 27 Dec 2018 16:10:04 +0100 (CET) Received: from nabiralnik.ijs.si (nabiralnik.ijs.si [IPv6:2001:1470:ff80::80:16]) by mildred.ijs.si (Postfix) with ESMTP id 43QYDD2V4Mzmn; Thu, 27 Dec 2018 16:10:04 +0100 (CET) Received: from neli.ijs.si (2001:1470:ff80:88:21c:c0ff:feb1:8c91) by nabiralnik.ijs.si with HTTP (HTTP/1.1 POST); Thu, 27 Dec 2018 16:10:04 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 27 Dec 2018 16:10:04 +0100 From: Mark Martinec To: freebsd-stable@freebsd.org Cc: Terry Kennedy Subject: Re: mps and LSI SAS2308: controller resets on 12.0 - IOC Fault 0x40000d04, Resetting Organization: Jozef Stefan Institute In-Reply-To: <01R19S451BX0002B96@glaver.org> References: <01R19S451BX0002B96@glaver.org> Message-ID: <82fe444636a26d115bed4ba1b31198fc@ijs.si> X-Sender: Mark.Martinec+freebsd@ijs.si User-Agent: Roundcube Webmail/1.3.1 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 15:10:11 -0000 2018-12-26 22:26, Terry Kennedy wrote: > The earlier LSI P20 releases were pretty flakey in some cases - try > flashing 20.00.07.00. Indeed. I have upgraded LSI SAS2308 firmware from 20.00.02.00 to 20.00.07.00 a week ago, left it running for a while with 11.2, then upgraded again to 12.0, and the controller is stable now, even with the new mps driver that came with 12.0. To recap: - mps driver from FreeBSD 11.2 and earlier is stable with SAS2308 firmware 20.00.02.00 _and_ 20.00.07.00 - mps driver from FreeBSD 12.0 causes frequent controller resets with SAS2308 firmware 20.00.02.00 (and ZFS can't cope with that), but is stable with 20.00.07.00. Mark 2018-12-17 16:52, je Mark Martinec napisal > One of our servers that was upgraded from 11.2 to 12.0 (to RC2 > initially, then to RC3 > and lastly to a 12.0-RELEASE) is suffering severe instability of a > disk controller, > resetting itself a couple of times a day, usually associated with high > disk usage > (like poudriere buils or zfs scrub or nightly file system scans). The > same setup > was rock-solid under 11.2 (and still/again is). > > The disk controller is LSI SAS2308. It has four disks attached as > JBODs, > one pair of SSDs and one pair of hard disks, each pair forming its own > zpool. > A controller reset can occur regardless of which pair is in heavy use. > > The following can be found in logs, just before machine becomes > unusable > (although not logged always, as disks may be dropped before syslog has > a chance > of writing anything): > > xxx kernel: [2382] mps0: IOC Fault 0x40000d04, Resetting > xxx kernel: [2382] mps0: Reinitializing controller > xxx kernel: [2383] mps0: Firmware: 20.00.02.00, Driver: > 21.02.00.00-fbsd > xxx kernel: [2383] mps0: IOCCapabilities: > 5a85c > xxx kernel: [2383] (da0:mps0:0:0:0): Invalidating pack > > The IOC Fault location is always the same. Apparently the disk > controller resets, > all disk devices are dropped and ZFS finds itself with no disks. The > machine still > responds to ping, and if logged-in during the event and running zpool > status -v 1, > zfs reports loss of all devices for each pool: > > pool: data0 > state: UNAVAIL > status: One or more devices are faulted in response to IO failures. > action: Make sure the affected devices are connected, then run 'zpool > clear'. > see: http://illumos.org/msg/ZFS-8000-HC > scan: scrub repaired 0 in 0 days 03:53:41 with 0 errors on Sat Nov > 17 00:22:38 2018 > config: > > NAME STATE READ WRITE CKSUM > data0 UNAVAIL 0 0 0 > mirror-0 UNAVAIL 0 24 0 > 2396428274137360341 REMOVED 0 0 0 was > /dev/gpt/da2-PN1334PCKAKD4S > 16738407333921736610 REMOVED 0 0 0 was > /dev/gpt/da3-PN2338P4GJ1XYC > > (and similar for the other pool) > > At this point the machine is unusable and needs to be hard-reset. > > My guess is that after the controller resets, disk devices come up > again > (according to the report seen on the console, stating 'periph > destroyed' > first, then listing full info on each disk) - but zfs ignores them. > > I don't see any mention of changes of the mps driver in the 12.0 > release notes, > although diff-ing its sources between 11.2 and 12.0 shows plenty of > nontrivial > changes. > > After suffering this instability for some time, I finally downgraded > the OS > to 11.2, and things are back to normal again! > > This downgrade path was nontrivial, as I have foolishly upgraded pool > features > to what comes with 12.0, so downgrading involved hacking with > dismantling > both zfs mirror pools, recreating pools without the two new features, > zfs send/receive copying, while having a machine hang during some of > these operations. Not something for the faint at heart. I know, foolish > of me to upgrade pools after just one day of uptime with 12.0. > > Some info on the controller: > > kernel: mps0: port 0xf000-0xf0ff > mem 0xfbe40000- > 0xfbe4ffff,0xfbe00000-0xfbe3ffff irq 64 at device 0.0 numa-domain 1 > on pci11 > kernel: mps0: Firmware: 20.00.02.00, Driver: 21.02.00.00-fbsd > > mpsutil shows: > > mps0 Adapter: > Board Name: LSI2308-IT > Board Assembly: > Chip Name: LSISAS2308 > Chip Revision: ALL > BIOS Revision: 7.39.00.00 > Firmware Revision: 20.00.02.00 > Integrated RAID: no > > > So, what has changed in the mps driver for this to be happening? > Would it be possible to take mps driver sources from 11.2, transplant > them to 12.0, recompile, and use that? Could the new mps driver be > using some new feature of the controller and hits a firmware bug? > I have resisted upgrading SAS2308 firmware and its BIOS, as it is > working very well under 11.2. > > Anyone else seen problems with mps driver and LSI SAS2308 controller? > > (btw, on another machine the mps driver with LSI SAS2004 is working > just fine under 12.0) > > Mark From owner-freebsd-stable@freebsd.org Thu Dec 27 16:13:19 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7203F1419B40 for ; Thu, 27 Dec 2018 16:13:19 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 00E8281BA2 for ; Thu, 27 Dec 2018 16:13:19 +0000 (UTC) (envelope-from ian@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id B8C771419B3D; Thu, 27 Dec 2018 16:13:18 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7D38F1419B3C for ; Thu, 27 Dec 2018 16:13:18 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from outbound3d.ore.mailhop.org (outbound3d.ore.mailhop.org [54.186.57.195]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 038F081B9F for ; Thu, 27 Dec 2018 16:13:17 +0000 (UTC) (envelope-from ian@freebsd.org) ARC-Seal: i=1; a=rsa-sha256; t=1545927160; cv=none; d=outbound.mailhop.org; s=arc-outbound20181012; b=CUJlIqYRIVChYEYWNfgttFwHbArY2FT+3PHKErxIu2DJZk67O3fDBD/wksxEKJ4M1X4a8/fc0tBnz jLbCO2p+dMd198OfN4sLFpRj9/BwHcSDgF3cBKnx/7F8cuueeoVedOHkYSYxF740qZuMN81kZoOPRG ads8/kALIw8Riel3HbfsAP1S8EUI2wWDgkf22Y4OpxYdje4rOuJQSr+5CBbpne++aOF8mU9hcydN9U iWodgItzHenvE/Es/QRenWApL9dFr+ZuzyS9eGHjDn3QBRvr+GVRc8FbPdKooY4JyGPdeMe/M3VL/+ qtdPJ++hFuA5nfr333X/Bl3eHMnt7Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=arc-outbound20181012; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:dkim-signature:from; bh=SZuSKCLpC7L1yqhgoUHbR5OpMVsZ7p6BCdarRu0KZks=; b=R4e3qaEwdSCmESKc42TwwmXaS26V3RlxpLncP/GGgP+BEYc23DQuBMO77JpA9zy2vcFfFLtRNuuCh NvP+fTOIKfNGYoIMFhjIeH1xrvc3mgME1SgtKJkhGDZGfszD64YDEElYTPIN0+x5asUUNAiyG9ulz7 ZbBBJ8AwAY/UjqDaTs9NkLeDMqx1flqrWOBK+VDwRIZwzdhkR86po6j7IKjUdcay1WTUBx91ixdx8o eExHCE96mmx3Ky8MmGZXnyzJkjcU0EU7TfDGEk8MCDuKKJEJpKS1FcVkC1VH/xBm+h5jtyjGBKocf4 73xyeis5ZGyuxnjnrtvmziTkhWTxGQw== ARC-Authentication-Results: i=1; outbound3.ore.mailhop.org; spf=softfail smtp.mailfrom=freebsd.org smtp.remote-ip=67.177.211.60; dmarc=none header.from=freebsd.org; arc=none header.oldest-pass=0; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=dkim-high; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:from; bh=SZuSKCLpC7L1yqhgoUHbR5OpMVsZ7p6BCdarRu0KZks=; b=trAOkesDHBVKsWBoHuZKQ8izy2h+rPMeXa7w7+Ujv1P3sHkTs0ooLQAMVUp4FfSVJtwvudX3h5YSx GxEkAMTvZZv+9TDfZ3DWSS9pNhs3CYyydik7X8WYasXEV0+Fi5/0ODhdJnRnAsT0VfdVHKWlR53Oh3 xLpVF56m3d3rXodDissaULZy7iaDA6lNvQgNWv69KSmqjdT/imYcmcgDjtAER+91QN4edbjVbdkRSR VCVLGHn/ZcYWjON9iyCizIgcCuwUuFDORALXZOhWkGqFXEnPovBTCmnvOkNdQKM7ZXJtTKUw/fcWa1 S098w2SDOsvEPP0c9k9hLaR8CzWK49Q== X-MHO-RoutePath: aGlwcGll X-MHO-User: 3ad49dbb-09f2-11e9-a59a-7b143e15dabc X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information X-Originating-IP: 67.177.211.60 X-Mail-Handler: DuoCircle Outbound SMTP Received: from ilsoft.org (unknown [67.177.211.60]) by outbound3.ore.mailhop.org (Halon) with ESMTPSA id 3ad49dbb-09f2-11e9-a59a-7b143e15dabc; Thu, 27 Dec 2018 16:12:39 +0000 (UTC) Received: from rev (rev [172.22.42.240]) by ilsoft.org (8.15.2/8.15.2) with ESMTP id wBRGD9BG021760 for ; Thu, 27 Dec 2018 09:13:09 -0700 (MST) (envelope-from ian@freebsd.org) Message-ID: <1545927189.78877.80.camel@freebsd.org> Subject: Re: Success updating stable/11 to /12; a couple things to note From: Ian Lepore To: stable@freebsd.org Date: Thu, 27 Dec 2018 09:13:09 -0700 In-Reply-To: <20181227135314.GW22302@albert.catwhisker.org> References: <20181227135314.GW22302@albert.catwhisker.org> Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: Evolution 3.18.5.1 FreeBSD GNOME Team Port Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 038F081B9F X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.99)[-0.991,0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 16:13:19 -0000 On Thu, 2018-12-27 at 05:53 -0800, David Wolfskill wrote: > * I found that I actually needed to create the ntpd user on the > running system prior to "make installworld" -- having run > "mergemaster -U" against the target (DESTDIF) was insufficient. The correct update sequence involves running mergemaster twice, once with the -p option, then again later without it. It's detailed at the bottom of UPDATING. People get in the habit of skipping the -p step because it's only really needed once every few years, such as when a new user is added to the base system. -- Ian From owner-freebsd-stable@freebsd.org Thu Dec 27 16:30:51 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 78291141A30D for ; Thu, 27 Dec 2018 16:30:51 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id C6F63825B3 for ; Thu, 27 Dec 2018 16:30:50 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 85A1E141A30A; Thu, 27 Dec 2018 16:30:50 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6352E141A308 for ; Thu, 27 Dec 2018 16:30:50 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AC3E7825AB; Thu, 27 Dec 2018 16:30:49 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBRGUkjW034824; Thu, 27 Dec 2018 16:30:46 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBRGUkvJ034823; Thu, 27 Dec 2018 08:30:46 -0800 (PST) (envelope-from david) Date: Thu, 27 Dec 2018 08:30:46 -0800 From: David Wolfskill To: Ian Lepore Cc: stable@freebsd.org Subject: Re: Success updating stable/11 to /12; a couple things to note Message-ID: <20181227163046.GD22302@albert.catwhisker.org> Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org, Ian Lepore References: <20181227135314.GW22302@albert.catwhisker.org> <1545927189.78877.80.camel@freebsd.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="4AmJdx/+JAF2YHMk" Content-Disposition: inline In-Reply-To: <1545927189.78877.80.camel@freebsd.org> User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: AC3E7825AB X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.97 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.975,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 16:30:51 -0000 --4AmJdx/+JAF2YHMk Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Dec 27, 2018 at 09:13:09AM -0700, Ian Lepore wrote: > On Thu, 2018-12-27 at 05:53 -0800, David Wolfskill wrote: > > * I found that I actually needed to create the ntpd user on the > > =A0 running system prior to "make installworld" -- having run > > =A0 "mergemaster -U" against the target (DESTDIF) was insufficient. >=20 > The correct update sequence involves running mergemaster twice, once > with the -p option, then again later without it. It's detailed at the > bottom of UPDATING. People get in the habit of skipping the -p step > because it's only really needed once every few years, such as when a > new user is added to the base system. >=20 > -- Ian > .... Yes, but the one after "make installworld" isn't likely to affect the "make installworld". :-) The sequence of events: mount -u -r / mount -u -r /usr mount /dev/ada0s1a /S1 mount /dev/ada0s1d /S1/usr mount -u -w /S1 mount -u -w /S1/usr ln -fhs /var /S1/var mount -o ro freebeast:/usr/src /usr/src mount -o ro freebeast:/usr/obj /usr/obj id mount cd /usr/src uname -a date make LD=3Dld.lld installkernel DESTDIR=3D/S1 date mergemaster -U -u 0022 -p -D /S1 date rm -fr /S1/usr/include.old date mv -f /S1/usr/include /S1/usr/include.old date rm -fr /S1/usr/share/man date make installworld DESTDIR=3D/S1 date mergemaster -F -U -u 0022 -i -D /S1 date make delete-old DESTDIR=3D/S1 date date df -k date My point was that running "mergemaster -U" against the new image (/S1, in the case above) is not sufficient for "make installworld DESTDIR=3D/S!" to work: it is necessary that the *running* system be aware of the "ntpd" user (I presume, to allow ownership of files to be set by the "ntpd" name, vs. the numeric "123"). Peace, david --=20 David H. Wolfskill david@catwhisker.org Beyond some threshold, should presidential lies become impeachable offenses? See http://www.catwhisker.org/~david/publickey.gpg for my public key. --4AmJdx/+JAF2YHMk Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwk/jZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PcnkuAgAlylkgwZ9VEnVuJW/T0hTbRsQ9qwBD0iUNPLkYYnx6bTfj7s4EiAX5hae fSJbcsaU8eC7j/4eUY9XEpiIHgDq+24x0K89+FLVyd+ccdeM0tRP2aCq0NG2+iad vTegeVQSIgjInVOj29QtImC0+aQW66/sKy5mqNcuvhL1pfd9cdD8ThhB3N0JS6DE 2Riin1MDkpq58R5zHLbI93QBNGlDswIO1k6XNk8+fPVwr+tldqsHPIJmrvPJavov Z1mBK6YxdyDru3VoUkxHTRMKlKG1itJFI3StWRYcYG20XEPnVWnAjsYqy36zmYgR Kv+lZkYklUAAIjY4gpro3wLfhtaqtQ== =+TB8 -----END PGP SIGNATURE----- --4AmJdx/+JAF2YHMk-- From owner-freebsd-stable@freebsd.org Thu Dec 27 17:57:08 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9F6C9141E314 for ; Thu, 27 Dec 2018 17:57:08 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 315B68555F for ; Thu, 27 Dec 2018 17:57:08 +0000 (UTC) (envelope-from ian@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id E2FB4141E313; Thu, 27 Dec 2018 17:57:07 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C05A8141E312 for ; Thu, 27 Dec 2018 17:57:07 +0000 (UTC) (envelope-from ian@freebsd.org) Received: from outbound1a.eu.mailhop.org (outbound1a.eu.mailhop.org [52.58.109.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3B4108555E for ; Thu, 27 Dec 2018 17:57:07 +0000 (UTC) (envelope-from ian@freebsd.org) ARC-Seal: i=1; a=rsa-sha256; t=1545933420; cv=none; d=outbound.mailhop.org; s=arc-outbound20181012; b=nk5SqmoOJsXitoBjQ7l2Z0U2ScInzsRvZg4hToYsXA/hcZ8A67v5JgWmyojNdnAov3y+HAOFwSWIS CdCRJ0+YN9BNgYwmoqF7hHECr/JOCHCn+YQnwpIkYHwn5os3BGYkWFdFaJLArwWBQwebEvLY1PnpBu ZkomFCB7wjRXhf6RdyIN6c2pUK8yGIOq6h5Otx6ZEKWb7S4eGYdc+psZyxlSY2EIKCSN5wo7urkGbe 038NHueDQmCzqT/yEKgpMppuSJbhVvGtKUjXo9wG2b9ggmULKH0wiAFu/+LXuWZP8s3tg29KINAnTa 6q0j59TmAaNNPfw2tENnZxKaqpYedTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=arc-outbound20181012; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:dkim-signature:from; bh=GHYxBu1FmNpRG7Ga3LzgMdQtEy/gx8J9wFGEVyX9lv8=; b=ps/SvTAhdRNChu3zAZGuFWvAwXkMmalPie/g7zWI2mg5zTNLUcAoRvvc36INyeBBb+gRKyyVjnISA ZaQM6K3vQYNSdJGKVa+3DHXjKa7eXpOb+fJOjD8R+5b9bV9RaTkg62q6+zo9rQlMw831W9nwmpzPml i4y6O0zzgy4GCWAS0ow1j/XOfCZIfSTyEa1i59tmOOhio2fXEkyTuDdlD1LNKo6zB9eVdie/UCe35Z AU5TqJpitHNdHBRv374WA6QwfYUEPXTW2cV+JYJ2muAcrx4uvki9y0gWvrkjyT7H6SuEb34wBqjnFZ Jv0iql2cnLMLycgk4ppacdwfO88wL4A== ARC-Authentication-Results: i=1; outbound2.eu.mailhop.org; spf=softfail smtp.mailfrom=freebsd.org smtp.remote-ip=67.177.211.60; dmarc=none header.from=freebsd.org; arc=none header.oldest-pass=0; DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outbound.mailhop.org; s=dkim-high; h=content-transfer-encoding:mime-version:content-type:references:in-reply-to: date:to:from:subject:message-id:from; bh=GHYxBu1FmNpRG7Ga3LzgMdQtEy/gx8J9wFGEVyX9lv8=; b=fKMF7lud5GrZrSDVLPyzKV13P7qj1wcGpGhQE3iVXbH7tot6vVd/I2QUUM4+9bckGKRUYguaiUwoi IcoDmi2c5Vuv3tbhmtz05CirdzcmpWRa26lvitlYqeD7HbMgdNpVXQqTUfAcUg3mMl5zXZey5hEq5k ATrlG071xMOKCxMi/n6CXk+1ASX5UWVo2pyjdlLktDA34cs/R96s8E2i//kGOFQDKfT3/kClxrjzvo nHGBN1+daFhKGa80qLvTodOapvuvMZ3dtm2Ps7W3an3CIqNoTPCU5u8nN1GDVcocJq7cfFvoU+07DB hb3olhSCxbTVOTrvFLK9hwrjitd9ZIA== X-MHO-RoutePath: aGlwcGll X-MHO-User: cd9abb98-0a00-11e9-a887-bd2f23b465e5 X-Report-Abuse-To: https://support.duocircle.com/support/solutions/articles/5000540958-duocircle-standard-smtp-abuse-information X-Originating-IP: 67.177.211.60 X-Mail-Handler: DuoCircle Outbound SMTP Received: from ilsoft.org (unknown [67.177.211.60]) by outbound2.eu.mailhop.org (Halon) with ESMTPSA id cd9abb98-0a00-11e9-a887-bd2f23b465e5; Thu, 27 Dec 2018 17:56:58 +0000 (UTC) Received: from rev (rev [172.22.42.240]) by ilsoft.org (8.15.2/8.15.2) with ESMTP id wBRHuvHd021953 for ; Thu, 27 Dec 2018 10:56:57 -0700 (MST) (envelope-from ian@freebsd.org) Message-ID: <1545933417.78877.82.camel@freebsd.org> Subject: Re: Success updating stable/11 to /12; a couple things to note From: Ian Lepore To: stable@freebsd.org Date: Thu, 27 Dec 2018 10:56:57 -0700 In-Reply-To: <20181227163046.GD22302@albert.catwhisker.org> References: <20181227135314.GW22302@albert.catwhisker.org> <1545927189.78877.80.camel@freebsd.org> <20181227163046.GD22302@albert.catwhisker.org> Content-Type: text/plain; charset="ISO-8859-1" X-Mailer: Evolution 3.18.5.1 FreeBSD GNOME Team Port Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 3B4108555E X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.985,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 17:57:09 -0000 On Thu, 2018-12-27 at 08:30 -0800, David Wolfskill wrote: > On Thu, Dec 27, 2018 at 09:13:09AM -0700, Ian Lepore wrote: > > > > On Thu, 2018-12-27 at 05:53 -0800, David Wolfskill wrote: > > > > > > * I found that I actually needed to create the ntpd user on the > > > running system prior to "make installworld" -- having run > > > "mergemaster -U" against the target (DESTDIF) was insufficient. > > The correct update sequence involves running mergemaster twice, > > once > > with the -p option, then again later without it. It's detailed at > > the > > bottom of UPDATING. People get in the habit of skipping the -p step > > because it's only really needed once every few years, such as when > > a > > new user is added to the base system. > > > > -- Ian > > .... > Yes, but the one after "make installworld" isn't likely to affect the > "make installworld".:-) > > The sequence of events: > > mount -u -r / > mount -u -r /usr > mount /dev/ada0s1a /S1 > mount /dev/ada0s1d /S1/usr > mount -u -w /S1 > mount -u -w /S1/usr > ln -fhs /var /S1/var > mount -o ro freebeast:/usr/src /usr/src > mount -o ro freebeast:/usr/obj /usr/obj > id > mount > cd /usr/src > uname -a > date > make LD=ld.lld installkernel DESTDIR=/S1 > date > mergemaster -U -u 0022 -p -D /S1 > date > rm -fr /S1/usr/include.old > date > mv -f /S1/usr/include /S1/usr/include.old > date > rm -fr /S1/usr/share/man > date > make installworld DESTDIR=/S1 > date > mergemaster -F -U -u 0022 -i -D /S1 > date > make delete-old DESTDIR=/S1 > date > date > df -k > date > > > My point was that running "mergemaster -U" against the new image > (/S1, > in the case above) is not sufficient for "make installworld > DESTDIR=/S!" > to work: it is necessary that the *running* system be aware of the > "ntpd" user (I presume, to allow ownership of files to be set by the > "ntpd" name, vs. the numeric "123"). > > Peace, > david I must have missed the part where you were using DESTDIR= during the install. In that case, the right magic is to add DB_FROM_SRC=yes to the make installworld command. There were a couple proposals to automate that somehow, but I didn't see anything proposed that didn't basically subvert the entire purpose of that check for whether the user exists. -- Ian From owner-freebsd-stable@freebsd.org Thu Dec 27 18:00:16 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 64E26141E43F for ; Thu, 27 Dec 2018 18:00:16 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id B1D8285692 for ; Thu, 27 Dec 2018 18:00:15 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 701F0141E43E; Thu, 27 Dec 2018 18:00:15 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5E8A0141E43D for ; Thu, 27 Dec 2018 18:00:15 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AF66385691; Thu, 27 Dec 2018 18:00:14 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBRI0CNd035701; Thu, 27 Dec 2018 18:00:12 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBRI0Cpm035700; Thu, 27 Dec 2018 10:00:12 -0800 (PST) (envelope-from david) Date: Thu, 27 Dec 2018 10:00:12 -0800 From: David Wolfskill To: Ian Lepore Cc: stable@freebsd.org Subject: Re: Success updating stable/11 to /12; a couple things to note Message-ID: <20181227180012.GE22302@albert.catwhisker.org> Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org, Ian Lepore References: <20181227135314.GW22302@albert.catwhisker.org> <1545927189.78877.80.camel@freebsd.org> <20181227163046.GD22302@albert.catwhisker.org> <1545933417.78877.82.camel@freebsd.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="RHnfto7yGd+QdmRl" Content-Disposition: inline In-Reply-To: <1545933417.78877.82.camel@freebsd.org> User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: AF66385691 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.97 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.975,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 18:00:16 -0000 --RHnfto7yGd+QdmRl Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Dec 27, 2018 at 10:56:57AM -0700, Ian Lepore wrote: > ....=20 > I must have missed the part where you were using DESTDIR=3D during the > install. In that case, the right magic is to add DB_FROM_SRC=3Dyes to the > make installworld command. There were a couple proposals to automate > that somehow, but I didn't see anything proposed that didn't basically > subvert the entire purpose of that check for whether the user exists. >=20 > -- Ian > .... Ah; good to knw: thanks! :-) Peace, david --=20 David H. Wolfskill david@catwhisker.org Beyond some threshold, should presidential lies become impeachable offenses? See http://www.catwhisker.org/~david/publickey.gpg for my public key. --RHnfto7yGd+QdmRl Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwlEytfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PckFZgf/RlOPUTxcoYrVd5JBZ7Rm2nKdhaS+oCkKhDl263VQovfl8bkjDiEx9nVa 6XOSC4xpuwCD3AdKg6VoDVcbiMRHzbi037g4JDbRKcsGdpOyuigA83NnHJ6+oi0r mti5zn2R9Zy8kFdMwse+zSLLRn5pho6SLYd/qe4dFYj9arzqaFTXlja91wVrQFTr nhm4FPW1Qn7aAWC3vFmeaQhN2IhrjyJ4jwkrEpqyXCwpjz0w9FHa/fbF0cHHOfks IdvKC7gfUNprF47SA03/+kQZEI02ynGFhlbv0Js8N2MawYxyz+WMCgLk1VEWQ4oG vln1TmtL1PZvwSx/D30tyKtOUPyrdg== =9fc+ -----END PGP SIGNATURE----- --RHnfto7yGd+QdmRl-- From owner-freebsd-stable@freebsd.org Thu Dec 27 20:41:29 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9BA801422700 for ; Thu, 27 Dec 2018 20:41:29 +0000 (UTC) (envelope-from thierry@pompo.net) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 16E428AD53 for ; Thu, 27 Dec 2018 20:41:29 +0000 (UTC) (envelope-from thierry@pompo.net) Received: by mailman.ysv.freebsd.org (Postfix) id CA47D14225FE; Thu, 27 Dec 2018 20:41:28 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A7C1214225FD for ; Thu, 27 Dec 2018 20:41:28 +0000 (UTC) (envelope-from thierry@pompo.net) Received: from erza.lautre.net (erza.lautre.net [80.67.160.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "lautre.net", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D08AE8AD38 for ; Thu, 27 Dec 2018 20:41:17 +0000 (UTC) (envelope-from thierry@pompo.net) Received: from graf.pompo.net (graf.pompo.net [78.225.128.39]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by erza.lautre.net (Postfix) with ESMTPSA id 2A55F45E01 for ; Thu, 27 Dec 2018 21:41:07 +0100 (CET) Received: by graf.pompo.net (Postfix, from userid 1001) id E44F622F48; Thu, 27 Dec 2018 21:41:06 +0100 (CET) Date: Thu, 27 Dec 2018 21:41:06 +0100 From: Thierry Thomas To: stable@freebsd.org Subject: Error upgrading 11-STABLE to 12-STABLE in ifunc resolver Message-ID: <20181227204106.GB2310@graf.pompo.net> Mail-Followup-To: stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="liOOAslEiF7prFVr" Content-Disposition: inline X-Operating-System: FreeBSD 11.2-STABLE amd64 Organization: Kabbale Eros X-Face: (hRbQnK~Pt7$ct`!fupO(`y_WL4^-Iwn4@ly-.,[4xC4xc; y=\ipKMNm<1J>lv@PP~7Z<.tKjAnXLs: X-PGP: 0xF1C516B3C8359753 User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: D08AE8AD38 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-4.88 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_NONE(0.00)[]; HAS_ORG_HEADER(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[mx.lautre.net]; NEURAL_HAM_SHORT(-0.68)[-0.683,0]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[thierry@freebsd.org,thierry@pompo.net]; RCVD_TLS_LAST(0.00)[]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:20766, ipnet:80.67.160.0/19, country:FR]; MIME_TRACE(0.00)[0:+,1:+]; FROM_NEQ_ENVFROM(0.00)[thierry@freebsd.org,thierry@pompo.net]; TO_DOM_EQ_FROM_DOM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-1.29)[ipnet: 80.67.160.0/19(-3.57), asn: 20766(-2.85), country: FR(-0.02)]; DMARC_NA(0.00)[freebsd.org]; R_SPF_NA(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 20:41:29 -0000 --liOOAslEiF7prFVr Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hello, Trying to upgrade a machine from 11.2-STABLE #0 r337833: Wed Aug 15 12:50:47 CEST 2018 to 12-STABLE as: Working Copy Root Path: /usr/src URL: https://svn.freebsd.org/base/stable/12 Relative URL: ^/stable/12 Repository Root: https://svn.freebsd.org/base Repository UUID: ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f Revision: 342558 Node Kind: directory Schedule: normal Last Changed Author: kp Last Changed Rev: 342545 Last Changed Date: 2018-12-26 13:56:36 +0100 (Wed, 26 Dec 2018) aborts due to this error: /usr/local/libexec/ccache/world/cc -target x86_64-unknown-freebsd12.0 --sys= root=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/= usr/bin -O2 -pipe -DNO__SCCSID -DNO__RCSID -I/usr/src/lib/libc/include -= I/usr/src/include -I/usr/src/lib/libc/amd64 -DNLS -D__DBINTERFACE_PRIVATE = -I/usr/src/contrib/gdtoa -I/usr/src/contrib/libc-vis -DINET6 -I/usr/obj/usr= /src/amd64.amd64/lib/libc -I/usr/src/lib/libc/resolv -D_ACL_PRIVATE -DPOSIX= _MISTAKE -I/usr/src/lib/libmd -I/usr/src/contrib/jemalloc/include -I/usr/sr= c/contrib/tzcode/stdtime -I/usr/src/lib/libc/stdtime -I/usr/src/lib/libc/lo= cale -DBROKEN_DES -DPORTMAP -DDES_BUILTIN -I/usr/src/lib/libc/rpc -DWANT_HY= PERV -DYP -DNS_CACHING -DSYMBOL_VERSIONING -g -MD -MF.depend.amd64_set_fsb= ase.o -MTamd64_set_fsbase.o -std=3Dgnu99 -fstack-protector-strong -Wsystem-= headers -Werror -Wall -Wno-format-y2k -Wno-uninitialized -Wno-pointer-sign = -Wno-empty-body -Wno-string-plus-int -Wno-unused-const-variable -Wno-tautol= ogical-compare -Wno-unused-value -Wno-parentheses-equality -Wno-unused-func= tion -Wno-enum-conversion -Wno-unused-local-typedef -Wno-address-of-packed-= member -Wno-switch -Wno-switch-enum -Wno-knr-promoted-parameter -Qunused-a= rguments -I/usr/src/lib/libutil -I/usr/src/lib/msun/amd64 -I/usr/src/lib/m= sun/x86 -I/usr/src/lib/msun/src -c /usr/src/lib/libc/amd64/sys/amd64_set_fs= base.c -o amd64_set_fsbase.o --- amd64_get_fsbase.o --- /usr/src/lib/libc/amd64/sys/amd64_get_fsbase.c:60:1: error: ifunc resolver = function must have no parameters DEFINE_UIFUNC(, int, amd64_get_fsbase, (void **), static) ^ /usr/obj/usr/src/amd64.amd64/tmp/usr/include/x86/ifunc.h:43:44: note: expan= ded from macro 'DEFINE_UIFUNC' qual ret_type name args __attribute__((ifunc(#name "_resolver"))); \ cc is: FreeBSD clang version 6.0.1 (tags/RELEASE_601/final 335540) (based on LLVM = 6.0.1) This problem has already been reported in and should be fixed with clang 7, but I'm surprised that it seems impossible to upgrade from 11-STABLE to 12-STABLE; did I miss something? Thanks. --=20 Th. Thomas. --liOOAslEiF7prFVr Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJcJTjiXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFNTM2QkU4NTM4NTM5OUQwMEI2RkFBNzZG MUM1MTZCM0M4MzU5NzUzAAoJEPHFFrPINZdT+DkP/0cBoWb9eRfQVJlNvMqxNrYB MYybh/54iEZA8P26To7tP+GYyU3jEqHADzUgK7O4jSIjpXEaNTshyUZvlMzNuqHs GdgRxPljRiVyoji0tan8sxClGCOCyFKfMxE78c9WmtW57xkdd4ABAT4GX0W4A6J3 +IWg3esscCIPa0jyJsyu644udTZRm3EnoV4UV1duY/+82XgY0jqfizrd/DPvcw7J uzzFv5FEOCqfxrRu8iOV4X9NGmIBfnvs5Ar6sI4AxzRZXcljIT/WshJX9cDM7qRo M6wvUQDYSVyN0/wi5SC8apyn5R2fl66MLq71K3otewAkJI90ga95tOP7VQ5ODjwQ iYoHUIEWx04nCeb+dxjUAJ4ZwTuM7D8BtuWPI2yl4FE4Y6CLGaO25U1/FhbC7/YH wsY6ZkIyPILKHY0wuiT9tphFX6CGjXyORbIOVFX1bVybYI4qFA0rY+unm6/wwACu NxP3Op3/GaSWdDoydgSsULVZy4nG/eWEKCP9GyPepP3UV/rUunVSc4QYC7Dk5YhW Xvh/yqyjPoMIxaRWuyPbl7T+7JbYLCnMmlMuv/42HCFk3dN7Z+RQECIdZKAr5XBY eayMd5doiR4z3QWD9Nk2PcL3s58cL31yqFZp33O+BORwqwDmXjrdSal9LJZueliS Z1jRUY6WizbU6s7chUNy =Vn7h -----END PGP SIGNATURE----- --liOOAslEiF7prFVr-- From owner-freebsd-stable@freebsd.org Thu Dec 27 21:10:17 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4FAF014233E7 for ; Thu, 27 Dec 2018 21:10:17 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id CAC488BCAB for ; Thu, 27 Dec 2018 21:10:16 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 89B7914233E6; Thu, 27 Dec 2018 21:10:16 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4A9A414233E5 for ; Thu, 27 Dec 2018 21:10:16 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 78E398BCAA for ; Thu, 27 Dec 2018 21:10:15 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id wBRLA7nC004170 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for ; Thu, 27 Dec 2018 23:10:10 +0200 (EET) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua wBRLA7nC004170 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id wBRLA7ri004156 for stable@freebsd.org; Thu, 27 Dec 2018 23:10:07 +0200 (EET) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Thu, 27 Dec 2018 23:10:07 +0200 From: Konstantin Belousov To: stable@freebsd.org Subject: Re: Error upgrading 11-STABLE to 12-STABLE in ifunc resolver Message-ID: <20181227211007.GE53138@kib.kiev.ua> References: <20181227204106.GB2310@graf.pompo.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable In-Reply-To: <20181227204106.GB2310@graf.pompo.net> User-Agent: Mutt/1.11.1 (2018-12-01) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 21:10:17 -0000 On Thu, Dec 27, 2018 at 09:41:06PM +0100, Thierry Thomas wrote: > Hello, >=20 > Trying to upgrade a machine from >=20 > 11.2-STABLE #0 r337833: Wed Aug 15 12:50:47 CEST 2018 >=20 > to 12-STABLE as: >=20 > Working Copy Root Path: /usr/src > URL: https://svn.freebsd.org/base/stable/12 > Relative URL: ^/stable/12 > Repository Root: https://svn.freebsd.org/base > Repository UUID: ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f > Revision: 342558 > Node Kind: directory > Schedule: normal > Last Changed Author: kp > Last Changed Rev: 342545 > Last Changed Date: 2018-12-26 13:56:36 +0100 (Wed, 26 Dec 2018) >=20 > aborts due to this error: >=20 > /usr/local/libexec/ccache/world/cc -target x86_64-unknown-freebsd12.0 --s= ysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tm= p/usr/bin -O2 -pipe -DNO__SCCSID -DNO__RCSID -I/usr/src/lib/libc/include= -I/usr/src/include -I/usr/src/lib/libc/amd64 -DNLS -D__DBINTERFACE_PRIVAT= E -I/usr/src/contrib/gdtoa -I/usr/src/contrib/libc-vis -DINET6 -I/usr/obj/u= sr/src/amd64.amd64/lib/libc -I/usr/src/lib/libc/resolv -D_ACL_PRIVATE -DPOS= IX_MISTAKE -I/usr/src/lib/libmd -I/usr/src/contrib/jemalloc/include -I/usr/= src/contrib/tzcode/stdtime -I/usr/src/lib/libc/stdtime -I/usr/src/lib/libc/= locale -DBROKEN_DES -DPORTMAP -DDES_BUILTIN -I/usr/src/lib/libc/rpc -DWANT_= HYPERV -DYP -DNS_CACHING -DSYMBOL_VERSIONING -g -MD -MF.depend.amd64_set_f= sbase.o -MTamd64_set_fsbase.o -std=3Dgnu99 -fstack-protector-strong -Wsyste= m-headers -Werror -Wall -Wno-format-y2k -Wno-uninitialized -Wno-pointer-sig= n -Wno-empty-body -Wno-string-plus-int -Wno-unused-const-variable -Wno-taut= ological-compare -Wno-unused-value -Wno-parentheses-equality -Wno-unused-fu= nction -Wno-enum-conversion -Wno-unused-local-typedef -Wno-address-of-packe= d-member -Wno-switch -Wno-switch-enum -Wno-knr-promoted-parameter -Qunused= -arguments -I/usr/src/lib/libutil -I/usr/src/lib/msun/amd64 -I/usr/src/lib= /msun/x86 -I/usr/src/lib/msun/src -c /usr/src/lib/libc/amd64/sys/amd64_set_= fsbase.c -o amd64_set_fsbase.o > --- amd64_get_fsbase.o --- > /usr/src/lib/libc/amd64/sys/amd64_get_fsbase.c:60:1: error: ifunc resolve= r function must have no parameters > DEFINE_UIFUNC(, int, amd64_get_fsbase, (void **), static) > ^ > /usr/obj/usr/src/amd64.amd64/tmp/usr/include/x86/ifunc.h:43:44: note: exp= anded from macro 'DEFINE_UIFUNC' > qual ret_type name args __attribute__((ifunc(#name "_resolver"))); \ >=20 > cc is: > FreeBSD clang version 6.0.1 (tags/RELEASE_601/final 335540) (based on LLV= M 6.0.1) >=20 > This problem has already been reported in > > and should be fixed with clang 7, but I'm surprised that it seems > impossible to upgrade from 11-STABLE to 12-STABLE; did I miss something? Yes, you should update to the latest stable/11. More details, you need to have host clang which includes the r339284 commit. From owner-freebsd-stable@freebsd.org Thu Dec 27 22:04:58 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 89A8D14246EA for ; Thu, 27 Dec 2018 22:04:58 +0000 (UTC) (envelope-from walterp@gmail.com) Received: from mail-it1-x141.google.com (mail-it1-x141.google.com [IPv6:2607:f8b0:4864:20::141]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1B1B68DD7C; Thu, 27 Dec 2018 22:04:58 +0000 (UTC) (envelope-from walterp@gmail.com) Received: by mail-it1-x141.google.com with SMTP id z7so26235984iti.0; Thu, 27 Dec 2018 14:04:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wrz5vt0RFBotb2aZGwnLgWnrZf56XRu7O1IPCl6ScPQ=; b=VlXdxBQ5rgkHXLJrKozbsZrkZje1U4mqRveHTUiCpnW1WzzeJ9Zbxdby5gRh3kMVNH zUv7JSvDOwkXCCFKSCvJ2iAhAUGhNFM3HnQTYtC92u18hNPfDSngCBAzACtvJ0ZCtWgv sLIgGPNYMex9IahBQi6OI62+do6yr8AskxADQX5958n+mneF4ykVpztfryb8V5SSDvXA fqynK568ZVCyMqWXAX9XzalVz6RG3b9C1MR872jyivgOcc+dXAr3/XOoQiZwtryOX1TK FUah8AjfApahs4zme8eWiK08iQLo2YHkxMdsoTokjE9sa9CnDXZ7I9oyaA5hcZv5ELpA BsMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wrz5vt0RFBotb2aZGwnLgWnrZf56XRu7O1IPCl6ScPQ=; b=BvqKZavWoMPA37Ida7y9CP5BYj0XBOovzhVNfMUy9s4IHB1A510w1FKtDo+FmE8Ryp Jb/+qCVV85dhbIjgoc+Wph8anGpvh+4mVsZCeRuw0J5mkby9RgtW8NoelcXC6rlEdFLC iGrdlvmbIfrNqqmcYRMUuoIkfg+yt4pG3CstPKY18JzQF5ggK8XGeuCzSwvRMt1Kcgfu n38fe56Jwwl4jSBAOC3KxqDbaTuiYRwSQkYATIWvZGyHHUMccZsMw3Zu603m7oGgDPsl I1kyuoG7LRy9i/lioXyWvJTKxAKxkT4biOhpedzSigAtqXT/XrR8BfvDZq6Ha8FtvQM6 OooQ== X-Gm-Message-State: AA+aEWagcIwv9KVrliV5EeVCEdSR6ND/TQQTkbK/wV4bXhVYOFNN/gtJ ufJiUGAkCkfGJATq4//AsXnKC0Bo/cP5KHWa/xYT8oDY X-Google-Smtp-Source: AFSGD/XX6WO/I0ZEXp/7PDxKpO+dtCIomon5YnGu1Z0JABVTkaT37XNC6VMcA4Veaz7lHyXHZXphOe6H6TjHCwtCA1Q= X-Received: by 2002:a24:1889:: with SMTP id 131mr16646702itr.138.1545948297099; Thu, 27 Dec 2018 14:04:57 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Walter Parker Date: Thu, 27 Dec 2018 14:04:48 -0800 Message-ID: Subject: Re: Pkg dependency strangeness To: Matthew Seaman Cc: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: 1B1B68DD7C X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.979,0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 22:04:58 -0000 Hi Matthew, I ran pkg upgrade -n New packages to be INSTALLED: xorgproto: 2018.4 wayland: 1.16.0 libepoll-shim: 0.0.20180530 libXtst: 1.2.3_2 postgresql95-client: 9.5.15_2 mysql56-client: 5.6.42_1 php72-pdo_sqlite: 7.2.13 (lots of p5-s) Installed packages to be UPGRADED: (lots of py36 s (lots of p5-s) dspam: 3.10.2_4 -> 3.10.2_5 dovecot-pigeonhole: 0.4.21_1 -> 0.5.4_1 dovecot: 2.2.33.2_4 -> 2.3.4_3 Installed packages to be REINSTALLED: roundcube-php72-1.3.8_1,1 (options changed) php72-pgsql-7.2.13_1 (direct dependency changed: postgresql95-client) php72-pdo_pgsql-7.2.13_1 (direct dependency changed: postgresql95-client) php72-openssl-7.2.13 (direct dependency changed: php72) Note, the system is currently running postgresql96. I used postmaster to install the php72-pgsql & php72-pdo_pgsql ports and to install postgresql96-client and server. Ran pkg version -vRL= Found several ophaned packages, most seem be because I remove the xproto packages per the UPDATING instructions ImageMagick-nox11-6.9.9.28,1 ? orphaned: graphics/ImageMagick-nox11 bigreqsproto-1.1.2 ? orphaned: x11/bigreqsproto Also, my X appears to be out of date (system runs headless so that is a lower concern) libXext-1.3.3_1,1 < needs updating (remote has 1.3.3_3,1) libXfixes-5.0.3 < needs updating (remote has 5.0.3_2) libXfont-1.5.2,2 < needs updating (remote has 1.5.4_2,2) libXft-2.3.2_1 < needs updating (remote has 2.3.2_3) lha-1.14i_7 ? orphaned: archivers/lha p5-Net-SMTP-SSL-1.04 ? orphaned: mail/p5-Net-SMTP-SSL pecl-imagick-3.4.3_2 ? orphaned: graphics/pecl-imagick pecl-memcached2-2.2.0_5 ? orphaned: databases/pecl-memcached2 roundcube-sieverules-2.1.2,1 ? orphaned: mail/roundcube-sieverules When I run pkg install phppgadmin-php72, it tells me that I'm on the most recent version of the package. So I removed it and tried a reinstall [root@natasha /usr/ports/mail/postfixadmin]# pkg install phppgadmin-php72 Updating FreeBSD repository catalogue... FreeBSD repository is up to date. All repositories are up to date. The following 7 package(s) will be affected (of 0 checked): New packages to be INSTALLED: phppgadmin-php72: 5.1_5 php56-session: 5.6.39 php56: 5.6.39 postgresql95-client: 9.5.15_2 php56-json: 5.6.39 php56-pdo_pgsql: 5.6.39_1 php56-pdo: 5.6.39 Number of packages to be installed: 7 I stopped this and did a portmaster -B -D databases/phppgadmin it it installed ===>>> All dependencies are up to date ===> Cleaning for phppgadmin-php72-5.1_5 ===> Cleaning for phppgadmin-php56-5.1_5 ===> Cleaning for phppgadmin-php71-5.1_5 ===> Cleaning for phppgadmin-php73-5.1_5 # you can customize the installation directory # by setting PGADMDIR in /etc/make.conf ===> License GPLv2 accepted by the user ===> phppgadmin-php72-5.1_5 depends on file: /usr/local/sbin/pkg - found ===> Fetching all distfiles required by phppgadmin-php72-5.1_5 for building ===> Extracting for phppgadmin-php72-5.1_5 => SHA256 Checksum OK for phpPgAdmin-5.1.tar.bz2. ===> Patching for phppgadmin-php72-5.1_5 Thank you, Walter On Thu, Dec 27, 2018 at 5:08 AM Matthew Seaman wrote: > On 27/12/2018 01:45, Walter Parker wrote: > > I've just upgraded an existing FreeBSD 11.1 system with php56 to FreeBSD > > 11.2 and php72. > > > > In order to do this, I used a mix of ports and packages to delete php56 > and > > all of the php56 extensions and replace them with php72 and php72 > > extensions. Everything is working now, but when I try to install anything > > using pkg, it wants to reinstall php56 and serveral php56 extensions. > This > > happens for packages that don't have php56 as a dependency. > > > > For example > > pkg install alpine > > > > As far as I can tell, this is nothing to do with alpine itself, which > doesn't seem to depend on PHP at all. My guess is that you have some > other PHP-based application installed which has an unmet dependency on > php56. > > If you run 'pkg upgrade -n' without trying to install anything new, what > happens? Also try 'pkg version -vRL=' Do you have any orphaned packages? > > See if you can work out what it is you've installed that wants to pull > in php56. Judging by the dependencies in your original post, it could > be something like databases/phppgadmin or a similar PHP application that > uses a postgresql back-end. I'm going to use phppgadmin as the example > package in what follows: you should substitute the actual package or > packages that are relevant in your case. > > What can happen is the pkg(8) fails to handle the change from an > unflavoured PHP package to a flavoured one. It doesn't grok that an > un-flavoured 'phppgadmin' package was essentially the same thing as > 'phppgadmin-php56' and also that 'phppgadmin-php56' can be replaced by > 'phppgadmin-php72'. You need to prod it into doing the right thing by > making it install exactly the flavour of phppgadmin you want. > > So, assuming phppgadmin was the culprit, you simply need to run 'pkg > install phppgadmin-php72' > > Cheers, > > Matthew > > > > > > -- The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. -- Justice Louis D. Brandeis From owner-freebsd-stable@freebsd.org Thu Dec 27 22:19:38 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4EB911424F54 for ; Thu, 27 Dec 2018 22:19:38 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 9449C8E5BC for ; Thu, 27 Dec 2018 22:19:37 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mailman.ysv.freebsd.org (Postfix) id 535D61424F53; Thu, 27 Dec 2018 22:19:37 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 30D781424F52 for ; Thu, 27 Dec 2018 22:19:37 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x734.google.com (mail-qk1-x734.google.com [IPv6:2607:f8b0:4864:20::734]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C3DC38E5BB for ; Thu, 27 Dec 2018 22:19:36 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x734.google.com with SMTP id r71so11627543qkr.10 for ; Thu, 27 Dec 2018 14:19:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=N6Uxu8O0+nfvMF3Sjk1Q/Hmxms45DjU2xitZJi/iPNg=; b=2JqozpHiCDtAJeNr9ieVXae6g39Ahdd75qg2G64n8n86+mDXAJ7mu5ZKBvU2+j/9ao QsZLBKA2gxW+SE4x6b2bf/6wVZ/eDIZAybDI/iqPa4iH1qOH0Y8GV9FJXy21yiOS3Cbf ReJWLoh9uhGKz4AO70t3EPwoj8yfEh0kcwmABQ+lspchDs1dkuWIYams64pjy2m89kP0 LwPD+EHx3M7d719qCXlNi3RyMyAo5J6lf1BhF/9UAWnhX3QgTIJdTzZLFmD2jlzNC2oN CcfR4tvmyhdXMJfpBkeeQAYfiBT6Ur9ayrhBfmNcBGQLwH7kLS3xibCpb83d0Osvt18Y zBAA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=N6Uxu8O0+nfvMF3Sjk1Q/Hmxms45DjU2xitZJi/iPNg=; b=sGdA0AjdSI6ZOR7Y29Lw1pj8Br0joVw1dz+xC6uopyV7NNNUp4gV5obVKDWJxNAt3g iZJ6F0dPvbrriJj0t39bTDeUdTs76X83Q51r+indHZwZtcqdvXnX41ZlKhxxUKnfr13Z +RWe5vf6uDxKxaHObHc27wW+VNbduirW8tq9Wccs1bJiAN8k+Evla0yzMu0astrM4hOJ VDGRFVrlFeQrtsL+dMB/HK3ytFMnUHRXDoNOVfh4+cuunM4PRNpwiwUwlU8ve1nGOxQu XqPjysEpKIORjYO170Se2KZwUvwd6dqunl2AlNuT29pHDU39XZaM1jChE1U5EEm/JagU nklA== X-Gm-Message-State: AJcUukexEFgA6A0AzbBryDbZeDL/TEluiiGYkwYbIeJuiw8OBn1FiGPs Heu8jQvJLsMnRjPiZrIHzL8a9tiutv5gbrqZzJ0XdNut X-Google-Smtp-Source: ALg8bN5ikXj+eVVG0ZbMd3yarKUY4cEIA3A0EMfUuedDcZfUOeOSBIbmdlEy7PXVKEgQRppxg0oljPzzXgi/pZflJKA= X-Received: by 2002:a37:6e86:: with SMTP id j128mr23748945qkc.46.1545949176290; Thu, 27 Dec 2018 14:19:36 -0800 (PST) MIME-Version: 1.0 References: <20181227204106.GB2310@graf.pompo.net> <20181227211007.GE53138@kib.kiev.ua> In-Reply-To: <20181227211007.GE53138@kib.kiev.ua> From: Warner Losh Date: Thu, 27 Dec 2018 15:19:24 -0700 Message-ID: Subject: Re: Error upgrading 11-STABLE to 12-STABLE in ifunc resolver To: Konstantin Belousov Cc: stable@freebsd.org X-Rspamd-Queue-Id: C3DC38E5BB X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.99 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.988,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Dec 2018 22:19:38 -0000 On Thu, Dec 27, 2018, 4:11 PM Konstantin Belousov On Thu, Dec 27, 2018 at 09:41:06PM +0100, Thierry Thomas wrote: > > Hello, > > > > Trying to upgrade a machine from > > > > 11.2-STABLE #0 r337833: Wed Aug 15 12:50:47 CEST 2018 > > > > to 12-STABLE as: > > > > Working Copy Root Path: /usr/src > > URL: https://svn.freebsd.org/base/stable/12 > > Relative URL: ^/stable/12 > > Repository Root: https://svn.freebsd.org/base > > Repository UUID: ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f > > Revision: 342558 > > Node Kind: directory > > Schedule: normal > > Last Changed Author: kp > > Last Changed Rev: 342545 > > Last Changed Date: 2018-12-26 13:56:36 +0100 (Wed, 26 Dec 2018) > > > > aborts due to this error: > > > > /usr/local/libexec/ccache/world/cc -target x86_64-unknown-freebsd12.0 > --sysroot=/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin -O2 -pipe -DNO__SCCSID > -DNO__RCSID -I/usr/src/lib/libc/include -I/usr/src/include > -I/usr/src/lib/libc/amd64 -DNLS -D__DBINTERFACE_PRIVATE > -I/usr/src/contrib/gdtoa -I/usr/src/contrib/libc-vis -DINET6 > -I/usr/obj/usr/src/amd64.amd64/lib/libc -I/usr/src/lib/libc/resolv > -D_ACL_PRIVATE -DPOSIX_MISTAKE -I/usr/src/lib/libmd > -I/usr/src/contrib/jemalloc/include -I/usr/src/contrib/tzcode/stdtime > -I/usr/src/lib/libc/stdtime -I/usr/src/lib/libc/locale -DBROKEN_DES > -DPORTMAP -DDES_BUILTIN -I/usr/src/lib/libc/rpc -DWANT_HYPERV -DYP > -DNS_CACHING -DSYMBOL_VERSIONING -g -MD -MF.depend.amd64_set_fsbase.o > -MTamd64_set_fsbase.o -std=gnu99 -fstack-protector-strong -Wsystem-headers > -Werror -Wall -Wno-format-y2k -Wno-uninitialized -Wno-pointer-sign > -Wno-empty-body -Wno-string-plus-int -Wno-unused-const-variable > -Wno-tautological-compare -Wno-unuse > d-value -Wno-parentheses-equality -Wno-unused-function > -Wno-enum-conversion -Wno-unused-local-typedef > -Wno-address-of-packed-member -Wno-switch -Wno-switch-enum > -Wno-knr-promoted-parameter -Qunused-arguments -I/usr/src/lib/libutil > -I/usr/src/lib/msun/amd64 -I/usr/src/lib/msun/x86 -I/usr/src/lib/msun/src > -c /usr/src/lib/libc/amd64/sys/amd64_set_fsbase.c -o amd64_set_fsbase.o > > --- amd64_get_fsbase.o --- > > /usr/src/lib/libc/amd64/sys/amd64_get_fsbase.c:60:1: error: ifunc > resolver function must have no parameters > > DEFINE_UIFUNC(, int, amd64_get_fsbase, (void **), static) > > ^ > > /usr/obj/usr/src/amd64.amd64/tmp/usr/include/x86/ifunc.h:43:44: note: > expanded from macro 'DEFINE_UIFUNC' > > qual ret_type name args __attribute__((ifunc(#name "_resolver"))); \ > > > > cc is: > > FreeBSD clang version 6.0.1 (tags/RELEASE_601/final 335540) (based on > LLVM 6.0.1) > > > > This problem has already been reported in > > < > https://lists.freebsd.org/pipermail/freebsd-current/2018-November/071980.html > > > > and should be fixed with clang 7, but I'm surprised that it seems > > impossible to upgrade from 11-STABLE to 12-STABLE; did I miss something? > > Yes, you should update to the latest stable/11. More details, you need > to have host clang which includes the r339284 commit. > We either need to fix this problem, or we need to bump the minimum in Makefile.inc1. Warner _______________________________________________ > freebsd-stable@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-stable > To unsubscribe, send any mail to "freebsd-stable-unsubscribe@freebsd.org" > From owner-freebsd-stable@freebsd.org Fri Dec 28 04:32:09 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 27B2D142D230 for ; Fri, 28 Dec 2018 04:32:09 +0000 (UTC) (envelope-from david.boyd49@twc.com) Received: from dnvrco-cmomta02.email.rr.com (dnvrco-outbound-snat.email.rr.com [107.14.73.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 5A0197226C for ; Fri, 28 Dec 2018 04:32:05 +0000 (UTC) (envelope-from david.boyd49@twc.com) Received: from bashful.bsd1.net ([74.138.140.144]) by cmsmtp with ESMTPA id cjoRgjNRPsismcjoUgVuSP; Fri, 28 Dec 2018 04:31:58 +0000 Message-ID: <221d4f2ca0532980248e9a8b40adc3e491c0d419.camel@twc.com> Subject: Unable to build 12.0-STABLE release From: David Boyd To: freebsd-stable@freebsd.org Date: Thu, 27 Dec 2018 23:31:55 -0500 Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-2.el7) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfNBmJzno3uHpE1mfzeDd0t/ZKY6QhjLozTx3xPc3xsvtiFD5np+g2DCkrgUl/3hZk0at2wo9CTFrTFIK9o6PrnFsvWj8/VWpo0/C8k+d6f4w675XiqDH ra9ECGPrnra4pGusDBL0aZQzhgI2bB658MoR16qanKHt9Psydsxdd12Gmn1uq002hmUzf3FATuSDDQ== X-Rspamd-Queue-Id: 5A0197226C X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david.boyd49@twc.com designates 107.14.73.228 as permitted sender) smtp.mailfrom=david.boyd49@twc.com X-Spamd-Result: default: False [-4.20 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; FREEMAIL_FROM(0.00)[twc.com]; R_SPF_ALLOW(-0.20)[+ip4:107.14.73.0/24]; MV_CASE(0.50)[]; TO_DN_NONE(0.00)[]; MX_GOOD(-0.01)[dnvrco-cmedge02.email.rr.com,dnvrco-cmedge01.email.rr.com]; NEURAL_HAM_SHORT(-0.87)[-0.868,0]; RECEIVED_SPAMHAUS_PBL(0.00)[144.140.138.74.zen.spamhaus.org : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[twc.com]; ASN(0.00)[asn:7843, ipnet:107.14.73.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; IP_SCORE(-1.52)[ipnet: 107.14.73.0/24(-4.17), asn: 7843(-3.34), country: US(-0.08)]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[twc.com]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[228.73.14.107.list.dnswl.org : 127.0.5.0]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 04:32:09 -0000 While attempting to build 12.0-STABLE release images, the following error message sequence occurs: make[2]: don't know how to make CHECKSUM.SHA512-FreeBSD-12.0-STABLE- amd64.asc. Stop. make[2]: stopped in /usr/doc/en_US.ISO8859-1/htdocs/releases/12.0R *** Error code 2 Stop. make[1]: stopped in /usr/src/release *** Error code 1 Stop. make: stopped in /usr/src/release The build of 12.0-RELEASE release images was successful. The only change made to release.conf.sample was CHROOTDIR="/u/1/scratch". The host is 12.0-RELEASE-p1. I don't have a log of the build, but will acquire one if that would be useful. Thanks. David. From owner-freebsd-stable@freebsd.org Fri Dec 28 05:12:31 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 079DF142DBF3 for ; Fri, 28 Dec 2018 05:12:31 +0000 (UTC) (envelope-from walterp@gmail.com) Received: from mail-it1-x142.google.com (mail-it1-x142.google.com [IPv6:2607:f8b0:4864:20::142]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 13DA873201; Fri, 28 Dec 2018 05:12:30 +0000 (UTC) (envelope-from walterp@gmail.com) Received: by mail-it1-x142.google.com with SMTP id p197so26066049itp.0; Thu, 27 Dec 2018 21:12:30 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xsj54bXNeP0yp16HTLH9urUKXySypLJEJIqT0qM56d0=; b=Hv2PQQumDGAnMGetg9CdoOJpmrSDzMe7PoS96ALcy8JVfTBI/B4DQFrpgzPJFLtvxv XLjFM+q+ajrCxpv5wlt7YKWKVzfxIu4Ptb81uUOkRN7z85Cs24bfRpEbwZuYh9S6WVRW 5tOiNOdagGndxzqYWD25GtOs+LyoaOgQw3aF9vK0Y+268sT/5jkWlkNhCjtEZKTROrwE nEfg5jY0rW3J9Pzucy+zm84c+DMDkOmNqwKWtq2OoJwpFjLtg+hzlm98MO/Mn4ZVAYLR B1YGOnk14Z3ceW9s3OveQNTNE4xI6ZKEidVfyoF9/VaVxGia9+VqgNmznPEBqO38Miz6 hCOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xsj54bXNeP0yp16HTLH9urUKXySypLJEJIqT0qM56d0=; b=N+TntKUVreQ6GQUmailsMXPiWVHiZBYqlkziXO4cAkcGVXWC2Q6ZFAQgjK2ICo8VAi dtw+xiEOn+7gRXAUXgHX2wrzsXycMmbPFhhpy9BpDieU6mnNCw2q0Dx3tL6GkDZfsfEq frSdQDN33Wi/rab0oUtIVWw8cVGcA6h6fiio1U3aHGFwspm+khYa3DAJ3pHA5FBYAKOS 1a5u49tMqJ9tVKxCMQiAsrvQnluB4BOD7tJtJEveCYczGx3ChqjTPBFqNye8QalQLvbz P6FWKxv0o4qK0tdw41pZyZyC9nqD5misNU2vKAcT9krWfE7M+37MUlsdvmUNd48TEqsi eM3w== X-Gm-Message-State: AA+aEWab2KUuZmumzqFUlsmgxaDypYpbYyJW8MXeQNNSgZKPndgoU6j9 AtGV+0DaimrxX1G4IRbBgSbvklZVt13YVAD3tCLTX0TEA3Y= X-Google-Smtp-Source: AFSGD/ViNx1Oja1nGgz98Zfx2d5EdntI3Xj4mGJWNxxtNkrbB6/GsTfvE1dZ9PAyXe95clYVG8XXj9FgscGC+JnSmuE= X-Received: by 2002:a24:5608:: with SMTP id o8mr16338126itb.35.1545973949126; Thu, 27 Dec 2018 21:12:29 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Walter Parker Date: Thu, 27 Dec 2018 21:12:18 -0800 Message-ID: Subject: Re: Pkg dependency strangeness To: Matthew Seaman Cc: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: 13DA873201 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=Hv2PQQum; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of walterp@gmail.com designates 2607:f8b0:4864:20::142 as permitted sender) smtp.mailfrom=walterp@gmail.com X-Spamd-Result: default: False [-1.92 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.90)[-0.902,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-0.98)[-0.975,0]; NEURAL_SPAM_SHORT(0.88)[0.882,0]; RCVD_TLS_LAST(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[2.4.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; IP_SCORE(0.09)[ip: (3.90), ipnet: 2607:f8b0::/32(-1.86), asn: 15169(-1.51), country: US(-0.08)]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 05:12:31 -0000 I appear to have found a solution: I used pkg check -d and it said pecl-memcached2 has a missing dependency: php56-session pecl-memcached2 has a missing dependency: php56-json policyd2 has a missing dependency: php56-pdo_pgsql php56-session dependency failed to be fixed php56-json dependency failed to be fixed php56-pdo_pgsql dependency failed to be fixed So use pkg remove to delete pecl-memcached2 and policyd2 and now when I use pkg it appears to work as expected [root@natasha /usr/local/etc/postfix]# pkg install alpine New packages to be INSTALLED: alpine: 2.21.9999 Number of packages to be installed: 1 The process will require 8 MiB more space. 2 MiB to be downloaded. On Thu, Dec 27, 2018 at 2:04 PM Walter Parker wrote: > Hi Matthew, > > I ran pkg upgrade -n > > New packages to be INSTALLED: > xorgproto: 2018.4 > wayland: 1.16.0 > libepoll-shim: 0.0.20180530 > libXtst: 1.2.3_2 > postgresql95-client: 9.5.15_2 > mysql56-client: 5.6.42_1 > php72-pdo_sqlite: 7.2.13 > (lots of p5-s) > > Installed packages to be UPGRADED: > (lots of py36 s > (lots of p5-s) > dspam: 3.10.2_4 -> 3.10.2_5 > dovecot-pigeonhole: 0.4.21_1 -> 0.5.4_1 > dovecot: 2.2.33.2_4 -> 2.3.4_3 > > Installed packages to be REINSTALLED: > roundcube-php72-1.3.8_1,1 (options changed) > php72-pgsql-7.2.13_1 (direct dependency changed: > postgresql95-client) > php72-pdo_pgsql-7.2.13_1 (direct dependency changed: > postgresql95-client) > php72-openssl-7.2.13 (direct dependency changed: php72) > > Note, the system is currently running postgresql96. I used postmaster to > install the php72-pgsql & php72-pdo_pgsql ports and to install > postgresql96-client and server. > > Ran pkg version -vRL= > Found several ophaned packages, most seem be because I remove the > xproto packages per the UPDATING instructions > ImageMagick-nox11-6.9.9.28,1 ? orphaned: graphics/ImageMagick-nox11 > bigreqsproto-1.1.2 ? orphaned: x11/bigreqsproto > Also, my X appears to be out of date (system runs headless so that is a > lower concern) > libXext-1.3.3_1,1 < needs updating (remote has > 1.3.3_3,1) > libXfixes-5.0.3 < needs updating (remote has 5.0.3_2) > libXfont-1.5.2,2 < needs updating (remote has > 1.5.4_2,2) > libXft-2.3.2_1 < needs updating (remote has 2.3.2_3) > lha-1.14i_7 ? orphaned: archivers/lha > p5-Net-SMTP-SSL-1.04 ? orphaned: mail/p5-Net-SMTP-SSL > pecl-imagick-3.4.3_2 ? orphaned: graphics/pecl-imagick > pecl-memcached2-2.2.0_5 ? orphaned: databases/pecl-memcached2 > roundcube-sieverules-2.1.2,1 ? orphaned: mail/roundcube-sieverules > > When I run pkg install phppgadmin-php72, it tells me that I'm on the most > recent version of the package. So I removed it and tried a reinstall > > [root@natasha /usr/ports/mail/postfixadmin]# pkg install phppgadmin-php72 > Updating FreeBSD repository catalogue... > FreeBSD repository is up to date. > All repositories are up to date. > The following 7 package(s) will be affected (of 0 checked): > > New packages to be INSTALLED: > phppgadmin-php72: 5.1_5 > php56-session: 5.6.39 > php56: 5.6.39 > postgresql95-client: 9.5.15_2 > php56-json: 5.6.39 > php56-pdo_pgsql: 5.6.39_1 > php56-pdo: 5.6.39 > > Number of packages to be installed: 7 > > I stopped this and did a portmaster -B -D databases/phppgadmin it it > installed > ===>>> All dependencies are up to date > > ===> Cleaning for phppgadmin-php72-5.1_5 > ===> Cleaning for phppgadmin-php56-5.1_5 > ===> Cleaning for phppgadmin-php71-5.1_5 > ===> Cleaning for phppgadmin-php73-5.1_5 > # you can customize the installation directory > # by setting PGADMDIR in /etc/make.conf > ===> License GPLv2 accepted by the user > ===> phppgadmin-php72-5.1_5 depends on file: /usr/local/sbin/pkg - found > ===> Fetching all distfiles required by phppgadmin-php72-5.1_5 for building > ===> Extracting for phppgadmin-php72-5.1_5 > => SHA256 Checksum OK for phpPgAdmin-5.1.tar.bz2. > ===> Patching for phppgadmin-php72-5.1_5 > > > Thank you, > > > Walter > > On Thu, Dec 27, 2018 at 5:08 AM Matthew Seaman > wrote: > >> On 27/12/2018 01:45, Walter Parker wrote: >> > I've just upgraded an existing FreeBSD 11.1 system with php56 to FreeBSD >> > 11.2 and php72. >> > >> > In order to do this, I used a mix of ports and packages to delete php56 >> and >> > all of the php56 extensions and replace them with php72 and php72 >> > extensions. Everything is working now, but when I try to install >> anything >> > using pkg, it wants to reinstall php56 and serveral php56 extensions. >> This >> > happens for packages that don't have php56 as a dependency. >> > >> > For example >> > pkg install alpine >> > >> >> As far as I can tell, this is nothing to do with alpine itself, which >> doesn't seem to depend on PHP at all. My guess is that you have some >> other PHP-based application installed which has an unmet dependency on >> php56. >> >> If you run 'pkg upgrade -n' without trying to install anything new, what >> happens? Also try 'pkg version -vRL=' Do you have any orphaned packages? >> >> See if you can work out what it is you've installed that wants to pull >> in php56. Judging by the dependencies in your original post, it could >> be something like databases/phppgadmin or a similar PHP application that >> uses a postgresql back-end. I'm going to use phppgadmin as the example >> package in what follows: you should substitute the actual package or >> packages that are relevant in your case. >> >> What can happen is the pkg(8) fails to handle the change from an >> unflavoured PHP package to a flavoured one. It doesn't grok that an >> un-flavoured 'phppgadmin' package was essentially the same thing as >> 'phppgadmin-php56' and also that 'phppgadmin-php56' can be replaced by >> 'phppgadmin-php72'. You need to prod it into doing the right thing by >> making it install exactly the flavour of phppgadmin you want. >> >> So, assuming phppgadmin was the culprit, you simply need to run 'pkg >> install phppgadmin-php72' >> >> Cheers, >> >> Matthew >> >> >> >> >> >> > > -- > The greatest dangers to liberty lurk in insidious encroachment by men of > zeal, well-meaning but without understanding. -- Justice Louis D. Brandeis > -- The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. -- Justice Louis D. Brandeis From owner-freebsd-stable@freebsd.org Fri Dec 28 08:42:56 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2CD961431202 for ; Fri, 28 Dec 2018 08:42:56 +0000 (UTC) (envelope-from raul@b2n.org) Received: from mail3.custos.es (bohn.b2n.org [212.34.158.159]) by mx1.freebsd.org (Postfix) with ESMTP id D1E378060D for ; Fri, 28 Dec 2018 08:42:54 +0000 (UTC) (envelope-from raul@b2n.org) Received: from plank.b2n.org (plank.b2n.org [213.37.4.13]) by mail3.custos.es (Postfix) with ESMTP id 1885C125ED4 for ; Fri, 28 Dec 2018 09:42:52 +0100 (CET) Received: from turing.b2n.org (unknown [10.64.3.2]) by plank.b2n.org (Postfix) with ESMTP id 5452D559D6 for ; Fri, 28 Dec 2018 09:42:51 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=b2n.org; s=dkim; t=1545986571; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references; bh=GLPkI7pwTLKBI8P+RvOHZfIMaUuY1F/YlZwQqas9Pdk=; b=WoWhJ3iyLZILr0SQYkt1/AnereJYb1KS11lKoKq+Rqlm9sF3e5eeji5j0GD40jE9axAaUa fq9f/0Hg7KpeZOFB9mjo0SxAAyi7E7kUfbfCpIjsZOUj/cmkcnB4uZr5HZ3Ku4oNtHPc39 XXxe5ZTEPEeAwx8XRCUC0r+0dKkf1JCgfj3lZsyc+retEVdjma2zBsOdxs3G8z99eJ088+ SwluVgpV22MlEzhVNcc4tnpEuaMtvARdDoQupR/wLr/lpa0IHACSm9xidkrA3t95mLnRXt UMjsbsqo9qHFYc7K8cS//oMV0HCNKxkZUbqpHbpMNElVe59OGhYAJAF6if1+LA== Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by turing.b2n.org (Postfix) with ESMTPSA id 2B2CE495E9 for ; Fri, 28 Dec 2018 09:42:51 +0100 (CET) To: freebsd-stable@freebsd.org From: =?UTF-8?B?UmHDumw=?= Openpgp: preference=signencrypt Autocrypt: addr=raul@b2n.org; prefer-encrypt=mutual; keydata= mQINBFns2ZIBEAC7xWTucmdvscBLlryw1xv2opUqexkdusr4cR8lzRn+KOUmpDoibIK4C0In PPY157sWviEwCx24Hs+e664vwx6xD7zQ7ttVE30t+bm4iVqdxyIDMdgEbWOcTpYRjhRIGGpX BeBt+eYw+uE519bXHJZJJGcIzUU6Wk9fghx8RHMb5IEg4+9rsyCnEznE8u8AfJTgeOdA4h0h EweHjOFJdn6i+3r1KZlwFMIUFBo+q8ldHVzjPZGGSjguW62GgYMFn5uiYxpqTkKqD9FwrRlz n41QIOzE8o6jJfF/r4py1EiHwOTfvrrCNOA5cJXFrTsmCTj8dAySEThlxfSKQED0uPZVaegL 8KDvJ56oR9U6YE86fTdn713TvukVWeK58ZjgF/kQMymTjFFbe2IeG/QkxjWbcHb8EpLNXtIL HFX0+sezFnhKJrfGyq4jqWqWp8suzzhgQBNSQxkHNuQADabHJ13VH6qqIeC0UGUtUjEwxznh 51uyh0APK+7xhSc4+JKcVZcK7xkhY04wPT4x/dn2IbwCXewTMHROqo4oWP2ajN4bTOte1tot ZUbeLgPdr9iZrTSdt63lnTTbAxnXAxxBc/q8hVsiWM9SfOIkZ0kGeNA8NlrubcuXQzTJHy2h JhmLSuLfUaGZcr+F/3KtohTvshy2291/ruM8ExMUSDd3wb96fwARAQABtCxSYcO6bCBNdcOx b3ogLSBDVVNUT1MgPHJhdWwubXVub3pAY3VzdG9zLmVzPokCPwQTAQIAKQUCWezZkgIbIwUJ CWYBgAcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJELKl4+9JDtBb750P/1d/rU1Ngc94 rVL2vqDEijJdFYEZbzE96MugnwCEdJ8Al/6mWbD4vaPIuuuW+TE8dMPItcUv1vq8D/wX8NSs OS5FNu7XfGpjjxOKdUpLLoiGbJC4AbhMZhvdpvWQQAk5szCzGT+nYPve7Ut6SyWtZPYwWM+K o5CNyRu838jfGhm6G8CvaLJHcrMBlA87OBkQi4tzT+NIBBp0U8vGXV8z6LlpI/EGXLgSJPnO pFn8PL6tXZ1uiI+AXVJT+emdB68InejcHgFrwoowZBLzXllGPH4pYVZ1h9pPARoPCmSlCe4x g+ELKvkogatQM4BXuzRGiYCVJDBqgFoRDDd/dnmsCb5DV0xWSlmpWPy06e9C8PwCI3NmukCh mq2ic74mAo9lKTv8VVc9czushKagVQhYPT3o6DHOCFJeoXvaQWIOprpAkcf5nz15SjeZWFqW EzF8+0LUocGLDLMaDkWBBruJuQfz8V3ktDdXkEv55sgrbf/98sGdIz3aOSrLy3Rop3m3shnM Uua1XpE6Fv+6g8owSI15k8bd0lmsq83/YYW2hN0vQWn/HR7xTwpA9fZh4stxJRJAHAJ7nQ/u SJkp2+NVOn9ZImKqegqqmn+amnkRsSunM1fe/i2GVsgKzkOlyDiLotUk8JU6t741kIJscGfW 8y1uC2Cf7T1tHdQsG4Hq1+C/uQINBFns2ZIBEACv+REqRGM1e6CuNil4Kim3Bi5RTXXx2/JJ dCC5W0ZsEoynoQ31RJ+3nu9OGDGzmEL+2fMVxvKiomXnwq6xZmhb6HFw03e/lOfYEEMm1hjj 23Dw9gNO3Dy5j1o3vzOWPOQwZpsE2vG0XE3ZfZ+Rg1b3SIe1R7w0nnzDAjznpYuG6WEYGFr9 r7IDouLqgBeR1i4B4M+7E8FLql06pyxF4plcJ1KSf++SNZf0arFuLzGZh9aA6L4OQ3eIqBg0 VqId8GiO6cz1t68dpOuwlt/HEcA3tCL15IIhKxQyWAU3S4yM/KBSXXGW2OI+EebFrBxYXySA IByYogpq795uiZ6gBDtQDvx1A8WHMy/7nDnXwJ9XTKzpjIFjKH0Gi/IpvxD1Aci/JbCzB76w iTA4Hbdw0iiZFUN3Wby5eVvkOBA5G+uaLJH10nyIZAe1IszaCxK+3sad6bVd2FsD7qmVHovq iLrjEa+p36kZB/Aeqm+Xwnwss32cOT3GZ6Cgs3ZYBwLJcPo+hhV9JXn7j8nt4tfJr5wm/HDN 4LgUKhUxTWrTS+iTbMtQ9NQdY4QrnB8Qa5E9mEeuZgorZCIrQm1D6MaoEX6fJ8yTru82EavX 9geX58VlFNcK32Ys1Ox0gsg6bX3CRRdAX42X4byuGGkkFwANULSCtepqbm9HO7FbGjkzNtO/ TQARAQABiQIlBBgBAgAPBQJZ7NmSAhsMBQkJZgGAAAoJELKl4+9JDtBbHaYP+wXvUGqFdxea O3Ec2WAFDzSS7EnLWAxrEHkKCIpVKYQ0TlYTd9HS2aGZ0oVJA3vNezJ3j8yusylNO9wWWIdX JQ5hrgzvEYzvb1hpo65CUsK954scz8lmh+Wh2bx728PssQsbL2gCiUJsLD6IDm9Q7374Ztsb sd1Qg+G7TmU2VQrVMo7eA3hGeNCcmiZH3zxHF8L2q1IEbo11/GaDzg9E53/lkd2+gizSD2PG OabRmIRAY7pUDjn54trQy/5fxNq0idyUUZYe6UbhE7UhpWAEdnU2Hp8bVyeJDMM6HiV7Apqg SuGcmGMYfBlNd+itjJk4MFYoIij+UiryCHfWwO8+bELyffDgHEcoVsgbL7Nn6TXoH6QjuMD2 cjGXoKplCV5jxTQJAd5/vnczlTbDA30UOwcje02r4mMh3vLaYeLNJ0Z8RCh09o7IeGskmwy4 849V5LoX3/TRKDnCf+rK7v08SEhb5QeUZ2GUwyEEby67TEmKE5LmQRj1gPnrH3Wlx2BkS/pS Y3k2cGEtoSYF3gUIec2VvzG52VSMJIOZZDcgscwvubJdRdvNPhGApWPgT8ZDfeafgJz/tRg/ hj6Zeln2xKBxgVKY/dJJouCJZdTOE6lB9vRJyCveVSi+uDu3G8idTON5cRLEy/acpBE8n0Ve noPvPYKoN8z5Hsw8DRyWVkxU Subject: webcamd vs 12.0-RELEASE-p1 Message-ID: <12a1a235-844a-c99e-5afe-2032f0328f48@b2n.org> Date: Fri, 28 Dec 2018 09:42:49 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Language: es-ES Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: D1E378060D X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=b2n.org header.s=dkim header.b=WoWhJ3iy; dmarc=pass (policy=none) header.from=b2n.org; spf=pass (mx1.freebsd.org: domain of raul@b2n.org designates 212.34.158.159 as permitted sender) smtp.mailfrom=raul@b2n.org X-Spamd-Result: default: False [-3.09 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[b2n.org:s=dkim]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+a:bohn.b2n.org]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; RCVD_COUNT_THREE(0.00)[4]; IP_SCORE(0.01)[country: ES(0.05)]; DKIM_TRACE(0.00)[b2n.org:+]; MX_GOOD(-0.01)[cached: kepler.b2n.org]; RCVD_IN_DNSWL_NONE(0.00)[159.158.34.212.list.dnswl.org : 127.0.10.0]; NEURAL_HAM_SHORT(-0.20)[-0.197,0]; DMARC_POLICY_ALLOW(-0.50)[b2n.org,none]; RCVD_NO_TLS_LAST(0.10)[]; RECEIVED_SPAMHAUS_PBL(0.00)[13.4.37.213.zen.spamhaus.org : 127.0.0.11]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:20648, ipnet:212.34.128.0/19, country:ES]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 08:42:56 -0000 Hello! Trying a logitech c910 usb camera, cuse, webcamd ... pwcview, chromium, vlc3 ... only greenish stuff, a block puzzle in motion or nothing at all. Reading about others success on other versions make me think must be an easy thing to achieve although I've never tried before. Anyone successfully using cuse / webcamd on 12.0-RELEASE?. Any obvious clue I'm missing?. Thanks in advance. Cheers, Raúl. From owner-freebsd-stable@freebsd.org Fri Dec 28 10:07:43 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3B17E1433831 for ; Fri, 28 Dec 2018 10:07:43 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: from mail-it1-x12d.google.com (mail-it1-x12d.google.com [IPv6:2607:f8b0:4864:20::12d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BA1EF835E7 for ; Fri, 28 Dec 2018 10:07:40 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: by mail-it1-x12d.google.com with SMTP id h65so26593741ith.3 for ; Fri, 28 Dec 2018 02:07:40 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=VJi1IjFtQrMp9El+pkkuWANl1eMW2MZczpJRmkvfO0U=; b=kXRvgsBbHKaQcmnJSGvtY88o7jGoZiSX2q5fmWqjqm1w7h7z6ljf9sxmtlK4dxephO xJe7Qz3c7TT5ISBMVMVqDHkEMM0yfLe5xpJf2TzUpGER/OZaHuuFLUexyhdx9SSbJn4O xes/7mB3wX3naVHKUrMHgVq+7aXWFXiJTlGMh1D5olgIelGYwvb76VBN5/G5oCPMLFE3 7dbsFsKa0qq5UITVnNEo11R6XUpe+1/+lBxO2xJsEwkBXt1REzAtlY93nusbfQJ7nz6e Egz1sZrbdyUKWakkbqTD0po4JnYG4x9xtSv33ls7adVpguT2aU0xQHs110UtIA6fmKMH EuSg== X-Gm-Message-State: AA+aEWbwvBu1SwvxMOhHklaJZqpO06z5uszX9Ov+4MWnIBjkryE70JHx YGt8/brvx+ERMaxkpFAtRM5DKV7PGz6wmUpOtExfe3Iv6hc= X-Google-Smtp-Source: AFSGD/V8/oW64kY5zzkgdvItFrLIreF3tASYJT1k2Xa1CmWNdd1CatQEotLBdi+rb9ZkkedOZRGvAh9SYElY9gjz0Uc= X-Received: by 2002:a02:1dc8:: with SMTP id 191mr17769176jaj.55.1545991659317; Fri, 28 Dec 2018 02:07:39 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: =?UTF-8?B?SnVyaWogS292YcSNacSN?= Date: Fri, 28 Dec 2018 11:07:27 +0100 Message-ID: Subject: Re: Kernel panic on 11.2-RELEASE-p7 To: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: BA1EF835E7 X-Spamd-Bar: ----- X-Spamd-Result: default: False [-5.26 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[ocpea.com:s=google]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_DN_NONE(0.00)[]; URI_COUNT_ODD(1.00)[5]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-2.27)[ip: (-7.88), ipnet: 2607:f8b0::/32(-1.87), asn: 15169(-1.51), country: US(-0.08)]; DKIM_TRACE(0.00)[ocpea.com:+]; MX_GOOD(-0.01)[alt1.aspmx.l.google.com,aspmx.l.google.com,alt3.aspmx.l.google.com,alt2.aspmx.l.google.com,alt4.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[d.2.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.98)[-0.982,0]; DMARC_POLICY_ALLOW(-0.50)[ocpea.com,reject]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 10:07:43 -0000 Dear list, This morning the server mentioned in my previous e-mail (Freebsd 11.2-RELEASE-p7 with GENERIC kernel, ZFS root) experienced another kernel panic: Fatal trap 9: general protection fault while in kernel mode cpuid =3D 0; apic id =3D 00 instruction pointer =3D 0x20:0xffffffff82299013 stack pointer =3D 0x28:0xfffffe0352893ad0 frame pointer =3D 0x28:0xfffffe0352893b10 code segment =3D base 0x0, limit 0xfffff, type 0x1b =3D DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags =3D interrupt enabled, resume, IOPL =3D 0 current process =3D 9 (dbuf_evict_thread) trap number =3D 9 panic: general protection fault cpuid =3D 0 KDB: stack backtrace: #0 0xffffffff80b3d577 at kdb_backtrace+0x67 #1 0xffffffff80af6b17 at vpanic+0x177 #2 0xffffffff80af6993 at panic+0x43 #3 0xffffffff80f77fdf at trap_fatal+0x35f #4 0xffffffff80f7759e at trap+0x5e #5 0xffffffff80f5808c at calltrap+0x8 #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 #8 0xffffffff80aba093 at fork_exit+0x83 #9 0xffffffff80f58fae at fork_trampoline+0xe I have used the "crashinfo" utility to (again) generate the text file which is available at this URL: http://www.ocpea.com/dump/core-2.txt Does anyone have any idea how we can go about discovering the cause for this? We would appreciate any suggestion ... Kind regards, Jurij Kovacic On Tue, Dec 25, 2018 at 7:57 AM Jurij Kova=C4=8Di=C4=8D wrote: > Dear list, > > I hope I am posting this to the correct list - if not, I apologize (and > please advise where to post this instead). > > Today I experienced a kernel panic on a (physical) server, running Freebs= d > 11.2-RELEASE-p7 with GENERIC kernel, ZFS root: > > Fatal trap 9: general protection fault while in kernel mode > cpuid =3D 0; apic id =3D 00 > instruction pointer =3D 0x20:0xffffffff82299013 > stack pointer =3D 0x28:0xfffffe0352893ad0 > frame pointer =3D 0x28:0xfffffe0352893b10 > code segment =3D base 0x0, limit 0xfffff, type 0x1b > =3D DPL 0, pres 1, long 1, def32 0, gran 1 > processor eflags =3D interrupt enabled, resume, IOPL =3D 0 > current process =3D 9 (dbuf_evict_thread) > trap number =3D 9 > panic: general protection fault > cpuid =3D 0 > KDB: stack backtrace: > #0 0xffffffff80b3d577 at kdb_backtrace+0x67 > #1 0xffffffff80af6b17 at vpanic+0x177 > #2 0xffffffff80af6993 at panic+0x43 > #3 0xffffffff80f77fdf at trap_fatal+0x35f > #4 0xffffffff80f7759e at trap+0x5e > #5 0xffffffff80f5808c at calltrap+0x8 > #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 > #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 > #8 0xffffffff80aba093 at fork_exit+0x83 > #9 0xffffffff80f58fae at fork_trampoline+0xe > > I have used "crashinfo" utility to generate the text file which is > available at this URL: http://www.ocpea.com/dump/core.txt > > At the time of the crash, the server was probably under more intensive I/= O > load (scheduled backup with rsync). > > This is a production server, so naturally, all advice is deeply > appreciated. :) > > Kind regards, > Jurij > From owner-freebsd-stable@freebsd.org Fri Dec 28 10:35:04 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8AF7B1434432 for ; Fri, 28 Dec 2018 10:35:04 +0000 (UTC) (envelope-from agapon@gmail.com) Received: from mail-lj1-f176.google.com (mail-lj1-f176.google.com [209.85.208.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3BCDE8499F for ; Fri, 28 Dec 2018 10:35:03 +0000 (UTC) (envelope-from agapon@gmail.com) Received: by mail-lj1-f176.google.com with SMTP id q2-v6so18350550lji.10 for ; Fri, 28 Dec 2018 02:35:03 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:openpgp:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=NbHQA7HiWy7qu2mk9c0zC8eQfZHw+U5wM4J/459Rwms=; b=Klb/JonSgbDYYlmsbjIQ9A9UCwBDQSOqRISKaA7ms/xl5+2uMVjmMZwKwIXHV6A5eo QSPPnpJrVgRIlOa32b48VulxXnXY1659Xk2M8/rUbf7Vr2z3wnJm1FHt3XZXmjo9L3FK jfNkcf+zvB1AMnzYaBklmi8ha3FDJndTOn/S/qm/1AhtHjuKy21iPRpxo67/h/jPK8W6 jQvyyVMDzngmz37TdFVmJ6K8uuAJPveGasWrasf85zY6krTZKh3NfYvO+gEZdsml4GMR 8KTcehjM1Wn/XTa5Jh3ziCAjHQ6KrmMKT55FiErE7iy/YI9xSmc8ehzZo4eBmsTm+reZ zImg== X-Gm-Message-State: AJcUukfZNs81/dkTeKtBKB4Y4KPSMimnlfkXrDmJLaCaLnuAoqKznzVV E9vHaysCv0O1seHw0VNWztVGhYDE X-Google-Smtp-Source: ALg8bN5Lq0Es1Bx3NKRsrUPztkGFXp9ycIPpqpDXWKkcPxrKIawHq71yNgzPXqNSTDKwtOj5cHHs+g== X-Received: by 2002:a2e:9e16:: with SMTP id e22-v6mr15796257ljk.4.1545993295849; Fri, 28 Dec 2018 02:34:55 -0800 (PST) Received: from [192.168.0.88] (east.meadow.volia.net. [93.72.151.96]) by smtp.googlemail.com with ESMTPSA id l63sm8041178lfl.76.2018.12.28.02.34.54 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 28 Dec 2018 02:34:55 -0800 (PST) Subject: Re: Kernel panic on 11.2-RELEASE-p7 To: =?UTF-8?B?SnVyaWogS292YcSNacSN?= , freebsd-stable@freebsd.org References: From: Andriy Gapon Openpgp: preference=signencrypt Autocrypt: addr=avg@FreeBSD.org; prefer-encrypt=mutual; keydata= xsFNBFm4LIgBEADNB/3lT7f15UKeQ52xCFQx/GqHkSxEdVyLFZTmY3KyNPQGBtyvVyBfprJ7 mAeXZWfhat6cKNRAGZcL5EmewdQuUfQfBdYmKjbw3a9GFDsDNuhDA2QwFt8BmkiVMRYyvI7l N0eVzszWCUgdc3qqM6qqcgBaqsVmJluwpvwp4ZBXmch5BgDDDb1MPO8AZ2QZfIQmplkj8Y6Z AiNMknkmgaekIINSJX8IzRzKD5WwMsin70psE8dpL/iBsA2cpJGzWMObVTtCxeDKlBCNqM1i gTXta1ukdUT7JgLEFZk9ceYQQMJJtUwzWu1UHfZn0Fs29HTqawfWPSZVbulbrnu5q55R4PlQ /xURkWQUTyDpqUvb4JK371zhepXiXDwrrpnyyZABm3SFLkk2bHlheeKU6Yql4pcmSVym1AS4 dV8y0oHAfdlSCF6tpOPf2+K9nW1CFA8b/tw4oJBTtfZ1kxXOMdyZU5fiG7xb1qDgpQKgHUX8 7Rd2T1UVLVeuhYlXNw2F+a2ucY+cMoqz3LtpksUiBppJhw099gEXehcN2JbUZ2TueJdt1FdS ztnZmsHUXLxrRBtGwqnFL7GSd6snpGIKuuL305iaOGODbb9c7ne1JqBbkw1wh8ci6vvwGlzx rexzimRaBzJxlkjNfMx8WpCvYebGMydNoeEtkWldtjTNVsUAtQARAQABzR5BbmRyaXkgR2Fw b24gPGF2Z0BGcmVlQlNELm9yZz7CwZQEEwEIAD4WIQS+LEO7ngQnXA4Bjr538m7TUc1yjwUC WbgsiAIbIwUJBaOagAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRB38m7TUc1yj+JAEACV l9AK/nOWAt/9cufV2fRj0hdOqB1aCshtSrwHk/exXsDa4/FkmegxXQGY+3GWX3deIyesbVRL rYdtdK0dqJyT1SBqXK1h3/at9rxr9GQA6KWOxTjUFURsU7ok/6SIlm8uLRPNKO+yq0GDjgaO LzN+xykuBA0FlhQAXJnpZLcVfPJdWv7sSHGedL5ln8P8rxR+XnmsA5TUaaPcbhTB+mG+iKFj GghASDSfGqLWFPBlX/fpXikBDZ1gvOr8nyMY9nXhgfXpq3B6QCRYKPy58ChrZ5weeJZ29b7/ QdEO8NFNWHjSD9meiLdWQaqo9Y7uUxN3wySc/YUZxtS0bhAd8zJdNPsJYG8sXgKjeBQMVGuT eCAJFEYJqbwWvIXMfVWop4+O4xB+z2YE3jAbG/9tB/GSnQdVSj3G8MS80iLS58frnt+RSEw/ psahrfh0dh6SFHttE049xYiC+cM8J27Aaf0i9RflyITq57NuJm+AHJoU9SQUkIF0nc6lfA+o JRiyRlHZHKoRQkIg4aiKaZSWjQYRl5Txl0IZUP1dSWMX4s3XTMurC/pnja45dge/4ESOtJ9R 8XuIWg45Oq6MeIWdjKddGhRj3OohsltKgkEU3eLKYtB6qRTQypHHUawCXz88uYt5e3w4V16H lCpSTZV/EVHnNe45FVBlvK7k7HFfDDkryM7BTQRZuCyIARAAlq0slcsVboY/+IUJdcbEiJRW be9HKVz4SUchq0z9MZPX/0dcnvz/gkyYA+OuM78dNS7Mbby5dTvOqfpLJfCuhaNYOhlE0wY+ 1T6Tf1f4c/uA3U/YiadukQ3+6TJuYGAdRZD5EqYFIkreARTVWg87N9g0fT9BEqLw9lJtEGDY EWUE7L++B8o4uu3LQFEYxcrb4K/WKmgtmFcm77s0IKDrfcX4doV92QTIpLiRxcOmCC/OCYuO jB1oaaqXQzZrCutXRK0L5XN1Y1PYjIrEzHMIXmCDlLYnpFkK+itlXwlE2ZQxkfMruCWdQXye syl2fynAe8hvp7Mms9qU2r2K9EcJiR5N1t1C2/kTKNUhcRv7Yd/vwusK7BqJbhlng5ZgRx0m WxdntU/JLEntz3QBsBsWM9Y9wf2V4tLv6/DuDBta781RsCB/UrU2zNuOEkSixlUiHxw1dccI 6CVlaWkkJBxmHX22GdDFrcjvwMNIbbyfQLuBq6IOh8nvu9vuItup7qemDG3Ms6TVwA7BD3j+ 3fGprtyW8Fd/RR2bW2+LWkMrqHffAr6Y6V3h5kd2G9Q8ZWpEJk+LG6Mk3fhZhmCnHhDu6CwN MeUvxXDVO+fqc3JjFm5OxhmfVeJKrbCEUJyM8ESWLoNHLqjywdZga4Q7P12g8DUQ1mRxYg/L HgZY3zfKOqcAEQEAAcLBfAQYAQgAJhYhBL4sQ7ueBCdcDgGOvnfybtNRzXKPBQJZuCyIAhsM BQkFo5qAAAoJEHfybtNRzXKPBVwQAKfFy9P7N3OsLDMB56A4Kf+ZT+d5cIx0Yiaf4n6w7m3i ImHHHk9FIetI4Xe54a2IXh4Bq5UkAGY0667eIs+Z1Ea6I2i27Sdo7DxGwq09Qnm/Y65ADvXs 3aBvokCcm7FsM1wky395m8xUos1681oV5oxgqeRI8/76qy0hD9WR65UW+HQgZRIcIjSel9vR XDaD2HLGPTTGr7u4v00UeTMs6qvPsa2PJagogrKY8RXdFtXvweQFz78NbXhluwix2Tb9ETPk LIpDrtzV73CaE2aqBG/KrboXT2C67BgFtnk7T7Y7iKq4/XvEdDWscz2wws91BOXuMMd4c/c4 OmGW9m3RBLufFrOag1q5yUS9QbFfyqL6dftJP3Zq/xe+mr7sbWbhPVCQFrH3r26mpmy841ym dwQnNcsbIGiBASBSKksOvIDYKa2Wy8htPmWFTEOPRpFXdGQ27awcjjnB42nngyCK5ukZDHi6 w0qK5DNQQCkiweevCIC6wc3p67jl1EMFY5+z+zdTPb3h7LeVnGqW0qBQl99vVFgzLxchKcl0 R/paSFgwqXCZhAKMuUHncJuynDOP7z5LirUeFI8qsBAJi1rXpQoLJTVcW72swZ42IdPiboqx NbTMiNOiE36GqMcTPfKylCbF45JNX4nF9ElM0E+Y8gi4cizJYBRr2FBJgay0b9Cp Message-ID: <67af7bf5-5fc7-a697-0055-d3518c93b86e@FreeBSD.org> Date: Fri, 28 Dec 2018 12:34:54 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: 3BCDE8499F X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of agapon@gmail.com designates 209.85.208.176 as permitted sender) smtp.mailfrom=agapon@gmail.com X-Spamd-Result: default: False [-3.97 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; IP_SCORE(-1.06)[ipnet: 209.85.128.0/17(-3.70), asn: 15169(-1.51), country: US(-0.08)]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; DMARC_NA(0.00)[FreeBSD.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; MIME_TRACE(0.00)[0:+]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[176.208.85.209.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.90)[-0.898,0]; RCVD_TLS_LAST(0.00)[]; FORGED_SENDER(0.30)[avg@FreeBSD.org,agapon@gmail.com]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; FROM_NEQ_ENVFROM(0.00)[avg@FreeBSD.org,agapon@gmail.com]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 10:35:04 -0000 On 28/12/2018 12:07, Jurij Kovačič via freebsd-stable wrote: > Dear list, > > This morning the server mentioned in my previous e-mail (Freebsd > 11.2-RELEASE-p7 with GENERIC kernel, ZFS root) experienced another kernel > panic: > > Fatal trap 9: general protection fault while in kernel mode > cpuid = 0; apic id = 00 > instruction pointer = 0x20:0xffffffff82299013 > stack pointer = 0x28:0xfffffe0352893ad0 > frame pointer = 0x28:0xfffffe0352893b10 > code segment = base 0x0, limit 0xfffff, type 0x1b > = DPL 0, pres 1, long 1, def32 0, gran 1 > processor eflags = interrupt enabled, resume, IOPL = 0 > current process = 9 (dbuf_evict_thread) > trap number = 9 > panic: general protection fault > cpuid = 0 > KDB: stack backtrace: > #0 0xffffffff80b3d577 at kdb_backtrace+0x67 > #1 0xffffffff80af6b17 at vpanic+0x177 > #2 0xffffffff80af6993 at panic+0x43 > #3 0xffffffff80f77fdf at trap_fatal+0x35f > #4 0xffffffff80f7759e at trap+0x5e > #5 0xffffffff80f5808c at calltrap+0x8 > #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 > #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 > #8 0xffffffff80aba093 at fork_exit+0x83 > #9 0xffffffff80f58fae at fork_trampoline+0xe > > I have used the "crashinfo" utility to (again) generate the text file which > is available at this URL: http://www.ocpea.com/dump/core-2.txt > This is useless because you do not have debug symbols for the kernel. > Does anyone have any idea how we can go about discovering the cause for > this? We would appreciate any suggestion ... -- Andriy Gapon From owner-freebsd-stable@freebsd.org Fri Dec 28 11:08:00 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 777231434EF6 for ; Fri, 28 Dec 2018 11:08:00 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: from mail-it1-x136.google.com (mail-it1-x136.google.com [IPv6:2607:f8b0:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EEC6385E42 for ; Fri, 28 Dec 2018 11:07:58 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: by mail-it1-x136.google.com with SMTP id p197so26770534itp.0 for ; Fri, 28 Dec 2018 03:07:58 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bZDPOoVLXrsyXi5NPDurnbZJSvf/5qymgBNwImlM6gY=; b=khEWECJr8nROOfG8UlOBZmFeHwmAy1cudfp93QCT9Wta93GLarLrouTNSwyg8S+9We rmb/1qIYiY/YuOSPY0xiKlrJIof9lzneflPDi4xcqq8BX41zBNKlbJJzQw/Ak/gOHGfo j5gPqNcLF5wqd5leKL9lypPHRydiCIkNZAetxPmVWfRKus38ezOUY9IxxRl1h0jfv8rl bVovDRTa3He3YlrV6dUsxeMLHVKWlnfbUUR4Wz0c4Jyk8WGd/jdiC9ljoWOpWpUwouB5 xVwULMY8v0DTPc9CKtfKXP9tcKAm/PHDmPjiuYiu9QBoWPY2arsskNWmOuLbRfNvb+nG QVnw== X-Gm-Message-State: AJcUukeI2QDAgPDlYQ7/veN45uYHIp9RSXAxw7fZMDbQV3va7PxQnsSc FxO3eQMS81FPRrcZJsxx2E4rtcDZpRf8VopvWkSZD7u1v9aBfg== X-Google-Smtp-Source: AFSGD/U672RE1+6NP5OPSnksSfkBkNL8S76B4l9Ta25H9akZKXRUff3wUe2KCyMXFmVGZ9mrnjmTkfVUx2Y9xf/pNZ8= X-Received: by 2002:a24:2c50:: with SMTP id i77mr15411416iti.131.1545995278102; Fri, 28 Dec 2018 03:07:58 -0800 (PST) MIME-Version: 1.0 References: <67af7bf5-5fc7-a697-0055-d3518c93b86e@FreeBSD.org> In-Reply-To: <67af7bf5-5fc7-a697-0055-d3518c93b86e@FreeBSD.org> From: =?UTF-8?B?SnVyaWogS292YcSNacSN?= Date: Fri, 28 Dec 2018 12:07:46 +0100 Message-ID: Subject: Re: Kernel panic on 11.2-RELEASE-p7 To: Andriy Gapon Cc: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: EEC6385E42 X-Spamd-Bar: ------ X-Spamd-Result: default: False [-6.04 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[ocpea.com:s=google]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[ocpea.com:+]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[6.3.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; DMARC_POLICY_ALLOW(-0.50)[ocpea.com,reject]; IP_SCORE(-2.20)[ip: (-7.52), ipnet: 2607:f8b0::/32(-1.87), asn: 15169(-1.51), country: US(-0.08)]; NEURAL_HAM_SHORT(-0.83)[-0.834,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 11:08:00 -0000 Hi Andriy, Thank you for your reply. Is what you are suggesting I build and install GENERIC kernel WITH debug symbols? I presume I just update the sources to 11.2 release and build and install the GENERIC kernel with added makeoptions DEBUG=3D-g ? Kind regards, Jurij On Fri, Dec 28, 2018 at 11:34 AM Andriy Gapon wrote: > On 28/12/2018 12:07, Jurij Kova=C4=8Di=C4=8D via freebsd-stable wrote: > > Dear list, > > > > This morning the server mentioned in my previous e-mail (Freebsd > > 11.2-RELEASE-p7 with GENERIC kernel, ZFS root) experienced another kern= el > > panic: > > > > Fatal trap 9: general protection fault while in kernel mode > > cpuid =3D 0; apic id =3D 00 > > instruction pointer =3D 0x20:0xffffffff82299013 > > stack pointer =3D 0x28:0xfffffe0352893ad0 > > frame pointer =3D 0x28:0xfffffe0352893b10 > > code segment =3D base 0x0, limit 0xfffff, type 0x1b > > =3D DPL 0, pres 1, long 1, def32 0, gran 1 > > processor eflags =3D interrupt enabled, resume, IOPL =3D 0 > > current process =3D 9 (dbuf_evict_thread) > > trap number =3D 9 > > panic: general protection fault > > cpuid =3D 0 > > KDB: stack backtrace: > > #0 0xffffffff80b3d577 at kdb_backtrace+0x67 > > #1 0xffffffff80af6b17 at vpanic+0x177 > > #2 0xffffffff80af6993 at panic+0x43 > > #3 0xffffffff80f77fdf at trap_fatal+0x35f > > #4 0xffffffff80f7759e at trap+0x5e > > #5 0xffffffff80f5808c at calltrap+0x8 > > #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 > > #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 > > #8 0xffffffff80aba093 at fork_exit+0x83 > > #9 0xffffffff80f58fae at fork_trampoline+0xe > > > > I have used the "crashinfo" utility to (again) generate the text file > which > > is available at this URL: http://www.ocpea.com/dump/core-2.txt > > > > This is useless because you do not have debug symbols for the kernel. > > > Does anyone have any idea how we can go about discovering the cause for > > this? We would appreciate any suggestion ... > > > > -- > Andriy Gapon > From owner-freebsd-stable@freebsd.org Fri Dec 28 11:31:54 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A950014359D1 for ; Fri, 28 Dec 2018 11:31:54 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: from mail-it1-x133.google.com (mail-it1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9FA0486CD3 for ; Fri, 28 Dec 2018 11:31:53 +0000 (UTC) (envelope-from jurij.kovacic@ocpea.com) Received: by mail-it1-x133.google.com with SMTP id b5so26804134iti.2 for ; Fri, 28 Dec 2018 03:31:53 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XeNNowBaxmfbvBQa2Yaev/9eOAOCh3VSX5nhtW8hR2M=; b=bY5RimsIzUYtgOzpV1R3E9Si7fiz41XhootplOZwpdPFDLL8I6fFgh5pCmHUvcxtVP 5dNRY85E7aXZJtGaQ15Eccb9LiwW/ovU9fVA6QPbbRq9WIp1XUBQzG92YhAUDqw/9oRN AzbFVB9vVKLg+UzSw2zLLKekpWkSAtnsmdd+ECbUMnRUPH/c+wkRY97QeBC+izROmYDu aZ89xKtUcpUuvUDG8SAUULZzk/LUl5rYbS6GWZYmBzKIFUmBNrT5GLEC6crkUtLF/32F 7yBvlmO9qpa4ydk+o5aQ8ELGa3Z8KzIuosIGcsY6idcJRgLER3Z+GywlXOyG8e3kIrWg /HUw== X-Gm-Message-State: AA+aEWbgB7b/FuEusMsEiBG3xrMv8EfS3DOa9EHptrLBQm/3bSUjdV6a 4LtJt0u3c9VUdhbF5mwsTH3YmpSrfHZxFePctlK1fg== X-Google-Smtp-Source: AFSGD/UsdkspvZgZHa92Pb15P+G7eA/kW8pG8ZrN47fj4Nd2VUn00pu02b9ST/b79+T8AQYp5r1iEVIOh/u3gVleO/w= X-Received: by 2002:a02:1dc8:: with SMTP id 191mr17925420jaj.55.1545996712797; Fri, 28 Dec 2018 03:31:52 -0800 (PST) MIME-Version: 1.0 References: <67af7bf5-5fc7-a697-0055-d3518c93b86e@FreeBSD.org> In-Reply-To: From: =?UTF-8?B?SnVyaWogS292YcSNacSN?= Date: Fri, 28 Dec 2018 12:31:41 +0100 Message-ID: Subject: Re: Kernel panic on 11.2-RELEASE-p7 To: Andriy Gapon Cc: freebsd-stable@freebsd.org X-Rspamd-Queue-Id: 9FA0486CD3 X-Spamd-Bar: ------ X-Spamd-Result: default: False [-6.03 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[ocpea.com:s=google]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-stable@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[ocpea.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[ocpea.com,reject]; MX_GOOD(-0.01)[cached: alt1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[3.3.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.63)[-0.635,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; IP_SCORE(-2.38)[ip: (-8.45), ipnet: 2607:f8b0::/32(-1.87), asn: 15169(-1.51), country: US(-0.08)] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 11:31:54 -0000 Hi Andriy, Upon further investigation - I take it the kernel options should probably be: ... makeoptions DEBUG=3D-g options KDB options KDB_UNATTENDED ... ? Thank you! Kind regards, Jurij On Fri, Dec 28, 2018 at 12:07 PM Jurij Kova=C4=8Di=C4=8D wrote: > Hi Andriy, > > Thank you for your reply. > > Is what you are suggesting I build and install GENERIC kernel WITH debug > symbols? > > I presume I just update the sources to 11.2 release and build and install > the GENERIC kernel with added > > makeoptions DEBUG=3D-g ? > > > Kind regards, > > Jurij > > > > On Fri, Dec 28, 2018 at 11:34 AM Andriy Gapon wrote: > >> On 28/12/2018 12:07, Jurij Kova=C4=8Di=C4=8D via freebsd-stable wrote: >> > Dear list, >> > >> > This morning the server mentioned in my previous e-mail (Freebsd >> > 11.2-RELEASE-p7 with GENERIC kernel, ZFS root) experienced another >> kernel >> > panic: >> > >> > Fatal trap 9: general protection fault while in kernel mode >> > cpuid =3D 0; apic id =3D 00 >> > instruction pointer =3D 0x20:0xffffffff82299013 >> > stack pointer =3D 0x28:0xfffffe0352893ad0 >> > frame pointer =3D 0x28:0xfffffe0352893b10 >> > code segment =3D base 0x0, limit 0xfffff, type 0x1b >> > =3D DPL 0, pres 1, long 1, def32 0, gran 1 >> > processor eflags =3D interrupt enabled, resume, IOPL =3D 0 >> > current process =3D 9 (dbuf_evict_thread) >> > trap number =3D 9 >> > panic: general protection fault >> > cpuid =3D 0 >> > KDB: stack backtrace: >> > #0 0xffffffff80b3d577 at kdb_backtrace+0x67 >> > #1 0xffffffff80af6b17 at vpanic+0x177 >> > #2 0xffffffff80af6993 at panic+0x43 >> > #3 0xffffffff80f77fdf at trap_fatal+0x35f >> > #4 0xffffffff80f7759e at trap+0x5e >> > #5 0xffffffff80f5808c at calltrap+0x8 >> > #6 0xffffffff8229c049 at dbuf_evict_one+0xe9 >> > #7 0xffffffff82297a15 at dbuf_evict_thread+0x1a5 >> > #8 0xffffffff80aba093 at fork_exit+0x83 >> > #9 0xffffffff80f58fae at fork_trampoline+0xe >> > >> > I have used the "crashinfo" utility to (again) generate the text file >> which >> > is available at this URL: http://www.ocpea.com/dump/core-2.txt >> > >> >> This is useless because you do not have debug symbols for the kernel. >> >> > Does anyone have any idea how we can go about discovering the cause fo= r >> > this? We would appreciate any suggestion ... >> >> >> >> -- >> Andriy Gapon >> > From owner-freebsd-stable@freebsd.org Fri Dec 28 15:42:51 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id D1DB1143C046 for ; Fri, 28 Dec 2018 15:42:51 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 570188F3B9; Fri, 28 Dec 2018 15:42:51 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id F016455CC; Fri, 28 Dec 2018 15:42:50 +0000 (UTC) (envelope-from gjb@freebsd.org) Date: Fri, 28 Dec 2018 15:42:48 +0000 From: Glen Barber To: David Boyd Cc: freebsd-stable@freebsd.org Subject: Re: Unable to build 12.0-STABLE release Message-ID: <20181228154248.GA80805@FreeBSD.org> References: <221d4f2ca0532980248e9a8b40adc3e491c0d419.camel@twc.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="mYCpIKhGyMATD0i+" Content-Disposition: inline In-Reply-To: <221d4f2ca0532980248e9a8b40adc3e491c0d419.camel@twc.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Queue-Id: 570188F3B9 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-0.996,0]; NEURAL_HAM_SHORT(-0.97)[-0.973,0]; NEURAL_HAM_LONG(-1.00)[-0.997,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 15:42:52 -0000 --mYCpIKhGyMATD0i+ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, Dec 27, 2018 at 11:31:55PM -0500, David Boyd wrote: > While attempting to build 12.0-STABLE release images, the following > error message sequence occurs: >=20 > make[2]: don't know how to make CHECKSUM.SHA512-FreeBSD-12.0-STABLE- > amd64.asc. Stop. >=20 > make[2]: stopped in /usr/doc/en_US.ISO8859-1/htdocs/releases/12.0R > *** Error code 2 >=20 > Stop. > make[1]: stopped in /usr/src/release > *** Error code 1 >=20 > Stop. > make: stopped in /usr/src/release >=20 > The build of 12.0-RELEASE release images was successful. >=20 > The only change made to release.conf.sample was > CHROOTDIR=3D"/u/1/scratch". >=20 > The host is 12.0-RELEASE-p1. >=20 > I don't have a log of the build, but will acquire one if that would be > useful. >=20 I know why it is failing (missing CHECKSUM.*-STABLE*.asc files). Please try again after doc revision r52735, which seems to be the correct fix. Thank you for the report. Glen --mYCpIKhGyMATD0i+ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEjRJAPC5sqwhs9k2jAxRYpUeP4pMFAlwmRHgACgkQAxRYpUeP 4pONJw/+LFbFQ3PDozF0ahiHEvUzT4kK+WpF/FVU4fv7TZ7bU0QyRRQZx3uIPY1m llfWmYtJdGwONT1KQtCY8Vz51SAj64M0RuHXoV2e0OwTAny9ecBUdNZ1SVxAz8fq aWM+tpjq7NbQqfU2yj0w5ijCTzow+YihlC29wd1+M1fE5qsZ+3Wof0y6zefzcs3T QP6wYt8+1Z8xRLhNN+OBAnjsSSwN5vklTEXx/Kidfo7GDLmtsKqEJNLp3FgtLtoL USWAADobDuJs5awZOIsN57aYmSLyy+sHPgjNm+GsXbYUh1LYam3sa4d36n3+JwuM oZj3zL5JNbDwE/xOIgunfHkKpjYO5ZT0a+zI+egwYriBMr/7Q/gGGFFqCheSsygg 42G+hBmasIvENaa+wC10TfOq7tA5RIJ8JwvXNNZzG3cfdJgZ9ga9lXeptgUT0ZC7 oJcqpX3h8081rCEwvNDTGs13FwrKNFVV9pRW3jag67iZlPmy8eIaQU/IbFclZpYk pr8TA9B0+gKT5VduKt/rsjjUsy+d2yQeSzYvg7t4Bm7oqIzc/4V6i4fqXMKF1tzp EI9mhm3Xv25/5ZAMQUMyfwijxuN9SoH7lfmm0DHu26mR8Gt9qi/QEjIlEm0vyFNo XLtv1BlvI5oesVQkIDI5zCPTcLbI+LfXBUscBW3ikoQ+HBjaygA= =xyYi -----END PGP SIGNATURE----- --mYCpIKhGyMATD0i+-- From owner-freebsd-stable@freebsd.org Fri Dec 28 18:05:17 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 12A86141B915 for ; Fri, 28 Dec 2018 18:05:17 +0000 (UTC) (envelope-from david.boyd49@twc.com) Received: from dnvrco-cmomta01.email.rr.com (dnvrco-outbound-snat.email.rr.com [107.14.73.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 289D493E2D; Fri, 28 Dec 2018 18:05:15 +0000 (UTC) (envelope-from david.boyd49@twc.com) Received: from bashful.bsd1.net ([74.138.140.144]) by cmsmtp with ESMTPA id cujYgTexlP088cujbgHPJj; Fri, 28 Dec 2018 16:11:39 +0000 Message-ID: <66a4cb998f0b0efa8f05f200ce39e42d071e620f.camel@twc.com> Subject: Re: Unable to build 12.0-STABLE release From: David Boyd To: Glen Barber Cc: freebsd-stable@freebsd.org Date: Fri, 28 Dec 2018 11:11:36 -0500 In-Reply-To: <20181228154248.GA80805@FreeBSD.org> References: <221d4f2ca0532980248e9a8b40adc3e491c0d419.camel@twc.com> <20181228154248.GA80805@FreeBSD.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-2.el7) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-CMAE-Envelope: MS4wfBjsvRwjejhzpvzvm8/W8kvXxYGQSIwdBDxuzwE1lH2KG79vCFSuSj6FRVCBCteju8yHDtPxkbXdGU+leEZrEanr2RHnEirLZns2C/WL3nZbgZ6juuRk zDUK2Da1KF5Nkd+rwS1RHT5GLmXeTAuMaZKOg9ONcxD61+ojiUEEKzKZWOQCMbAE7apjFsNC8RjA0RfN5gOTQVxk0tjOrZ+otinAyJvNrIqGiey21BCF1AjE X-Rspamd-Queue-Id: 289D493E2D X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david.boyd49@twc.com designates 107.14.73.225 as permitted sender) smtp.mailfrom=david.boyd49@twc.com X-Spamd-Result: default: False [-4.28 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[twc.com]; R_SPF_ALLOW(-0.20)[+ip4:107.14.73.0/24]; MV_CASE(0.50)[]; MX_GOOD(-0.01)[cached: dnvrco-cmedge02.email.rr.com]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.97)[-0.966,0]; RECEIVED_SPAMHAUS_PBL(0.00)[144.140.138.74.zen.spamhaus.org : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[twc.com]; ASN(0.00)[asn:7843, ipnet:107.14.73.0/24, country:US]; MID_RHS_MATCH_FROM(0.00)[]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; IP_SCORE(-1.50)[ipnet: 107.14.73.0/24(-4.13), asn: 7843(-3.30), country: US(-0.08)]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-0.999,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[twc.com]; MIME_TRACE(0.00)[0:+]; RCVD_IN_DNSWL_NONE(0.00)[225.73.14.107.list.dnswl.org : 127.0.5.0]; RCVD_TLS_LAST(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 18:05:17 -0000 On Fri, 2018-12-28 at 15:42 +0000, Glen Barber wrote: > On Thu, Dec 27, 2018 at 11:31:55PM -0500, David Boyd wrote: > > While attempting to build 12.0-STABLE release images, the following > > error message sequence occurs: > > > > make[2]: don't know how to make CHECKSUM.SHA512-FreeBSD-12.0- > > STABLE- > > amd64.asc. Stop. > > > > make[2]: stopped in /usr/doc/en_US.ISO8859-1/htdocs/releases/12.0R > > *** Error code 2 > > > > Stop. > > make[1]: stopped in /usr/src/release > > *** Error code 1 > > > > Stop. > > make: stopped in /usr/src/release > > > > The build of 12.0-RELEASE release images was successful. > > > > The only change made to release.conf.sample was > > CHROOTDIR="/u/1/scratch". > > > > The host is 12.0-RELEASE-p1. > > > > I don't have a log of the build, but will acquire one if that would > > be > > useful. > > > > I know why it is failing (missing CHECKSUM.*-STABLE*.asc > files). Please > try again after doc revision r52735, which seems to be the correct > fix. > > Thank you for the report. > > Glen > Glen, Thanks for the quick reply. I won't be able to give this a try until tomorrow. David. From owner-freebsd-stable@freebsd.org Fri Dec 28 19:15:10 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id AF3A3141F5E8 for ; Fri, 28 Dec 2018 19:15:10 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from mail.nomadlogic.org (mail.nomadlogic.org [140.82.23.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.nomadlogic.org", Issuer "Let's Encrypt Authority X3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id E3820967DE for ; Fri, 28 Dec 2018 19:15:09 +0000 (UTC) (envelope-from pete@nomadlogic.org) Received: from duke.gem.co (cpe-76-175-75-27.socal.res.rr.com [76.175.75.27]) by mail.nomadlogic.org (OpenSMTPD) with ESMTPSA id 011dd01d TLS version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO; Fri, 28 Dec 2018 11:15:07 -0800 (PST) Subject: Re: webcamd vs 12.0-RELEASE-p1 To: =?UTF-8?B?UmHDumw=?= , freebsd-stable@freebsd.org References: <12a1a235-844a-c99e-5afe-2032f0328f48@b2n.org> From: Pete Wright Message-ID: <41f67e69-d796-6ead-e467-1816489d8225@nomadlogic.org> Date: Fri, 28 Dec 2018 11:15:07 -0800 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <12a1a235-844a-c99e-5afe-2032f0328f48@b2n.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Rspamd-Queue-Id: E3820967DE X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of pete@nomadlogic.org designates 140.82.23.70 as permitted sender) smtp.mailfrom=pete@nomadlogic.org X-Spamd-Result: default: False [-5.70 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[27.75.175.76.zen.spamhaus.org : 127.0.0.10]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+mx]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[nomadlogic.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MX_GOOD(-0.01)[cached: mail.nomadlogic.org]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.99)[-0.986,0]; IP_SCORE(-2.40)[ip: (-9.00), ipnet: 140.82.16.0/21(-4.50), asn: 20473(1.58), country: US(-0.08)]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:20473, ipnet:140.82.16.0/21, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Dec 2018 19:15:10 -0000 On 12/28/18 12:42 AM, Raúl wrote: > Hello! > > Trying a logitech c910 usb camera, cuse, webcamd ... pwcview, chromium, > vlc3 ... only greenish stuff, a block puzzle in motion or nothing at > all. Reading about others success on other versions make me think must > be an easy thing to achieve although I've never tried before. > > Anyone successfully using cuse / webcamd on 12.0-RELEASE?. > Any obvious clue I'm missing?. > > Thanks in advance. kind of hard to debug without any logs or configs posted, but i have a working config that supports webRTC websites like zoom.us for example.  i am running 12.0-RELEASE as well.  here is the webcam i have: $ sudo usbconfig|grep Camera ugen0.2: at usbus0, cfg=0 md=HOST spd=HIGH (480Mbps) pwr=ON (500mA) and i have enabled webcamd via rc.conf like so: $ grep webca /etc/rc.conf webcamd_enable="YES" i also load cuse via /boot/loader.conf: $ sudo grep cuse /boot/loader.conf cuse_load="YES" Note, this requires a web browser with support for webRTC, which firefox def supports by default once you grant permissions (iirc chormium also works by default).  I know this isn't super helpful for your rig - i think i have a c910 here i work i can try to reproduce this on later today, but just wanted to check the basics that everything is configured on your end correctly. cheers, -pete -- Pete Wright pete@nomadlogic.org @nomadlogicLA From owner-freebsd-stable@freebsd.org Sat Dec 29 16:20:53 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2C5DA1425020 for ; Sat, 29 Dec 2018 16:20:53 +0000 (UTC) (envelope-from raul@b2n.org) Received: from mail3.custos.es (bohn.b2n.org [212.34.158.159]) by mx1.freebsd.org (Postfix) with ESMTP id A8BC674EFB for ; Sat, 29 Dec 2018 16:20:50 +0000 (UTC) (envelope-from raul@b2n.org) Received: from plank.b2n.org (plank.b2n.org [213.37.4.13]) by mail3.custos.es (Postfix) with ESMTP id 365D5125ED5; Sat, 29 Dec 2018 17:20:43 +0100 (CET) Received: from turing.b2n.org (unknown [10.64.3.2]) by plank.b2n.org (Postfix) with ESMTP id 5A38C55D4C; Sat, 29 Dec 2018 17:20:41 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=b2n.org; s=dkim; t=1546100441; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=FyeVAhUZP13FA5+koOIHBIvyxJlVgsqRW8WtVKOi6rg=; b=l/oDrOzT9WwV8+LLn1otCBayCrEce7Qf6hIrYRbehPh4LetvF2c2sj569vjNbUXW1aDmiL JjMu32t6ik7oacMSHWaLPVVPLKDV+PbvmH03Fb2DVrI5C3X1+ePNZIY77lvWab/EtpvkbW 2wnnt7UOn06zf1M0mSKEIvQeIqoHqpWyZm0R0uCUnUZIw+Kpqtrnh9zvzADZ1b23ZF7nsC 8gR6FWGXrjuCkgYSdHqoFLAkczu1NaDbiBsV1dHoeWlM7K/cRllZpyUKkuqvZIRMRkMhJW V2VOWRDLe8TKGoXQ/5sBna8G8winbV3UsKMX73EDZxHEWVVY0IrwJCdfgM45QQ== Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by turing.b2n.org (Postfix) with ESMTPSA id 20D8D4CFA1; Sat, 29 Dec 2018 17:20:41 +0100 (CET) To: Pete Wright , freebsd-stable@freebsd.org References: <12a1a235-844a-c99e-5afe-2032f0328f48@b2n.org> <41f67e69-d796-6ead-e467-1816489d8225@nomadlogic.org> From: =?UTF-8?B?UmHDumw=?= Openpgp: preference=signencrypt Autocrypt: addr=raul@b2n.org; prefer-encrypt=mutual; keydata= mQINBFns2ZIBEAC7xWTucmdvscBLlryw1xv2opUqexkdusr4cR8lzRn+KOUmpDoibIK4C0In PPY157sWviEwCx24Hs+e664vwx6xD7zQ7ttVE30t+bm4iVqdxyIDMdgEbWOcTpYRjhRIGGpX BeBt+eYw+uE519bXHJZJJGcIzUU6Wk9fghx8RHMb5IEg4+9rsyCnEznE8u8AfJTgeOdA4h0h EweHjOFJdn6i+3r1KZlwFMIUFBo+q8ldHVzjPZGGSjguW62GgYMFn5uiYxpqTkKqD9FwrRlz n41QIOzE8o6jJfF/r4py1EiHwOTfvrrCNOA5cJXFrTsmCTj8dAySEThlxfSKQED0uPZVaegL 8KDvJ56oR9U6YE86fTdn713TvukVWeK58ZjgF/kQMymTjFFbe2IeG/QkxjWbcHb8EpLNXtIL HFX0+sezFnhKJrfGyq4jqWqWp8suzzhgQBNSQxkHNuQADabHJ13VH6qqIeC0UGUtUjEwxznh 51uyh0APK+7xhSc4+JKcVZcK7xkhY04wPT4x/dn2IbwCXewTMHROqo4oWP2ajN4bTOte1tot ZUbeLgPdr9iZrTSdt63lnTTbAxnXAxxBc/q8hVsiWM9SfOIkZ0kGeNA8NlrubcuXQzTJHy2h JhmLSuLfUaGZcr+F/3KtohTvshy2291/ruM8ExMUSDd3wb96fwARAQABtCxSYcO6bCBNdcOx b3ogLSBDVVNUT1MgPHJhdWwubXVub3pAY3VzdG9zLmVzPokCPwQTAQIAKQUCWezZkgIbIwUJ CWYBgAcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJELKl4+9JDtBb750P/1d/rU1Ngc94 rVL2vqDEijJdFYEZbzE96MugnwCEdJ8Al/6mWbD4vaPIuuuW+TE8dMPItcUv1vq8D/wX8NSs OS5FNu7XfGpjjxOKdUpLLoiGbJC4AbhMZhvdpvWQQAk5szCzGT+nYPve7Ut6SyWtZPYwWM+K o5CNyRu838jfGhm6G8CvaLJHcrMBlA87OBkQi4tzT+NIBBp0U8vGXV8z6LlpI/EGXLgSJPnO pFn8PL6tXZ1uiI+AXVJT+emdB68InejcHgFrwoowZBLzXllGPH4pYVZ1h9pPARoPCmSlCe4x g+ELKvkogatQM4BXuzRGiYCVJDBqgFoRDDd/dnmsCb5DV0xWSlmpWPy06e9C8PwCI3NmukCh mq2ic74mAo9lKTv8VVc9czushKagVQhYPT3o6DHOCFJeoXvaQWIOprpAkcf5nz15SjeZWFqW EzF8+0LUocGLDLMaDkWBBruJuQfz8V3ktDdXkEv55sgrbf/98sGdIz3aOSrLy3Rop3m3shnM Uua1XpE6Fv+6g8owSI15k8bd0lmsq83/YYW2hN0vQWn/HR7xTwpA9fZh4stxJRJAHAJ7nQ/u SJkp2+NVOn9ZImKqegqqmn+amnkRsSunM1fe/i2GVsgKzkOlyDiLotUk8JU6t741kIJscGfW 8y1uC2Cf7T1tHdQsG4Hq1+C/uQINBFns2ZIBEACv+REqRGM1e6CuNil4Kim3Bi5RTXXx2/JJ dCC5W0ZsEoynoQ31RJ+3nu9OGDGzmEL+2fMVxvKiomXnwq6xZmhb6HFw03e/lOfYEEMm1hjj 23Dw9gNO3Dy5j1o3vzOWPOQwZpsE2vG0XE3ZfZ+Rg1b3SIe1R7w0nnzDAjznpYuG6WEYGFr9 r7IDouLqgBeR1i4B4M+7E8FLql06pyxF4plcJ1KSf++SNZf0arFuLzGZh9aA6L4OQ3eIqBg0 VqId8GiO6cz1t68dpOuwlt/HEcA3tCL15IIhKxQyWAU3S4yM/KBSXXGW2OI+EebFrBxYXySA IByYogpq795uiZ6gBDtQDvx1A8WHMy/7nDnXwJ9XTKzpjIFjKH0Gi/IpvxD1Aci/JbCzB76w iTA4Hbdw0iiZFUN3Wby5eVvkOBA5G+uaLJH10nyIZAe1IszaCxK+3sad6bVd2FsD7qmVHovq iLrjEa+p36kZB/Aeqm+Xwnwss32cOT3GZ6Cgs3ZYBwLJcPo+hhV9JXn7j8nt4tfJr5wm/HDN 4LgUKhUxTWrTS+iTbMtQ9NQdY4QrnB8Qa5E9mEeuZgorZCIrQm1D6MaoEX6fJ8yTru82EavX 9geX58VlFNcK32Ys1Ox0gsg6bX3CRRdAX42X4byuGGkkFwANULSCtepqbm9HO7FbGjkzNtO/ TQARAQABiQIlBBgBAgAPBQJZ7NmSAhsMBQkJZgGAAAoJELKl4+9JDtBbHaYP+wXvUGqFdxea O3Ec2WAFDzSS7EnLWAxrEHkKCIpVKYQ0TlYTd9HS2aGZ0oVJA3vNezJ3j8yusylNO9wWWIdX JQ5hrgzvEYzvb1hpo65CUsK954scz8lmh+Wh2bx728PssQsbL2gCiUJsLD6IDm9Q7374Ztsb sd1Qg+G7TmU2VQrVMo7eA3hGeNCcmiZH3zxHF8L2q1IEbo11/GaDzg9E53/lkd2+gizSD2PG OabRmIRAY7pUDjn54trQy/5fxNq0idyUUZYe6UbhE7UhpWAEdnU2Hp8bVyeJDMM6HiV7Apqg SuGcmGMYfBlNd+itjJk4MFYoIij+UiryCHfWwO8+bELyffDgHEcoVsgbL7Nn6TXoH6QjuMD2 cjGXoKplCV5jxTQJAd5/vnczlTbDA30UOwcje02r4mMh3vLaYeLNJ0Z8RCh09o7IeGskmwy4 849V5LoX3/TRKDnCf+rK7v08SEhb5QeUZ2GUwyEEby67TEmKE5LmQRj1gPnrH3Wlx2BkS/pS Y3k2cGEtoSYF3gUIec2VvzG52VSMJIOZZDcgscwvubJdRdvNPhGApWPgT8ZDfeafgJz/tRg/ hj6Zeln2xKBxgVKY/dJJouCJZdTOE6lB9vRJyCveVSi+uDu3G8idTON5cRLEy/acpBE8n0Ve noPvPYKoN8z5Hsw8DRyWVkxU Subject: Re: webcamd vs 12.0-RELEASE-p1 Message-ID: <57c91b06-776d-0a01-ca4d-1457ee340f90@b2n.org> Date: Sat, 29 Dec 2018 17:20:39 +0100 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0 MIME-Version: 1.0 In-Reply-To: <41f67e69-d796-6ead-e467-1816489d8225@nomadlogic.org> Content-Type: text/plain; charset=utf-8 Content-Language: es-ES Content-Transfer-Encoding: 8bit X-Rspamd-Queue-Id: A8BC674EFB X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=b2n.org header.s=dkim header.b=l/oDrOzT; dmarc=pass (policy=none) header.from=b2n.org; spf=pass (mx1.freebsd.org: domain of raul@b2n.org designates 212.34.158.159 as permitted sender) smtp.mailfrom=raul@b2n.org X-Spamd-Result: default: False [-7.65 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[b2n.org:s=dkim]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+a:bohn.b2n.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; IP_SCORE(-3.75)[ip: (-9.91), ipnet: 212.34.128.0/19(-4.95), asn: 20648(-3.96), country: ES(0.05)]; RCVD_COUNT_THREE(0.00)[4]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[b2n.org:+]; RCPT_COUNT_TWO(0.00)[2]; RCVD_IN_DNSWL_NONE(0.00)[159.158.34.212.list.dnswl.org : 127.0.10.0]; MX_GOOD(-0.01)[kepler.b2n.org,plank.b2n.org]; DMARC_POLICY_ALLOW(-0.50)[b2n.org,none]; NEURAL_HAM_SHORT(-0.98)[-0.982,0]; RCVD_NO_TLS_LAST(0.10)[]; RECEIVED_SPAMHAUS_PBL(0.00)[13.4.37.213.zen.spamhaus.org : 127.0.0.11]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:20648, ipnet:212.34.128.0/19, country:ES]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Dec 2018 16:20:53 -0000 Hello Pete, El 28/12/18 a las 20:15, Pete Wright escribió: > kind of hard to debug without any logs or configs posted, but i have a > working config that supports webRTC websites like zoom.us for example.  > i am running 12.0-RELEASE as well.  here is the webcam i have: so must be something on my box I've tried on linux and reinstalled FreeBSD again. This time, used config files instead of dynamically kldload cuse and start webcamd ... devd fires webcamd and I'm member of group webcamd. Tried with quarterlie's webcamd pkg, it looks unstable from vlc3 but works for a while before hung. Now I'm trying whit using 'latest' pkg.cof binaries. Some happen with the camera mic ... [....] Dec 29 13:54:30 ram-ws kernel: uaudio0 on uhub2 Dec 29 13:54:30 ram-ws kernel: uaudio0: on usbus0 Dec 29 13:54:30 ram-ws kernel: uaudio0: No playback. Dec 29 13:54:30 ram-ws kernel: uaudio0: Record: 32000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 13:54:30 ram-ws kernel: uaudio0: Record: 24000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 13:54:30 ram-ws kernel: uaudio0: Record: 16000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 13:54:30 ram-ws kernel: uaudio0: No MIDI sequencer. Dec 29 13:54:30 ram-ws kernel: pcm7: on uaudio0 Dec 29 13:54:30 ram-ws kernel: uaudio0: No HID volume keys found. [...] Dec 29 14:11:57 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:11:57 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:11:59 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:11:59 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:12:01 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:12:01 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:12:03 ram-ws kernel: pcm7: unregister: mixer busy [...] Dec 29 14:11:57 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:11:57 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:11:59 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:11:59 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:12:01 ram-ws kernel: pcm7: unregister: mixer busy Dec 29 14:12:01 ram-ws kernel: pcm7: Waiting for sound application to exit! Dec 29 14:12:03 ram-ws kernel: pcm7: unregister: mixer busy [...] Dec 29 14:22:14 ram-ws devd[3345]: notify_[...]clients: send() failed; dropping unresponsive client Dec 29 14:22:14 ram-ws syslogd: last message repeated 1 times Dec 29 14:22:14 ram-ws kernel: pcm7: detached Dec 29 14:22:14 ram-ws kernel: uaudio0: detached Dec 29 14:22:16 ram-ws kernel: ugen0.2: at usbus0 Dec 29 14:22:16 ram-ws kernel: uaudio0 on uhub2 Dec 29 14:22:16 ram-ws kernel: uaudio0: on usbus0 Dec 29 14:22:16 ram-ws kernel: uaudio0: No playback. Dec 29 14:22:16 ram-ws kernel: uaudio0: Record: 32000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 14:22:16 ram-ws kernel: uaudio0: Record: 24000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 14:22:16 ram-ws kernel: uaudio0: Record: 16000 Hz, 2 ch, 16-bit S-LE PCM format, 2x8ms buffer. Dec 29 14:22:16 ram-ws kernel: uaudio0: No MIDI sequencer. Dec 29 14:22:16 ram-ws kernel: pcm7: on uaudio0 Dec 29 14:22:16 ram-ws kernel: uaudio0: No HID volume keys found. [....] I'll look for information about the mic. It would be great to know if you are able to make your c910 work. Thanks a lot Pete. Cheers, Raúl. From owner-freebsd-stable@freebsd.org Sat Dec 29 14:36:57 2018 Return-Path: Delivered-To: freebsd-stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id ED16D1421A4F for ; Sat, 29 Dec 2018 14:36:56 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 6BDD470E02 for ; Sat, 29 Dec 2018 14:36:56 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 2CB9B1421A4E; Sat, 29 Dec 2018 14:36:56 +0000 (UTC) Delivered-To: stable@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E616D1421A4D for ; Sat, 29 Dec 2018 14:36:55 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5174570E01 for ; Sat, 29 Dec 2018 14:36:53 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id wBTEajKI077290 for ; Sat, 29 Dec 2018 14:36:45 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id wBTEajTe077289 for stable@freebsd.org; Sat, 29 Dec 2018 06:36:45 -0800 (PST) (envelope-from david) Date: Sat, 29 Dec 2018 06:36:45 -0800 From: David Wolfskill To: stable@freebsd.org Subject: "Sample size of one," but a possibly-interesting comparison Message-ID: <20181229143645.GG22302@albert.catwhisker.org> Reply-To: stable@freebsd.org Mail-Followup-To: stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="y+KtxNjwEe4Q3Zyh" Content-Disposition: inline User-Agent: Mutt/1.11.1 (2018-12-01) X-Rspamd-Queue-Id: 5174570E01 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 198.144.209.73 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-4.05 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[stable@freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:198.144.209.73]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[stable@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; DMARC_NA(0.00)[catwhisker.org]; MX_GOOD(-0.01)[mx.catwhisker.org]; NEURAL_HAM_SHORT(-0.96)[-0.958,0]; RCVD_IN_DNSWL_NONE(0.00)[73.209.144.198.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:7961, ipnet:198.144.192.0/19, country:US]; RCVD_TLS_LAST(0.00)[]; IP_SCORE(-3.68)[ip: (-9.73), ipnet: 198.144.192.0/19(-4.77), asn: 7961(-3.82), country: US(-0.08)]; REPLYTO_EQ_TO_ADDR(5.00)[] X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 29 Dec 2018 14:36:57 -0000 --y+KtxNjwEe4Q3Zyh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable My build machine tracks head, as well as recent stable (since 12 was branched, stable/11 and stable/12), running a GENERIC kernel to do so. As described in , each of the three branches boots from its own slice on the same physical machine; the boot drive is an SSD. On weekends, it also uses poudriere to build local packages for installation on my "production" machines during their weekly updates (Sunday morning). Since the end of October, these poudriere runs have included stable/12 (as well as stable/11). After finishing the poudriere run from stable/12, I notcied that its summary output showed that the same number of packages had been built as for stable/11 -- not surprising, of course. A further check showed that the same set of packages was built in each case, so I thought I'd share this mini-comparison as a bit of a reality check: [11amd64-ports-home] [2018-12-29_11h44m22s] [committing:] Queued: 106 Built= : 106 Failed: 0 Skipped: 0 Ignored: 0 Tobuild: 0 Time: 01:06:00 [12amd64-ports-home] [2018-12-29_13h02m24s] [committing:] Queued: 106 Built= : 106 Failed: 0 Skipped: 0 Ignored: 0 Tobuild: 0 Time: 01:05:31 I don't suggest drawing many conclusions from this, except perhaps to note that in this environment, stable/11 and stable/12 seems to be roughly comparable at first glance (both in ability to build the packages and in performance). (Information on recent FreeBSD (vs. packages/ports) builds, as well as dmesg output, may be found at .) Peace, david --=20 David H. Wolfskill david@catwhisker.org Beyond some threshold, should presidential lies become impeachable offenses? See http://www.catwhisker.org/~david/publickey.gpg for my public key. --y+KtxNjwEe4Q3Zyh Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlwnhn1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 Pcn49Af+NfXnCn4q4epeyO9anAX83wtO4zC4mBfXmNQG0AdtI4z7Oga5f++FlOVX v2LzvtucW6wjQLcg62XX1iZYa8s1V79lwLlKhaKKIbdfJ6lidoB3dlzErsLgQAQ6 nKEl9kb+anYiyCGqCwqm3LZJa4n5yXrdjK89W2jmSSkiqVubgr/N4efsHTuN+9cm /BvOpJELiYJz1Dg89QL/IWNkSuKCHMspZLcZ7FkHAqPziQSHB804NpmhKG1RGCay SDypbC+O172iVpKAh20DQmr/32wGUAeYZjubtZxgkvCsi/rYWE2MW9VGLN34+Me3 4ekUrP5P0oWGqcyDSZwDEyVU+PkM0g== =Ov2P -----END PGP SIGNATURE----- --y+KtxNjwEe4Q3Zyh--