From owner-svn-doc-head@freebsd.org Sun Jan 26 10:03:02 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 53618237C2E; Sun, 26 Jan 2020 10:03:02 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4857jf1R7wz3Kb6; Sun, 26 Jan 2020 10:03:02 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 2C2851F6AC; Sun, 26 Jan 2020 10:03:02 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QA32pw039350; Sun, 26 Jan 2020 10:03:02 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QA31Wv039348; Sun, 26 Jan 2020 10:03:01 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261003.00QA31Wv039348@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:03:01 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53818 - in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Commit-Revision: 53818 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:03:02 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:03:01 2020 New Revision: 53818 URL: https://svnweb.freebsd.org/changeset/doc/53818 Log: handbook: document freebsd-mobile list removal Submitted by: core@ Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sat Jan 25 19:19:19 2020 (r53817) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:03:01 2020 (r53818) @@ -455,11 +455,6 @@ - &a.mobile.name; - Discussions about mobile computing - - - &a.mono.name; Mono and C# applications on &os; Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sat Jan 25 19:19:19 2020 (r53817) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:03:01 2020 (r53818) @@ -318,10 +318,6 @@ FreeBSD mirror site administrators"> mirror-announce"> - -FreeBSD laptop computer mailing list"> -freebsd-mobile"> - Mono and C# applications on FreeBSD"> freebsd-mono"> From owner-svn-doc-head@freebsd.org Sun Jan 26 10:12:54 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id DAB9923812B; Sun, 26 Jan 2020 10:12:54 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4857x25XNmz3LMh; Sun, 26 Jan 2020 10:12:54 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B94931F879; Sun, 26 Jan 2020 10:12:54 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QACswv045920; Sun, 26 Jan 2020 10:12:54 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QACsFl045918; Sun, 26 Jan 2020 10:12:54 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261012.00QACsFl045918@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:12:54 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53819 - in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Commit-Revision: 53819 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:12:54 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:12:54 2020 New Revision: 53819 URL: https://svnweb.freebsd.org/changeset/doc/53819 Log: Undo handbook because of build problem Submitted by: pi Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:03:01 2020 (r53818) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:12:54 2020 (r53819) @@ -455,6 +455,11 @@ + &a.mobile.name; + Discussions about mobile computing + + + &a.mono.name; Mono and C# applications on &os; Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:03:01 2020 (r53818) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:12:54 2020 (r53819) @@ -318,6 +318,10 @@ FreeBSD mirror site administrators"> mirror-announce"> + +FreeBSD laptop computer mailing list"> +freebsd-mobile"> + Mono and C# applications on FreeBSD"> freebsd-mono"> From owner-svn-doc-head@freebsd.org Sun Jan 26 10:27:01 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 333E0238431; Sun, 26 Jan 2020 10:27:01 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4858FK0Jwgz3LkQ; Sun, 26 Jan 2020 10:27:01 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E0CA91FA42; Sun, 26 Jan 2020 10:27:00 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QAR03R051839; Sun, 26 Jan 2020 10:27:00 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QAR0TJ051836; Sun, 26 Jan 2020 10:27:00 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261027.00QAR0TJ051836@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:27:00 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53820 - in head/en_US.ISO8859-1: books/faq books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/faq books/handbook/eresources share/xml X-SVN-Commit-Revision: 53820 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:27:01 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:27:00 2020 New Revision: 53820 URL: https://svnweb.freebsd.org/changeset/doc/53820 Log: handbook: document freebsd-mobile list removal, second attempt Submitted by: core@ Modified: head/en_US.ISO8859-1/books/faq/book.xml head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/faq/book.xml ============================================================================== --- head/en_US.ISO8859-1/books/faq/book.xml Sun Jan 26 10:12:54 2020 (r53819) +++ head/en_US.ISO8859-1/books/faq/book.xml Sun Jan 26 10:27:00 2020 (r53820) @@ -1407,7 +1407,7 @@ took place just last week. Before purchasing a laptop, check the archives for - &a.mobile; and &a.questions;, or possibly a specific + &a.questions;, or possibly a specific mailing list for a particular hardware type. Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:12:54 2020 (r53819) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:27:00 2020 (r53820) @@ -455,11 +455,6 @@ - &a.mobile.name; - Discussions about mobile computing - - - &a.mono.name; Mono and C# applications on &os; Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:12:54 2020 (r53819) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:27:00 2020 (r53820) @@ -318,10 +318,6 @@ FreeBSD mirror site administrators"> mirror-announce"> - -FreeBSD laptop computer mailing list"> -freebsd-mobile"> - Mono and C# applications on FreeBSD"> freebsd-mono"> From owner-svn-doc-head@freebsd.org Sun Jan 26 10:43:46 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 295DB238A46; Sun, 26 Jan 2020 10:43:46 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4858cf00CWz3MSV; Sun, 26 Jan 2020 10:43:46 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id EF3161FDF3; Sun, 26 Jan 2020 10:43:45 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QAhjVW063319; Sun, 26 Jan 2020 10:43:45 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QAhjD6063318; Sun, 26 Jan 2020 10:43:45 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261043.00QAhjD6063318@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:43:45 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53821 - head/en_US.ISO8859-1/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: head/en_US.ISO8859-1/share/xml X-SVN-Commit-Revision: 53821 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:43:46 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:43:45 2020 New Revision: 53821 URL: https://svnweb.freebsd.org/changeset/doc/53821 Log: handbook: document freebsd-ia64 list removal Submitted by: core@ Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:27:00 2020 (r53820) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:43:45 2020 (r53821) @@ -270,10 +270,6 @@ FreeBSD IA32 porting mailing list"> freebsd-ia32"> - -FreeBSD IA64 porting mailing list"> -freebsd-ia64"> - Infiniband on FreeBSD"> freebsd-infiniband"> From owner-svn-doc-head@freebsd.org Sun Jan 26 10:48:32 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 60175238B6C; Sun, 26 Jan 2020 10:48:32 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4858k81ptFz3MXm; Sun, 26 Jan 2020 10:48:32 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 34FCD1FDF6; Sun, 26 Jan 2020 10:48:32 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QAmWvY063602; Sun, 26 Jan 2020 10:48:32 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QAmVGh063601; Sun, 26 Jan 2020 10:48:31 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261048.00QAmVGh063601@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:48:31 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53822 - in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Commit-Revision: 53822 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:48:32 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:48:31 2020 New Revision: 53822 URL: https://svnweb.freebsd.org/changeset/doc/53822 Log: handbook: document freebsd-ia32 list removal Submitted by: core@ Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:43:45 2020 (r53821) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:48:31 2020 (r53822) @@ -405,12 +405,6 @@ - &a.ia32.name; - &os; on the IA-32 (&intel; x86) - platform - - - &a.infiniband.name; Infiniband on &os; Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:43:45 2020 (r53821) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:48:31 2020 (r53822) @@ -266,10 +266,6 @@ FreeBSD i386-specific issues mailing list"> freebsd-i386"> - -FreeBSD IA32 porting mailing list"> -freebsd-ia32"> - Infiniband on FreeBSD"> freebsd-infiniband"> From owner-svn-doc-head@freebsd.org Sun Jan 26 10:54:25 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0B1F9238F40; Sun, 26 Jan 2020 10:54:25 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4858rw6ZL6z3NG1; Sun, 26 Jan 2020 10:54:24 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DC6781FFC9; Sun, 26 Jan 2020 10:54:24 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QAsOQn069728; Sun, 26 Jan 2020 10:54:24 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QAsOcW069726; Sun, 26 Jan 2020 10:54:24 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261054.00QAsOcW069726@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 10:54:24 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53823 - in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Commit-Revision: 53823 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 10:54:25 -0000 Author: pi (ports committer) Date: Sun Jan 26 10:54:24 2020 New Revision: 53823 URL: https://svnweb.freebsd.org/changeset/doc/53823 Log: handbook: document freebsd-afs list removal Submitted by: core@ Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:48:31 2020 (r53822) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:54:24 2020 (r53823) @@ -218,11 +218,6 @@ - &a.afs.name; - Porting AFS to &os; - - - &a.amd64.name; Porting &os; to AMD64 systems (moderated) @@ -1051,17 +1046,6 @@ ACPI and power management development - - - - - &a.afs.name; - - - Andrew File System - - This list is for discussion on porting and using - AFS from CMU/Transarc Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:48:31 2020 (r53822) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:54:24 2020 (r53823) @@ -16,10 +16,6 @@ FreeBSD advocacy mailing list"> freebsd-advocacy"> - -FreeBSD AFS porting mailing list"> -freebsd-afs"> - FreeBSD Adaptec AIC7xxx discussions mailing list"> freebsd-aic7xxx"> From owner-svn-doc-head@freebsd.org Sun Jan 26 11:00:03 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4BC3F239127; Sun, 26 Jan 2020 11:00:03 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4858zR1KlJz3NNh; Sun, 26 Jan 2020 11:00:03 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0EEC01FFDE; Sun, 26 Jan 2020 11:00:03 +0000 (UTC) (envelope-from pi@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QB0236070116; Sun, 26 Jan 2020 11:00:02 GMT (envelope-from pi@FreeBSD.org) Received: (from pi@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QB02GH070112; Sun, 26 Jan 2020 11:00:02 GMT (envelope-from pi@FreeBSD.org) Message-Id: <202001261100.00QB02GH070112@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pi set sender to pi@FreeBSD.org using -f From: Kurt Jaeger Date: Sun, 26 Jan 2020 11:00:02 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53824 - in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: pi X-SVN-Commit-Paths: in head/en_US.ISO8859-1: books/handbook/eresources share/xml X-SVN-Commit-Revision: 53824 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 11:00:03 -0000 Author: pi (ports committer) Date: Sun Jan 26 11:00:02 2020 New Revision: 53824 URL: https://svnweb.freebsd.org/changeset/doc/53824 Log: handbook: document freebsd-small list removal Submitted by: core@ Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml head/en_US.ISO8859-1/share/xml/mailing-lists.ent Modified: head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 10:54:24 2020 (r53823) +++ head/en_US.ISO8859-1/books/handbook/eresources/chapter.xml Sun Jan 26 11:00:02 2020 (r53824) @@ -582,12 +582,6 @@ - &a.small.name; - Using &os; in embedded applications - (obsolete; use &a.embedded.name; instead) - - - &a.snapshots.name; &os; Development Snapshot Announcements @@ -1957,26 +1951,6 @@ Notifications of &os; security problems and fixes. This is not a discussion list. The discussion list is FreeBSD-security. - - - - - &a.small.name; - - - Using &os; in embedded - applications - - This list discusses topics related to unusually - small and embedded &os; installations. This is a - technical mailing list for which strictly technical - content is expected. - - - This list has been obsoleted by - &a.embedded.name;. - - Modified: head/en_US.ISO8859-1/share/xml/mailing-lists.ent ============================================================================== --- head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 10:54:24 2020 (r53823) +++ head/en_US.ISO8859-1/share/xml/mailing-lists.ent Sun Jan 26 11:00:02 2020 (r53824) @@ -427,10 +427,6 @@ FreeBSD security notifications mailing list"> freebsd-security-notifications"> - -FreeBSD-small mailing list"> -freebsd-small"> - FreeBSD Development Snapshot Announcements"> freebsd-snapshots"> From owner-svn-doc-head@freebsd.org Sun Jan 26 11:25:44 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id C2A9A239C13; Sun, 26 Jan 2020 11:25:44 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4859Y44HWKz3Pst; Sun, 26 Jan 2020 11:25:44 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 8E4C720566; Sun, 26 Jan 2020 11:25:44 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QBPiJN087977; Sun, 26 Jan 2020 11:25:44 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QBPiI2087976; Sun, 26 Jan 2020 11:25:44 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <202001261125.00QBPiI2087976@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sun, 26 Jan 2020 11:25:44 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53825 - head/de_DE.ISO8859-1/books/handbook/boot X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/boot X-SVN-Commit-Revision: 53825 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 11:25:44 -0000 Author: bhd Date: Sun Jan 26 11:25:44 2020 New Revision: 53825 URL: https://svnweb.freebsd.org/changeset/doc/53825 Log: Update to r53816: VESA_LOAD is loaded by default in the FreeBSD kernel so we can remove this advice from our handbook Modified: head/de_DE.ISO8859-1/books/handbook/boot/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/boot/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/boot/chapter.xml Sun Jan 26 11:00:02 2020 (r53824) +++ head/de_DE.ISO8859-1/books/handbook/boot/chapter.xml Sun Jan 26 11:25:44 2020 (r53825) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/boot/chapter.xml,v 1.63 2012/04/22 20:05:15 bcr Exp $ - basiert auf: r52851 + basiert auf: r53816 --> - - Damit größere Bilder bis zu einer maximalen Auflösung von - 1024 mal 768 Pixeln verwendet werden können, muss das - VESA Modul beim Systemstart geladen werden. - Für einen angepassten Kernel, wie in beschrieben, muss die - VESA-Kernelkonfigurationsoption eingefügt - werden. Um das VESA-Modul für den - Willkommensbildschirm zu laden, fügen Sie zusätzlich zu den - Zeilen aus den vorherigen Beispielen, folgende Zeile in - /boot/loader.conf ein: - - vesa_load="YES" Weitere interessante Optionen für loader.conf sind: From owner-svn-doc-head@freebsd.org Sun Jan 26 13:07:43 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7348923D8E4; Sun, 26 Jan 2020 13:07:43 +0000 (UTC) (envelope-from carlavilla@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 485Cpl2RMXz41FC; Sun, 26 Jan 2020 13:07:43 +0000 (UTC) (envelope-from carlavilla@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4EBE7217DF; Sun, 26 Jan 2020 13:07:43 +0000 (UTC) (envelope-from carlavilla@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QD7hnA048107; Sun, 26 Jan 2020 13:07:43 GMT (envelope-from carlavilla@FreeBSD.org) Received: (from carlavilla@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QD7hD8048106; Sun, 26 Jan 2020 13:07:43 GMT (envelope-from carlavilla@FreeBSD.org) Message-Id: <202001261307.00QD7hD8048106@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: carlavilla set sender to carlavilla@FreeBSD.org using -f From: Sergio Carlavilla Delgado Date: Sun, 26 Jan 2020 13:07:43 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53826 - head/en_US.ISO8859-1/books/handbook/zfs X-SVN-Group: doc-head X-SVN-Commit-Author: carlavilla X-SVN-Commit-Paths: head/en_US.ISO8859-1/books/handbook/zfs X-SVN-Commit-Revision: 53826 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 13:07:43 -0000 Author: carlavilla Date: Sun Jan 26 13:07:42 2020 New Revision: 53826 URL: https://svnweb.freebsd.org/changeset/doc/53826 Log: Update links on ZFS additional resources PR: 222441 Submitted by: frank.ebert@freenet.de Path by: carlavilla@ Approved by: bcr@(mentor) Differential Revision: https://reviews.freebsd.org/D23358 Modified: head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Modified: head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml ============================================================================== --- head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Sun Jan 26 11:25:44 2020 (r53825) +++ head/en_US.ISO8859-1/books/handbook/zfs/chapter.xml Sun Jan 26 13:07:42 2020 (r53826) @@ -3455,20 +3455,14 @@ vfs.zfs.vdev.cache.size="5M" - FreeBSD - Wiki - ZFS + OpenZFS FreeBSD Wiki - ZFS Tuning - - - - Illumos - Wiki - ZFS From owner-svn-doc-head@freebsd.org Sun Jan 26 13:49:47 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id BDD9F23EB53; Sun, 26 Jan 2020 13:49:47 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 485DlH5PWDz434r; Sun, 26 Jan 2020 13:49:47 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id B465021F33; Sun, 26 Jan 2020 13:49:47 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00QDnlts072223; Sun, 26 Jan 2020 13:49:47 GMT (envelope-from trasz@FreeBSD.org) Received: (from trasz@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00QDnlAu072222; Sun, 26 Jan 2020 13:49:47 GMT (envelope-from trasz@FreeBSD.org) Message-Id: <202001261349.00QDnlAu072222@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: trasz set sender to trasz@FreeBSD.org using -f From: Edward Tomasz Napierala Date: Sun, 26 Jan 2020 13:49:47 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53827 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head X-SVN-Commit-Author: trasz X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/news/status X-SVN-Commit-Revision: 53827 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 26 Jan 2020 13:49:47 -0000 Author: trasz Date: Sun Jan 26 13:49:47 2020 New Revision: 53827 URL: https://svnweb.freebsd.org/changeset/doc/53827 Log: Create 2019Q4 quarterly status report, covering October 2019 - December 2019. Submitted by: salvadore@ Differential Revision: https://reviews.freebsd.org/D23256 Added: head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml (contents, props changed) Modified: head/en_US.ISO8859-1/htdocs/news/status/Makefile Modified: head/en_US.ISO8859-1/htdocs/news/status/Makefile ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/Makefile Sun Jan 26 13:07:42 2020 (r53826) +++ head/en_US.ISO8859-1/htdocs/news/status/Makefile Sun Jan 26 13:49:47 2020 (r53827) @@ -85,6 +85,7 @@ XMLDOCS+= report-2018-09-2018-12 XMLDOCS+= report-2019-01-2019-03 XMLDOCS+= report-2019-04-2019-06 XMLDOCS+= report-2019-07-2019-09 +XMLDOCS+= report-2019-10-2019-12 XSLT.DEFAULT= report.xsl Added: head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml Sun Jan 26 13:49:47 2020 (r53827) @@ -0,0 +1,1721 @@ + + + + + + + + + + 10-12 + + 2019 + + +
+ Introduction +

Here is the last quarterly status report for 2019. As you + might remember + from last report, we changed our timeline: now we collect + reports the last + month of each quarter and we edit and publish the full + document the next + month. Thus, we cover here the period October 2019 - + December 2019.

+

If you thought that the FreeBSD community was less active + in the + Christmas' quarter you will be glad to be proven wrong: a + quick glance at + the summary will be sufficient to see that much work has + been done in the + last months.

+

Have a nice read!

+

-- Lorenzo Salvadore

+
+ + + team + + &os; Team Reports + +

Entries from the various official and semi-official teams, + as found in the Administration + Page.

+
+ + + proj + + Projects + +

Projects that span multiple categories, from the kernel and userspace + to the Ports Collection or external projects.

+
+ + + kern + + Kernel + +

Updates to kernel subsystems/features, driver support, + filesystems, and more.

+
+ + + arch + + Architectures + +

Updating platform-specific features and bringing in support + for new hardware platforms.

. +
+ + + bin + + Userland Programs + +

Changes affecting the base system and programs in it.

+
+ + + ports + + Ports + +

Changes affecting the Ports Collection, whether sweeping + changes that touch most of the tree, or individual ports + themselves.

+
+ + + third + + Third-Party Projects + +

Many projects build upon &os; or incorporate components of + &os; into their project. As these projects may be of interest + to the broader &os; community, we sometimes include brief + updates submitted by these projects in our quarterly report. + The &os; project makes no representation as to the accuracy or + veracity of any claims in these submissions.

+
+ FreeBSD Core Team + FreeBSD Core Team + core@FreeBSD.org + + + +

The FreeBSD Core Team is the governing body of FreeBSD.

+
  • Julie Saravanos, the sister of Bruce D. Evans (bde), + mailed core with the sad + news that Bruce passed away on 2019-12-18 at the age of 68 + years. Bruce was a + deeply respected member of the community, served on the + Core team, and made + over 5,000 commits. Bruce's impact on our culture was so + profound that new + terminology was spawned. This is an excerpt of a message + from Poul-Henning + Kamp to Julie. +
    +

    + I don't know precisely when I first communicated with + Bruce, it was in the + late 1980'ies via "UseNET", but I can say with certainty + that few people + have inspired me more, or improved my programming more, + than Bruce he did + over the next half of my life.

    +

    All large projects invent its own vocabulary and in + FreeBSD two of the + neologisms are "Brucification", and "Brucified".

    +

    A "brucification" meant receiving a short, courteous note + pointing out a + sometimes subtle deficiency, or an overlooked detail in a + source code + change. Not necessarily a serious problem, possibly not + even a problem to + anybody at all, but nonetheless something which was wrong + and ought to be + fixed. It was not uncommon for the critique to be + considerably longer + than the change in question.

    +

    If one ignored brucifications one ran the risk of being + "brucified", which + meant receiving a long and painstakingly detailed list of + every single one + of the errors, mistakes, typos, shortcomings, bad + decisions, questionable + choices, style transgressions and general sloppiness of + thinking, often + expressed with deadpan humor sharpened to a near-fatal + point.

    +

    The most frustrating thing was that Bruce would be + perfectly justified and + correct. I can only recall one or two cases where I were + able to respond + "Sorry Bruce, but you're wrong there..." - and I confess + that on those + rare days I felt like I should cut a notch in my keyboard.

    +

    The last email we received from Bruce is a good example of + the depth of + knowledge and insight he provided for the project:

    +

    + https://docs.freebsd.org/cgi/getmsg.cgi?fetch=1163414+0+archive/2019/svn-src-all/20191027.svn-src-all

    +
    +
  • +
  • The 12.1 release was dedicated to another FreeBSD + developer who passed away in + the fourth quarter of 2019, Kurt Lidl. The FreeBSD + Foundation has a memorial + page to Kurt. +

    + + https://www.freebsdfoundation.org/blog/in-memory-of-kurt-lidl/

    +

    We send our condolences to both the families of Bruce and + Kurt.

  • +
  • Core has documented The Project's policy on support tiers. +

    + + https://www.freebsd.org/doc/en_US.ISO8859-1/articles/committers-guide/archs.html

  • +
  • Core approved a source commit bit for James Clarke. Brooks + Davis (brooks) + will mentor James and John Baldwin (jhb) will co-mentor.
  • +
  • The Project's first Season of Docs ended with a negative + result. The work was + not completed and contact could not be established with + the writer. No + payment was made and the financing was set aside for + future work.
  • +
  • Google Summer of Code completed. Information about the + seven accepted + projects can be found on the wiki page. +

    + https://wiki.freebsd.org/SummerOfCode2019Projects

  • +
  • Adam Weinberger (admaw) was added to conduct@. Adam has + demonstrated + competence, understanding, and fairness in personal + matters.
  • +
  • Li-Wen Hsu (lwhsu) contacted Core after receiving a report + from concerned + local community members about past updates to The + Project's + internationalization policy. Lengthy discussions took + place to determine how + to reaffirm that The Project maintains a neutral position + in political + disputes. Updates were made to the document and it was + decided that any + future changes would require explicit Core approval. +

    + https://www.freebsd.org/internal/i18n.html

  • +
  • After nomination by Edward NapieraÅ‚a (trasz), core voted + to grant Daniel + Ebdrup (debdrup) and Lorenzo Salvadore (salvadore) + membership in The Project. + Both Daniel and Lorenzo have been working on the quarterly + reports for the + past few quarters.
  • +
  • The Core-initiated Git Transition Working Group continued + to meet over the + last quarter of 2019. Their report is still forthcoming.
+ +
+FreeBSD Foundation + Deb Goodkin + deb@FreeBSDFoundation.org + + + +

The FreeBSD Foundation is a 501(c)(3) non-profit + organization dedicated to + supporting and promoting the FreeBSD Project and community + worldwide. Funding + comes from individual and corporate donations and is used + to fund and manage + software development projects, conferences and developer + summits, and provide + travel grants to FreeBSD contributors. The Foundation + purchases and supports + hardware to improve and maintain FreeBSD infrastructure + and provides resources + to improve security, quality assurance, and release + engineering efforts; + publishes marketing material to promote, educate, and + advocate for the FreeBSD + Project; facilitates collaboration between commercial + vendors and FreeBSD + developers; and finally, represents the FreeBSD Project in + executing contracts, + license agreements, and other legal arrangements that + require a recognized + legal entity.

+

Here are some highlights of what we did to help FreeBSD + last quarter:

+

Partnerships and Commercial User Support

+

We help facilitate collaboration between commercial users + and FreeBSD + developers. We also meet with companies to discuss their + needs and bring that + information back to the Project. In Q4, Ed Maste and Deb + Goodkin met with a + few commercial users in the US. It's not only beneficial + for the above, but it + also helps us understand some of the applications where + FreeBSD is used. We + were also able to meet with a good number of commercial + users at the Bay Area + Vendor/Developer Summit and Open Source Summit Europe. + These venues provide an + excellent opportunity to meet with commercial and + individual users and + contributors to FreeBSD.

+

Fundraising Efforts

+

In 2019, we focused on supporting a few key areas where + the Project needed the + most help. The first area was software development. + Whether it was contracting + FreeBSD developers to work on projects like wifi support, + to providing internal + staff to quickly implement hardware workarounds, we've + stepped in to help keep + FreeBSD innovative, secure, and reliable. Software + development includes + supporting the tools and infrastructure that make the + development process go + smoothly, and we're on it with team members heading up the + Continuous + Integration efforts, and actively involved in the + clusteradmin and security + teams.

+

Our advocacy efforts focused on recruiting new users and + contributors to the + Project. We attended and participated in 38 conferences + and events in 21 + countries. From giving FreeBSD presentations and workshops + to staffing tables, + we were able to have 1:1 conversations with thousands of + attendees.

+

Our travels also provided opportunities to talk directly + with FreeBSD + commercial and individual users, contributors, and future + FreeBSD + users/contributors. We've seen an increase in use and + interest in FreeBSD from + all of these organizations and individuals. These meetings + give us a chance to + learn more about what organizations need and what they and + other individuals + are working on. The information helps inform the work we + should fund.

+

In 2019, your donations helped us continue our efforts of + supporting critical + areas of FreeBSD such as:

+
  • Operating System Improvements: Providing staff to + immediately respond to + urgent problems and implement new features and + functionality allowing for + the innovation and stability you've come to rely on.
  • +
  • Improving and increasing test coverage, continuous + integration, and automated + testing with a full-time software engineer to ensure you + receive the highest + quality, secure, and reliable operating system.
  • +
  • Security: Providing engineering resources to bolster the + capacity and + responsiveness of the Security team providing you with + peace of mind when + security issues arise.
  • +
  • Growing the number of FreeBSD contributors and users from + our global FreeBSD + outreach and advocacy efforts, including expanding into + regions such as + China, India, Africa, and Singapore.
  • +
  • Offering FreeBSD workshops and presentations at more + conferences, meetups, + and universities around the world.
  • +
  • Providing opportunities such as developer and vendor + summits and company + visits to help facilitate collaboration between commercial + users and FreeBSD + developers, as well as helping to get changes pushed into + the FreeBSD source + tree, and creating a bigger and healthier ecosystem.
+

+ We've accomplished a lot this year, but we are still only + a small 501(c)3 + organization focused on supporting FreeBSD and not a trade + organization like + many other open source Foundations.

+

Please consider making + a donation + at https://www.FreeBSDfoundation.org/donate/ to help us + continue and increase + our support for FreeBSD.

+

We also have the Partnership Program, to provide more + benefits for our larger + commercial donors. + Find out more information at + + https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-program/ + and share with your companies!

+

OS Improvements

+

The Foundation supports software development projects to + improve FreeBSD + through our full time technical staff, contractors, and + project grant + recipients. They maintain and improve critical kernel + subsystems, add new + features and functionality, and fix bugs.

+

Between October and December there were 236 commits to the + FreeBSD source + repository tagged with FreeBSD Foundation sponsorship. + This is about 10% + of all commits during this period. Some of these projects + have their own + entries in the quarterly report, and are not repeated + here, while others + are briefly described below.

+

As usual, Foundation staff member Konstantin Belousov + committed a large + number of UFS, NFS, tmpfs, VM system, and low-level Intel + x86 bug fixes and + improvements. Kostik also committed improvements to the + run-time linker + (rtld), and participated in very many code reviews, + helping to get changes + from other developers integrated into the tree.

+

Following on from his work to improve debugging tools in + the Linuxulator + environment, Edward Napierała integrated the Linux Test + Project (LTP) with + FreeBSD's CI system, and committed a number of small bug + fixes to the + Linuxulator itself.

+

Mark Johnston continued working on infrastructure for the + Syzkaller system + call fuzzing tool, and committed fixes for many issues + identified by it. + Mark committed improvements to RISC-V infrastructure, the + network stack, + performance and locking, and x86 pmap.

+

Mark also added support for newer Intel WiFi chipsets to + the iwm driver, + enabling WiFi support for the Lenovo X1 Carbon 7th + generation, and other + contemporary laptops.

+

Ed Maste committed a number of improvements and cleanups + in build + infrastructure, vt console fixes including issues with + keyboard maps, + some blacklistd updates, documentation updates, and other + small changes. + Ed also committed some work to prepare for the removal of + GCC 4.2.1 from + the FreeBSD source tree, currently planned for Q1 2020.

+

Continuous Integration and Quality Assurance

+

The Foundation provides a full-time staff member who is + working on improving + our automated testing, continuous integration, and overall + quality assurance + efforts.

+

During the fourth quarter of 2019, Foundation staff + continued to improve the + project's CI infrastructure, worked with contributors to + fix the failing build + and test cases. We worked with other teams in the project + for their testing + needs and also worked with many external projects and + companies to improve + their support of FreeBSD. We added several new CI jobs and + brought the + FreeBSD Hardware + Testing Lab online.

+

We published + 2019 + in Review: CI and Testing Advancements + on the Foundation's blog.

+

See the FreeBSD CI section of this report for completed + work items and detailed + information.

+

Supporting FreeBSD Infrastructure

+

The Foundation provides hardware and support to improve + the FreeBSD + infrastructure. Last quarter, we continued supporting + FreeBSD hardware located + around the world.

+

FreeBSD Advocacy and Education

+

A large part of our efforts are dedicated to advocating + for the Project. This + includes promoting work being done by others with FreeBSD; + producing advocacy + literature to teach people about FreeBSD and help make the + path to starting + using FreeBSD or contributing to the Project easier; and + attending and helping + other FreeBSD contributors volunteer to run FreeBSD + events, staff FreeBSD + tables, and give FreeBSD presentations.

+

The FreeBSD Foundation sponsors many conferences, events, + and summits around the globe. These events can be + BSD-related, open source, or technology events + geared towards underrepresented groups. We support + the FreeBSD-focused events to help provide a venue + for sharing knowledge, to work together on + projects, and to facilitate collaboration between + developers and commercial users. This all helps + provide a healthy ecosystem. We support the + non-FreeBSD events to promote and raise awareness + of FreeBSD, to increase the use of FreeBSD in + different applications, and to recruit more + contributors to the Project.

+

+ Check out some of the advocacy and education work we did + last quarter:

+
  • Organized the 2019 Bay Area FreeBSD Vendor and Developers + Summit + in Santa Clara, CA
  • +
  • Presented at COSCON '19 in Shanghai, China
  • +
  • Represented FreeBSD at All Things Open 2019, in Raleigh, + North Carolina
  • +
  • Industry Partner Sponsor for LISA '19 in Portland, OR
  • +
  • Silver Sponsor of OpenZFS in San Francisco, CA
  • +
  • Gave a technical presentation at School of Mines in + Golden, CO
  • +
  • Presenting and representing FreeBSD at Seagl, in Seattle, + WA
  • +
  • Presented at Open Source Summit Europe in Lyon France
  • +
  • Committed to sponsoring LinuxConfAu 2020, in Gold Coast, + Australia in + addition to holding a FreeBSD Mini-Conf
  • +
  • Accepted to present at the BSD Dev Room at FOSDEM '20, in + Brussels, Belgium
  • +
  • Accepted to have a stand at FOSDEM '20, in Brussels, + Belgium
  • +
  • Committed to sponsoring FOSSASIA 2020, in Singapore
  • +
  • Committed to hold FreeBSD Day at SCALE 18x, in Pasadena, + CA
+

+ We continued producing FreeBSD advocacy material to help + people promote + FreeBSD. Learn more about our efforts in 2019 to advocate + for FreeBSD: + + https://www.freebsdfoundation.org/blog/2019-in-review-advocacy/

+

Our Faces of FreeBSD series is back. Check out the latest + post: Mahdi Mokhtari. + + https://www.freebsdfoundation.org/blog/faces-of-freebsd-2019-mahdi-mokhtari/

+

Read more about our conference adventures in the + conference recaps and trip + reports in our monthly newsletters: + + https://www.freebsdfoundation.org/news-and-events/newsletter/

+

We help educate the world about FreeBSD by publishing the + professionally + produced FreeBSD Journal. As we mentioned previously, the + FreeBSD Journal is + now a free publication. Find out more and access the + latest issues at + https://www.FreeBSDfoundation.org/journal/.

+

You can find out more about events we attended and + upcoming events at + https://www.FreeBSDfoundation.org/news-and-events/.

+

We have continued our work with a new website developer to + help us improve our + website. Work has begun to make it easier for community + members to find + information more easily and to make the site more + efficient.

+

Legal/FreeBSD IP

+

The Foundation owns the FreeBSD trademarks, and it is our + responsibility to + protect them. We also provide legal support for the core + team to investigate + questions that arise.

+

Go to http://www.FreeBSDfoundation.org to find out how we + support FreeBSD and + how we can help you!

+ +
+FreeBSD Release Engineering Team + FreeBSD Release Engineering Team + re@FreeBSD.org + + + + + FreeBSD 12.1-RELEASE schedule + FreeBSD 12.1-RELEASE announcement + FreeBSD development snapshots + + +

The FreeBSD Release Engineering Team is responsible for + setting + and publishing release schedules for official project + releases + of FreeBSD, announcing code freezes and maintaining the + respective branches, among other things.

+

The FreeBSD Release Engineering Team continued work on the + 12.1-RELEASE, which + started September 6th. This release cycle was the first + "freeze-less" release + from the Subversion repository, and the test bed for + eliminating the requirement + of a hard code freeze on development branches.

+

The 12.1-RELEASE cycle concluded with the final build + beginning November 4th, + preceded by three BETA builds and two RC builds. The RC3 + build had been + included in the original schedule, but had been decided to + not be required.

+

Additionally throughout the quarter, several development + snapshots builds + were released for the head, + stable/12, and + stable/11 branches.

+

Much of this work was sponsored by Rubicon Communications, + LLC (netgate.com) + and the FreeBSD Foundation.

+ +
+Cluster Administration Team + Cluster Administration Team + clusteradm@FreeBSD.org + + + + + Cluster Administration Team members + + +

The FreeBSD Cluster Administration Team consists of the + people responsible for administering the machines + that the Project relies on for its distributed + work and communications to be synchronised. In + this quarter, the team has worked on the + following:

+
  • Upgrade ref11-{amd64,i386}.freebsd.org to 11.3-STABLE + r353313
  • +
  • Ongoing systems administration work:
  • +
  • Creating accounts for new committers.
  • +
  • Backups of critical infrastructure.
  • +
  • Keeping up with security updates in 3rd party software.
+

+ Work in progress:

+
  • Review the service jails and service administrators + operation.
  • +
  • South Africa Mirror (JINX) in progress.
  • +
  • NVME issues on PowerPC64 Power9 blocking dual socket + machine from being used as pkg builder.
  • +
  • Drive upgrade test for pkg builders (SSDs) courtesy of the + FreeBSD Foundation.
  • +
  • Boot issues with Aarch64 reference machines.
  • +
  • New NYI.net sponsored colocation space in Chicago-land + area.
  • +
  • Setup new host for CI staging environment.
  • +
  • Plan how to add new semi-official pkg mirrors
+ +
+Continuous Integration + Jenkins Admin + jenkins-admin@FreeBSD.org + + + Li-Wen Hsu + lwhsu@FreeBSD.org + + + + + FreeBSD Jenkins Instance + FreeBSD Hardware Testing Lab + FreeBSD CI artifact archive + FreeBSD CI weekly report + freebsd-testing Mailing List + FreeBSD Jenkins wiki + Hosted CI wiki + 3rd Party Software CI + Tickets related to freebsd-testing@ + FreeBSD CI Repository + + +

The FreeBSD CI team maintains continuous integration + system and related tasks + for the FreeBSD project. The CI system regularly checks + the committed changes + can be successfully built, then performs various tests and + analysis of the + results. The results from build jobs are archived in an + artifact server, for + the further testing and debugging needs. The CI team + members examine the + failing builds and unstable tests, and work with the + experts in that area to + fix the code or adjust test infrastructure. The details + are of these efforts + are available in the weekly CI + reports.

+

During the fourth quarter of 2019, we worked with the + contributors and + developers in the project for their testing needs and also + worked with many + external projects and companies to improve their support + of FreeBSD. The + FreeBSD Hardware + Testing Lab is online in this + quarter. It's still in work in progress stage and we are + merging the different + versions and will integrate more tightly to the main CI + server. We are also + working on make this work more easierly to be reproduced.

+

Work in progress:

+
  • Collecting and sorting CI tasks and ideas at + https://hackmd.io/bWCGgdDFTTK_FG0X7J1Vmg
  • +
  • Setup the CI stage environment and put the experimental + jobs on it
  • +
  • Implementing automatic tests on bare metal hardware
  • +
  • Adding drm ports building test against -CURRENT
  • +
  • Testing and merging pull requests at + https://github.com/freebsd/freebsd-ci/pulls
  • +
  • Planning for running ztest and network stack tests
  • +
  • Helping more 3rd software get CI on FreeBSD through a + hosted CI solution
  • +
  • Adding LTP test jobs.
  • +
  • Adding non-x86 test jobs.
  • +
  • Adding external toolchin related jobs.
+

+ Please see freebsd-testing@ related tickets for more WIP + information.

+ + + + The FreeBSD Foundation + +
+IPSec Extended Sequence Number (ESN) support + Patryk Duda + pdk@semihalf.com + + + Marcin Wojtas + mw@semihalf.com + + + +

Extended Sequence Number (ESN) is IPSec extension defined + in RFC4303 + Section 2.2.1. + It makes possible to implement high-speed IPSec + implementations where standard, 32-bit sequence + number is not sufficent. + Key feature of the ESN is that only low order 32 bits of + sequence number are transmitted over the wire. + High-order 32 bits are maintained by sender and receiver. + Additionally high-order bits are included in the + computation of Integrity Check Value (ICV) field.

+

Extended Sequence Number support contains following:

+
  • Modification of existing anti-replay algorithm to fulfil + ESN requirements
  • +
  • Trigger soft lifetime expiration at 80% of UINT32_MAX + when ESN is disabled
  • +
  • Implement support for including ESN into ICV in cryptosoft + engine in both + encrypt and authenticate mode (eg. AES-CBC and SHA256 + HMAC) and combined + mode (eg. AES-GCM)
  • +
  • Implement support for including ESN into ICV in AES-NI + engine in both + encrypt and authenticate mode and combined mode
+

+ Remaining work:

+
  • Upstream patches of the anti-replay algorithm
  • +
  • Adjust implementation of crypto part after the reworked + Open Crypto Framework gets stable
+

+ + + + Stormshield + +
+NFS Version 4.2 implementation + Rick Macklem + rmacklem@freebsd.org + + + +

RFC-7862 describes a new minor revision to the NFS Version + 4 protocol. + This project implements this new minor revision.

+

The NFS Version 4 Minorversion 2 protocol adds several + optional + features to NFS, such as support for SEEK_DATA/SEEK_HOLE, + file + copying done on the server that avoids data transfer over + the wire + and support for posix_fallocate(), posix_fadvise(). + Hopefully these features can improve performance for + certain applications.

+

This project has basically been completed. The code + changes have now + all been committed to head/current and should be released + in FreeBSD 13.

+

Testing by others would be appreciated. To do testing, an + up to date + head/current system is required. Client mounts need the + "minorversion=2" mount option to enable this protocol. + The NFS server will have NFSv4.2 enabled by default.

+ +
+DTS Update + Emmanuel Vadot + manu@FreeBSD.org + + + +

DTS files (Device Tree Sources) were updated to be on par + with Linux 5.4 for + HEAD and 5.2 for the 12-STABLE branch. + The DTS for the RISC-V architecture are now imported as + well.

+ +
+RockChip Support + + freebsd-arm@FreeBSD.Org + + + Emmanuel Vadot + manu@FreeBSD.Org + + + Michal Meloun + mmel@FreeBSD.Org + + + +

RockChip RK3399 now has USB3 support, some configuration + such as device mode + are still not supported however host mode should work on + any board.

+

Support for SPI has been committed which enables ability + to interact with SPI + flash if present.

+

All regulators for the RK808 PMIC (Power Management IC) + have been added.

+

All clocks are now supported which completes clock and + reset implementation, + previously only clocks from devices with drivers were + supported.

+

The TS-ADC (Temperature Sensor ADC) is now supported, this + adds the ability + to read temperature of the CPU and GPU via sysctl + hw.temperature .

+

Initial PCIe support has been committed and verified + working on several + different boards. + Known working devices are NVMe devices and PCIe cards that + doesn't utilize PCIe + switching or bridge functionality.

+

Card Detection for SDCard on RK3328 and RK3399 is now + supported. There is still + some problems if the board is using a GPIO for CD instead + of the internal detection + mechanism.

+ +
+Creating virtual FreeBSD appliances from RE VMDK images + Oleksandr Tymoshenko + gonzo@FreeBSD.org + + + + + freebsd-mkova + + +

OVA is a file format for packaging and distributing + virtual appliances: pre-configured virtual machine + images. Virtual appliance file contains full VM + information like the number of CPUs, amount of + memory, list of virtual devices, it also includes + disk images. Applications like VirtualBox or + VMWare can import OVA files; this process can be + easily automated.

+

freebsd-mkova is a CLI tool to create OVA files using VMDK + images provided by FreeBSD RE. For now, only a + limited set of attributes can be specified: VM + name, number of CPU, amount of memory, and disk + size. The tool also does only cursory sanity + checks on the VMDK file format, assuming it's a + monolithic sparse file and that it has to be + converted to the stream-optimized format. The + script can be extended to make hardware + configuration more flexible and VMDK parser more + robust.

+ +
+SoC audio framework and RK3399 audio drivers + Oleksandr Tymoshenko + gonzo@FreeBSD.org + + + + + rk3399_audio + + +

Most modern SoCs and devboards have audio support in one + form or another, but it's one of the areas that + are overlooked by FreeBSD driver developers. The + most common architecture for the audio pipeline on + a single-board computer consists of two DAIs + (digital audio interfaces): CPU and codec, + connected by a serial bus.

+

CPU DAI is a SoC IP block that operates with samples: + obtains them from the driver for playback or + provides them to the driver for recording through + FIFOs or DMA requests. Audio samples leave (or + arrive at) the SoC through a serial bus, usually + I2S, that is connected to Codec DAI.

+

Codec DAI is an external (to the SoC) chip that packs one + or more DAC/ADC blocks along with mixers, + amplifiers, and probably more specialized devices + like filters and/or sound effects. The analog part + of the codec is connected to + microphones/headphones/speakers. On SBCs, the + codec usually communicates with SoC through two + interfaces: data path, over which audio samples + travel, and a control interface that is used to + read/write chip registers and configure its + behavior. The most common choices for these are + I2S and I2C buses, respectively.

+

For FDT-enabled devices, an audio pipeline is described as + a virtual DTB node that has links to the CPU and + codec device(s), and which specifies the data + format, and clock details that both the CPU and + the codec chips would use. It also may have more + than one CPU/codec pair.

+

Using Firefly-RK3399 as a test device, I was able to + implement I2S driver for RK3399 SoC (PIO mode, + playback only), the driver for Realtek's RT5640 + chip (headphones playback only + mixer controls) + and a base outline of SoC audio framework. Some + bits of rk_i2s and the framework were + ported from the NetBSD code developed by Jared + McNeill. On my WIP branch, I can play mp3 audio + and control playback volume.

+

The primary missing functionalities at the moment are + recording support, multi-link audio cards, DMA + support. The most critical among these is DMA + support. In the current implementation, all buffer + management is placed at the ausoc layer, which is + not going to work for DMA, because only the CPU + DAI driver would know about the memory constraints + and access mechanisms. The current state of RK3399 + support does not allow to implement DMA transfers + for rk_i2s easily, but I plan to look + into this right after adding recording support, + which should not be a lot of work.

+ +
+FreeBSD on Microsoft HyperV and Azure + FreeBSD Integration Services Team + bsdic@microsoft.com + + + Wei Hu + whu@FreeBSD.org + + + Li-Wen Hsu + lwhsu@FreeBSD.org + + + + + FreeBSD on MicrosoftAzure wiki + FreeBSD on Microsoft HyperV + + +

Wei is working on HyperV Socket support for FreeBSD. + HyperV Socket provides a way for host and guest to + communicate using common socket interfaces without + networking support. Some features in Azure require + HyperV Socket support in guest.

+

It is planned to commit the code by the end of February.

+

This project is sponsored by Microsoft. Details of HyperV + Socket is available at + https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/user-guide/make-integration-service

+

Li-Wen and Wei are working on improving FreeBSD release on + Azure. During this quarter, Wei has published the + 11.3-RELEASE + on Azure. Li-Wen is working on the FreeBSD + release codes related to Azure for the -CURRENT + and 12-STABLE branches.

+

This project is sponsored by Microsoft and FreeBSD + Foundation.

+ +
+FreeBSD on EC2 ARM64 + Colin Percival + cperciva@FreeBSD.org + + + + + FreeBSD/ARM 12 in AWS Marketplace + FreeBSD/EC2 Patreon + M6G vs M5 buildworld cost/time performance + + +

In November 2018, Amazon Web Services announced the first + Elastic *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@freebsd.org Mon Jan 27 00:00:21 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id B49D6228916; Mon, 27 Jan 2020 00:00:21 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 485VHn3lNvz4dyS; Mon, 27 Jan 2020 00:00:21 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 79D7111FC; Mon, 27 Jan 2020 00:00:21 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00R00LlU046698; Mon, 27 Jan 2020 00:00:21 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00R00KUT046695; Mon, 27 Jan 2020 00:00:20 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <202001270000.00R00KUT046695@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Mon, 27 Jan 2020 00:00:20 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53828 - in head/en_US.ISO8859-1/htdocs/releases: 12.0R/hardware 12.1R/hardware 12.2R/hardware X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: in head/en_US.ISO8859-1/htdocs/releases: 12.0R/hardware 12.1R/hardware 12.2R/hardware X-SVN-Commit-Revision: 53828 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2020 00:00:21 -0000 Author: gjb Date: Mon Jan 27 00:00:20 2020 New Revision: 53828 URL: https://svnweb.freebsd.org/changeset/doc/53828 Log: Fix build. Sponsored by: Rubicon Communications, LLC (netgate.com) Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/hardware/hardware.xml head/en_US.ISO8859-1/htdocs/releases/12.1R/hardware/hardware.xml head/en_US.ISO8859-1/htdocs/releases/12.2R/hardware/hardware.xml Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/hardware/hardware.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/hardware/hardware.xml Sun Jan 26 13:49:47 2020 (r53827) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/hardware/hardware.xml Mon Jan 27 00:00:20 2020 (r53828) @@ -238,9 +238,7 @@ as sound, graphics, power management, and PCCARD expansion slots. These features tend to vary in idiosyncratic ways between machines, and frequently require special-case support - in &os; to work around hardware bugs or other oddities. When - in doubt, a search of the archives of the &a.mobile; may be - useful. + in &os; to work around hardware bugs or other oddities. Most modern laptops (as well as many desktops) use the Advanced Configuration and Power Management (ACPI) standard. Modified: head/en_US.ISO8859-1/htdocs/releases/12.1R/hardware/hardware.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.1R/hardware/hardware.xml Sun Jan 26 13:49:47 2020 (r53827) +++ head/en_US.ISO8859-1/htdocs/releases/12.1R/hardware/hardware.xml Mon Jan 27 00:00:20 2020 (r53828) @@ -239,9 +239,7 @@ as sound, graphics, power management, and PCCARD expansion slots. These features tend to vary in idiosyncratic ways between machines, and frequently require special-case support - in &os; to work around hardware bugs or other oddities. When - in doubt, a search of the archives of the &a.mobile; may be - useful. + in &os; to work around hardware bugs or other oddities. Most modern laptops (as well as many desktops) use the Advanced Configuration and Power Management (ACPI) standard. Modified: head/en_US.ISO8859-1/htdocs/releases/12.2R/hardware/hardware.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.2R/hardware/hardware.xml Sun Jan 26 13:49:47 2020 (r53827) +++ head/en_US.ISO8859-1/htdocs/releases/12.2R/hardware/hardware.xml Mon Jan 27 00:00:20 2020 (r53828) @@ -240,9 +240,7 @@ as sound, graphics, power management, and PCCARD expansion slots. These features tend to vary in idiosyncratic ways between machines, and frequently require special-case support - in &os; to work around hardware bugs or other oddities. When - in doubt, a search of the archives of the &a.mobile; may be - useful. + in &os; to work around hardware bugs or other oddities. Most modern laptops (as well as many desktops) use the Advanced Configuration and Power Management (ACPI) standard. From owner-svn-doc-head@freebsd.org Mon Jan 27 15:16:31 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7927C1F8E4C; Mon, 27 Jan 2020 15:16:31 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 485tcv2h2xz4TW2; Mon, 27 Jan 2020 15:16:31 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5752CBFFD; Mon, 27 Jan 2020 15:16:31 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00RFGVbV003896; Mon, 27 Jan 2020 15:16:31 GMT (envelope-from trasz@FreeBSD.org) Received: (from trasz@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00RFGVMx003895; Mon, 27 Jan 2020 15:16:31 GMT (envelope-from trasz@FreeBSD.org) Message-Id: <202001271516.00RFGVMx003895@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: trasz set sender to trasz@FreeBSD.org using -f From: Edward Tomasz Napierala Date: Mon, 27 Jan 2020 15:16:31 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53829 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head X-SVN-Commit-Author: trasz X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/news/status X-SVN-Commit-Revision: 53829 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2020 15:16:31 -0000 Author: trasz Date: Mon Jan 27 15:16:30 2020 New Revision: 53829 URL: https://svnweb.freebsd.org/changeset/doc/53829 Log: Publish the 2019Q4 status report. Modified: head/en_US.ISO8859-1/htdocs/news/status/status.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/status.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/status.xml Mon Jan 27 00:00:20 2020 (r53828) +++ head/en_US.ISO8859-1/htdocs/news/status/status.xml Mon Jan 27 15:16:30 2020 (r53829) @@ -13,8 +13,8 @@ -

Next Quarterly Status Report submissions (October – - December) due: January 1st, 2020

+

Next Quarterly Status Report submissions (January – + March) due: April 1st, 2020

Submit your entries as Pull Requests from your fork of FreeBSD @@ -58,6 +58,8 @@

2019

    +
  • October, 2019 - + December, 2019
  • July, 2019 - September, 2019
  • April, 2019 - From owner-svn-doc-head@freebsd.org Mon Jan 27 15:21:30 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5F8361F9180; Mon, 27 Jan 2020 15:21:30 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 485tkf1w9Nz4TtY; Mon, 27 Jan 2020 15:21:30 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3D126C066; Mon, 27 Jan 2020 15:21:30 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00RFLU4v008158; Mon, 27 Jan 2020 15:21:30 GMT (envelope-from trasz@FreeBSD.org) Received: (from trasz@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00RFLUhr008157; Mon, 27 Jan 2020 15:21:30 GMT (envelope-from trasz@FreeBSD.org) Message-Id: <202001271521.00RFLUhr008157@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: trasz set sender to trasz@FreeBSD.org using -f From: Edward Tomasz Napierala Date: Mon, 27 Jan 2020 15:21:30 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53830 - head/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: trasz X-SVN-Commit-Paths: head/share/xml X-SVN-Commit-Revision: 53830 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2020 15:21:30 -0000 Author: trasz Date: Mon Jan 27 15:21:29 2020 New Revision: 53830 URL: https://svnweb.freebsd.org/changeset/doc/53830 Log: Add 2019Q4 status report to the newsflash. Modified: head/share/xml/news.xml Modified: head/share/xml/news.xml ============================================================================== --- head/share/xml/news.xml Mon Jan 27 15:16:30 2020 (r53829) +++ head/share/xml/news.xml Mon Jan 27 15:21:29 2020 (r53830) @@ -34,6 +34,18 @@ 1 + 27 + + + October-December 2019 Status Report + +

    The October + to December 2019 Status Report is now available.

    + + + + 21 From owner-svn-doc-head@freebsd.org Mon Jan 27 20:22:40 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 783D322D229; Mon, 27 Jan 2020 20:22:40 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4861Q82bYvz47rY; Mon, 27 Jan 2020 20:22:40 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 3A3D3FB20; Mon, 27 Jan 2020 20:22:40 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00RKMe9x019358; Mon, 27 Jan 2020 20:22:40 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00RKMdHb019355; Mon, 27 Jan 2020 20:22:39 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <202001272022.00RKMdHb019355@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Mon, 27 Jan 2020 20:22:39 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53831 - in head/fr_FR.ISO8859-1/htdocs: gnome news/status X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: in head/fr_FR.ISO8859-1/htdocs: gnome news/status X-SVN-Commit-Revision: 53831 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 27 Jan 2020 20:22:40 -0000 Author: gjb Date: Mon Jan 27 20:22:39 2020 New Revision: 53831 URL: https://svnweb.freebsd.org/changeset/doc/53831 Log: Attempt to fix a silent build failure. Approved by: doceng (implicit) Sponsored by: Rubicon Communications, LLC (netgate.com) Modified: head/fr_FR.ISO8859-1/htdocs/gnome/index.xsl head/fr_FR.ISO8859-1/htdocs/gnome/newsflash.xsl head/fr_FR.ISO8859-1/htdocs/news/status/report.xsl Modified: head/fr_FR.ISO8859-1/htdocs/gnome/index.xsl ============================================================================== --- head/fr_FR.ISO8859-1/htdocs/gnome/index.xsl Mon Jan 27 15:21:29 2020 (r53830) +++ head/fr_FR.ISO8859-1/htdocs/gnome/index.xsl Mon Jan 27 20:22:39 2020 (r53831) @@ -24,7 +24,7 @@ &title; - +
    &nav.gnome;
    Modified: head/fr_FR.ISO8859-1/htdocs/gnome/newsflash.xsl ============================================================================== --- head/fr_FR.ISO8859-1/htdocs/gnome/newsflash.xsl Mon Jan 27 15:21:29 2020 (r53830) +++ head/fr_FR.ISO8859-1/htdocs/gnome/newsflash.xsl Mon Jan 27 20:22:39 2020 (r53831) @@ -26,14 +26,14 @@ &nav.developers;
    - + FreeBSD GNOME News - + Modified: head/fr_FR.ISO8859-1/htdocs/news/status/report.xsl ============================================================================== --- head/fr_FR.ISO8859-1/htdocs/news/status/report.xsl Mon Jan 27 15:21:29 2020 (r53830) +++ head/fr_FR.ISO8859-1/htdocs/news/status/report.xsl Mon Jan 27 20:22:39 2020 (r53831) @@ -27,7 +27,7 @@ &nav.about; - + @@ -49,7 +49,7 @@
      - +
    • # From owner-svn-doc-head@freebsd.org Tue Jan 28 11:29:19 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0F13F1FF924; Tue, 28 Jan 2020 11:29:19 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486PXG4n0Wz3JTS; Tue, 28 Jan 2020 11:29:18 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9F5252235D; Tue, 28 Jan 2020 11:29:18 +0000 (UTC) (envelope-from ryusuke@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SBTIr2063247; Tue, 28 Jan 2020 11:29:18 GMT (envelope-from ryusuke@FreeBSD.org) Received: (from ryusuke@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SBTI8Z063246; Tue, 28 Jan 2020 11:29:18 GMT (envelope-from ryusuke@FreeBSD.org) Message-Id: <202001281129.00SBTI8Z063246@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: ryusuke set sender to ryusuke@FreeBSD.org using -f From: Ryusuke SUZUKI Date: Tue, 28 Jan 2020 11:29:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53832 - head/ja_JP.eucJP/books/handbook/boot X-SVN-Group: doc-head X-SVN-Commit-Author: ryusuke X-SVN-Commit-Paths: head/ja_JP.eucJP/books/handbook/boot X-SVN-Commit-Revision: 53832 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 11:29:19 -0000 Author: ryusuke Date: Tue Jan 28 11:29:18 2020 New Revision: 53832 URL: https://svnweb.freebsd.org/changeset/doc/53832 Log: - Merge the following from the English version: r52851 -> r53816 head/ja_JP.eucJP/books/handbook/boot/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/boot/chapter.xml Modified: head/ja_JP.eucJP/books/handbook/boot/chapter.xml ============================================================================== --- head/ja_JP.eucJP/books/handbook/boot/chapter.xml Mon Jan 27 20:22:39 2020 (r53831) +++ head/ja_JP.eucJP/books/handbook/boot/chapter.xml Tue Jan 28 11:29:18 2020 (r53832) @@ -3,7 +3,7 @@ The FreeBSD Documentation Project The FreeBSD Japanese Documentation Project - Original revision: r52851 + Original revision: r53816 $FreeBSD$ --> @@ -769,17 +769,6 @@ bitmap_name="/boot/splash.pcxsplash_txt="YES" bitmap_load="YES" bitmap_name="/boot/splash.bin" - - (ºÇÂç²òÁüÅÙ 1024x768 ¥Ô¥¯¥»¥ë¤Þ¤Ç¤Î) - ¤â¤¦¾¯¤·Â礭¤Ê¥¤¥á¡¼¥¸¤ò»È¤¤¤¿¤¤¾ì¹ç¤Ë¤Ï¡¢¥·¥¹¥Æ¥à¤Îµ¯Æ°»þ¤Ë - VESA ¥â¥¸¥å¡¼¥ë¤ò¥í¡¼¥É¤·¤Æ¤¯¤À¤µ¤¤¡£ - ¥«¥¹¥¿¥à¥«¡¼¥Í¥ë¤ò»È¤Ã¤Æ¤¤¤ë¾ì¹ç¤Ë¤Ï¡¢VESA - ¥«¡¼¥Í¥ë¥³¥ó¥Õ¥£¥°¥ì¡¼¥·¥ç¥ó¥ª¥×¥·¥ç¥ó¤òÄɲ䷤Ƥ¯¤À¤µ¤¤¡£ - ¥¹¥×¥é¥Ã¥·¥å¥¹¥¯¥ê¡¼¥ó¤Î¤¿¤á¤Ë VESA - ¥â¥¸¥å¡¼¥ë¤òÆɤ߹þ¤à¤Ë¤Ï¡¢/boot/loader.conf - ¤Î¤³¤ì¤Þ¤Ç¤ËÀâÌÀ¤·¤¿ 3 ¹Ô¤ÎÁ°¤Ë°Ê²¼¤Î¹Ô¤òÄɲ䷤Ƥ¯¤À¤µ¤¤¡£ - - vesa_load="YES" ¾¤Ë¶½Ì£¤ò»ý¤Á¤½¤¦¤Ê loader.conf ¤Î¥ª¥×¥·¥ç¥ó¤ò°Ê²¼¤Ç¾Ò²ð¤·¤Þ¤¹¡£ From owner-svn-doc-head@freebsd.org Tue Jan 28 12:11:16 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7F90622A494; Tue, 28 Jan 2020 12:11:16 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486QSh2m2gz3MlM; Tue, 28 Jan 2020 12:11:16 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 59E7922B7B; Tue, 28 Jan 2020 12:11:16 +0000 (UTC) (envelope-from trasz@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SCBGQh090390; Tue, 28 Jan 2020 12:11:16 GMT (envelope-from trasz@FreeBSD.org) Received: (from trasz@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SCBGY3090389; Tue, 28 Jan 2020 12:11:16 GMT (envelope-from trasz@FreeBSD.org) Message-Id: <202001281211.00SCBGY3090389@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: trasz set sender to trasz@FreeBSD.org using -f From: Edward Tomasz Napierala Date: Tue, 28 Jan 2020 12:11:16 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53833 - head/en_US.ISO8859-1/htdocs/news/status X-SVN-Group: doc-head X-SVN-Commit-Author: trasz X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/news/status X-SVN-Commit-Revision: 53833 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 12:11:16 -0000 Author: trasz Date: Tue Jan 28 12:11:15 2020 New Revision: 53833 URL: https://svnweb.freebsd.org/changeset/doc/53833 Log: Fix typo. Reported by: koobs Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml Tue Jan 28 11:29:18 2020 (r53832) +++ head/en_US.ISO8859-1/htdocs/news/status/report-2019-10-2019-12.xml Tue Jan 28 12:11:15 2020 (r53833) @@ -200,7 +200,7 @@ projects can be found on the wiki page.

      https://wiki.freebsd.org/SummerOfCode2019Projects

    • -
    • Adam Weinberger (admaw) was added to conduct@. Adam has +
    • Adam Weinberger (adamw) was added to conduct@. Adam has demonstrated competence, understanding, and fairness in personal matters.
    • From owner-svn-doc-head@freebsd.org Tue Jan 28 14:39:35 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 85E8B22EFDF; Tue, 28 Jan 2020 14:39:35 +0000 (UTC) (envelope-from dbaio@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486Tlq2wymz42ys; Tue, 28 Jan 2020 14:39:35 +0000 (UTC) (envelope-from dbaio@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 5FA7A24825; Tue, 28 Jan 2020 14:39:35 +0000 (UTC) (envelope-from dbaio@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SEdZCq080284; Tue, 28 Jan 2020 14:39:35 GMT (envelope-from dbaio@FreeBSD.org) Received: (from dbaio@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SEdZSQ080283; Tue, 28 Jan 2020 14:39:35 GMT (envelope-from dbaio@FreeBSD.org) Message-Id: <202001281439.00SEdZSQ080283@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: dbaio set sender to dbaio@FreeBSD.org using -f From: "Danilo G. Baio" Date: Tue, 28 Jan 2020 14:39:35 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53834 - head/en_US.ISO8859-1/articles/contributors X-SVN-Group: doc-head X-SVN-Commit-Author: dbaio X-SVN-Commit-Paths: head/en_US.ISO8859-1/articles/contributors X-SVN-Commit-Revision: 53834 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 14:39:35 -0000 Author: dbaio (ports committer) Date: Tue Jan 28 14:39:34 2020 New Revision: 53834 URL: https://svnweb.freebsd.org/changeset/doc/53834 Log: Add Andreas Bilke to contributors Maintainer of: deskutils/py-khard deskutils/py-todoman www/py-pelican PR: 241689 Modified: head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Modified: head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Tue Jan 28 12:11:15 2020 (r53833) +++ head/en_US.ISO8859-1/articles/contributors/contrib.additional.xml Tue Jan 28 14:39:34 2020 (r53834) @@ -730,6 +730,11 @@ + Andreas Bilke + andreas@bilke.org + + + Andreas Fehlner fehlner@gmx.de From owner-svn-doc-head@freebsd.org Tue Jan 28 19:12:59 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1F42D23894D; Tue, 28 Jan 2020 19:12:59 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486bqG6ndWz4Q5n; Tue, 28 Jan 2020 19:12:58 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E3F7B27C99; Tue, 28 Jan 2020 19:12:58 +0000 (UTC) (envelope-from gordon@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SJCwek049956; Tue, 28 Jan 2020 19:12:58 GMT (envelope-from gordon@FreeBSD.org) Received: (from gordon@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SJCtdV049937; Tue, 28 Jan 2020 19:12:55 GMT (envelope-from gordon@FreeBSD.org) Message-Id: <202001281912.00SJCtdV049937@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gordon set sender to gordon@FreeBSD.org using -f From: Gordon Tetlow Date: Tue, 28 Jan 2020 19:12:55 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53835 - in head/share: security/advisories security/patches/EN-20:01 security/patches/EN-20:02 security/patches/SA-20:01 security/patches/SA-20:02 security/patches/SA-20:03 xml X-SVN-Group: doc-head X-SVN-Commit-Author: gordon X-SVN-Commit-Paths: in head/share: security/advisories security/patches/EN-20:01 security/patches/EN-20:02 security/patches/SA-20:01 security/patches/SA-20:02 security/patches/SA-20:03 xml X-SVN-Commit-Revision: 53835 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 19:12:59 -0000 Author: gordon (src committer) Date: Tue Jan 28 19:12:55 2020 New Revision: 53835 URL: https://svnweb.freebsd.org/changeset/doc/53835 Log: Add EN-20:01, EN-20:01, and SA-20:01 through SA-20:03. Approved by: so Added: head/share/security/advisories/FreeBSD-EN-20:01.ssp.asc (contents, props changed) head/share/security/advisories/FreeBSD-EN-20:02.nmount.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:01.libfetch.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:02.ipsec.asc (contents, props changed) head/share/security/advisories/FreeBSD-SA-20:03.thrmisc.asc (contents, props changed) head/share/security/patches/EN-20:01/ head/share/security/patches/EN-20:01/ssp.patch (contents, props changed) head/share/security/patches/EN-20:01/ssp.patch.asc (contents, props changed) head/share/security/patches/EN-20:02/ head/share/security/patches/EN-20:02/nmount.patch (contents, props changed) head/share/security/patches/EN-20:02/nmount.patch.asc (contents, props changed) head/share/security/patches/SA-20:01/ head/share/security/patches/SA-20:01/libfetch.patch (contents, props changed) head/share/security/patches/SA-20:01/libfetch.patch.asc (contents, props changed) head/share/security/patches/SA-20:02/ head/share/security/patches/SA-20:02/ipsec.patch (contents, props changed) head/share/security/patches/SA-20:02/ipsec.patch.asc (contents, props changed) head/share/security/patches/SA-20:03/ head/share/security/patches/SA-20:03/thrmisc.patch (contents, props changed) head/share/security/patches/SA-20:03/thrmisc.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml head/share/xml/notices.xml Added: head/share/security/advisories/FreeBSD-EN-20:01.ssp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:01.ssp.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,138 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:01.ssp Errata Notice + The FreeBSD Project + +Topic: Imprecise ordering of SSP canary initialization + +Category: core +Module: libc +Announced: 2020-01-28 +Credits: Kyle Evans +Affects: All supported versions of FreeBSD. +Corrected: 2019-11-25 03:49:38 UTC (stable/12, 12.1-STABLE) + 2020-01-28 18:53:14 UTC (releng/12.1, 12.1-RELEASE-p2) + 2020-01-28 18:53:14 UTC (releng/12.0, 12.0-RELEASE-p13) + 2019-11-25 03:49:38 UTC (stable/11, 11.3-STABLE) + 2020-01-28 18:53:14 UTC (releng/11.3, 11.3-RELEASE-p6) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The Stack Smashing Protector ("SSP") relies on a stack canary being +initialized early on in application startup. On FreeBSD, this is +accomplished with a constructor in libc. + +II. Problem Description + +When a binary is statically linked, constructor invocation order is based on +priority and sorted arbitrarily within a priority level across all +constructors present in the single statically linked object. The stack +canary guard constructor had no priority, so statically linked binary could +not predictably order their constructors to avoid bad interactions with +respect to the stack canary constructor leading to false-positive detection +of a stack overflow condition and erroneous process abort in some rare cases. + +Dynamically linked binaries are generally not affected, since the stack +canary is initialized in libc and libc is ordered very early in constructor +invocation. + +III. Impact + +Affected programs will abort and log a "stack overflow detected" message to +syslog(3). + +IV. Workaround + +No workaround is available, but dynamically linked binaries are not affected. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date. Statically linked binaries +should be relinked against the updated base system. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:01/ssp.patch +# fetch https://security.FreeBSD.org/patches/EN-20:01/ssp.patch.asc +# gpg --verify ssp.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r355080 +releng/12.1/ r357215 +releng/12.0/ r357215 +stable/11/ r355080 +releng/11.3/ r357215 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whbdfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cKWSA/8CINmMeEm76kGRoyuDiTD+h1Ra28DM81+HNsTuEb8W8uhNT/ZJf61lWZe +c5BEO8uJMP8XUjGEzIEu4ARkZcV2pvLxyUIoWgq1TGTYB7jp8zXeJZj/wPqLLpI4 +lwXl19hWPprz1CDgukR87+flDZyNEe62YfAtL3WRqGuYU8Yb6AmNoKSwOphset4m +6F7pg8wPFnHfW2EOl6/jFZsv41C+2SlIXa8HIXFJj0TnfltLsCqEWhpDhVE0Wv0D +f2MCGs03xS+UN/kUGIE6G2WBD/Etfy4DMr7RsRxu1lta6FhOk8sR27FCcSnqyKPM +MqXK0PxN5qx8D2UbQUhNCmmclnOVjzGEn9ECzxW5XrDsz17bhodtL4f29GmLEw4l +wdHcttUlQduzolZlBgKgNyp6ZuKXXYzPYsATgJTG9LBQShyQeWa4rCz21Nh+vrmA +NdSAY/LEvq6R8IKHFljDwFIPITnV6xQObMIDgrsJMFyFyIUGiZEo0Jo51I28aUJ/ +EM76+SULzxY50Agw5KFgCM1iXPfGnEfPN03wNCzrbvpv3y67qduGF4jbmLMZPcnv +aZBVQj4Cx9Q/pC/TCFNilmmEa3/xYDB6hGnQn9cIYBV1Q61IQXwGaGXNG+fN760x +gYfnbY2ZlJVV66amfTC89HNVwMeq++Imd4AzNlaXV+a9qummNKc= +=VzHc +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-EN-20:02.nmount.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-EN-20:02.nmount.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,131 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-EN-20:02.nmount Errata Notice + The FreeBSD Project + +Topic: nmount invalid pointer dereference + +Category: core +Module: kernel +Announced: 2020-01-28 +Credits: Andrew Turner +Affects: FreeBSD 11.3 and FreeBSD 12.0. +Corrected: 2019-10-03 07:17:26 UTC (stable/12, 12.1-STABLE) + 2019-10-04 14:10:56 UTC (releng/12.1, 12.1-RELEASE) + 2020-01-28 18:54:15 UTC (releng/12.0, 12.0-RELEASE-p13) + 2019-10-04 17:27:49 UTC (stable/11, 11.3-STABLE) + 2020-01-28 18:54:15 UTC (releng/11.3, 11.3-RELEASE-p6) + +For general information regarding FreeBSD Errata Notices and Security +Advisories, including descriptions of the fields above, security +branches, and the following sections, please visit +. + +I. Background + +The nmount(2) system call is used to mount file systems. + +II. Problem Description + +VFS option processing related to the nmount(2) system call was missing a +length check. This is generally only available to privileged users unless +the vfs.usermount sysctl is changed from the default to allow non-privileged +users the ability to mount file systems. + +III. Impact + +A userland process authorized to mount filesystems can possibly trigger a +kernel panic. + +IV. Workaround + +No workaround is available. However, if the vfs.usermount sysctl has been +changed to allow non-privileged users the ability to mount file systems, +switching back to the default value of 0 will prevent non-privileged users +from triggering the issue. + +V. Solution + +Upgrade your system to a supported FreeBSD stable or release / security +branch (releng) dated after the correction date, and reboot. + +Perform one of the following: + +1) To update your system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for an errata update" + +2) To update your system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/EN-20:02/nmount.patch +# fetch https://security.FreeBSD.org/patches/EN-20:02/nmount.patch.asc +# gpg --verify nmount.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r353032 +releng/12.1/ r353104 +releng/12.0/ r357216 +stable/11/ r353109 +releng/11.3/ r357216 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whcpfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJWUQ//UZtfZZXpkmLYet67qmbIj7uLbw9CDc1N5HRwNgnjTDGc4d5o3BQEAr2X +/q1t8US3Ec/rWm5YqzqRNmt+Uei/F7J2u1udRm56vsPPb+eq8tRiRVK6RYY4FYBj +rxPkxf6nNCTqWELFtmQejnCQ0wN2Oy+oNY3fA1j1GzOHm0S7dc9CnlrE75eDX33q +sXezm6/VYRwyKGKEJUMlmn9gn0qzGr3L9go5TCWDw9lhuJoygE/QblnVTQI5mTDv +khjke28RxLkAkOUMvq8EIq1L9j88FeVWEOMIKU2xgaUvh6z6NQE8o6eKTb4D7mDO +Vo4NdB81SdPmCaHISocrEhkS/Vff3rlMcb4xf/DFZgDK3FXzNYkAqLyMrDNw6egv +fV4fbhnyqPpejCDW0Il7nxOwV4KtdmEaMCvKwvQu9VpiL8wUrV9wBSkbavyagS49 +un2UYkkv28IIkmhDwbRM7qEcE7Dt6xfsZN4HIZ6R2eUGhGx/ETDXoC9fE74khigF +ubU7QygqWtZ8JDZ8qmnfDM7n0EG1DV3I+XSdupN1ytaxaKOzF5HAnVxcLuMnY5LT +80HaVQazsfCJ5IQinUtiGoOFldQT3NGkvVMcCe+M5R+PP2g4DRJgaCzDCXDIx0k2 +My/JU5RjlUl0714OV0VaGlzVnwk5y7RNNLcHWlSx83HBoBSWcnk= +=uOTk +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:01.libfetch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:01.libfetch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,131 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:01.libfetch Security Advisory + The FreeBSD Project + +Topic: libfetch buffer overflow + +Category: core +Module: libfetch +Announced: 2020-01-28 +Credits: Duncan Overbruck +Affects: All supported versions of FreeBSD. +Corrected: 2020-01-28 18:40:55 UTC (stable/12, 12.1-STABLE) + 2020-01-28 18:55:25 UTC (releng/12.1, 12.1-RELEASE-p2) + 2020-01-28 18:55:25 UTC (releng/12.0, 12.0-RELEASE-p13) + 2020-01-28 18:42:06 UTC (stable/11, 11.3-STABLE) + 2020-01-28 18:55:25 UTC (releng/11.3, 11.3-RELEASE-p6) +CVE Name: CVE-2020-7450 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +libfetch(3) is a multi-protocol file transfer library included with FreeBSD +and used by the fetch(1) command-line tool, pkg(8) package manager, and +others. + +II. Problem Description + +A programming error allows an attacker who can specify a URL with a username +and/or password components to overflow libfetch(3) buffers. + +III. Impact + +An attacker in control of the URL to be fetched (possibly via HTTP redirect) +may cause a heap buffer overflow, resulting in program misbehavior or +malicious code execution. + +IV. Workaround + +No workaround is available. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:01/libfetch.patch +# fetch https://security.FreeBSD.org/patches/SA-20:01/libfetch.patch.asc +# gpg --verify libfetch.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in . + +Restart all daemons that use the library, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r357213 +releng/12.1/ r357217 +releng/12.0/ r357217 +stable/11/ r357214 +releng/11.3/ r357217 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whc5fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJw5BAAmi4Mk+an8qJB4GwfOSxWhn42GnN9/HikJwkiTNHQr7n51ANp4sHCgTYG +PCo6UvCFqdIfhpBIrykI7ZwzAetCpldDdIMQFJoi5ChJ7aIcNDpiH06yLjYLgseS +qSxJ+dXt6j7G2FMUWPBka8eTNBi64gT0MbyC7zFdISfJqfNy+p0WvdwYm3UsWkeR +pEV+o6zL+PI3s6IsqQTQzYuyNYgoTLdvhjgNMymI+OMH8uCdBUrdItdSwSYPwVOp ++8SUX47jMFNcIbBmuQ3KnPxu9fHx8JzfqpLDAkmp6hu6sXNTmIZ27mgItu4DRgWN +nvd750H6fv9UCbRYOyvjeuEN8olOpZcoTAuQDtcC/z7BvKAwLC7oAYXZEiQ4pn/D +MGMzlJU7fxiyIWDNJprzyrsgPAUhCC3ePyenTErB+GQKmf1fHTjLWJHN43W2tbqk +kYzMwwLQa3KwOYzHPHbJt6F94b9dN30v8cgIVkvs5ivLr8eErIJAQ71PgxkgRQL1 +/C301qeJvgBqLm+so0Ef6wi/D9HvCvyk6IqbQNEvOXD8RNtyqdhBO1jJ93zDVLLK +ey5room7Hln/A3l5bXBzb6O3+q60U7lbxzokkAhNoe+pls6HQ50OeainXDU1dal4 +HcBOCM1cnXNjXDdizqdMDvyR7ftXuBxOYeMsxY2JbT4qKjjA19M= +=chN4 +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:02.ipsec.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:02.ipsec.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,123 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:02.ipsec Security Advisory + The FreeBSD Project + +Topic: Missing IPsec anti-replay window check + +Category: core +Module: kernel +Announced: 2020-01-28 +Credits: Jean-Francois HREN +Affects: FreeBSD 12.0 only +Corrected: 2020-01-28 18:56:46 UTC (releng/12.0, 12.0-RELEASE-p13) +CVE Name: CVE-2019-5613 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +IPsec is a suite of protocols providing data authentication, integrity, and +confidentiality between two networked hosts. + +II. Problem Description + +A missing check means that an attacker can reinject an old packet and it will +be accepted and processed by the IPsec endpoint. + +III. Impact + +The impact depends on the higher-level protocols in use over IPsec. For +example, an attacker who can capture and inject packets could cause an action +that was intentionally performed once to be repeated. + +IV. Workaround + +No workaround is available. Systems not using IPsec are not vulnerable. + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:02/ipsec.patch +# fetch https://security.FreeBSD.org/patches/SA-20:02/ipsec.patch.asc +# gpg --verify ipsec.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +releng/12.0/ r357218 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whdFfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cIWbQ/9EvRm9/pFezk65B8NR9BJFYzSbFv8GxtxNjcFJ0KpG48s7XxBg9BWNKMs +b7dtGTRlPKGUh0CRfhkCzxx10JZ0Aeu+UNNWQrt7r34pku1bUTrOAqW9nxIBq8zr +tihvShWxWmMb9roeGRQIDpDoRCDs/Ps5eZ9NkTIRIPnGvidm8FTr8eQIHxSQJ/dX +9bnQO1KP3Fz1+ywKA/poMdfXwdrUhiaPaC9AQ704lMiz881Itsi93Xw9HceKar0E +dnbPbXMTQ+mkdVe3U2KLVDIMs119XL3Nuel2y7ACNjH3Bvjeerfjn6rZfiseV5FR +muH0I+HKVdkdgWrFRPPthzUTmZYaStgbgOymsclwCpUJkS/ITgJWTpx6V+0E+4n6 +bocwue5xP9EtCKDoEp3RSf17f47nbHgA0oeR+1CU9bh2lU6h2lAxRhxkPcWrgBiJ +HWSJ96UyF3S9Kfj7sbKBE/0wPQYRO2fs2PSfjvjmydyYlg0gcZ25tK3sm5xyvxoG +pVCwMn3gFDchEWnxJaSrGg/xoQCCWM+KdVXkaBSdCEsqs8+o6bTXPrq8ZyU451aO +7qxLPBlw5XNZ87jUEOhT3PwH49H9sAl++4IHUUUvs5pcIigdTNplgVpRt2DdFDzg +ardLO/Cyr1qAAMClC3jXx0I7uTViROt3x7lg2+2V7bF5SnL8VjU= +=tFox +-----END PGP SIGNATURE----- Added: head/share/security/advisories/FreeBSD-SA-20:03.thrmisc.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-20:03.thrmisc.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,131 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-20:03.thrmisc Security Advisory + The FreeBSD Project + +Topic: kernel stack data disclosure + +Category: core +Module: kernel +Announced: 2020-01-28 +Credits: Ilja Van Sprundel +Affects: All supported versions of FreeBSD. +Corrected: 2019-11-15 16:40:10 UTC (stable/12, 12.1-STABLE) + 2020-01-28 18:57:45 UTC (releng/12.1, 12.1-RELEASE-p2) + 2020-01-28 18:57:45 UTC (releng/12.0, 12.0-RELEASE-p13) + 2019-11-15 16:40:55 UTC (stable/11, 11.3-STABLE) + 2020-01-28 18:57:45 UTC (releng/11.3, 11.3-RELEASE-p6) +CVE Name: CVE-2019-15875 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit . + +I. Background + +The kernel can create a core dump file when a process crashes that contains +process state, for debugging. + +II. Problem Description + +Due to incorrect initialization of a stack data structure, up to 20 bytes of +kernel data stored previously stored on the stack will be exposed to a +crashing user process. + +III. Impact + +Sensitive kernel data may be disclosed. + +IV. Workaround + +Core dumps may be disabled by setting the kern.coredump sysctl to 0. +See sysctl(8) and sysctl.conf(5). + +V. Solution + +Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date, +and reboot. + +Perform one of the following: + +1) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install +# shutdown -r +10min "Rebooting for a security update" + +2) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +# fetch https://security.FreeBSD.org/patches/SA-20:03/thrmisc.patch +# fetch https://security.FreeBSD.org/patches/SA-20:03/thrmisc.patch.asc +# gpg --verify thrmisc.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile your kernel as described in + and reboot the +system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/12/ r354734 +releng/12.1/ r357219 +releng/12.0/ r357219 +stable/11/ r354735 +releng/11.3/ r357219 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + + + +VII. References + + + +The latest revision of this advisory is available at + +-----BEGIN PGP SIGNATURE----- + +iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whdVfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cLOgg/7BAIhE6SQ06BkCKNBerK3jj1sY2gBc7aohLbzdhEpCIrrd+sMsh0tphII +ftR5psPaZahzjP9Mrs/lA1fWVsco1jo4icevGiPTfbEVqBF1S8XINccwQr3AvYJR +33PGUrgzY2rU8MTj0YPJ2EG3ahghb96lKkK3USikoJA5SsXSZkFphp2OFXnUFWbG +TXWOUBWXbHMBUprf/oXcvNo/ZjDcxvJzMqT2YIGwKOsT0Xtx5nD+6C390axRuVEd +sA6z1RhA/EEx6JMNSUAoG5rnJSXDYQTB2kd9ilozXi07CboVZ38loXy8492FGrin +uG3MfnI+PHrMtG+S5yHwzOGhB/20DNoWqLKZobTGr46r8rrdc553F5Cn7ivLEz9Y +Sk+IGjZfB99jv+JxCr/+/4gn3niOyh0MolqG9r0rT13fLmeQX5XtYfyYPJHE1wuR ++JZ9TQSaJ6TX/DcIsy60OWcfWAQOeoYsvTZO6hqpjHt66m2Ah1pdAyc8c0R8yaQG +tFpRhgQvYpiPJviq7NvM5V2afSo16RWWy9A+xEYUrxp0H0inVNOgdqwhln7ZzI4u +YoBis/eZkNAPxqFJyvJ89TQFmsWFPcpHjAGMoL+aCuIotuHHa/MPdT2pfyqHG9iL +E9axI8zhyzNUC+osR2I6DT/R8rF5QHAY8xI8FffiS8jfN3BJVm4= +=3mdJ +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-20:01/ssp.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-20:01/ssp.patch Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,33 @@ +--- lib/libc/secure/stack_protector.c.orig ++++ lib/libc/secure/stack_protector.c +@@ -40,11 +40,29 @@ + #include + #include "libc_private.h" + ++/* ++ * We give __guard_setup a defined priority early on so that statically linked ++ * applications have a defined priority at which __stack_chk_guard will be ++ * getting initialized. This will not matter to most applications, because ++ * they're either not usually statically linked or they simply don't do things ++ * in constructors that would be adversely affected by their positioning with ++ * respect to this initialization. ++ * ++ * This conditional should be removed when GCC 4.2 is removed. ++ */ ++#if __has_attribute(__constructor__) || __GNUC_PREREQ__(4, 3) ++#define _GUARD_SETUP_CTOR_ATTR \ ++ __attribute__((__constructor__ (200), __used__)); ++#else ++#define _GUARD_SETUP_CTOR_ATTR \ ++ __attribute__((__constructor__, __used__)); ++#endif ++ + extern int __sysctl(const int *name, u_int namelen, void *oldp, + size_t *oldlenp, void *newp, size_t newlen); + + long __stack_chk_guard[8] = {0, 0, 0, 0, 0, 0, 0, 0}; +-static void __guard_setup(void) __attribute__((__constructor__, __used__)); ++static void __guard_setup(void) _GUARD_SETUP_CTOR_ATTR; + static void __fail(const char *); + void __stack_chk_fail(void); + void __chk_fail(void); Added: head/share/security/patches/EN-20:01/ssp.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-20:01/ssp.patch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4wheBfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJjxg/5ATm/M6VVGLH8RR/VVdsEn0MaXnq8K8Mu/z42RzHhApPZuK9Rqxi0KllI +HapRslvyE/PsgxP119jhrqRFpxyXkkQI27t8+muQalENRqMQr1TUzqRz8R/ULm/b +1/O83JSzaCVuVgSSFIEi49PfLdkO7M/UYxSGm8OXKJiYR+5lbWORPdQH8iCx5CCv +hXgE65yTFxS9ekOTlr3kBCe5p+Oy3e8HRmWGpStfWx/KIKZXxoC4Nhwg+zP3DoV+ +4S+mCpknPjDAtdEaL9cUxYQ1OUjIII+yQ91ZOkwoTMelvDMU/Aam6LIi6mBPTs3q +nI+hNZlI5t7eE4jhdhDFxnH6hGKIFuQe9AsEz0wlMtyyyAnXWwuNzr9lAw1Stu8c +ksC3rFgP2PWHxO42KzewDiBqLKnNxM8nN5m544qqASo9UNJnnQdooluuMWFlJ7iP +Cr/QPQlNwAGiZ3GxI9t2TnUzUH8raWyKQokkgp5ZYwVIuO2Wxj/dKvbg+bQkXuqv +BRz3TLWjPlGWwPpSCqQG0I5IQbq3YJK+r0lJ1cyONlDRsUTXe2Y2YUFdp4toTFR5 +43kQbU1dTcuydYQ8C/gU6wklneGhiswINL+aZHtGGw8IMz9kPvTAti1WmrHAWLph +ADYr+VMT3Hds0FZfDmIhiBBcDI528Bz9pMXZBfP4YJhwRic+nic= +=IKok +-----END PGP SIGNATURE----- Added: head/share/security/patches/EN-20:02/nmount.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-20:02/nmount.patch Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,20 @@ +--- sys/kern/vfs_mount.c.orig ++++ sys/kern/vfs_mount.c +@@ -603,7 +603,7 @@ + */ + fstypelen = 0; + error = vfs_getopt(optlist, "fstype", (void **)&fstype, &fstypelen); +- if (error || fstype[fstypelen - 1] != '\0') { ++ if (error || fstypelen <= 0 || fstype[fstypelen - 1] != '\0') { + error = EINVAL; + if (errmsg != NULL) + strncpy(errmsg, "Invalid fstype", errmsg_len); +@@ -611,7 +611,7 @@ + } + fspathlen = 0; + error = vfs_getopt(optlist, "fspath", (void **)&fspath, &fspathlen); +- if (error || fspath[fspathlen - 1] != '\0') { ++ if (error || fspathlen <= 0 || fspath[fspathlen - 1] != '\0') { + error = EINVAL; + if (errmsg != NULL) + strncpy(errmsg, "Invalid fspath", errmsg_len); Added: head/share/security/patches/EN-20:02/nmount.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/EN-20:02/nmount.patch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whedfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJKTBAAmQXDT2YnQ4jZkHw/ZpiqA5cVJQzaCDX4BC0gtJijdbHiewrxgSK0yw/6 +iguZ2YUCi+0SkjqGtSHNZgNk8JZ4Xdqicq47jxuNbh5ckDjlkR8h7BL+MWRYPLU/ +DtpUy3u66C/zXCJZMxUTCNwg5eJjCmJW9LXeVLVE3uGWQZ21eA8VM4LAmYnUOgVW +cLjmyu7yQRVBtqkfVOD8yWMy0aLim6iwdxlun8MfFsQRJFiUXnz/3qJWlm85+mhC +Agll8Ea8+VuhYnhqsy6ixEi82ISllKqGsysBH9X/PQevkx6jgNBMlDnvQ4ZNskFt +P1GUZgcLnBW3qYeCvj0ob8kylnK1F8Vm5YLV/GU4m7ja56Q6xZzqfez/WuwB+8Pu +epYZIglBrx1hXjZag9iUwWDNaHCjI+M+Ki49DbCsxBZUsj8/YPfh2OS+NBFcpWDp +rExxzcfN23YeOpFawDeAHcMXRCBozqP/JEG+8Yv3tLmj7kPMxWmaOAc+Zm2EUEBq +KYRAErAPbQUcZExaH/OHcJId0JV6llP+QYu55IhMPY04jAVIjaBAU3jh+Gm0V7CQ +QV462nucMVtt/qCcFjcemVirZMpqYIbJ5ud1+9vqqPHJEOsbEmYTrcm7frBZtT6r +tklX+u2rbl3fWVwhkOYTtax2YhxbKADG+vI2wxuVszn1qDLsZEg= +=w1fm +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-20:01/libfetch.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:01/libfetch.patch Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,29 @@ +--- lib/libfetch/fetch.c.orig ++++ lib/libfetch/fetch.c +@@ -332,6 +332,8 @@ + } + if (dlen-- > 0) + *dst++ = c; ++ else ++ return (NULL); + } + return (s); + } +@@ -381,11 +383,15 @@ + if (p && *p == '@') { + /* username */ + q = fetch_pctdecode(u->user, URL, URL_USERLEN); ++ if (q == NULL) ++ goto ouch; + + /* password */ +- if (*q == ':') ++ if (*q == ':') { + q = fetch_pctdecode(u->pwd, q + 1, URL_PWDLEN); +- ++ if (q == NULL) ++ goto ouch; ++ } + p++; + } else { + p = URL; Added: head/share/security/patches/SA-20:01/libfetch.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:01/libfetch.patch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whexfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cI8uRAAjHeuD0Mz/5DVcAAY/eAA/hiN/maLEVbNAP+mqv3S5Xa7Iha/XWsq96ih +qu6UnZeAhwRPBDC3tTAd6BlgGBvnAeLVkRto1SJFLjROGJOL9CXM1ohtxkKwSZpd +xH2Y9kUj4vTfa/RL+ctE5xIsaMI5A23YJ4RaP/nB7BGOsXzSM62beeX4ibKrZPP2 +gtJC6OsJADnZnX/FGsfit9Ckc3DvYOyuxV/hj2PMwkNUt+xzoJ0wPVmEvglTMlcm +0gFGfRUhvO4IetKpZG1+jfD5EngYsvcyswd1JazTZVflpUfGt6rACYw8rPbBNTXi +pKhTgu4KUicTSq2A74Mfd7ClYyPAhLU5RMav/ydwTDYpjpt6+akWcxap9V4hwW5p +8bxCt0bi/9eXhgt7PuSTV/NvRPvsuhoyXXLLodMAWwHHCvlJEs8PYM/Qwz2yd5V2 +FYHf1EaCV79vLYeqVa/CE5p9er783GwEvSmeeNKOHlBeOeb3Is7cdrTpFYwBS+sY +RQhqccfEpSq0bUdpHyiKV6pvq0tfOhLyamTH/4SAPh3hC52uH90zejeGhPMmZ6ld +ud3eN7Lz8sZsJRg9nq8GCfpS1x225twnVz15YAlaQCZ2+y9R/QxKZpt/H0X4o9Hp +8fOpiyxbW79k7/OuZDEwmXk7oAl4z//uM97Z9bLkuLk9heiVgI0= +=Vs4w +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-20:02/ipsec.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:02/ipsec.patch Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,11 @@ +--- sys/netipsec/ipsec.c.orig ++++ sys/netipsec/ipsec.c +@@ -1318,6 +1318,8 @@ + __func__, replay->overflow, + ipsec_sa2str(sav, buf, sizeof(buf)))); + } ++ ++ replay->count++; + return (0); + } + Added: head/share/security/patches/SA-20:02/ipsec.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:02/ipsec.patch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whe9fFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cL22hAAp65Q2PDHj0Y5ykuTsXobEH6oD7DDmvL27PtY8mbT01hYu7jNxwycuzv3 +7ALZljpJN+1pwN6NV7+lOlVPj/VVCzHBIK1ga7uZi0Qv/CvzIRdazWOTMKDmbo9L +4NzLZTrC4DcQmJI7YZptMy+2jlldBkYf9cEJRC2xPxAiKonLmRrBtR826VOLCV4a +5FPtFObGAp1JYrspExzpyJ5U5Eh6Nxag3kgY3OwXPcIa6CfI2CeY2rp5rUhqwIy/ +6CewC4YP2kRL//auKFkXc8jTvgcIdUEPdmAEzKdmlpkE/xQ+twcAYxwkYxox8QVS +dEACEOcVJ3krKo5r5dFrTdeu/fUmptvXsVR5iI/J/r997+fsqKG8O7N3J+HNYJWM +r9zKJjfzRNYuTNwk15KxpfY3qx2d+G09mTVwTYJ/hG+LHyj9qgB/gVCyct/l82zQ +93rlyDKN3EQiLNs1BgoSXSRz3IoS2NErccE5tSKPbphtbpdbxU6f45wHhEWyRO/b +43yJwslmMIgSVoG1B2WftRuQBK9EmQSVpMvP3T6gJqr0ZyQuXLTWHpBg/vX79chQ +R/necLTNP4+aQEDtv9d8GjkEkFqj6fLbe6nJiUdo0hME8WdbGfM+cjRSBUx5LvyS +6yMddT9SPlu4PXiMn3OT1qmqsaUuozWL+UmS5QkmGwgkbBwGS6w= +=wVs3 +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-20:03/thrmisc.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:03/thrmisc.patch Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,11 @@ +--- sys/kern/imgact_elf.c.orig ++++ sys/kern/imgact_elf.c +@@ -2211,7 +2211,7 @@ + td = (struct thread *)arg; + if (sb != NULL) { + KASSERT(*sizep == sizeof(thrmisc), ("invalid size")); +- bzero(&thrmisc._pad, sizeof(thrmisc._pad)); ++ bzero(&thrmisc, sizeof(thrmisc)); + strcpy(thrmisc.pr_tname, td->td_name); + sbuf_bcat(sb, &thrmisc, sizeof(thrmisc)); + } Added: head/share/security/patches/SA-20:03/thrmisc.patch.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-20:03/thrmisc.patch.asc Tue Jan 28 19:12:55 2020 (r53835) @@ -0,0 +1,18 @@ +-----BEGIN PGP SIGNATURE----- + +iQKTBAABCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAl4whfJfFIAAAAAALgAo +aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD +MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n +5cJfyw/+LEyYZDvgLZGxH+vMhpFKaG/s02TCf4qz9alCkn20JvYJYPZQUW6zJfgh +qjRwa4cP1uvbO+on7O0Ez6QHOfCec6QgFOdAh5H0R2u1kt7WZri6NjIZuxidJeuk +BJMdg0uGlCwdI4kFXiRjhRBLDHJImD1WFuoCK+hiCYlYxYaVJ7lDSBPWx0q1MbTA +8FSRcmohlRKjjuw6ANBpw84K9JJcNBw+WcMePdMCmU/JhhDSeVbxfs5UonBPu09o +JIGqX4k5FMbSWFWdCEz4GrtAv8CtO3eT7ykv0B8qaDiW/NGq4l3h6koh/e0ZsWPj +vyvf+989VCnQHvNSxlde+Hdl+5rR2Lu23gj3v9AcRlLNjfE/8nVvosh7QgTtf3oC +ZgElZXBSTO7T4msBKLnFKwyPrHm1B0ZgGDGDHr7gngyYukt+eCyYlvA8qtsv3L+f +UXyutsABSk73O3Jm/qLNad1g51/KTfhesVzaOo1LV1McmfqkEwdt5YDmsW/A4pUO +V5Xhjc8a0pjp2looiIrZHOGqd4pgUhwl9JvdkGm0ab4VQdc67SzgJZYj5PzMeufU +cUdsCzvLS0ioblz6osPEp+fzhXw/F12nSb7mWXTftnTmpkJXBJkepMU7vzxrL4Ds ++KhqpqxM41XOy5my5E3FH9m0ZPhMKF7dRR6IEOkjF3eLOUc+J7M= +=pyQC +-----END PGP SIGNATURE----- Modified: head/share/xml/advisories.xml ============================================================================== --- head/share/xml/advisories.xml Tue Jan 28 14:39:34 2020 (r53834) +++ head/share/xml/advisories.xml Tue Jan 28 19:12:55 2020 (r53835) @@ -5,6 +5,31 @@ + 2020 + + + 1 + + + 28 + + + FreeBSD-SA-20:03.thrmisc + + + + FreeBSD-SA-20:02.ipsec + + + + FreeBSD-SA-20:01.libfetch + + + + + + + 2019 Modified: head/share/xml/notices.xml ============================================================================== --- head/share/xml/notices.xml Tue Jan 28 14:39:34 2020 (r53834) +++ head/share/xml/notices.xml Tue Jan 28 19:12:55 2020 (r53835) @@ -5,6 +5,27 @@ + 2020 + + + 1 + + + 28 + + + FreeBSD-EN-20:02.nmount + + + + FreeBSD-EN-20:01.ssp + + + + + + + 2019 From owner-svn-doc-head@freebsd.org Tue Jan 28 20:16:22 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 6C72E23B7AB; Tue, 28 Jan 2020 20:16:22 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486dDQ2CSLz4VRH; Tue, 28 Jan 2020 20:16:22 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 47170811; Tue, 28 Jan 2020 20:16:22 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SKGMfc086263; Tue, 28 Jan 2020 20:16:22 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SKGM9E086262; Tue, 28 Jan 2020 20:16:22 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <202001282016.00SKGM9E086262@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Tue, 28 Jan 2020 20:16:22 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53836 - head/de_DE.ISO8859-1/books/handbook/zfs X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/zfs X-SVN-Commit-Revision: 53836 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 20:16:22 -0000 Author: bhd Date: Tue Jan 28 20:16:21 2020 New Revision: 53836 URL: https://svnweb.freebsd.org/changeset/doc/53836 Log: Update to r53373: Fix two textproc/igor warnings: - extra space after content - a straggling Modified: head/de_DE.ISO8859-1/books/handbook/zfs/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/zfs/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/zfs/chapter.xml Tue Jan 28 19:12:55 2020 (r53835) +++ head/de_DE.ISO8859-1/books/handbook/zfs/chapter.xml Tue Jan 28 20:16:21 2020 (r53836) @@ -4,7 +4,7 @@ The FreeBSD German Documentation Project $FreeBSD$ - basiert auf: r53010 + basiert auf: r53373 --> - Booting Root on <acronym>ZFS</acronym> + Booting Root on <acronym>ZFS</acronym> @@ -3859,8 +3859,7 @@ vfs.zfs.vdev.cache.size="5M" GUID identifiziert. Die verfügbaren Eigenschaften werden durch die ZFS-Versionsnummer des Pools - bestimmt. - + bestimmt. From owner-svn-doc-head@freebsd.org Tue Jan 28 20:18:07 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D554123B854; Tue, 28 Jan 2020 20:18:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486dGR5Hj6z4VTZ; Tue, 28 Jan 2020 20:18:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AC9A9812; Tue, 28 Jan 2020 20:18:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SKI7GJ086378; Tue, 28 Jan 2020 20:18:07 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SKI7W8086377; Tue, 28 Jan 2020 20:18:07 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <202001282018.00SKI7W8086377@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Tue, 28 Jan 2020 20:18:07 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53837 - head/de_DE.ISO8859-1/books/handbook/jails X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/jails X-SVN-Commit-Revision: 53837 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 20:18:07 -0000 Author: bhd Date: Tue Jan 28 20:18:07 2020 New Revision: 53837 URL: https://svnweb.freebsd.org/changeset/doc/53837 Log: Update to r53808: Add clarification to ezjail section. Modified: head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Tue Jan 28 20:16:21 2020 (r53836) +++ head/de_DE.ISO8859-1/books/handbook/jails/chapter.xml Tue Jan 28 20:18:07 2020 (r53837) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/jails/chapter.xml,v 1.23 2011/05/25 20:42:25 jkois Exp $ - basiert auf: r53124 + basiert auf: r53808 --> &prompt.root; mergemaster -U -D /usr/jails/jailname + + + Nach einem größeren Versionsupdate empfiehlt + sysutils/ezjail, sicherzustellen, + dass pkg die richtige Version hat. + Geben Sie dazu den folgenden Befehl ein, um auf die + entsprechende Version zu aktualisieren: + + &prompt.root; pkg-static upgrade -f pkg + From owner-svn-doc-head@freebsd.org Tue Jan 28 20:52:19 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 4241223FABA; Tue, 28 Jan 2020 20:52:19 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486f1t6DP1z4c2s; Tue, 28 Jan 2020 20:52:18 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CEBE6FAD; Tue, 28 Jan 2020 20:52:18 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SKqIsW009840; Tue, 28 Jan 2020 20:52:18 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SKqIh5009836; Tue, 28 Jan 2020 20:52:18 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <202001282052.00SKqIh5009836@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 28 Jan 2020 20:52:18 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53838 - in head/en_US.ISO8859-1/htdocs/releases: 12.0R/share/xml 12.1R/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: in head/en_US.ISO8859-1/htdocs/releases: 12.0R/share/xml 12.1R/share/xml X-SVN-Commit-Revision: 53838 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 20:52:19 -0000 Author: gjb Date: Tue Jan 28 20:52:17 2020 New Revision: 53838 URL: https://svnweb.freebsd.org/changeset/doc/53838 Log: Document EN-20:01-02, SA-20:01-03. Sponsored by: Rubicon Communications, LLC (netgate.com) Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/errata.xml head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/security.xml Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Tue Jan 28 20:18:07 2020 (r53837) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/errata.xml Tue Jan 28 20:52:17 2020 (r53838) @@ -155,6 +155,21 @@ 12 November 2019 UEFI Loader Memory Fragmentation + + + FreeBSD-EN-20:01.ssp + 28 January 2020 + Imprecise orderring of canary + initialization + + + + FreeBSD-EN-20:02.nmount + 28 January 2020 + Invalid pointer dereference + Modified: head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml Tue Jan 28 20:18:07 2020 (r53837) +++ head/en_US.ISO8859-1/htdocs/releases/12.0R/share/xml/security.xml Tue Jan 28 20:52:17 2020 (r53838) @@ -207,6 +207,27 @@ 12 November 2019 Intel CPU Microcode Update + + + FreeBSD-SA-20:01.libfetch + 28 January 2020 + &man.fetch.3; buffer overflow + + + + FreeBSD-SA-20:02.ipsec + 28 January 2020 + Missing anti-replay window check + + + + FreeBSD-SA-20:03.thrmisc + 28 January 2020 + Kennel stack data disclosure + Modified: head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/errata.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/errata.xml Tue Jan 28 20:18:07 2020 (r53837) +++ head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/errata.xml Tue Jan 28 20:52:17 2020 (r53838) @@ -24,6 +24,14 @@ 12 November 2019 UEFI Loader Memory Fragmentation + + + FreeBSD-EN-20:01.ssp + 28 January 2020 + Imprecise orderring of canary + initialization + Modified: head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/security.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/security.xml Tue Jan 28 20:18:07 2020 (r53837) +++ head/en_US.ISO8859-1/htdocs/releases/12.1R/share/xml/security.xml Tue Jan 28 20:52:17 2020 (r53838) @@ -32,6 +32,20 @@ 12 November 2019 Intel CPU Microcode Update + + + FreeBSD-SA-20:01.libfetch + 28 January 2020 + &man.fetch.3; buffer overflow + + + + FreeBSD-SA-20:03.thrmisc + 28 January 2020 + Kennel stack data disclosure + From owner-svn-doc-head@freebsd.org Tue Jan 28 20:57:41 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D7621240006; Tue, 28 Jan 2020 20:57:41 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 486f8564tlz4cgW; Tue, 28 Jan 2020 20:57:41 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id CBCF6FD2; Tue, 28 Jan 2020 20:57:41 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00SKvf2v010301; Tue, 28 Jan 2020 20:57:41 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00SKvful010300; Tue, 28 Jan 2020 20:57:41 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <202001282057.00SKvful010300@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Tue, 28 Jan 2020 20:57:41 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53839 - head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/11.3R X-SVN-Commit-Revision: 53839 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Jan 2020 20:57:41 -0000 Author: gjb Date: Tue Jan 28 20:57:41 2020 New Revision: 53839 URL: https://svnweb.freebsd.org/changeset/doc/53839 Log: Regen after r357230. Sponsored by: Rubicon Communications, LLC (netgate.com) Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html head/en_US.ISO8859-1/htdocs/releases/11.3R/hardware.html Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Tue Jan 28 20:52:17 2020 (r53838) +++ head/en_US.ISO8859-1/htdocs/releases/11.3R/errata.html Tue Jan 28 20:57:41 2020 (r53839) @@ -1,5 +1,5 @@ -FreeBSD 11.3-RELEASE Errata

      FreeBSD 11.3-RELEASE Errata

      The FreeBSD Project

      FreeBSD 11.3-RELEASE Errata

      The FreeBSD Project

      FreeBSD is a registered trademark of the FreeBSD Foundation.

      Intel, Celeron, Centrino, Core, EtherExpress, i386, i486, Itanium, Pentium, and Xeon are trademarks or registered @@ -13,7 +13,7 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

      Last modified on 2019-12-06 16:20:32 EST by gjb.
      Abstract

      This document lists errata items for FreeBSD 11.3-RELEASE, + ® symbol.

      Last modified on 2020-01-28 15:56:41 EST by gjb.
      Abstract

      This document lists errata items for FreeBSD 11.3-RELEASE, containing significant information discovered after the release or too late in the release cycle to be otherwise included in the release documentation. This information @@ -38,9 +38,10 @@ the snapshot).

      For a list of all FreeBSD CERT security advisories, see https://www.FreeBSD.org/security/.

      2. Security Advisories

      AdvisoryDateTopic
      FreeBSD-SA-19:12.telnet24 July 2019

      Multiple vulnerabilities

      FreeBSD-SA-19:13.pts24 July 2019

      Write-after-free vulnerability

      FreeBSD-SA-19:14.freebsd3224 July 2019

      Kernel memory disclosure

      FreeBSD-SA-19:15.mqueuefs24 July 2019

      Reference count overflow

      FreeBSD-SA-19:16.bhyve24 July 2019

      xhci(4) out-of-bounds read

      FreeBSD-SA-19:17.fd24 July 2019

      Reference count leak

      FreeBSD-SA-19:18.bzip26 August 2019

      Multiple vulnerabilities

      FreeBSD-SA-19:19.mldv26 August 2019

      Out-of-bounds memor y access

      FreeBSD-SA-19:20.bsnmp6 August 2019

      Insufficient message length validation

      FreeBSD-SA-19:21.bhyve6 August 2019

      Insufficient validation of guest-supplied data

      FreeBSD-SA-19:22.mbuf20 August 2019

      IPv6 remove denial-of-service

      FreeBSD-SA-19:23.midi20 August 2019

      Kernel memory disclosure

      FreeBSD-SA-19:24.mqueuefs20 August 2019

      Reference count overflow

      FreeBSD-SA-19:25.mcepce12 November 2019

      Machine Check Exception on Page Size - Change

      FreeBSD-SA-19:26.mcu12 November 2019

      Intel CPU Microcode Update

      3. Errata Notices

      ErrataDateTopic
      FreeBSD-EN-19:13.mds24 July 2019

      System crash from Intel CPU vulnerability + Change

      FreeBSD-SA-19:26.mcu12 November 2019

      Intel CPU Microcode Update

      FreeBSD-SA-20:01.libfetch28 January 2020

      fetch(3) buffer overflow

      FreeBSD-SA-20:03.thrmisc28 January 2020

      Kennel stack data disclosure

      3. Errata Notices

      ErrataDateTopic
      FreeBSD-EN-19:13.mds24 July 2019

      System crash from Intel CPU vulnerability mitigation

      FreeBSD-EN-19:15.libunwind6 August 2019

      Incorrect exception handling

      FreeBSD-EN-19:16.bhyve20 August 2019

      Instruction emulation improvements

      FreeBSD-EN-19:17.ipfw20 August 2019

      "jail" keyword fix

      FreeBSD-EN-19:18.tzdata23 Oct ober 2019

      Timezone database information - update

      4. Open Issues

      4. Open Issues

      • [2019-07-04] An issue which can cause a crash when connecting to a bhyve(4) instance with a VNC client under certain circumstances had been reported. An errata notice is planned Modified: head/en_US.ISO8859-1/htdocs/releases/11.3R/hardware.html ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/11.3R/hardware.html Tue Jan 28 20:52:17 2020 (r53838) +++ head/en_US.ISO8859-1/htdocs/releases/11.3R/hardware.html Tue Jan 28 20:57:41 2020 (r53839) @@ -1,5 +1,5 @@ -FreeBSD 11.3-RELEASE Hardware Notes

        FreeBSD 11.3-RELEASE Hardware Notes

        The FreeBSD Documentation Project

        FreeBSD 11.3-STABLE Hardware Notes

        The FreeBSD Documentation Project

        FreeBSD is a registered trademark of the FreeBSD Foundation.

        AMD, AMD Athlon, AMD Opteron, AMD Phenom, AMD Sempron, AMD Turion, Athlon, Élan, Opteron, and PCnet are @@ -26,8 +26,8 @@ as trademarks. Where those designations appear in this document, and the FreeBSD Project was aware of the trademark claim, the designations have been followed by the or the - ® symbol.

        Last modified on 2019-06-14 00:30:53 UTC by gjb.

        1. Introduction

        This document contains the hardware compatibility notes for - FreeBSD 11.3-RELEASE. It lists the hardware platforms + ® symbol.

        Last modified on 2020-01-28 15:56:41 EST by gjb.

        1. Introduction

        This document contains the hardware compatibility notes for + FreeBSD 11.3-STABLE. It lists the hardware platforms supported by FreeBSD, as well as the various types of hardware devices (storage controllers, network interfaces, and so on), along with known working instances of these devices.

        2. Supported Processors and System Boards

        This section provides some architecture-specific information @@ -103,9 +103,7 @@ as sound, graphics, power management, and PCCARD expansion slots. These features tend to vary in idiosyncratic ways between machines, and frequently require special-case support - in FreeBSD to work around hardware bugs or other oddities. When - in doubt, a search of the archives of the FreeBSD laptop computer mailing list may be - useful.

        Most modern laptops (as well as many desktops) use the + in FreeBSD to work around hardware bugs or other oddities.

        Most modern laptops (as well as many desktops) use the Advanced Configuration and Power Management (ACPI) standard. FreeBSD supports ACPI via the ACPI Component Architecture reference implementation from Intel®, as described in the @@ -150,7 +148,7 @@ as well as the ATI Mach64 chips found onboard in for example Sun Blade™ 100, Sun Blade™ 150, Sun Ultra™ 5 and Sun Ultra™ 10) driver must use the serial console.

        If you have a system that is not listed here, it may not - have been tested with FreeBSD 11.3-RELEASE. We encourage + have been tested with FreeBSD 11.3-STABLE. We encourage you to try it and send a note to the FreeBSD SPARC porting mailing list with your results, including which devices work and which do not.

        The following systems are fully supported by FreeBSD:

        • Naturetech GENIALstation 777S

        • Sun Blade™ 100

        • Sun Blade™ 150

        • Sun Enterprise™ 150

        • Sun Enterprise™ 220R

        • Sun Enterprise™ 250

        • Sun Enterprise™ 420R

        • Sun Enterprise™ 450

        • Sun Fire™ B100s (support for the on-board NICs first appeared in 8.1-RELEASE)

        • Sun Fire™ V100

        • Sun Fire™ V120

        • Sun Netra™ t1 100/105

        • Sun Netra™ T1 AC200/DC200

        • Sun Netra™ t 1100

        • Sun Netra™ t 1120

        • Sun Netra™ t 1125

        • Sun Netra™ t 1400/1405

        • Sun Netra™ 120

        • Sun Netra™ X1

        • Sun SPARCEngine® Ultra AX1105

        • Su! n SPARCEngine® Ultra AXe

        • Sun SPARCEngine® Ultra AXi

        • Sun SPARCEngine® Ultra AXmp

        • Sun SPARCEngine® CP1500

        • Sun Ultra™ 1

        • Sun Ultra™ 1E

        • Sun Ultra™ 2

        • Sun Ultra™ 5

        • Sun Ultra™ 10

        • Sun Ultra™ 30

        • Sun Ultra™ 60

        • Sun Ultra™ 80

        • Sun Ultra™ 450

        The following systems are partially supported by FreeBSD. In @@ -332,7 +330,7 @@ cards compatible with the HOT1 from Virtual Computers (xrpu driver).

        [pc98] Power Management Controller of NEC PC-98 Note (pmc driver)

        This file, and other release-related documents, - can be downloaded from https://www.FreeBSD.org/releases/.

        For questions about FreeBSD, read the + can be downloaded from https://www.FreeBSD.org/snapshots/.

        For questions about FreeBSD, read the documentation before contacting <questions@FreeBSD.org>.

        All users of FreeBSD 11.3-STABLE should subscribe to the <stable@FreeBSD.org> From owner-svn-doc-head@freebsd.org Wed Jan 29 14:57:33 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id F11511F2934; Wed, 29 Jan 2020 14:57:33 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4876656m2Pz3Br7; Wed, 29 Jan 2020 14:57:33 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id E2241DC92; Wed, 29 Jan 2020 14:57:33 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00TEvXRn057369; Wed, 29 Jan 2020 14:57:33 GMT (envelope-from blackend@FreeBSD.org) Received: (from blackend@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00TEvXCX057368; Wed, 29 Jan 2020 14:57:33 GMT (envelope-from blackend@FreeBSD.org) Message-Id: <202001291457.00TEvXCX057368@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: blackend set sender to blackend@FreeBSD.org using -f From: Marc Fonvieille Date: Wed, 29 Jan 2020 14:57:33 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53840 - head/fr_FR.ISO8859-1/books/handbook/bsdinstall X-SVN-Group: doc-head X-SVN-Commit-Author: blackend X-SVN-Commit-Paths: head/fr_FR.ISO8859-1/books/handbook/bsdinstall X-SVN-Commit-Revision: 53840 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jan 2020 14:57:34 -0000 Author: blackend Date: Wed Jan 29 14:57:33 2020 New Revision: 53840 URL: https://svnweb.freebsd.org/changeset/doc/53840 Log: MFen: r44891 --> r53618 Modified: head/fr_FR.ISO8859-1/books/handbook/bsdinstall/chapter.xml Modified: head/fr_FR.ISO8859-1/books/handbook/bsdinstall/chapter.xml ============================================================================== --- head/fr_FR.ISO8859-1/books/handbook/bsdinstall/chapter.xml Tue Jan 28 20:57:41 2020 (r53839) +++ head/fr_FR.ISO8859-1/books/handbook/bsdinstall/chapter.xml Wed Jan 29 14:57:33 2020 (r53840) @@ -4,7 +4,7 @@ The FreeBSD French Documentation Project $FreeBSD$ - Original revision: 44891 + Original revision: 53618 --> - Installer &os; 9.<replaceable>X</replaceable> et versions - suivantes + Installer &os; @@ -77,10 +76,65 @@ installation - A partir de &os; 9.0-RELEASE, &os; est fourni avec un programme d'installation en mode - texte facile d'emploi appelé - bsdinstall - chapitre décrit comment installer &os; en utilisant + There are several different ways of getting &os; to run, + depending on the environment. Those are: + En fonction de l'environnement utilisé, il existe plusieurs + manières différentes pour obtenir un &os; en mesure de + fonctionner. Il existe des: + + + + Images de machines virtuelles, à télécharger et à + importer dans l'environnement virtuel de votre choix. Elles + peuvent être récupérées à partir de la page Download + FreeBSD. Il existe des images pour KVM + (qcow2), VMWare (vmdk), + Hyper-V (vhd), ainsi que des images disque + brutes (raw) qui sont universellement + supportées. Ce ne sont pas des images d'installation, mais + plutôt des instances préconfigurées (déjà + installées), prêtes à fonctionner et à effectuer les + tâches de post-installation. + + + + Images de machines virtuelles disponibles sur les + plateformes Amazon AWS + Marketplace, Microsoft + Azure Marketplace, et Google + Cloud Platform, à exécuter sur leur services + d'hébergement respectifs. Pour plus d'information sur le + déploiement de &os; sur Azure, veuillez consulter le + chapitre correspondant de la Documentayion + Azure. + + + + Images disque de cartes SD, pour les systèmes embarqués + comme le Raspberry Pi ou le BeagleBone Black. Elles peuvent + être téléchargées à partir de la page Download + FreeBSD. Ces fichiers doivent être décompressés et + écrits sur une carte SD, comme un fichier d'image disque + brut, à partir de laquelle la carte embarquée pourra + démarrer. + + + + Images disque d'installation, pour installer &os; sur un + disque dur pour les ordinateurs de bureau, ordinateurs + portables ou les systèmes serveurs. + + + + Le reste de ce chapitre décrit les quatre cas, en expliquant + comment installer &os; en utilisant un programme d'installation + en mode texte appelé bsdinstall. Par défaut, les instructions d'installation de ce chapitre @@ -111,16 +165,10 @@ - Comment créer un support d'installation de &os;. + Comment créer le support d'installation de &os;. - - Comment &os; subdivise et accède aux disques - durs. - - - Comment lancer bsdinstall. @@ -130,6 +178,15 @@ posera, ce qu'elles signifient, et comment y répondre. + + + Comment dépanner une installation qui a échouée. + + + + Comment accéder à la version live de &os; + avant d'effectuer une installation. + Avant de lire ce chapitre, vous devrez: @@ -201,8 +258,8 @@ PAE) sur les CPUs avec cette fonctionnalité. Un noyau avec la fonctionnalité PAE activée détectera la - mémoire au-desus de 4 Go et permettra son utilisation - par le système. Néamoins, utiliser PAE + mémoire au-dessus de 4 Go et permettra son utilisation + par le système. Néanmoins, utiliser PAE ajoutera des contraintes aux pilotes de périphériques et à d'autres fonctionnalités de &os;. Consulter &man.pae.4; pour plus de détails. @@ -210,18 +267,6 @@ - ia64 - - Les processeurs actuellement supportés sont - l'&itanium; et l'&itanium; 2. Les chipsets supportés - comprennent l'HP zx1, l'&intel; 460GX, et l'&intel; E8870. - Les configurations mono-processeur (UP) - et multi-processeurs (SMP) sont - supportées. - - - - &arch.powerpc; Tous les systèmes &apple; &mac; utilisant une @@ -277,7 +322,7 @@ réseau, ou sur un système de sauvegarde en ligne. Tester la sauvegarde avant de lancer l'installation afin de s'assurer qu'elle contient tous les fichiers nécessaires. Quand le - programme d'installation formatte le disque du système, + programme d'installation formate le disque du système, toutes les données stockées sur ce disque seront perdues. @@ -292,7 +337,7 @@ Dans les architectures &arch.i386; et &arch.amd64;, les disques durs peuvent être divisés en plusieurs partitions en - utilisant une des deux méthodes de partionnement. Le + utilisant une des deux méthodes de partitionnement. Le Master Boot Record (MBR) traditionnel contient une table de partitions définissant jusqu'à quatre partitions @@ -414,7 +459,7 @@ affectent le processus d'installation. Dès que ces problèmes sont découverts et corrigés, ils sont notés dans l'Errata de &os; (http://www.freebsd.org/releases/&rel.current;R/errata.html) + xlink:href="&url.base;/releases/&rel.current;R/errata.html">https://www.freebsd.org/releases/&rel.current;R/errata.html) présent sur le site Web de FreeBSD. Vérifier l'errata avant l'installation afin d'être sûr qu'il n'y a pas de problème pouvant affecter l'installation. @@ -422,142 +467,182 @@ Les informations sur chaque version, y compris les errata, peuvent être trouvés sur le site web de &os; dans la section d'information sur les différentes versions (http://www.freebsd.org/releases/index.html). + xlink:href="&url.base;/releases/index.html">https://www.freebsd.org/releases/index.html). Préparer le support d'installation - Une installation de &os; est lancée en démarrant - l'ordinateur avec un CD, - DVD, ou clé USB - d'installation de &os;. Le programme d'installation n'est pas - un programme qui peut être exécuté à partir d'un autre système - d'exploitation. + Le programme d'installation &os; n'est pas une application + qui peut être exécutée à partir d'un autre système + d'exploitation. Au lieu de cela, télécharger un fichier + d'installation de &os;, copiez-le sur le support correspondant + à sa taille (CD, DVD, ou + clé USB) et démarrer le système pour + installer à partir du support inséré ou branché sur + l'ordinateur. - En plus des supports standards d'installation qui - contiennent une copie de l'ensemble des fichiers - d'installation de &os;, il existe une variante dite - bootonly. Le support d'installation - bootonly ne comprend pas les fichiers d'installation, mais les - téléchargera à partir du réseau lors de l'installation. Le - CD d'installation bootonly est donc plus - petit, et réduit la bande passante utilisée lors de - l'installation en ne téléchargeant que les fichiers - nécessaires. - - Des exemplaires des supports d'installation de &os; sont + Les fichiers d'installation de &os; sont disponibles sur www.freebsd.org/where.html#download. - Téléchargez également le fichier + Chaque nom de fichier d'installation contient le numéro de la + version de &os;, l'architecture et le type de fichier. + Par exemple pour installer &os; 10.2 sur un système + &arch.amd64; à partir d'un DVD, téléchargez + FreeBSD-10.2-RELEASE-amd64-dvd1.iso, + gravez ce fichier sur un DVD, et démarrer + le système avec le DVD inséré. + + Les fichiers d'installation sont disponibles dans + différents formats. Les formats varient en fonction de + l'architecture matérielle et du type de support. + + Des fichiers + d'installation supplémentaires sont prévus pour les + ordinateurs qui sont amorcés par UEFI + (Unified Extensible Firmware Interface pour Interface + micrologicielle extensible unifiée). Le nom de ces + fichiers comprend la chaîne de caractères + uefi. + + Types de fichiers: + + + + -bootonly.iso: C'est le plus petit + fichier d'installation car il ne contient que le programme + d'installation. Une connexion à Internet fonctionnelle + est requise lors de l'installation puisque le programme + d'installation téléchargera les fichiers nécessaires pour + effectuer l'installation de &os;. Ce fichier doit être + gravé sur un CD en utilisant une + application de gravure de CDs. + + + + -disc1.iso: Ce fichier contient + tous les fichiers nécessaires pour installer &os;, ses + sources, et le catalogue des logiciels portés. Il doit + être gravé sur un CD en utilisant une + application de gravure de CDs. + + + + -dvd1.iso: Ce fichier contient + tous les fichiers nécessaires pour installer &os;, ses + sources, et le catalogue des logiciels portés. Il + contient également un ensemble de paquetages binaires + populaires pour installer un gestionnaire de fenêtres et + des applications de manière à ce qu'un système complet + puisse être installé sans nécessiter une connexion à + Internet. Ce fichier être gravé sur un + DVD en utilisant une application de + gravure de DVDs. + + + + -memstick.img: Ce fichier contient + tous les fichiers nécessaires pour installer &os;, ses + sources, et le catalogue des logiciels portés. Il doit + être copié sur une clé USB en suivant + les instructions données plus bas. + + + + -mini-memstick.img: Comme + -bootonly.iso, ne contient pas les + fichiers d'installation, mais les téléchargera au fur et à + mesure des besoins. Un connexion à Internet fonctionnelle + est requise lors de l'installation. Copier ce fichier sur + une clé USB comme décrit dans . + + + + Après avoir téléchargé le fichier image du support d'installation, + téléchargez également le fichier CHECKSUM.SHA256 à partir du même - répertoire et utilisez-le pour contrôler l'intégralité des - fichiers en calculant une somme de - contrôle ou checksum. &os; - fournit &man.sha256.1; à cet effet, les autres systèmes - d'exploitation proposent des outils similaires. Comparez la + répertoire. Calculez une somme de + contrôle ou checksum du + fichier image. &os; fournit &man.sha256.1; à cet effet, à + utiliser comme sha256 fichierimage. + Les autres systèmes d'exploitation proposent des outils similaires. + + Comparez la somme de contrôle calculée avec celle donnée dans le fichier CHECKSUM.SHA256. Les sommes de contrôle doivent être identiques. Si une des sommes ne correspond pas, le fichier est corrompu et devra être téléchargé à nouveau. - - Si une copie de &os; sur CD, - DVD, ou clé USB existe - déjà , cette section peut être ignorée. - + + Ecrire un fichier image sur un disque + <acronym>USB</acronym> - Les images CD et - DVD de &os; sont des fichiers - ISO bootable. Seul un - CD ou DVD est nécessaire - pour l'installation. Gravez l'image ISO - sur un CD ou DVD en - utilisant un logiciel de gravure disponible avec le système - d'exploitation actuel. Sous &os;, la gravure est possible - avec cdrecord du logiciel porté sysutils/cdrtools, installé à partir du - catalogue des logiciels portés. + Le fichier *.img est une + image de l'intégralité du contenu d'une + clé USB. Il ne peut pas être copié + directement vers le périphérique de destination comme un + simple fichier. Plusieurs applications existent pour écrire + le fichier *.img sur une clé + USB. Cette section décrit deux de ces + utilitaires. - Pour créer une clé USB bootable, suivez - les étapes suivantes: - - - - Obtenir l'image de la clé USB - - Les images de clés USB pour &os; 9.0-RELEASE et - versions ultérieures peuvent être téléchargées à partir du - répertoire ISO-IMAGES/ à l'adresse - ftp://ftp.FreeBSD.org/pub/FreeBSD/releases/arch/arch/ISO-IMAGES/version/&os;-version-RELEASE-arch-memstick.img. - Remplacer arch et - version par respectivement - l'architecture et le numéro de version à - installer. Par exemple, les images de clés USB Pour - &os;/&arch.i386; 9.0-RELEASE sont disponibles à - partir de . - - - Un chemin de répertoire différent est utilisé pour - &os; 8.X et les versions - antérieures. - - - L'image de la clé USB a l'extension - .img. Le répertoire - ISO-IMAGES/ contient un certain - nombre d'images différentes, et celle à employer dépend de - la version de &os; à installer, et dans certains cas, du - matériel cible de l'installation. - - Avant de continuer, sauvegardez - les données présentes sur la clé USB, en effet - l'écriture de l'image détruira - toutes les données. + Avant de continuer, sauvegardez toutes les données + importantes présentes sur la clé USB. Cette procédure + effacera toutes les données sur la clé. - + + + Utiliser <command>dd</command> pour écrire une + image - - Ecrire le fichier image sur la clé USB + + Cet exemple prend /dev/da0 + comme périphérique cible sur lequel l'image sera écrite. + Vérifiez que le périphérique utilisé comme cible est + bien le bon, car cette commande détruira les données + existantes. + - - Utiliser &os; pour écrire l'image + + L'utilitaire en ligne de commande &man.dd.1; est + disponible sur les systèmes BSD, &linux;, et &macos;. + Pour écrire une image en utilisant + dd, brancher la clé + USB et déterminez son nom de + périphérique. Indiquer, alors, le nom du fichier + d'installation téléchargé et le nom du périphérique pour + la clé USB. Cet exemple écrit le + fichier image d'installation &arch.amd64; sur le premier + périphérique USB sur un système &os; + existant. - - L'exemple ci-dessous prend - /dev/da0 comme périphérique cible - sur lequel l'image sera écrite. Vérifiez que le - périphérique utilisé comme cible est bien le bon, car - cette commande détruira les données existantes. - + &prompt.root; dd if=FreeBSD-10.2-RELEASE-amd64-memstick.img of=/dev/da0 bs=1M conv=sync - - Ecrire l'image avec &man.dd.1; + Si cette commande échoue, vérifier que la clé + USB n'est pas montée et que le nom de + périphérique est bien celui d'un disque et non d'une + partition. Certains systèmes d'exploitation pourront + nécessiter l'exécution de cette commande avec + &man.sudo.8;. La syntaxe &man.dd.1; varie légèrement en + fonction des plate-formes; par exemple, &macos; a besoin + d'un en minuscules. Des systèmes + comme &linux; pourront mettre en tampon les écritures. + Pour forcer toutes les écritures en attente à + s'effectuer, utiliser &man.sync.8;. + + - Le fichier .img n'est - pas un - fichier classique. C'est une - image de l'intégralité du contenu - de la clé. Il ne peut pas être - copié comme n'importe quel fichier, mais - doit être écrit directement sur le périphérique cible - avec &man.dd.1;: - - &prompt.root; dd if=&os;-9.0-RELEASE-&arch.i386;-memstick.img of=/dev/da0 bs=64k - - - Utiliser &windows; pour écrire l'image - Assurez-vous de préciser le bon lecteur comme - cible, car les données existantes seront écrasées et - détruites. + Assurez-vous de préciser le bon disque comme + cible, car les données existantes sur ce disque seront + écrasées et détruites. @@ -568,7 +653,7 @@ &windows; est une application gratuite pour écrire une image sur une clé USB. Téléchargez-la depuis + xlink:href="https://sourceforge.net/projects/win32diskimager/">https://sourceforge.net/projects/win32diskimager/ et décompressez-la dans un répertoire. @@ -577,7 +662,7 @@ Double-cliquez sur l'icone Win32DiskImager pour lancer - le programme. Vérifez que le lecteur affiché sous + le programme. Vérifiez que le lecteur affiché sous Device est celui de la clé USB. Cliquer sur l'icone répertoire et sélectionner l'image à écrire sur la clé. Cliquer sur @@ -590,16 +675,10 @@ le fichier image sur la clé USB. - - - - L'installation à partir de disquettes n'est plus - supportée. - - Vous êtes maintenant prêt à commencer l'installation de &os;. + @@ -664,7 +743,7 @@ commit your changes? Soit les modifications du BIOS - étaient incorrectes ou non-sauvegardées. Revérifier que + étaient incorrectes ou non-sauvegardées. Vérifier à nouveau que le bon périphérique a été choisi comme premier périphérique de démarrage. @@ -775,7 +854,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. - Boot Multi User (Démarage en mode + Boot Multi User (Démarrage en mode multi-utilisateur): Cette option provoquera la poursuite du processus de démarrage de &os;. Si le décompte du démarrage a été mis en pause, appuyer sur @@ -784,7 +863,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. - Boot Single User (Démarage en mode + Boot Single User (Démarrage en mode mono-utilisateur): Ce mode peut être employé pour réparer une installation de &os; existante comme décrit dans la . Appuyer sur @@ -834,7 +913,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.On ou Off en appuyant sur le chiffre ou le caractère en surbrillance pour chaque option. Le système - démarre toujours en utilisant le paramètrage choisi pour ces + démarre toujours en utilisant le paramétrage choisi pour ces options jusqu'à ce qu'il soit modifié. Plusieurs options peuvent être modifées en utilisant ce menu: @@ -874,7 +953,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.1 ou Retour arrière pour retourner au menu de démarrage principal, puis appuyer sur Entrée pour démarrer sous &os;. Une série de - messages de démarrage apparaitront au fur et à mesure que &os; + messages de démarrage apparaîtra au fur et à mesure que &os; détectera le matériel et chargera le programme d'installation. Une fois le démarrage achevé, le menu d'accueil de la sera affiché. @@ -923,10 +1002,10 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.bsdinstall et le type d'information qui sera demandé avant l'installation du système. Utiliser les touches fléchées pour sélectionner un menu, et ensuite la touche - Space pour sélectionner ou déselectionner un - des éléments du menu. Ensuite, utiliser Enter - pour sauvegarder la sélection et passer à l'écran - suivant. + Espace pour sélectionner ou déselectionner cet + élément du menu. Une fois terminé, utiliser + Enter pour sauvegarder la sélection et passer + à l'écran suivant. Sélectionner le menu des tables de clavier @@ -1040,7 +1119,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.Décider quels composants installer dépendra principalement de l'utilisation prévue du système et de l'espace disque disponible. Le noyau &os; et les utilitaires de base, formant - ensemble ce que l'on nomme le système de base, + ensemble ce que l'on nomme le système de base, sont toujours installés. Selon l'architecture, certains de ces composants peuvent ne pas apparaître: @@ -1072,11 +1151,8 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.ports - Le catalogue des logiciels portés pour &os;. - Le catalogue des logiciels portés est une méthode - simple et commode pour installer des logiciels. Le - catalogue des logiciels portés ne contient pas le code - source nécessaire pour compiler le logiciel. A la place, - c'est un ensemble de fichiers qui automatise le + Le catalogue des logiciels portés est un + ensemble de fichiers qui automatise le téléchargement, la compilation et l'installation de logiciels tierce-partie. Le discute de l'utilisation du catalogue des logiciels @@ -1092,32 +1168,33 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. - src - Code source du système. - - &os; est livré avec le code source complet du noyau et + src - Code source complet du noyau et du système de base. Bien que n'étant pas requis pour la majorité des applications, il peut être nécessaire pour - compiler certains logiciels (par exemple, les pilotes de - périphériques ou les modules du noyau), ou pour développer - &os;. - - L'arborescence complète des sources demande 1 Go + compiler des pilotes de périphériques, des modules du + noyau, ou des application du catalogue des logiciels + portés. Il est également utilisé pour le développement de + &os;. L'arborescence complète des sources demande + 1 Go d'espace disque, et la recompilation du système &os; complet nécessite 5 Go d'espace supplémentaire. - - + Installation à partir du réseau - Le support d'installation bootonly ne - contient pas de copie des fichiers d'installation. Lorsqu'une - méthode d'installation de type bootonly est - utilisée, les fichiers doivent être récupérés par - l'intermédiaire d'une connexion réseau. + Le menu affiché dans n'apparaît que lors + de l'installation à partir d'un CD + -bootonly.iso étant donné que ce support + d'installation ne contient pas de copie des fichiers + d'installation. Comme les fichiers d'installation doivent être + récupérés par l'intermédiaire d'une connexion réseau, ce menu + indique qu'une interface réseau doit être configurée en premier + lieu.

        Installation à partir du réseau @@ -1129,14 +1206,14 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        - Après que la connexion réseau ait été configurée comme - montré dans , un - site miroir est sélectionné. Les sites miroirs maintiennent des - copies des fichiers &os;. Choisissez un site miroir situé dans + Pour configurer la connexion réseau, appuyer sur + Enter et suivre les instructions données dans + . Une fois + l'interface configurée, choisir un site miroir situé dans la même région du monde que l'ordinateur sur lequel &os; doit être installé. Les fichiers peuvent être récupérés plus - rapidement quand le miroir est proche de l'ordinateur cible, et - les temps d'installation réduits. + rapidement quand le miroir est proche de l'ordinateur cible, + réduisant ainsi les temps d'installation.
        Sélection d'un miroir @@ -1149,41 +1226,20 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        - L'installation se poursuivra comme si les fichiers - d'installation étaient présents en local. + L'installation se poursuivra alors comme si les fichiers + d'installation étaient présents sur le support d'installation + local. + Allouer l'espace disque - Il existe quatre manières pour allouer l'espace disque pour - &os;. Le partionnement guidé (Guided) fixe - automatiquement les partitions disque, alors que le - partionnement manuel (Manual) permet aux - utilisateurs avancés de créer des partitions sur mesures. - L'option ZFS, disponible uniquement sous &os; - 10 et versions suivantes, créera un système de fichiers racine - sur ZFS optionnel avec support pour les différents - environnements de démarrage. - Enfin, il y a la possibilité de lancer un interpréteur de - commandes dans lequel les programmes en ligne de commande comme - &man.gpart.8;, &man.fdisk.8;, et &man.bsdlabel.8; pourront être - utilisés directement. + Le menu suivant est utilisé pour déterminer la méthode pour + allouer l'espace disque. -
        - Sélection du partitionnement guidé, manuel ou via - l'interpréteur de commandes - - - - - - -
        -
        - Choix de partionnement sous &os; 10.X et versions + <title>Choix du partitionnement sous FreeBSD 10.X et versions ultérieures @@ -1193,6 +1249,20 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        + Le partitionnement guidé (Guided) fixe + automatiquement les partitions disque, le partitionnement manuel + (Manual) permet aux utilisateurs avancés de + créer des partitions sur mesures à partir des options du menu, + Shell ouvre une invite d'interpréteur de + commandes dans laquelle les utilisateurs avancés peuvent créer + des partitions sur mesures en employant des utilitaires en ligne + de commande comme &man.gpart.8;, &man.fdisk.8;, et + &man.bsdlabel.8;. Le partitionnement ZFS, + disponible uniquement sous &os; 10 et versions suivantes, créera + un système de fichiers racine sur ZFS éventuellement chiffré + avec support pour différents environnements de + démarrage. + Cette section décrit ce qui doit être pris en compte lors du partitionnement du disque. Elle montre ensuite comment utiliser les différentes méthodes de partionnement. @@ -1211,7 +1281,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4./usr - Lors du partionnement, il faut garder à l'esprit que les + Lors du partitionnement, il faut garder à l'esprit que les disques durs transfèrent les données plus rapidement depuis les pistes extérieures que depuis les pistes intérieures. Aussi, les systèmes de fichiers plus petits et très sollicités @@ -1250,7 +1320,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.La partition /usr contient beaucoup de fichiers nécessaires au système, dont le catalogue des logiciels portés de &os; et le code source du système. Au - moins 2 gigaoctets sont recommandés pour cette + moins 2 gigaoctets d'espace sont recommandés pour cette partition. Lors du choix de la taille des partitions, gardez à @@ -1313,7 +1383,9 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. Partitionnement guidé - Si plusieurs disques sont connectés, choisissez celui sur + Quand cette méthode est sélectionnée, un menu affichera + le(s) disque(s) disponible(s). + Si plusieurs disques sont connectés, choisissez celui sur lequel &os; doit être installé.
        @@ -1327,11 +1399,13 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        - L'intégralité ou une portion du disque peut être - allouée pour &os;. Si + Une fois le disque sélectionné, le menu suivant demande + si l'installation se fait soit sur l'intégralité du disque + soit sur une partition à créer à partir de l'espace libre. + Si [ Entire Disk ] est sélectionné, une partition recouvrant la totalité du disque - est créée. Sélectionner + est automatiquement créée. Sélectionner [ Partition ] créé une partition dans l'espace inutilisé du disque. @@ -1347,19 +1421,20 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. - Une fois les partitions créés, vérifiez attentivement le - résultat. Si une erreur a été faite, sélectionner + Une fois l'organisation des partitions créée, vérifiez-la + afin de s'assurer qu'elle correspond bien aux besoins de + l'installation. La sélection de [ Revert ] permettra de - revenir au partionnement de départ, ou + revenir au partitionnement de départ, et l'appui sur [ Auto ] créera les partitions &os; automatiquement. Les partitions peuvent être créées, modifiées, ou supprimées manuellement. Quand le - partionnement est correct, sélectionner + partitionnement est correct, sélectionner [ Finish ] pour poursuivre l'installation.
        - Vérification des partitions créés + Vérification des partitions créées @@ -1372,7 +1447,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. Partitionnement manuel - Le partionnement manuel envoie directement dans l'éditeur + La sélection de cette méthode ouvre l'éditeur de partitions.
        @@ -1386,10 +1461,10 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        - Sélectionner un disque (ada0 dans + Sélectionner le disque d'installation(ada0 dans cet exemple) et [ Create ] - permet d'afficher un menu pour le choix du type de - table de partitionnement. + pour afficher un menu sur le choix du type de + table de partitionnement.
        Créer manuellement les partitions @@ -1403,13 +1478,13 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.
        - Le partionnement GPT est généralement - le choix le plus approprié pour les ordinateurs de type PC. - Les systèmes d'exploitation anciens ne sont pas compatibles - avec GPT et peuvent nécessiter à la place + Le partitionnement GPT est généralement + le choix le plus approprié pour les ordinateurs de type &arch.amd64; + Les ordinateurs anciens qui ne sont pas compatibles + avec GPT doivent utiliser à la place un partitionnement de type MBR. Les autres systèmes de partitionnement sont en général utilisés pour les - ordinateurs anciens ou particuliers. + ordinateurs plus anciens ou particuliers. Tables de partitionnement @@ -1425,17 +1500,17 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. APM - Table de partition Applie, utilisée par le &macintosh; &powerpc; (http://support.apple.com/kb/TA21692). + Table de partition Apple, utilisée par l'architecture &powerpc;. BSD - Partitions BSD (BSD Labels) - sans MBR, parfois appelé dangerously - dedicated mode ou mode - dédié. Consulter la page de manuel - &man.bsdlabel.8;. + Partition BSD (BSD Labels) + sans MBR, parfois appelée dangerously + dedicated mode ou mode + dédié car les utilitaires disques + non-BSD peuvent ne pas la + reconnaître. @@ -1452,7 +1527,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. PC98 - Variante du MBR, utilisée par les ordinateurs de + Variante du MBR, utilisée par les ordinateurs de type NEC PC-98 (http://en.wikipedia.org/wiki/Pc9801). @@ -1470,7 +1545,9 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.Après avoir choisi et créé le partitionnement, sélectionner à nouveau [ Create ] créera les - nouvelles partitions. + nouvelles partitions. La touche Tab est + utilisée pour déplacer le curseur entre les différents + champs.
        Créer manuellement les partitions @@ -1488,17 +1565,15 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. - Partitionnement <acronym>GPT</acronym> standard sous - &os; - freebsd-boot - Code de démarrage + freebsd-boot - Contient le code de démarrage &os;. freebsd-ufs - Un système de - fichiers UFS &os;. + fichiers UFS &os;. @@ -1510,12 +1585,13 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.Un autre type de partition qui vaut la peine d'être mentionné freebsd-zfs, employé pour des partitions qui contiendront un système de fichiers &os; - ZFS. Voir . La page - de manuel &man.gpart.8; liste d'autres types de partitions - disponibles pour GPT. + ZFS (Voir ). + Consulter la page de manuel &man.gpart.8; pour la description + d'autres types de partitions disponibles pour + GPT. Des partitions avec plusieurs systèmes de fichiers peuvent - être utilisées, certaines personnes peuvent préférer une + être créées et certaines personnes préfèrent une organisation plus traditionnelle avec des partitions séparées pour les systèmes de fichiers /, /var, /tmp, et @@ -1531,44 +1607,43 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. Un alignement correct des secteurs sur le disque permet de meilleures performances, et créer des partitions de - tailles multiples de 4K permet de s'assurer de l'alignement - sur les disques à secteur de 512 octets ou 4 Koctets. + tailles multiples de 4Koctets permet de s'assurer de l'alignement + sur les disques à secteur de 512 octets ou 4Koctets. Généralement, employer des tailles de partition qui sont des multiples d'1M ou 1G est le moyen le plus simple de garantir - que chaque partition débute sur un multiple de 4K. Une - exception: à présent, la partition + que chaque partition débute sur un multiple de 4K. Il + existe une exception: la partition freebsd-boot ne devrait pas dépasser 512K en raison de limitations du code de démarrage. Un point de montage est nécessaire si cette partition - contiendra un système de fichiers. Si une seule partition UFS + contiendra un système de fichiers. Si une seule partition UFS unique sera créée, le point de montage devra être /. - Un label est également demandé. Un - label (ou étiquette) est le nom par lequel la partition sera + Un Label (ou étiquette) est le nom avec lequel la partition sera connue. Les noms ou numéros de disques peuvent varier si le disque est connecté à un contrôleur ou port différent, mais le label de partition ne changera pas. Se référer aux labels plutôt qu'aux noms de disques et numéros de partitions dans les fichiers comme /etc/fstab rend le système plus tolérant aux changements de matériel. Les labels - GPT apparaissent dans le répertoire + GPT apparaissent dans le répertoire /dev/gpt/ lorsqu'un disque est attaché au système. Les autres systèmes de partitionnement présentent - d'autres possibilités au niveau des labels, et leur labels + d'autres possibilités au niveau des labels et leur labels apparaissent sous différentes répertoires dans /dev/. - Employez un label unique pour chaque système de fichiers + Employez un label unique pour chaque partition pour éviter les conflits avec les labels identiques. Quelques lettres du nom du l'ordinateur, de son rôle, ou de son emplacement peuvent être ajoutées au label. Par exemple, labroot ou - rootfs-lab pour la partition UFS racine - de l'ordinateur du laboratoire. + rootfslab pour la partition UFS racine + de l'ordinateur appelé lab. @@ -1592,7 +1667,7 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4. Par défaut, le programme gptboot de - &os; s'attend à ce que la première partition UFS trouvée soit la + &os; s'attend à ce que la première partition UFS trouvée soit la partition /. @@ -1767,8 +1842,8 @@ Ethernet address 0:3:ba:b:92:d4, Host ID: 830b92d4.- Rescan Devices pour repeupler la liste des disques - disponibles. Pour éviter d'effacer par accident le mauvais - disque, le menu - Disk Info peut être + disponibles. Pour éviter d'effacer par accident les mauvais *** DIFF OUTPUT TRUNCATED AT 1000 LINES *** From owner-svn-doc-head@freebsd.org Wed Jan 29 15:46:27 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 7B9D21F3F48; Wed, 29 Jan 2020 15:46:27 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4877BW2L3cz3Fgb; Wed, 29 Jan 2020 15:46:27 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4B7E6E5AD; Wed, 29 Jan 2020 15:46:27 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00TFkRJh087586; Wed, 29 Jan 2020 15:46:27 GMT (envelope-from blackend@FreeBSD.org) Received: (from blackend@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00TFkROI087585; Wed, 29 Jan 2020 15:46:27 GMT (envelope-from blackend@FreeBSD.org) Message-Id: <202001291546.00TFkROI087585@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: blackend set sender to blackend@FreeBSD.org using -f From: Marc Fonvieille Date: Wed, 29 Jan 2020 15:46:27 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53841 - head/fr_FR.ISO8859-1/books/handbook/linuxemu X-SVN-Group: doc-head X-SVN-Commit-Author: blackend X-SVN-Commit-Paths: head/fr_FR.ISO8859-1/books/handbook/linuxemu X-SVN-Commit-Revision: 53841 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jan 2020 15:46:27 -0000 Author: blackend Date: Wed Jan 29 15:46:26 2020 New Revision: 53841 URL: https://svnweb.freebsd.org/changeset/doc/53841 Log: MFen: r53044 --> r53722 Modified: head/fr_FR.ISO8859-1/books/handbook/linuxemu/chapter.xml Modified: head/fr_FR.ISO8859-1/books/handbook/linuxemu/chapter.xml ============================================================================== --- head/fr_FR.ISO8859-1/books/handbook/linuxemu/chapter.xml Wed Jan 29 14:57:33 2020 (r53840) +++ head/fr_FR.ISO8859-1/books/handbook/linuxemu/chapter.xml Wed Jan 29 15:46:26 2020 (r53841) @@ -4,7 +4,7 @@ The FreeBSD French Documentation Project $FreeBSD$ - Original revision: 53044 + Original revision: 53722 --> Compatibilité binaire avec &linux; @@ -111,14 +111,13 @@ 7 1 0xc24db000 d000 linux.ko Le logiciel précompilé - emulators/linux_base-c6 ou la version + emulators/linux_base-c7 ou la version compilée à partir du catalogue des logiciels portés est la méthode la plus simple pour installer l'ensemble des bibliothèques et binaires de base &linux; sur un système - &os;. + &os;. Pour installer le logiciel porté: - &prompt.root; pkg install - emulators/linux_base-c6 + &prompt.root; pkg install emulators/linux_base-c7 Pour activer au démarrage la compatibilité &linux;, ajouter ligne suivante au fichier From owner-svn-doc-head@freebsd.org Wed Jan 29 15:49:32 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 452701F401D; Wed, 29 Jan 2020 15:49:32 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4877G417zJz3Fl5; Wed, 29 Jan 2020 15:49:32 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 227F1E5B1; Wed, 29 Jan 2020 15:49:32 +0000 (UTC) (envelope-from blackend@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00TFnWUS087755; Wed, 29 Jan 2020 15:49:32 GMT (envelope-from blackend@FreeBSD.org) Received: (from blackend@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00TFnWWx087754; Wed, 29 Jan 2020 15:49:32 GMT (envelope-from blackend@FreeBSD.org) Message-Id: <202001291549.00TFnWWx087754@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: blackend set sender to blackend@FreeBSD.org using -f From: Marc Fonvieille Date: Wed, 29 Jan 2020 15:49:32 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53842 - head/fr_FR.ISO8859-1/books/handbook X-SVN-Group: doc-head X-SVN-Commit-Author: blackend X-SVN-Commit-Paths: head/fr_FR.ISO8859-1/books/handbook X-SVN-Commit-Revision: 53842 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jan 2020 15:49:32 -0000 Author: blackend Date: Wed Jan 29 15:49:31 2020 New Revision: 53842 URL: https://svnweb.freebsd.org/changeset/doc/53842 Log: Bump copyright year after important changes. Modified: head/fr_FR.ISO8859-1/books/handbook/book.xml Modified: head/fr_FR.ISO8859-1/books/handbook/book.xml ============================================================================== --- head/fr_FR.ISO8859-1/books/handbook/book.xml Wed Jan 29 15:46:26 2020 (r53841) +++ head/fr_FR.ISO8859-1/books/handbook/book.xml Wed Jan 29 15:49:31 2020 (r53842) @@ -47,6 +47,7 @@ 2017 2018 2019 + 2020 Groupe de Documentation &os; From owner-svn-doc-head@freebsd.org Wed Jan 29 17:06:33 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 9E7AC1F6966; Wed, 29 Jan 2020 17:06:33 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4878yx3lR5z3Lfv; Wed, 29 Jan 2020 17:06:33 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 77953F54B; Wed, 29 Jan 2020 17:06:33 +0000 (UTC) (envelope-from gjb@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00TH6Xs0035656; Wed, 29 Jan 2020 17:06:33 GMT (envelope-from gjb@FreeBSD.org) Received: (from gjb@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00TH6XVp035655; Wed, 29 Jan 2020 17:06:33 GMT (envelope-from gjb@FreeBSD.org) Message-Id: <202001291706.00TH6XVp035655@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: gjb set sender to gjb@FreeBSD.org using -f From: Glen Barber Date: Wed, 29 Jan 2020 17:06:33 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53843 - head/en_US.ISO8859-1/htdocs/releases/12.2R X-SVN-Group: doc-head X-SVN-Commit-Author: gjb X-SVN-Commit-Paths: head/en_US.ISO8859-1/htdocs/releases/12.2R X-SVN-Commit-Revision: 53843 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jan 2020 17:06:33 -0000 Author: gjb Date: Wed Jan 29 17:06:32 2020 New Revision: 53843 URL: https://svnweb.freebsd.org/changeset/doc/53843 Log: Fix a copy/paste error. PR: 243690 Submitted by: Pau Amma Sponsored by: Rubicon Communications, LLC (netgate.com) Modified: head/en_US.ISO8859-1/htdocs/releases/12.2R/schedule.xml Modified: head/en_US.ISO8859-1/htdocs/releases/12.2R/schedule.xml ============================================================================== --- head/en_US.ISO8859-1/htdocs/releases/12.2R/schedule.xml Wed Jan 29 15:49:31 2020 (r53842) +++ head/en_US.ISO8859-1/htdocs/releases/12.2R/schedule.xml Wed Jan 29 17:06:32 2020 (r53843) @@ -126,7 +126,7 @@
        - + From owner-svn-doc-head@freebsd.org Wed Jan 29 17:22:07 2020 Return-Path: Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 5AF3F1F6DEE; Wed, 29 Jan 2020 17:22:07 +0000 (UTC) (envelope-from alfredo@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4879Jv1n8Hz3MM6; Wed, 29 Jan 2020 17:22:07 +0000 (UTC) (envelope-from alfredo@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 36907F7DD; Wed, 29 Jan 2020 17:22:07 +0000 (UTC) (envelope-from alfredo@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 00THM7u1047682; Wed, 29 Jan 2020 17:22:07 GMT (envelope-from alfredo@FreeBSD.org) Received: (from alfredo@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 00THM6Ig047677; Wed, 29 Jan 2020 17:22:06 GMT (envelope-from alfredo@FreeBSD.org) Message-Id: <202001291722.00THM6Ig047677@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: alfredo set sender to alfredo@FreeBSD.org using -f From: "Alfredo Dal'Ava Junior" Date: Wed, 29 Jan 2020 17:22:06 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53844 - in head: en_US.ISO8859-1/articles/contributors share/pgpkeys share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: alfredo X-SVN-Commit-Paths: in head: en_US.ISO8859-1/articles/contributors share/pgpkeys share/xml X-SVN-Commit-Revision: 53844 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 29 Jan 2020 17:22:07 -0000 Author: alfredo (src committer) Date: Wed Jan 29 17:22:05 2020 New Revision: 53844 URL: https://svnweb.freebsd.org/changeset/doc/53844 Log: Add myself (alfredo) as a src commiter Approved by: jhibbits (mentor) Added: head/share/pgpkeys/alfredo.key (contents, props changed) Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml head/share/pgpkeys/pgpkeys-developers.xml head/share/pgpkeys/pgpkeys.ent head/share/xml/authors.ent head/share/xml/news.xml Modified: head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml ============================================================================== --- head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Wed Jan 29 17:06:32 2020 (r53843) +++ head/en_US.ISO8859-1/articles/contributors/contrib.committers.xml Wed Jan 29 17:22:05 2020 (r53844) @@ -281,6 +281,10 @@ xmlns:xlink="http://www.w3.org/1999/xlink" version="5. + &a.alfredo.email; + + + &a.bapt.email; Added: head/share/pgpkeys/alfredo.key ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/pgpkeys/alfredo.key Wed Jan 29 17:22:05 2020 (r53844) @@ -0,0 +1,65 @@ + + + +sub rsa4096/DF8F858B2C0C8187 2020-01-29 [E] [expires: 2023-01-28] + +]]> + Modified: head/share/pgpkeys/pgpkeys-developers.xml ============================================================================== --- head/share/pgpkeys/pgpkeys-developers.xml Wed Jan 29 17:06:32 2020 (r53843) +++ head/share/pgpkeys/pgpkeys-developers.xml Wed Jan 29 17:22:05 2020 (r53844) @@ -466,6 +466,11 @@ &pgpkey.aaron; + + &a.alfredo.email; + &pgpkey.alfredo; + + &a.bapt.email; &pgpkey.bapt; Modified: head/share/pgpkeys/pgpkeys.ent ============================================================================== --- head/share/pgpkeys/pgpkeys.ent Wed Jan 29 17:06:32 2020 (r53843) +++ head/share/pgpkeys/pgpkeys.ent Wed Jan 29 17:22:05 2020 (r53844) @@ -18,6 +18,7 @@ + Modified: head/share/xml/authors.ent ============================================================================== --- head/share/xml/authors.ent Wed Jan 29 17:06:32 2020 (r53843) +++ head/share/xml/authors.ent Wed Jan 29 17:22:05 2020 (r53844) @@ -96,6 +96,9 @@ alfred@FreeBSD.org"> + +alfredo@FreeBSD.org"> + allanjude@FreeBSD.org"> Modified: head/share/xml/news.xml ============================================================================== --- head/share/xml/news.xml Wed Jan 29 17:06:32 2020 (r53843) +++ head/share/xml/news.xml Wed Jan 29 17:22:05 2020 (r53844) @@ -37,6 +37,12 @@ 27 +

        New commiter: + Alfredo Dal'Ava Júnior + (src)

        +
        + + October-December 2019 Status Report

        The Delivered-To: svn-doc-head@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A5DA824893C; Sat, 1 Feb 2020 08:56:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 488nxd3wNXz4JnW; Sat, 1 Feb 2020 08:56:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 8197024536; Sat, 1 Feb 2020 08:56:05 +0000 (UTC) (envelope-from jkois@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 0118u5Er034541; Sat, 1 Feb 2020 08:56:05 GMT (envelope-from jkois@FreeBSD.org) Received: (from jkois@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 0118u5N2034540; Sat, 1 Feb 2020 08:56:05 GMT (envelope-from jkois@FreeBSD.org) Message-Id: <202002010856.0118u5N2034540@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: jkois set sender to jkois@FreeBSD.org using -f From: Johann Kois Date: Sat, 1 Feb 2020 08:56:05 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r53845 - head/de_DE.ISO8859-1/share/xml X-SVN-Group: doc-head X-SVN-Commit-Author: jkois X-SVN-Commit-Paths: head/de_DE.ISO8859-1/share/xml X-SVN-Commit-Revision: 53845 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 01 Feb 2020 08:56:05 -0000 Author: jkois Date: Sat Feb 1 08:56:05 2020 New Revision: 53845 URL: https://svnweb.freebsd.org/changeset/doc/53845 Log: r53639 -> r53844 MFde: Resync the project news page Modified: head/de_DE.ISO8859-1/share/xml/news.xml Modified: head/de_DE.ISO8859-1/share/xml/news.xml ============================================================================== --- head/de_DE.ISO8859-1/share/xml/news.xml Wed Jan 29 17:22:05 2020 (r53844) +++ head/de_DE.ISO8859-1/share/xml/news.xml Sat Feb 1 08:56:05 2020 (r53845) @@ -4,7 +4,7 @@

        RC3 builds begin * 16 October 2020 -Second release candidate.Third release candidate.