From owner-freebsd-hackers@FreeBSD.ORG Sat Nov 22 03:28:41 2014 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 00FF361F for ; Sat, 22 Nov 2014 03:28:40 +0000 (UTC) Received: from mho-01-ewr.mailhop.org (mho-03-ewr.mailhop.org [204.13.248.66]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CA274698 for ; Sat, 22 Nov 2014 03:28:40 +0000 (UTC) Received: from [73.34.117.227] (helo=ilsoft.org) by mho-01-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from ) id 1Xs1NH-0006IK-NH; Sat, 22 Nov 2014 03:28:39 +0000 Received: from [172.22.42.240] (revolution.hippie.lan [172.22.42.240]) by ilsoft.org (8.14.9/8.14.9) with ESMTP id sAM3ScFk005042; Fri, 21 Nov 2014 20:28:38 -0700 (MST) (envelope-from ian@FreeBSD.org) X-Mail-Handler: Dyn Standard SMTP by Dyn X-Originating-IP: 73.34.117.227 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1/v5aYBgHe/kOOLOBdxjuBw X-Authentication-Warning: paranoia.hippie.lan: Host revolution.hippie.lan [172.22.42.240] claimed to be [172.22.42.240] Subject: Re: Running 8 building 10 success (I think?) From: Ian Lepore To: Dieter BSD In-Reply-To: References: Content-Type: text/plain; charset="us-ascii" Date: Fri, 21 Nov 2014 20:28:38 -0700 Message-ID: <1416626918.1147.327.camel@revolution.hippie.lan> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit Cc: freebsd-hackers@freebsd.org X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 22 Nov 2014 03:28:41 -0000 On Fri, 2014-11-21 at 19:14 -0800, Dieter BSD wrote: > > I was looking into whether we could easily fix /bin/sh > > /bin/sh's error message is badly broken and needs to be fixed. > I previously posted a short list of things that should be > improved. A high school student that knows C should be able to do it. > Since there is one brain-dead error message there are likely more, > so bonus points for looking through the source and fixing those as well. > > The F_DUPFD_CLOEXEC problem is unfortunate, but it is already released. > And there is an easy workaround: just mv /bin/sh /bin/sh_10.1 and > then copy 8.2's /bin/sh to the chroot. > > > or whether we should > > just warn that you can't bootstrap from systems earlier than 8.4. > > Looks like you can, actually. > > Make a chroot with 10.1 binaries and sources. > Add /dev/null > replace 10.1's /bin/sh with 8.2's /bin/sh > Add /etc/make.conf containing WITHOUT_CTF=true > edit GENERIC, commenting out "makeoptions WITH_CTF=1" > chroot > cd /usr/src > make buildkernel KERNCONF=GENERIC > > I haven't testing doing these steps and nothing else, so the list > might be missing something. Well, since you've supplied plenty of sarcasm but once again no actual information about what problem you ran into trying to build from sources the right way, without crazy hackery like runing a 10.1 chroot on an 8.2 kernel, I guess I"m done with this. -- Ian