From nobody Wed Dec 14 17:10:51 2022 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NXMMW2sdDz4k5K7 for ; Wed, 14 Dec 2022 17:11:03 +0000 (UTC) (envelope-from kempe@lysator.liu.se) Received: from mail.lysator.liu.se (mail.lysator.liu.se [IPv6:2001:6b0:17:f0a0::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4NXMMV3pkPz3PRl for ; Wed, 14 Dec 2022 17:11:02 +0000 (UTC) (envelope-from kempe@lysator.liu.se) Authentication-Results: mx1.freebsd.org; dkim=none; spf=pass (mx1.freebsd.org: domain of kempe@lysator.liu.se designates 2001:6b0:17:f0a0::3 as permitted sender) smtp.mailfrom=kempe@lysator.liu.se; dmarc=pass (policy=none) header.from=lysator.liu.se Received: from mail.lysator.liu.se (localhost [127.0.0.1]) by mail.lysator.liu.se (Postfix) with ESMTP id D4C0D1EDEC for ; Wed, 14 Dec 2022 18:10:52 +0100 (CET) Received: from claptrap.lysator.liu.se (claptrap.lysator.liu.se [IPv6:2001:6b0:17:f0a0::fa]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.lysator.liu.se (Postfix) with ESMTPSA id D33F61EEAE for ; Wed, 14 Dec 2022 18:10:52 +0100 (CET) Date: Wed, 14 Dec 2022 18:10:51 +0100 From: Andreas Kempe To: FreeBSD Hackers Subject: Re: FreeBSD 12.4: EFI: geli + UFS won't boot - fix available Message-ID: References: List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Virus-Scanned: ClamAV using ClamSMTP X-Spamd-Result: default: False [-3.80 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-0.997]; DMARC_POLICY_ALLOW(-0.50)[lysator.liu.se,none]; R_SPF_ALLOW(-0.20)[+a:mail.lysator.liu.se]; MIME_GOOD(-0.10)[text/plain]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; TO_DN_ALL(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; ASN(0.00)[asn:1653, ipnet:2001:6b0::/32, country:EU]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROMTLD(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; RCVD_TLS_LAST(0.00)[] X-Rspamd-Queue-Id: 4NXMMV3pkPz3PRl X-Spamd-Bar: --- X-ThisMailContainsUnwantedMimeParts: N On Sun, Dec 11, 2022 at 08:29:18PM -0700, Warner Losh wrote: > On Sun, Dec 11, 2022, 8:10 PM David Cross wrote: > > > One would hope. This is now the third time this has been reported. At > > least. I even personally wrote a draft en for it (for 13.1). And 2 other > > ENs yet to see a release, also with bugs and patches and fixes committed to > > -CURRENT > > > > > EN s are hard to do as a developer. We do very few of them. Since they are > hard, I just don't bother. That needs to change... > If ENs are difficult to do, would it at least be possible to add a notice under Late-Breaking News with a warning? To me, having a system that won't boot is a quite nasty surprise. Best regards, Andreas Kempe