From owner-freebsd-current@freebsd.org Sun Jun 2 16:48:57 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2FD9C15BA0F9 for ; Sun, 2 Jun 2019 16:48:57 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AA90F6F4F3 for ; Sun, 2 Jun 2019 16:48:56 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by home.opsec.eu with local (Exim 4.92 (FreeBSD)) (envelope-from ) id 1hXTf9-00020v-Uu; Sun, 02 Jun 2019 18:48:51 +0200 Date: Sun, 2 Jun 2019 18:48:51 +0200 From: Kurt Jaeger To: Konstantin Belousov Cc: FreeBSD Current Subject: Re: Crash on very recent CURRENT if using poudriere Message-ID: <20190602164851.GA5902@home.opsec.eu> References: <20190531104911.GA39925@home.opsec.eu> <20190531170443.GD27392@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190531170443.GD27392@kib.kiev.ua> X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 16:48:57 -0000 Hi! > > [panic] non-zero write count during poudriere run > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238031 > > > > Ideas on how to proceed ? > > Try this. Unfortunatly, I can no longer reproduce the crashes after the update of the kernel to r348454. -- pi@opsec.eu +49 171 3101372 One year to go ! From owner-freebsd-current@freebsd.org Sun Jun 2 16:55:54 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B76A715BA606 for ; Sun, 2 Jun 2019 16:55:54 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x830.google.com (mail-qt1-x830.google.com [IPv6:2607:f8b0:4864:20::830]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6F0C16FA6A for ; Sun, 2 Jun 2019 16:55:53 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x830.google.com with SMTP id x47so6879441qtk.11 for ; Sun, 02 Jun 2019 09:55:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=LKR5zD06f3ciy3iATraLzH0ULegX3jzvORdtXgx6Fk4=; b=aIDREAphoGyCRPrArFo0DW+qnZx3W7C00byNgCN9HXBgSknhBzaBuQrbdmiLqsgS/j APHN9rMPNiVvwG3IdBNfewKRfVeHtCFqVy1eDc2H3Ob9KD/KVR/3m0v6EkxD25X83yUw kdl4iUZ/ayz9mMSAxTeA2niFgu6ubqQk6qZtrZUE9lxDcbRhYZnraDE7yn1TJm37EcG8 3fCXolfHjXGfKEd78l5gdbKK/bxvxaD8Uv2ek1mEk5O9gc8xYKnm8jd9ViDO3BVuMYKc MUEyODOeXoCRasmfkGRBoIK5WpdGoFI0r/5plYL9dW1URAlIjrSWA8chWKMyHI5fIyUm TmMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=LKR5zD06f3ciy3iATraLzH0ULegX3jzvORdtXgx6Fk4=; b=OP32T89E+aUshFNxHXAlBZN2WTHPwWP/54RxBQ09hxIZneTmfnHH/8cStw1Ga9FDWE pV4CC1xV/EtVmL3JW9izf+07gyrqYklSNYPWQ3u1O9QhJZnao3NdKvlMNV0l7RtoQ9F8 QAP0NR4gWcHiDCOH/FR5hOvdv5fjwPwi7J0g9o/Q/EohPFIufDNMefS+SPgaSy3gZ2cK F4q+Trm36ZNnbxzZxPDyFHIMqK6JzKYrrTIeyfV+gt/aC5PPBKNKKLSypcxyvXqfj24b TWs6Vz/Pye6mVvBk8LFkDvE+0hdAr5VLDRtOC+Yksb9l3PMLweemnxygwRM4on/pc59p ohkg== X-Gm-Message-State: APjAAAVF7PBNSqPZiFa6WmrEpcdPA+RoufZ0aIEPatluU2R6nSQTsz6S k1fRHTBl6I+llfm4w4qVU66YeQ9QjWEXU1w/MQwlOjX0 X-Google-Smtp-Source: APXvYqzCWFawTRhKoVKXMcxPIXBrQk4lyoj+vs93w896L7ib/BEOdMILW+9Wt5gN3xWEW0bwLxYulR59L35j8WOs1D4= X-Received: by 2002:ac8:488f:: with SMTP id i15mr18211332qtq.32.1559494552336; Sun, 02 Jun 2019 09:55:52 -0700 (PDT) MIME-Version: 1.0 From: Warner Losh Date: Sun, 2 Jun 2019 10:55:41 -0600 Message-ID: Subject: One True Awk upgrade To: FreeBSD Current X-Rspamd-Queue-Id: 6F0C16FA6A X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=aIDREAph X-Spamd-Result: default: False [-5.93 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-3.00)[ip: (-9.38), ipnet: 2607:f8b0::/32(-3.27), asn: 15169(-2.28), country: US(-0.06)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[ALT1.aspmx.l.google.com,aspmx.l.google.com,ALT2.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[0.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.92)[-0.920,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 16:55:55 -0000 I'm upgrading the in-tree version of one-true-awk. Normally, this isn't a problem, but there's a number of small differences I'm still trying to figure out due to our... contorted history. Some of the revisions we had in the vendor branch of our repo were accepted as-is, some completely, and some not yet, We've also added bug fixes we've found, as well as fixes from other BSDs, which has also caused at least one unexplained difference. I should have it sorted out in the next day or so, but wanted to give a heads up. I doubt anybody would notice, but each of the differences is going to take a little time to sort out, chase back to the failing case, work out with upstream if there's a bug or not, etc. There's also a small window between r348513 and r348515 where the tree fails to build (due to svn's commit subtree vs git's commit while tree differences). Also, I've not tagged this as such, but my plans are to MFC to 12 next week, and to 11 after 11.3R goes out the door. Warner From owner-freebsd-current@freebsd.org Sun Jun 2 17:06:55 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0BDAE15BAD41 for ; Sun, 2 Jun 2019 17:06:55 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3029C7012B for ; Sun, 2 Jun 2019 17:06:53 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-qt1-x82f.google.com with SMTP id s15so6914062qtk.9 for ; Sun, 02 Jun 2019 10:06:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=6dZSwCtJ+V4k5nN8uxjWPfhGPOcsFjbRB9IJfotRfRI=; b=ilsKGQrXHUvSEnKJ4TlWOqPHtCWn3zwsKSEM40o2IYkqiDDlCf78bnK/K7zNlrRpaz uFbzklC/KZqk1JQcuNEK0rsaXbt0sLn/D+dZmNoRxPgCLbQ99RL8C0oRmOuZf7aLrlK9 Xo7UmipAMgKGs0vVDOFsUWrLelFGH0Rj6K652lXtzcbtkh0CCMhOQ3aHNTbD4R/UD3Dp KEATlb0g5o34vKeVUAWZgPyGQ3G3yqFBb5wwzie9gP2kO8mQLtzphFwuDJsouYDvZ1yt lt2zhyMnS/4CS+2NVdSYehkUJXfoPYxqJ2V4OCXiy26gDcI8MaRGFqFw1iK6ahXac1jl jOvw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=6dZSwCtJ+V4k5nN8uxjWPfhGPOcsFjbRB9IJfotRfRI=; b=icLo4vRZTFtYf15tMlYsqnZj88YtDoo83kFbb0e0K6fIyycct4iur88ZcJvzb83XN4 tD5jCubVHImdMVsVOEIUchJLOwfPdhlBAbmG6r17u8yq33HQmULh/NCciLCRAC6A7rhH 4UusAMKc47q0+jMv7FKmur6r+pM1vLpnmGBldtWUrsIBA7Rh0KUvzrEd0rRFOGwz1ODK DMW3y/NTHyUxorZcC+6vdYWuJzqira21KgqFfy35Ysy9MTmNZLR+4jCYLjph7frERV2a HZfNGUeok1Qhiq7khq6ojsS13yKPYb4JxUUKX4JBSJhcauRkFCUi6MidJIMFxSKcYP1D 3o2A== X-Gm-Message-State: APjAAAWYSUWWzX6uOOUpq+tAMBvhUdWen7LkU3GQPpQTP6ifqMAovh5Y 63aKJwIrGmAtNXCJurPuu6EHPXquFyI= X-Google-Smtp-Source: APXvYqxTV2hHK0UWl+XeVgEVAWm69xhf1Vrs5iBB8kybBmqUthbh93EdwFqBvDjpr1z2G5RLRt0SjQ== X-Received: by 2002:aed:22b4:: with SMTP id p49mr19035384qtc.208.1559495212389; Sun, 02 Jun 2019 10:06:52 -0700 (PDT) Received: from mutt-hbsd ([151.196.118.239]) by smtp.gmail.com with ESMTPSA id p1sm4989674qti.83.2019.06.02.10.06.51 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sun, 02 Jun 2019 10:06:51 -0700 (PDT) Date: Sun, 2 Jun 2019 13:06:51 -0400 From: Shawn Webb To: Warner Losh Cc: FreeBSD Current Subject: Re: One True Awk upgrade Message-ID: <20190602170651.6vxbycv3knrre2px@mutt-hbsd> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="lvpcs65tqob46bee" Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD mutt-hbsd 13.0-CURRENT-HBSD FreeBSD 13.0-CURRENT-HBSD HARDENEDBSD-13-CURRENT amd64 X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0xFF2E67A277F8E1FA User-Agent: NeoMutt/20180716 X-Rspamd-Queue-Id: 3029C7012B X-Spamd-Bar: -------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=hardenedbsd.org header.s=google header.b=ilsKGQrX; spf=pass (mx1.freebsd.org: domain of shawn.webb@hardenedbsd.org designates 2607:f8b0:4864:20::82f as permitted sender) smtp.mailfrom=shawn.webb@hardenedbsd.org X-Spamd-Result: default: False [-8.10 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; RCVD_COUNT_THREE(0.00)[3]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[hardenedbsd.org:+]; RCPT_COUNT_TWO(0.00)[2]; MX_GOOD(-0.01)[alt1.aspmx.l.google.com,aspmx.l.google.com,aspmx2.googlemail.com,alt2.aspmx.l.google.com,aspmx3.googlemail.com]; SIGNED_PGP(-2.00)[]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; IP_SCORE(-3.01)[ip: (-9.42), ipnet: 2607:f8b0::/32(-3.27), asn: 15169(-2.28), country: US(-0.06)]; RECEIVED_SPAMHAUS_PBL(0.00)[239.118.196.151.zen.spamhaus.org : 127.0.0.10]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[hardenedbsd.org:s=google]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[hardenedbsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[f.2.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 17:06:55 -0000 --lvpcs65tqob46bee Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, Jun 02, 2019 at 10:55:41AM -0600, Warner Losh wrote: > I'm upgrading the in-tree version of one-true-awk. Normally, this isn't a > problem, but there's a number of small differences I'm still trying > to figure out due to our... contorted history. Some of the revisions we h= ad > in the vendor branch of our repo were accepted as-is, some completely, and > some not yet, We've also added bug fixes we've found, as well as fixes fr= om > other BSDs, which has also caused at least one unexplained difference. >=20 > I should have it sorted out in the next day or so, but wanted to give a > heads up. I doubt anybody would notice, but each of the differences is > going to take a little time to sort out, chase back to the failing case, > work out with upstream if there's a bug or not, etc. There's also a small > window between r348513 and r348515 where the tree fails to build (due to > svn's commit subtree vs git's commit while tree differences). >=20 > Also, I've not tagged this as such, but my plans are to MFC to 12 next > week, and to 11 after 11.3R goes out the door. Hey Warner, Thanks for maintaining one-true-awk in the tree! I was planning on publishing a new binary update of 13-CURRENT for HardenedBSD users. Should I hold off until the dust settles? Thanks, --=20 Shawn Webb Cofounder / Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0xFF2E67A277F8E1FA GPG Key Fingerprint: D206 BB45 15E0 9C49 0CF9 3633 C85B 0AF8 AB23 0FB2 --lvpcs65tqob46bee Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEA6TL67gupaZ9nzhT/y5nonf44foFAlz0AiYACgkQ/y5nonf4 4foQtA/+OCLddiRLlXJkrCI1PPgADY6q+W0Rb1ZKipHAvg9JFsInfUFw4TI1empI LSnhZO/eV6q9PVNmGEi3zDImy3TncbTdB5MVQnrCylutVynplRBW5YNlZ4VuwJWZ JRSuL5W/+fpzaDqxwE3PQxZiFnv5RRp+YkFLxy2iRiwDCF1lJD0YVIWXuYEZJ6Ub um7O2Pmg2H04rvmNzPDUENryHJTIT33k51HTocDcwbkTETsxWCirOCFmtrW6CBnb zVH17I/QR2RPmfhCDPNf5ptMmqfuholnb18iltBfvmfEXOwei+DKwNSAxVo3A+7W CqmaImy7v0TxdPEaW0in6Q0xnlexYKiulvhagHnETi+mtDRaU5cfJ5w7Lg/1U3qG qMYPpd9c82g6ZfIHS/ZwFWXfMC1Ia+TDKL3MWCm9rKE+VDFpOPjF3MsVbWx2qEV1 U1X5xZD1RGzcBqZ5yaREPHMUW13KWiP70XRAKA17epYFslugbASe7/dkH7yEQIO9 Jp2jzB5cNHJNrw2vDQq+QGQ700F9+B5ls0IDzxOmaeDWtW0SZnBYQMatCwXN9LR/ pXxYQpYB2MFgZVB4XlFkKcezJe+cCG4YyfiP3WGaINmWmouEdwp59YHP0qkDmJdU I/2tWxc0kXuHDB84OCpxC62HZKfpG4KP2TTOrJk88P2zYavkOz4= =RW+m -----END PGP SIGNATURE----- --lvpcs65tqob46bee-- From owner-freebsd-current@freebsd.org Sun Jun 2 17:32:07 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 249DE15BB4B9 for ; Sun, 2 Jun 2019 17:32:07 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3FF1F7184D; Sun, 2 Jun 2019 17:32:06 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x52HVpkq047140 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 2 Jun 2019 20:31:54 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x52HVpkq047140 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x52HVpqH047139; Sun, 2 Jun 2019 20:31:51 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 2 Jun 2019 20:31:51 +0300 From: Konstantin Belousov To: Kurt Jaeger Cc: FreeBSD Current Subject: Re: Crash on very recent CURRENT if using poudriere Message-ID: <20190602173151.GH75280@kib.kiev.ua> References: <20190531104911.GA39925@home.opsec.eu> <20190531170443.GD27392@kib.kiev.ua> <20190602164851.GA5902@home.opsec.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190602164851.GA5902@home.opsec.eu> User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 17:32:07 -0000 On Sun, Jun 02, 2019 at 06:48:51PM +0200, Kurt Jaeger wrote: > Hi! > > > > [panic] non-zero write count during poudriere run > > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238031 > > > > > > Ideas on how to proceed ? > > > > Try this. > > Unfortunatly, I can no longer reproduce the crashes after the > update of the kernel to r348454. Regardless of that, did you run with the patch applied ? From owner-freebsd-current@freebsd.org Sun Jun 2 17:46:05 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 58D2215BB82E for ; Sun, 2 Jun 2019 17:46:05 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from fc.opsec.eu (fc.opsec.eu [IPv6:2001:14f8:200:4::4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CBBC171E0F for ; Sun, 2 Jun 2019 17:46:04 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by fc.opsec.eu with local (Exim 4.92 (FreeBSD)) (envelope-from ) id 1hXUY2-000NhQ-D7; Sun, 02 Jun 2019 19:45:34 +0200 Date: Sun, 2 Jun 2019 19:45:34 +0200 From: Kurt Jaeger To: Konstantin Belousov Cc: FreeBSD Current Subject: Re: Crash on very recent CURRENT if using poudriere Message-ID: <20190602174534.GG82898@fc.opsec.eu> References: <20190531104911.GA39925@home.opsec.eu> <20190531170443.GD27392@kib.kiev.ua> <20190602164851.GA5902@home.opsec.eu> <20190602173151.GH75280@kib.kiev.ua> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190602173151.GH75280@kib.kiev.ua> X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 17:46:05 -0000 Hi! > > > > [panic] non-zero write count during poudriere run > > > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238031 > > > > > > > > Ideas on how to proceed ? > > > > > > Try this. > > > > Unfortunatly, I can no longer reproduce the crashes after the > > update of the kernel to r348454. > > Regardless of that, did you run with the patch applied ? No -- should I ? How would you or I know that it changed anything ? Should I try with the previous kernel @ r348371M and that patch ? -- pi@FreeBSD.org +49 171 3101372 One year to go ! From owner-freebsd-current@freebsd.org Sun Jun 2 17:50:44 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4593115BBA32 for ; Sun, 2 Jun 2019 17:50:44 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 98A0F720A3; Sun, 2 Jun 2019 17:50:43 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x52Hoais051781 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sun, 2 Jun 2019 20:50:39 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x52Hoais051781 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x52Hoa03051779; Sun, 2 Jun 2019 20:50:36 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sun, 2 Jun 2019 20:50:36 +0300 From: Konstantin Belousov To: Kurt Jaeger Cc: FreeBSD Current Subject: Re: Crash on very recent CURRENT if using poudriere Message-ID: <20190602175036.GI75280@kib.kiev.ua> References: <20190531104911.GA39925@home.opsec.eu> <20190531170443.GD27392@kib.kiev.ua> <20190602164851.GA5902@home.opsec.eu> <20190602173151.GH75280@kib.kiev.ua> <20190602174534.GG82898@fc.opsec.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190602174534.GG82898@fc.opsec.eu> User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 17:50:44 -0000 On Sun, Jun 02, 2019 at 07:45:34PM +0200, Kurt Jaeger wrote: > Hi! > > > > > > [panic] non-zero write count during poudriere run > > > > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=238031 > > > > > > > > > > Ideas on how to proceed ? > > > > > > > > Try this. > > > > > > Unfortunatly, I can no longer reproduce the crashes after the > > > update of the kernel to r348454. > > > > Regardless of that, did you run with the patch applied ? > > No -- should I ? How would you or I know that it changed anything ? > > Should I try with the previous kernel @ r348371M and that patch ? Run today kernel with the patch. I am only interested in report is it panic or not (and all usual details it it does panics). From owner-freebsd-current@freebsd.org Sun Jun 2 18:27:00 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 94EE115BC8AF for ; Sun, 2 Jun 2019 18:27:00 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A99307347D for ; Sun, 2 Jun 2019 18:26:54 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x833.google.com with SMTP id j19so3346728qtr.12 for ; Sun, 02 Jun 2019 11:26:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=vlU3HnifRet2jwVBPKy5E2PU7GErWPZ3UhXyBNTNdKs=; b=PUhWY9qpGMasf3UgbFcdeJfph7TvutqfAmwLaZNciuXj7aSRwjOuqVqKMSuVrbt+ly HTjR3C6H+B8Kd3Dw1a1umcJCRmQjfiur9oO2JlFxYdZ2xwDBe9iIH0ptVtiLLaSB4/2Z usK73BBLkuFTQdJmxv40XlSmHeibwHsXXQTI0s2XinmKH+xUme8XtBrUOAOJhwo7CRHE yn04CZydOYk2AGnjzzxTSh6nXlVnrrC+mBdlBn3w9w8xYoufHrD65rLiODoHc2kmG7G/ F8g1BYA8KeTIEshTsw7m9ybKugDjzez+A7wiO6Veszc+Eg4eip2H1U0C4WEOKwH+kFTM 0nqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vlU3HnifRet2jwVBPKy5E2PU7GErWPZ3UhXyBNTNdKs=; b=SgjoQz9On72UYfp1eaDAVMKYg0d7/gl07Y573hUy35YheAZAz0OvpqXyM3DyNqZ2tT ISjVFQaozwfhQrx9NOdSj/Ddez1ifrE4A89yhRyySPgw1nvoDkANwTjcMuZebZs+L4TC pmD4PXZ6VG1RlkiG7neEBzbcJJMvj+TlgRvKPaC4gX4ibDg3w1gnCmoDT7z3B56HxNok 2zmcuXjpUk+/ek+mums4I7//qczk+82H88yp28Kx2k8IFZ+7u3DlNZpiKNtaRILKoMJb i0YBigcxhtxwIMqV9y6uazhKIjZen4LnCKfzHftvaAzwicsNRyYvFV/KVdMuGV8fU5RO KjUQ== X-Gm-Message-State: APjAAAU4BucMkJpYJY6UYESwx9zo0iTLjh7fKl1EtazwNgC3KIRbthwm zUtWdXtS0oyrTZ/S/CzzlLvrS7LWnXwHrmeKGzGq5Ht+ X-Google-Smtp-Source: APXvYqzra4Tq/rUraUVQvcZjI9vPyUkW7lb8eFpIEzysBGDNSfgt5KadoT6R7TLbRZLL+NVBXLKk6HdG722r6wRZj10= X-Received: by 2002:a0c:d604:: with SMTP id c4mr18728546qvj.27.1559500013790; Sun, 02 Jun 2019 11:26:53 -0700 (PDT) MIME-Version: 1.0 References: <20190602170651.6vxbycv3knrre2px@mutt-hbsd> In-Reply-To: <20190602170651.6vxbycv3knrre2px@mutt-hbsd> From: Warner Losh Date: Sun, 2 Jun 2019 12:26:42 -0600 Message-ID: Subject: Re: One True Awk upgrade To: Shawn Webb Cc: FreeBSD Current X-Rspamd-Queue-Id: A99307347D X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=PUhWY9qp X-Spamd-Result: default: False [-5.79 / 15.00]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: ALT1.aspmx.l.google.com]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.79)[-0.790,0]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[3.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; IP_SCORE(-2.99)[ip: (-9.36), ipnet: 2607:f8b0::/32(-3.27), asn: 15169(-2.28), country: US(-0.06)] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 18:27:00 -0000 On Sun, Jun 2, 2019 at 11:06 AM Shawn Webb wrote: > On Sun, Jun 02, 2019 at 10:55:41AM -0600, Warner Losh wrote: > > I'm upgrading the in-tree version of one-true-awk. Normally, this isn't a > > problem, but there's a number of small differences I'm still trying > > to figure out due to our... contorted history. Some of the revisions we > had > > in the vendor branch of our repo were accepted as-is, some completely, > and > > some not yet, We've also added bug fixes we've found, as well as fixes > from > > other BSDs, which has also caused at least one unexplained difference. > > > > I should have it sorted out in the next day or so, but wanted to give a > > heads up. I doubt anybody would notice, but each of the differences is > > going to take a little time to sort out, chase back to the failing case, > > work out with upstream if there's a bug or not, etc. There's also a small > > window between r348513 and r348515 where the tree fails to build (due to > > svn's commit subtree vs git's commit while tree differences). > > > > Also, I've not tagged this as such, but my plans are to MFC to 12 next > > week, and to 11 after 11.3R goes out the door. > > Thanks for maintaining one-true-awk in the tree! I was planning on > publishing a new binary update of 13-CURRENT for HardenedBSD users. > Should I hold off until the dust settles? > The test suite shows no differences, so any bug differences between FreeBSD and upstream one-true-awk are likely obscure. Warner From owner-freebsd-current@freebsd.org Sun Jun 2 21:37:30 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4C03915C11E4 for ; Sun, 2 Jun 2019 21:37:30 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-lf1-x12d.google.com (mail-lf1-x12d.google.com [IPv6:2a00:1450:4864:20::12d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id EDC8281F99 for ; Sun, 2 Jun 2019 21:37:28 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-lf1-x12d.google.com with SMTP id y13so11955514lfh.9 for ; Sun, 02 Jun 2019 14:37:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=maiNPAWxGSwq3BffslQsf4LZGIwMvraim+NxM0uLEKE=; b=uv0g+nRBIh9U/trDqYE/dFxpyKUSwAxNmYJTz+pxkOSBo1XkJIpqYj5OeRUsU/rDL2 xMKMyHVFJSwej6HTww0sPe3kExtTtJZV0xNsNDj6UnyzT2PgZyUmWKcNQRGWaJ0M6keO lCRYnyYLJ4dQmaX31STyCtPBTFcQwcmv9fWzcw1MqczdJ9QbvmVALuF0TXKLnOR2cHAK okjrCf1BLxfkJnmTCWIzUf+UDQZOxNzl9OJj8k6HXzSkwVRp9XM7kWZ0YfzW7fOBgQM7 cK0n2+BgL3/GAd5yGCa2VeMt2AxAO0rwMAkaputOIC/D80AQVSMlXQvuEVH5WPx+lhRV 4MKg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=maiNPAWxGSwq3BffslQsf4LZGIwMvraim+NxM0uLEKE=; b=fhc6641/pcdyttmX2MqXhFho1bovIROcK6KyVn/EfmCMErzwf4GSDFEMwUVdjqHTn1 2TGxp2HweLVGOK/ouz4mpmT4hlEp+BeMKL/mkNFbyhvFUvLxf59j6fbGblrfdYlFb0rm Vwcx36J2YDpDH5YtUzox6NkyhDumgt+jrKx6iG8Z5ssP0XmoeolWi9cIRjzu6pS+JkZq F2p80+bvQkIrKuGQaK78ibPADMU5vUujvlSoACMgcpR+MCtcvzBIEKag5OKvi7nuICMh 45ytxW5e4MraSvBBsp3TjOAnydM4qWVGWwyGnJDRXtdLKYHFrtyTMzWp6fmcKVtPbAy6 qj3g== X-Gm-Message-State: APjAAAWLHn6Po/Ym6C/Hqmzz+dNGkvSBCf60kxPJe2vU5D658Xlk0kcJ TBsAa7WzYo3LqD0KxTs9dX1BubSRpwdBWd07VR9NI1HvVRQ= X-Google-Smtp-Source: APXvYqxnB5u+kEru2uwI4pCH37Vo69l0+u4kxIjEd0N6wBtbyAZZSguiy+5niwoBBBl43GnQVa3axL5eiLqLwjo698o= X-Received: by 2002:a19:ed07:: with SMTP id y7mr12484478lfy.56.1559511447245; Sun, 02 Jun 2019 14:37:27 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Warner Losh Date: Sun, 2 Jun 2019 15:37:16 -0600 Message-ID: Subject: Re: One True Awk upgrade To: FreeBSD Current X-Rspamd-Queue-Id: EDC8281F99 X-Spamd-Bar: ----- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=uv0g+nRB X-Spamd-Result: default: False [-5.73 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-2.75)[ip: (-9.20), ipnet: 2a00:1450::/32(-2.20), asn: 15169(-2.28), country: US(-0.06)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: ALT1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[d.2.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.97)[-0.970,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 02 Jun 2019 21:37:30 -0000 On Sun, Jun 2, 2019 at 10:55 AM Warner Losh wrote: > I'm upgrading the in-tree version of one-true-awk. Normally, this isn't a > problem, but there's a number of small differences I'm still trying > to figure out due to our... contorted history. Some of the revisions we had > in the vendor branch of our repo were accepted as-is, some completely, and > some not yet, We've also added bug fixes we've found, as well as fixes from > other BSDs, which has also caused at least one unexplained difference. > > I should have it sorted out in the next day or so, but wanted to give a > heads up. I doubt anybody would notice, but each of the differences is > going to take a little time to sort out, chase back to the failing case, > work out with upstream if there's a bug or not, etc. There's also a small > window between r348513 and r348515 where the tree fails to build (due to > svn's commit subtree vs git's commit while tree differences). > > Also, I've not tagged this as such, but my plans are to MFC to 12 next > week, and to 11 after 11.3R goes out the door. > OK. I've resolved all the diffs between the git-tree I had and what made it into the tree. the upgrade is now complete, and I've pushed my notion of what awk should be to the bsd-ota branch in https://github.com/bsdimp/awk.git I'll work on folding them into upstream, although some of them are quite old and I'm unsure if they are appropriate for upstream... Warner From owner-freebsd-current@freebsd.org Mon Jun 3 08:40:38 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3B8AD15A8B39 for ; Mon, 3 Jun 2019 08:40:38 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mail-lf1-x134.google.com (mail-lf1-x134.google.com [IPv6:2a00:1450:4864:20::134]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B7D806D16C for ; Mon, 3 Jun 2019 08:40:36 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mail-lf1-x134.google.com with SMTP id q26so12925850lfc.3 for ; Mon, 03 Jun 2019 01:40:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=63ztZHVAj26wlMI6wRPriaB7ZRRjNO6ms/ltqMqo4AM=; b=EGeEQ0GP7XjrDhgJPCJ3bUNwr1+fkDcpj50sAPmTHYeJUVrFoqjWuqPTOatgIKDrVc JjEmvaTEejE2R4ArNULfzac8mbISFCWfw4Jf2GUZI6C64ZJ5b7Yr0BWH8xXE5NUEdr9d NXkMoSU+ruc356VwDGOsK+EB6UzRrl3w1BFQ/8A/a4zpITQwD22Gkk9yvfLpX6RnPtQ1 9gT+4aoKNtIEzM2FNrMfyLaBhxk1T1dC7HhQl1DZRD9l5pH5XS4OdwB+DG5frs+rsIvg vgJuUF7X7T000xZAQW35BjgPczUdcMrVlZNa7ai7cwRiCCcMzTOOfI6MBi6jLql/vFC1 rZPQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=63ztZHVAj26wlMI6wRPriaB7ZRRjNO6ms/ltqMqo4AM=; b=hKmIxjBOjPuWSsb13H1YSQrlB9OlSnpC/W1yUWHNeWAhXeIuuYgvpczzrxtWw/3n74 c0MeKQCdtWq+DCRN9nyCJfS+xVfQyO/87MPjLCGCbbs2pLodoIEjVNRNeavYic+0kfLz xKYHkT6dneuM48Q1/kF7aICljxWMqkQ+cWRFjFZ9OgjxTkSvNILLmxSCzMDvrRXChxUt Yj07huWKO8qfXJKrbw2YMwEN9vmgZwcdUfsKG0e4qbWcULliP1APusVpjqnMV6a9ivyE m/6mtiOk0CWg/Nec8jAgsOpj4gye+NmtunIufmVjlLgBiD24aV0ezN0GtNqoMuUAaASW bNbQ== X-Gm-Message-State: APjAAAVispFSl1NSTrEmlZ40ClV9A2eqj4tqG5aXofP9IBSaJsiyr76C FX2WyBKoSyHpoPyvoe1HY8po9J/BRh4MkC4BL/TNJupv X-Google-Smtp-Source: APXvYqyVK5EJE84B7sCOh2tAPgUqaJWK2Sz2uqBtbETYwrTMibnfIuNuHNsR1B4z7anLB6sDZKX8xxI71jHzKKXplOs= X-Received: by 2002:a19:9f84:: with SMTP id i126mr13052736lfe.142.1559551234968; Mon, 03 Jun 2019 01:40:34 -0700 (PDT) MIME-Version: 1.0 From: Andreas Nilsson Date: Mon, 3 Jun 2019 10:40:24 +0200 Message-ID: Subject: make packages broken To: Current FreeBSD X-Rspamd-Queue-Id: B7D806D16C X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=EGeEQ0GP; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of andrnils@gmail.com designates 2a00:1450:4864:20::134 as permitted sender) smtp.mailfrom=andrnils@gmail.com X-Spamd-Result: default: False [-6.60 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[4.3.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; IP_SCORE(-2.77)[ip: (-9.29), ipnet: 2a00:1450::/32(-2.20), asn: 15169(-2.28), country: US(-0.06)]; NEURAL_HAM_SHORT(-0.83)[-0.825,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 08:40:38 -0000 Hello all, It was time for the weekly update so git gave me: c7cdb4a80779a0451dc2c04c3d6b30769049d402 . It compiled fined, but when I tried to build packages I get: make -C /usr/src PKG_VERSION=3D13.0.s20190603083918 real-packages make[5]: "/usr/obj/usr/src/amd64.amd64/toolchain-metadata.mk" line 1: Using cached toolchain metadata from build at charlotte.resilans.se on Mon Jun 3 10:12:27 CEST 2019 -------------------------------------------------------------- >>> Install check world -------------------------------------------------------------- mkdir -p /tmp/install.M2Q9GbT8 progs=3D$(for prog in [ awk cap_mkdb cat chflags chmod chown cmp cp date echo egrep find grep id install ln make mkdir mtree mv pwd_mkdb rm sed services_mkdb sh sort strip sysctl test true uname wc zic tzsetup makewhatis; do if progpath=3D`which $prog`; then echo $progpath; else echo "Required tool $prog not found in PATH." >&2; exit 1; fi; done); libs=3D$(ldd -f "%o %p\n" -f "%o %p\n" $progs 2>/dev/null | sort -u | whi= le read line; do set -- $line; if [ "$2 $3" !=3D "not found" ]; then echo $= 2; else echo "Required library $1 not found." >&2; exit 1; fi; done); cp $libs $progs /tmp/install.M2Q9GbT8 cp -R ${PATH_LOCALE:-"/usr/share/locale"} /tmp/install.M2Q9GbT8/locale mkdir -p /usr/obj/usr/src/amd64.amd64/worldstage/ echo "#mtree 2.0" > /usr/obj/usr/src/amd64.amd64/worldstage//METALOG cd /usr/src; MACHINE_ARCH=3Damd64 MACHINE=3Damd64 CPUTYPE=3Dskylake CC=3D= "cc -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX=3D"c++ -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CPP=3D"cpp -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" AS=3D"as" AR=3D"ar" LD=3D"ld" LLVM_LINK=3D"" NM=3Dnm OBJCOPY=3D"objcopy" RANLIB=3Dranlib STRINGS=3D SI= ZE=3D"size" PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/tmp/install.M2Q9GbT8 LD_LIBRARY_PATH=3D/tmp/install.M2Q9GbT8 PATH_LOCALE=3D/tmp/install.M2Q9GbT8/locale make -f Makefile.inc1 INSTALL=3D"install -U -M /usr/obj/usr/src/amd64.amd64/worldstage//METALOG = -D /usr/obj/usr/src/amd64.amd64/worldstage" MTREE_CMD=3D" -W" __MAKE_SHELL=3D/tmp/install.M2Q9GbT8/sh -DNO_ROOT METALOG=3D/usr/obj/usr/src/amd64.amd64/worldstage//METALOG restage; MACHINE_ARCH=3Damd64 MACHINE=3Damd64 CPUTYPE=3Dskylake CC=3D"cc -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX=3D"c++ -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CPP=3D"cpp -target x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" AS=3D"as" AR=3D"ar" LD=3D"ld" LLVM_LINK=3D"" NM=3Dnm OBJCOPY=3D"objcopy" RANLIB=3Dranlib STRINGS=3D SI= ZE=3D"size" PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/tmp/install.M2Q9GbT8 LD_LIBRARY_PATH=3D/tmp/install.M2Q9GbT8 PATH_LOCALE=3D/tmp/install.M2Q9GbT8/locale rm -rf /tmp/install.M2Q9GbT8 -------------------------------------------------------------- >>> Making hierarchy -------------------------------------------------------------- cd /usr/src; make -f Makefile.inc1 LOCAL_MTREE=3D hierarchy cd /usr/src/etc; PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/tmp/install.M2Q9GbT8 make LOCAL_MTREE=3D PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.amd= 64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/us= r/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legac= y/bin::/tmp/install.M2Q9GbT8 METALOG=3D/usr/obj/usr/src/amd64.amd64/worldstage//METALOG -DNO_ROOT distrib-dirs for file in /usr/share/doc/usd/10.exref /usr/share/doc/usd/11.edit /usr/share/doc/usd/12.vi /usr/share/doc/usd/13.viref; do if [ -f /usr/obj/usr/src/amd64.amd64/worldstage/${file} ]; then rm -f /usr/obj/usr/src/amd64.amd64/worldstage/${file}; fi; done -W -deU -i -f /usr/src/etc/mtree/BSD.root.dist -p /usr/obj/usr/src/amd64.amd64/worldstage/ /tmp/install.M2Q9GbT8/sh: -W: not found *** Error code 127 Anyone else seeing this? Best regards Andreas From owner-freebsd-current@freebsd.org Mon Jun 3 10:05:31 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A35EB15AB507 for ; Mon, 3 Jun 2019 10:05:31 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mail-lj1-x22d.google.com (mail-lj1-x22d.google.com [IPv6:2a00:1450:4864:20::22d]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 75605705D9 for ; Mon, 3 Jun 2019 10:05:30 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mail-lj1-x22d.google.com with SMTP id o13so15575954lji.5 for ; Mon, 03 Jun 2019 03:05:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=tg2MOge/hlD/O+B7otS3tfbMIbXgF7tXlRxx6clUux0=; b=TvoA6FiX6P4gD01VsTNhzlwJ1oAmWzMpMt4LLT0YfPo8Lwsb11+ZCZPKYCTWibdGLM Uj5OFSpr/I3PgoD6aGCHqrxXokSMUaeCJ+fTJyhlmrOvZN/HQVHeJeIgREo+ktt02ngE UzkJ3vVH4/+4Kjvgu210MOFgPJiauHHDGK2svCY6iehlZir4CGaIFoboV0N9K8N552bA NUoZUwLoiKnnBecYBiSwLtAV+3Viddmvy8aCCU8saGJD+94CTunanUva0/kMhoTp5HJ3 0SzVxl5/q5ASK8xkBzUcFZQ2gGQx7qZU9z/UeUAMQgF9+VDjuM7Ul7I4qnphw8ySz3/7 O0Zw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=tg2MOge/hlD/O+B7otS3tfbMIbXgF7tXlRxx6clUux0=; b=H+Ai7pNeb4crqebxzsTW/KMHI+3+8Q1NKTGgryQHMC6/4SROVY8g6ivCbWt8aG+DiU vmBmwSztnU8BoxGc1l1EzjeAwGpyqp7H78y6DFGIgkznciJwUVPkrjv07mmjK26R3VVc x58GC6ICDDKRmAv2q1BEIzM5q2P1Yr02U9ZhUCp1vUFWFze5ZS+DKBFiezUd0cJ9dbBe 8ODL/5mpVmypkZxWXw4TzCwKhEnbTDWs4RJIxJrMnFniuoakGPjIkcOqkZkYmGHD21Sk aZGPKPNaGKUiI6Mzc0s63c2SY3k9ziuIXdwd7bXtpri8m6450pq/rfJiFpJgxZ+NFjMq DmTA== X-Gm-Message-State: APjAAAVI9cDqO72ShtQ9IYDMsVyW4mQPAQYLB3ZLU4LJhPtqXXx2fFYB Ye86Hd+iZwC+fg484Mpyd+3sGpAJRf597QJcuozjf+T6 X-Google-Smtp-Source: APXvYqzMhcb+QO5MCSvZtaucUaaU0QKlWlOVztjrj/86o0dfUMV0Eu1G//hAik58JhJ9a9kEBUqmmBGMG1BXSAEOjX0= X-Received: by 2002:a2e:9951:: with SMTP id r17mr891545ljj.125.1559556327290; Mon, 03 Jun 2019 03:05:27 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Andreas Nilsson Date: Mon, 3 Jun 2019 12:05:15 +0200 Message-ID: Subject: Re: make packages broken To: Current FreeBSD X-Rspamd-Queue-Id: 75605705D9 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=TvoA6FiX; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of andrnils@gmail.com designates 2a00:1450:4864:20::22d as permitted sender) smtp.mailfrom=andrnils@gmail.com X-Spamd-Result: default: False [-6.63 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCPT_COUNT_ONE(0.00)[1]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[d.2.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; IP_SCORE(-2.69)[ip: (-8.93), ipnet: 2a00:1450::/32(-2.20), asn: 15169(-2.28), country: US(-0.06)]; NEURAL_HAM_SHORT(-0.93)[-0.927,0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 10:05:32 -0000 On Mon, Jun 3, 2019 at 10:40 AM Andreas Nilsson wrote: > Hello all, > > It was time for the weekly update so git gave > me: c7cdb4a80779a0451dc2c04c3d6b30769049d402 . > > It compiled fined, but when I tried to build packages I get: > make -C /usr/src PKG_VERSION=3D13.0.s20190603083918 real-packages > make[5]: "/usr/obj/usr/src/amd64.amd64/toolchain-metadata.mk" line 1: > Using cached toolchain metadata from build at charlotte.resilans.se on > Mon Jun 3 10:12:27 CEST 2019 > -------------------------------------------------------------- > >>> Install check world > -------------------------------------------------------------- > mkdir -p /tmp/install.M2Q9GbT8 > progs=3D$(for prog in [ awk cap_mkdb cat chflags chmod chown cmp cp date > echo egrep find grep id install ln make mkdir mtree mv pwd_mkdb rm sed > services_mkdb sh sort strip sysctl test true uname wc zic tzsetup > makewhatis; do if progpath=3D`which $prog`; then echo $progpath; else > echo "Required tool $prog not found in PATH." >&2; exit 1; fi; done); > libs=3D$(ldd -f "%o %p\n" -f "%o %p\n" $progs 2>/dev/null | sort -u | w= hile > read line; do set -- $line; if [ "$2 $3" !=3D "not found" ]; then echo= $2; > else echo "Required library $1 not found." >&2; exit 1; fi; done); = cp > $libs $progs /tmp/install.M2Q9GbT8 > cp -R ${PATH_LOCALE:-"/usr/share/locale"} /tmp/install.M2Q9GbT8/locale > mkdir -p /usr/obj/usr/src/amd64.amd64/worldstage/ > echo "#mtree 2.0" > /usr/obj/usr/src/amd64.amd64/worldstage//METALOG > cd /usr/src; MACHINE_ARCH=3Damd64 MACHINE=3Damd64 CPUTYPE=3Dskylake CC= =3D"cc > -target x86_64-unknown-freebsd13.0 > --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX=3D"c++ -target > x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CPP=3D"cpp -target > x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" AS=3D"as" AR=3D"ar" LD=3D"ld= " > LLVM_LINK=3D"" NM=3Dnm OBJCOPY=3D"objcopy" RANLIB=3Dranlib STRINGS=3D = SIZE=3D"size" > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/tmp/install.M2Q9GbT8 > LD_LIBRARY_PATH=3D/tmp/install.M2Q9GbT8 > PATH_LOCALE=3D/tmp/install.M2Q9GbT8/locale make -f Makefile.inc1 > INSTALL=3D"install -U -M /usr/obj/usr/src/amd64.amd64/worldstage//METALO= G -D > /usr/obj/usr/src/amd64.amd64/worldstage" MTREE_CMD=3D" -W" > __MAKE_SHELL=3D/tmp/install.M2Q9GbT8/sh -DNO_ROOT > METALOG=3D/usr/obj/usr/src/amd64.amd64/worldstage//METALOG restage; > MACHINE_ARCH=3Damd64 MACHINE=3Damd64 CPUTYPE=3Dskylake CC=3D"cc -targe= t > x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CXX=3D"c++ -target > x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" CPP=3D"cpp -target > x86_64-unknown-freebsd13.0 --sysroot=3D/usr/obj/usr/src/amd64.amd64/tmp > -B/usr/obj/usr/src/amd64.amd64/tmp/usr/bin" AS=3D"as" AR=3D"ar" LD=3D"ld= " > LLVM_LINK=3D"" NM=3Dnm OBJCOPY=3D"objcopy" RANLIB=3Dranlib STRINGS=3D = SIZE=3D"size" > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/tmp/install.M2Q9GbT8 > LD_LIBRARY_PATH=3D/tmp/install.M2Q9GbT8 > PATH_LOCALE=3D/tmp/install.M2Q9GbT8/locale rm -rf /tmp/install.M2Q9GbT8 > -------------------------------------------------------------- > >>> Making hierarchy > -------------------------------------------------------------- > cd /usr/src; make -f Makefile.inc1 LOCAL_MTREE=3D hierarchy > cd /usr/src/etc; > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/tmp/install.M2Q9GbT8 > make LOCAL_MTREE=3D > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/tmp/install.M2Q9GbT8 > METALOG=3D/usr/obj/usr/src/amd64.amd64/worldstage//METALOG -DNO_ROOT > distrib-dirs > for file in /usr/share/doc/usd/10.exref /usr/share/doc/usd/11.edit > /usr/share/doc/usd/12.vi /usr/share/doc/usd/13.viref; do if [ -f > /usr/obj/usr/src/amd64.amd64/worldstage/${file} ]; then rm -f > /usr/obj/usr/src/amd64.amd64/worldstage/${file}; fi; done > -W -deU -i -f /usr/src/etc/mtree/BSD.root.dist -p > /usr/obj/usr/src/amd64.amd64/worldstage/ > /tmp/install.M2Q9GbT8/sh: -W: not found > *** Error code 127 > > > Anyone else seeing this? > > Best regards > Andreas > I seems mtree-related as the following patch allows it to make packages. $ git diff diff --git a/Makefile.inc1 b/Makefile.inc1 index 6c77c8abdb8..60ac6493c95 100644 --- a/Makefile.inc1 +++ b/Makefile.inc1 @@ -888,7 +888,7 @@ INSTALLFLAGS+=3D -h sha256 .endif .if defined(DB_FROM_SRC) || defined(NO_ROOT) IMAKE_INSTALL=3D INSTALL=3D"${INSTALL} ${INSTALLFLAGS}" -IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE_CMD} ${MTREEFLAGS}" +IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE} ${MTREEFLAGS}" .endif MTREE_CMD seems to be defined in /usr/src/etc/Makefile, was it meant to be used in /usr/src/Makefile.inc1? Best regards Andreas From owner-freebsd-current@freebsd.org Mon Jun 3 11:05:07 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A3D0E15ACE86 for ; Mon, 3 Jun 2019 11:05:07 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 2100B726F7 for ; Mon, 3 Jun 2019 11:05:07 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id D73EF15ACE83; Mon, 3 Jun 2019 11:05:06 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B250815ACE7E for ; Mon, 3 Jun 2019 11:05:06 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 89337726F6 for ; Mon, 3 Jun 2019 11:05:03 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id x53B4sUZ013727 for ; Mon, 3 Jun 2019 11:04:54 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id x53B4scL013726 for current@freebsd.org; Mon, 3 Jun 2019 04:04:54 -0700 (PDT) (envelope-from david) Date: Mon, 3 Jun 2019 04:04:54 -0700 From: David Wolfskill To: current@freebsd.org Subject: Post-installworld mergemaster breakage r348504 -> r348529? Message-ID: <20190603110454.GH1170@albert.catwhisker.org> Reply-To: current@freebsd.org Mail-Followup-To: current@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="Fnm8lRGFTVS/3GuM" Content-Disposition: inline User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: 89337726F6 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of david@catwhisker.org designates 198.144.209.73 as permitted sender) smtp.mailfrom=david@catwhisker.org X-Spamd-Result: default: False [-1.97 / 15.00]; ARC_NA(0.00)[]; HAS_REPLYTO(0.00)[current@freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:198.144.209.73]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[current@freebsd.org]; TO_DN_NONE(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; RCVD_TLS_LAST(0.00)[]; MX_GOOD(-0.01)[cached: mx.catwhisker.org]; NEURAL_HAM_SHORT(-0.92)[-0.916,0]; RCVD_IN_DNSWL_NONE(0.00)[73.209.144.198.list.dnswl.org : 127.0.10.0]; SIGNED_PGP(-2.00)[]; DMARC_NA(0.00)[catwhisker.org]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:7961, ipnet:198.144.208.0/20, country:US]; MIME_TRACE(0.00)[0:+,1:+]; IP_SCORE(-2.65)[ip: (-9.48), asn: 7961(-3.70), country: US(-0.06)]; REPLYTO_EQ_TO_ADDR(5.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 11:05:07 -0000 --Fnm8lRGFTVS/3GuM Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable I see: =2E.. -------------------------------------------------------------- >>> Installing everything completed on Mon Jun 3 03:48:55 PDT 2019 -------------------------------------------------------------- Mon Jun 3 03:48:55 PDT 2019 *** Creating the temporary root environment in /var/tmp/temproot *** /var/tmp/temproot ready for use *** Creating and populating directory structure in /var/tmp/temproot /bin/sh: -N: not found *** FATAL ERROR: Cannot 'cd' to /usr/src and install files to the temproot environment (using my usual set of csh aliases, so trying again "manually"): freebeast(13.0-C)[1] cd /usr/src freebeast(13.0-C)[2] mergemaster -F -U -u 0022 -i *** The directory specified for the temporary root environment, /var/tmp/temproot, exists. This can be a security risk if untrusted users have access to the system. Use 'd' to delete the old /var/tmp/temproot and continue Use 't' to select a new temporary root directory Use 'e' to exit mergemaster Default is to use /var/tmp/temproot as is How should I deal with this? [Use the existing /var/tmp/temproot] d *** Deleting the old /var/tmp/temproot *** Creating the temporary root environment in /var/tmp/temproot *** /var/tmp/temproot ready for use *** Creating and populating directory structure in /var/tmp/temproot /bin/sh: -N: not found *** FATAL ERROR: Cannot 'cd' to /usr/src and install files to the temproot environment freebeast(13.0-C)[3]=20 As for the environment: FreeBSD freebeast.catwhisker.org 13.0-CURRENT FreeBSD 13.0-CURRENT #573 r34= 8504M/348508: Sun Jun 2 09:00:52 PDT 2019 root@freebeast.catwhisker.or= g:/common/S4/obj/usr/src/amd64.amd64/sys/GENERIC amd64 freebeast(13.0-C)[16] grep -v '^#' /etc/make.conf SENDMAIL_MC=3D/etc/mail/client.mc freebeast(13.0-C)[17]=20 freebeast(13.0-C)[17] grep -v '^#' /etc/src.conf = =20 WITHOUT_DEBUG_FILES=3D1 WITH_ELFCOPY_AS_OBJCOPY=3D1 freebeast(13.0-C)[18]=20 freebeast(13.0-C)[19] grep -v '^#' /etc/src-env.conf=20 WITH_META_MODE=3Dyes freebeast(13.0-C)[20]=20 I find "-N ..." in /usr/src/Makefile.inc1 (for INSTALLFLAGS and MTREEFLAGS, but I don't see how that would cause this. And I've been doing this (tracking head daily) for ... "a while" (usually without incident). Any hints? Thanks! Peace, david --=20 David H. Wolfskill david@catwhisker.org "One of the things I learned is it=E2=80=99s not about the political view, = it=E2=80=99s about=20 the kind of person they are.=E2=80=9D -- political reporter Dave Bryan (ret= ired) See http://www.catwhisker.org/~david/publickey.gpg for my public key. --Fnm8lRGFTVS/3GuM Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlz0/tZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PclaUAf5AUrCQsh+L9+IYZrZpBozjcLsCxhffExEvciQRRpScBDukABGeIpo5llc XLTwK5uTwi4b+aOVfUPKtguE/AWHOk3m1zH/Mbjao15xYIDCLyY4fOpLwO8cQ3r7 nCQmHVX6+DoWebg1xe1C0WM4ENn1rOvn1fk8zqRHh3HfcvUR7/hC4utkbAvPgQjQ jvki18eyhsLT4WWXCq9+dIp1HeUBbjdnHg6+p0K55ybVz5dIPQC0Z23KXuFh6STO V+7Y6+1Gal/x28BIj4mQHuXyO7DanEv63srh3mgCSikZqFkVvzH2A+rcCMbHJ10X VNWU00ssvWLqMuc4xBxME2vk3ApLCQ== =MptR -----END PGP SIGNATURE----- --Fnm8lRGFTVS/3GuM-- From owner-freebsd-current@freebsd.org Mon Jun 3 11:17:59 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0F6A515AD701 for ; Mon, 3 Jun 2019 11:17:59 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3E58073116 for ; Mon, 3 Jun 2019 11:17:58 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id F084715AD6FF; Mon, 3 Jun 2019 11:17:57 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CC88915AD6FE for ; Mon, 3 Jun 2019 11:17:57 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2694873115 for ; Mon, 3 Jun 2019 11:17:57 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mail-lf1-x129.google.com with SMTP id d7so3736393lfb.10 for ; Mon, 03 Jun 2019 04:17:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=ESBdrL51lH/JyBM5PuzeuLWzd9LRuz3a5lp3yTL37I4=; b=loINJSvtC6sfyCViCYZJE6gZPiL18eOie5I53mXnKTgZUit29izHR7TAjLeApmXGUF pf0xqxPDAJE2OzCUojx0wzyfDBrpfULgUsd6Gtk2px02OzCU3P7KiKP9Qi7lGvz8H7Bd ITb/wENOo1K/rngwGVaoO/LbXt/4KL9/y4mG6fv8TyrWiVX5hBZlV2DE+xvRFuWHzsqu CUtUnLPa67zBGB+fHV4bilpioT/AKGyDpWU8+L7bZLPRMLUvlPTPMNMG9akQtxJkQV5N YyANyt5WBjatjbIkY3hDNJ8RIrVoR92/UgCGU4rTFZNHprG3wJpaAbK+dr5t1P+Yz7vv B8nA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=ESBdrL51lH/JyBM5PuzeuLWzd9LRuz3a5lp3yTL37I4=; b=nYApFuyxBUi1GA82OZ0Bc6Al3JwPrS+pS/S4TsU6JrJ4b7ZPjaQqtBZ/Jm9HaDM4cB tiPk4XtlcIa+IT9kGYB0cDPT+WBk64SCTkHvVFxBN/FwyCDO569odqdAzyUlZVHWPX5E ZdJ69H27by5654hgMScR4OVgjH9aSN17soZJwQmxmL0pH5UrzCPTL4aq766bzNkG6R6e 9a4ZIlTdwKVVtzTWndhZtaZ7RATzkcFKIytuciMktpZ97zNaq/xUC9qpbMqc4D12AiuM UIxWKACJWOENkSTz/Krhm13Re/9nIn7PVAhkq1fi46rHfk4SrLbFSfwQxUzlpfL/9c2f oUOw== X-Gm-Message-State: APjAAAUAJQyknWJQ6HK2rvotJ7lnnVEoj+oyQJWEFeXVm+cPXbk0SYn9 Tjy2mNyHQV8PqrGfR3nTNmcfx/9F+Y32ksIuRG8S3yPu X-Google-Smtp-Source: APXvYqw5M/+qnt7qxohXc/qxJxguETjJV+9/Cc5DJJgVhw3gVBj6AC/YJKEnwebkp2tHPMro3Ut9fu8GCuQL7HXNuzg= X-Received: by 2002:ac2:59c9:: with SMTP id x9mr13297683lfn.52.1559560675240; Mon, 03 Jun 2019 04:17:55 -0700 (PDT) MIME-Version: 1.0 References: <20190603110454.GH1170@albert.catwhisker.org> In-Reply-To: <20190603110454.GH1170@albert.catwhisker.org> From: Andreas Nilsson Date: Mon, 3 Jun 2019 13:17:44 +0200 Message-ID: Subject: Re: Post-installworld mergemaster breakage r348504 -> r348529? To: current@freebsd.org X-Rspamd-Queue-Id: 2694873115 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.96 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[]; NEURAL_HAM_SHORT(-0.96)[-0.956,0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 11:17:59 -0000 On Mon, Jun 3, 2019 at 1:06 PM David Wolfskill wrote= : > I see: > > ... > -------------------------------------------------------------- > >>> Installing everything completed on Mon Jun 3 03:48:55 PDT 2019 > -------------------------------------------------------------- > Mon Jun 3 03:48:55 PDT 2019 > > *** Creating the temporary root environment in /var/tmp/temproot > *** /var/tmp/temproot ready for use > *** Creating and populating directory structure in /var/tmp/temproot > > /bin/sh: -N: not found > > *** FATAL ERROR: Cannot 'cd' to /usr/src and install files to > the temproot environment > > > > (using my usual set of csh aliases, so trying again "manually"): > > freebeast(13.0-C)[1] cd /usr/src > freebeast(13.0-C)[2] mergemaster -F -U -u 0022 -i > > *** The directory specified for the temporary root environment, > /var/tmp/temproot, exists. This can be a security risk if untrusted > users have access to the system. > > Use 'd' to delete the old /var/tmp/temproot and continue > Use 't' to select a new temporary root directory > Use 'e' to exit mergemaster > > Default is to use /var/tmp/temproot as is > > How should I deal with this? [Use the existing /var/tmp/temproot] d > > *** Deleting the old /var/tmp/temproot > > *** Creating the temporary root environment in /var/tmp/temproot > *** /var/tmp/temproot ready for use > *** Creating and populating directory structure in /var/tmp/temproot > > /bin/sh: -N: not found > > *** FATAL ERROR: Cannot 'cd' to /usr/src and install files to > the temproot environment > > freebeast(13.0-C)[3] > > > As for the environment: > > FreeBSD freebeast.catwhisker.org 13.0-CURRENT FreeBSD 13.0-CURRENT #573 > r348504M/348508: Sun Jun 2 09:00:52 PDT 2019 > root@freebeast.catwhisker.org:/common/S4/obj/usr/src/amd64.amd64/sys/GENE= RIC > amd64 > > freebeast(13.0-C)[16] grep -v '^#' /etc/make.conf > SENDMAIL_MC=3D/etc/mail/client.mc > freebeast(13.0-C)[17] > > freebeast(13.0-C)[17] grep -v '^#' /etc/src.conf > > WITHOUT_DEBUG_FILES=3D1 > WITH_ELFCOPY_AS_OBJCOPY=3D1 > freebeast(13.0-C)[18] > > freebeast(13.0-C)[19] grep -v '^#' /etc/src-env.conf > WITH_META_MODE=3Dyes > freebeast(13.0-C)[20] > > I find "-N ..." in /usr/src/Makefile.inc1 (for INSTALLFLAGS and > MTREEFLAGS, but I don't see how that would cause this. And I've > been doing this (tracking head daily) for ... "a while" (usually > without incident). > > Any hints? > > Thanks! > > Peace, > david > -- > David H. Wolfskill david@catwhisker.org > "One of the things I learned is it=E2=80=99s not about the political view= , it=E2=80=99s > about > the kind of person they are.=E2=80=9D -- political reporter Dave Bryan (r= etired) > > See http://www.catwhisker.org/~david/publickey.gpg for my public key. > Might this be the same I noticed with "make packages", ie: diff --git a/Makefile.inc1 b/Makefile.inc1 index 6c77c8abdb8..60ac6493c95 100644 --- a/Makefile.inc1 +++ b/Makefile.inc1 @@ -888,7 +888,7 @@ INSTALLFLAGS+=3D -h sha256 .endif .if defined(DB_FROM_SRC) || defined(NO_ROOT) IMAKE_INSTALL=3D INSTALL=3D"${INSTALL} ${INSTALLFLAGS}" -IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE_CMD} ${MTREEFLAGS}" +IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE} ${MTREEFLAGS}" .endif DESTDIR_MTREEFLAGS=3D -deU Best regards Andreas From owner-freebsd-current@freebsd.org Mon Jun 3 11:27:49 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 05A5315ADA56 for ; Mon, 3 Jun 2019 11:27:49 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 30F69736C5 for ; Mon, 3 Jun 2019 11:27:48 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id E0C6415ADA55; Mon, 3 Jun 2019 11:27:47 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CDEA615ADA54 for ; Mon, 3 Jun 2019 11:27:47 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 169C3736BE for ; Mon, 3 Jun 2019 11:27:46 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id x53BRhra015337; Mon, 3 Jun 2019 11:27:43 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id x53BRhPP015336; Mon, 3 Jun 2019 04:27:43 -0700 (PDT) (envelope-from david) Date: Mon, 3 Jun 2019 04:27:43 -0700 From: David Wolfskill To: Andreas Nilsson Cc: current@freebsd.org Subject: Re: Post-installworld mergemaster breakage r348504 -> r348529? Message-ID: <20190603112743.GI1170@albert.catwhisker.org> Mail-Followup-To: David Wolfskill , Andreas Nilsson , current@freebsd.org References: <20190603110454.GH1170@albert.catwhisker.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="tH81YkO9bF1TqYxP" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: 169C3736BE X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.983,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 11:27:49 -0000 --tH81YkO9bF1TqYxP Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jun 03, 2019 at 01:17:44PM +0200, Andreas Nilsson wrote: > ... > > Any hints? > ....=20 > Might this be the same I noticed with "make packages", ie: > diff --git a/Makefile.inc1 b/Makefile.inc1 > index 6c77c8abdb8..60ac6493c95 100644 > --- a/Makefile.inc1 > +++ b/Makefile.inc1 > @@ -888,7 +888,7 @@ INSTALLFLAGS+=3D -h sha256 > .endif > .if defined(DB_FROM_SRC) || defined(NO_ROOT) > IMAKE_INSTALL=3D INSTALL=3D"${INSTALL} ${INSTALLFLAGS}" > -IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE_CMD} ${MTREEFLAGS}" > +IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE} ${MTREEFLAGS}" > .endif >=20 > DESTDIR_MTREEFLAGS=3D -deU >=20 > Best regards > Andreas > .... Thank you! Yes; that fixes it. (Sorry for failing to recognize that the git hash you cited was related to the r348504 - r348529 range....) Peace, david --=20 David H. Wolfskill david@catwhisker.org "One of the things I learned is it=E2=80=99s not about the political view, = it=E2=80=99s about=20 the kind of person they are.=E2=80=9D -- political reporter Dave Bryan (ret= ired) See http://www.catwhisker.org/~david/publickey.gpg for my public key. --tH81YkO9bF1TqYxP Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlz1BC9fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PcmPjwgAg38lW80L6+fhm/HU9uy9NrlIX9FBaeEAUm2Qk1qsb6TwLcwf2KySglrr NFCl23vJkzbRJeBb5VjJ/gmDnkRg8KB0VaqlxyEx/EYHdqVWTGcVI93/FTpGkfNH u0JpmibMMHfk9OtITBtMDLnUsH0ES87YOwLl8QNj2lgHcHpkbcnNlfYpSWX/7qDJ h6ApgtgjSKPMqNlfn5rIc7aGawZQU6yujnM+uAZnn65LkCkcPvKrpt/LdGdIDSVg A7tTpCDGoxwgPZ8T6Ys//qr0M6zXIYSKDx1tsCy4JhQzWck/0P5MPLiJ8O5uhZjc 07bdBSOn0GzFGXp3LCnKxVeBWZrZFw== =5Qx3 -----END PGP SIGNATURE----- --tH81YkO9bF1TqYxP-- From owner-freebsd-current@freebsd.org Mon Jun 3 11:32:07 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6E90615ADD6F for ; Mon, 3 Jun 2019 11:32:07 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id D1FAA73B80 for ; Mon, 3 Jun 2019 11:32:06 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 9316615ADD6E; Mon, 3 Jun 2019 11:32:06 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 6C77615ADD6D for ; Mon, 3 Jun 2019 11:32:06 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C450473B7C for ; Mon, 3 Jun 2019 11:32:05 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mail-lf1-x131.google.com with SMTP id a9so11886925lff.7 for ; Mon, 03 Jun 2019 04:32:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=vkg8jfsXGh9gOfi1AAinEpn5YeoSsro4JxORCgGI5eU=; b=fItICz5Fkq80RA9SH4r3YYgDbGGHvjVLt1W7o/EVthL/a4rS8xpRWuu1ku71CVBvAt BpKXop3P2cxEzYgEbjkfU54CQEd9AM9M8swF6JPC4S0+2e6fQVFA0rVuby4vD0tHYPSf QZNnehpkyNpJHe5x/2xyL+wtpu1cywAzn1l96iH76xItHe9Rj7LJXPVOC74kI4WyUl19 U3TxYoNOT3YbaxHGid3+Jb0tYte8yPWhacpRahzGnVEAMNoJ3bZg2wMUOKwpv84eA/97 rLuTne+uhm13zqrmfaP5sfl5tRONrmSvDYw9bT+ZtJZ4O+Sje+HFir6UuKf20zig8nsz 7l9Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=vkg8jfsXGh9gOfi1AAinEpn5YeoSsro4JxORCgGI5eU=; b=VgpN2l12RMpqnEno+iF8bSPHka5PeeEqAFfiHYO/crzXWckvJuPu2bHX0TWOTPqrU1 wQKNGTI1zmorIe3RvyZKaD/fkQ2p0fxEWy/5D9I65m5lFl0An0shBX9jz7ZiOLvkwEF5 0Obs8Qw+BqqLn/nNQhR7nh7cF6wQd84IvGpKLnLOPK53YIfrO4c3xe3PSf7QrkbZdHzj XLIThkc0MAAIQ39pphi/WusjU58YcIWOUPp+ZgNSDkCj01zs31v4sX0nx8F+meh7pnDd bNUc6AN56WLr9u9iVVckvIQ1YR4un8rTgabnYaBl0idYI/9ZV6eFOxSSzqLd3pdNLygI IERA== X-Gm-Message-State: APjAAAXI2msuoANwl9qdcezfPVhI3/S97nMyIAEUhvhhrcrHoWuDc5vv eNmMIR/KtqlYTr+lLhKBK0unrIdBBZ0E93Qfufz8vA== X-Google-Smtp-Source: APXvYqyjnYINao+eocxoCTWBohIPvn/qRQOOe3kibLOn3bbnl90Ts7O8gSZy6guobtFuQhO2QeJKNOWGFR8X1fyaGy0= X-Received: by 2002:ac2:5e9b:: with SMTP id b27mr11591515lfq.45.1559561524386; Mon, 03 Jun 2019 04:32:04 -0700 (PDT) MIME-Version: 1.0 References: <20190603110454.GH1170@albert.catwhisker.org> <20190603112743.GI1170@albert.catwhisker.org> In-Reply-To: <20190603112743.GI1170@albert.catwhisker.org> From: Andreas Nilsson Date: Mon, 3 Jun 2019 13:31:53 +0200 Message-ID: Subject: Re: Post-installworld mergemaster breakage r348504 -> r348529? To: David Wolfskill , Andreas Nilsson , current@freebsd.org X-Rspamd-Queue-Id: C450473B7C X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.977,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 11:32:07 -0000 On Mon, Jun 3, 2019 at 1:27 PM David Wolfskill wrote= : > On Mon, Jun 03, 2019 at 01:17:44PM +0200, Andreas Nilsson wrote: > > ... > > > Any hints? > > .... > > > Might this be the same I noticed with "make packages", ie: > > diff --git a/Makefile.inc1 b/Makefile.inc1 > > index 6c77c8abdb8..60ac6493c95 100644 > > --- a/Makefile.inc1 > > +++ b/Makefile.inc1 > > @@ -888,7 +888,7 @@ INSTALLFLAGS+=3D -h sha256 > > .endif > > .if defined(DB_FROM_SRC) || defined(NO_ROOT) > > IMAKE_INSTALL=3D INSTALL=3D"${INSTALL} ${INSTALLFLAGS}" > > -IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE_CMD} ${MTREEFLAGS}" > > +IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE} ${MTREEFLAGS}" > > .endif > > > > DESTDIR_MTREEFLAGS=3D -deU > > > > Best regards > > Andreas > > .... > > Thank you! Yes; that fixes it. > > (Sorry for failing to recognize that the git hash you cited was related > to the r348504 - r348529 range....) > > Peace, > david > -- > David H. Wolfskill david@catwhisker.org > "One of the things I learned is it=E2=80=99s not about the political view= , it=E2=80=99s > about > the kind of person they are.=E2=80=9D -- political reporter Dave Bryan (r= etired) > > See http://www.catwhisker.org/~david/publickey.gpg for my public key. > Great :) I just want to point out that I'm not certain my "fix" does the right thing; it works for me for building packages for amd64 on amd64, I'm not sure it correctly handles crossbuilding, so I would wait for an upstream fix for any production workloads. Best regards Andreas From owner-freebsd-current@freebsd.org Mon Jun 3 14:15:32 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1871F15B2435 for ; Mon, 3 Jun 2019 14:15:32 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 5826C826E6 for ; Mon, 3 Jun 2019 14:15:31 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mailman.ysv.freebsd.org (Postfix) id 12CE315B2434; Mon, 3 Jun 2019 14:15:31 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E2D1315B2433 for ; Mon, 3 Jun 2019 14:15:30 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x732.google.com (mail-qk1-x732.google.com [IPv6:2607:f8b0:4864:20::732]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 83C82826E5 for ; Mon, 3 Jun 2019 14:15:30 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x732.google.com with SMTP id g18so484927qkl.3 for ; Mon, 03 Jun 2019 07:15:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pQxzi7xusx8l9Bs2s6v+dSmWqUbFJu/3fhKn4DP4Ly4=; b=jx4MPvQtyDm6hOCi0q/Ho8x6Qlim6c1A7flk1yriho/gJWKDmTXdBf6P3zXVygTsqs Ov4BGbroZpNcnQThaXDJ6fwViqVwKKL3ft4adYM8D2T/efR0GT+DRJGLyE+P/u1rrzXN WF3qu+HFWzLW8GZ6WWL/I6Jwm6T7fSbCF5L5SRYntjbMD3X70Tp3h2JsnFEhoDXFhMxB tGUfJ11stqNnHJP8t1D1/7fGJ9vDGbncfPMry0cSI2ILUpxlvunvwIvugHTN53Y2zFKa QaXASJzoPAMOup3Mf9PyPBgZLboP30QRmaRjyro5sZ/NgE8q0DQo1q53Y9dSWksTuOct 10AQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pQxzi7xusx8l9Bs2s6v+dSmWqUbFJu/3fhKn4DP4Ly4=; b=epI6GOKij25d+DnVG4yFVsp1XXlIKHxGZHoe16pYyKDrhj9Ihkrc/z4C6p0ytbFHce 2jItdbmy552pGTstGGhqmkw6WtcQ8nL7LvikWAwZYDp63vFFZr1mcUjJSDND6+hYVi6u oCV84mt/nKJVGyYiTGCteZ0vA3A9aonOBBBBf1Xu8Z+T7iF2FA6OidqJZTB+LBhR8Pvl 9whJUugZsWjXb3D4EBHzcYCHhcrGrzxRwE3Cf/5OL9paateO/uZ9Tio6njdtBl7H0dOX nZ15vd0QXW5lKSzqVuU5DfvQWuWttrSV9l9AFxPh4LC6YZm/2a9iXusXdtqAUk+dylsK enUA== X-Gm-Message-State: APjAAAVlvVNgC2yqE6HpbUTBolfDOC7JgeGjvmkK5XxktZENwCyk6tqG 7a1PL5kpg+zn7glHVtLoq2gYxtKarNvsi6+l2WNVKA== X-Google-Smtp-Source: APXvYqw96R2jtsNQ9LiAcPHdhBjuaRIlKGfoxDgatlP3o9owy9JeNN6IHCUcfXNaYn32ILZRSCtkamY0gAJKT0cXAUQ= X-Received: by 2002:a05:620a:125b:: with SMTP id a27mr22475388qkl.112.1559571329693; Mon, 03 Jun 2019 07:15:29 -0700 (PDT) MIME-Version: 1.0 References: <20190603110454.GH1170@albert.catwhisker.org> <20190603112743.GI1170@albert.catwhisker.org> In-Reply-To: From: Warner Losh Date: Mon, 3 Jun 2019 08:15:18 -0600 Message-ID: Subject: Re: Post-installworld mergemaster breakage r348504 -> r348529? To: Andreas Nilsson Cc: David Wolfskill , FreeBSD Current X-Rspamd-Queue-Id: 83C82826E5 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.96 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.96)[-0.961,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 14:15:32 -0000 I just committed this as a stop-gap fix. Warner On Mon, Jun 3, 2019 at 5:33 AM Andreas Nilsson wrote: > On Mon, Jun 3, 2019 at 1:27 PM David Wolfskill > wrote: > > > On Mon, Jun 03, 2019 at 01:17:44PM +0200, Andreas Nilsson wrote: > > > ... > > > > Any hints? > > > .... > > > > > Might this be the same I noticed with "make packages", ie: > > > diff --git a/Makefile.inc1 b/Makefile.inc1 > > > index 6c77c8abdb8..60ac6493c95 100644 > > > --- a/Makefile.inc1 > > > +++ b/Makefile.inc1 > > > @@ -888,7 +888,7 @@ INSTALLFLAGS+=3D -h sha256 > > > .endif > > > .if defined(DB_FROM_SRC) || defined(NO_ROOT) > > > IMAKE_INSTALL=3D INSTALL=3D"${INSTALL} ${INSTALLFLAGS}" > > > -IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE_CMD} ${MTREEFLAGS}" > > > +IMAKE_MTREE=3D MTREE_CMD=3D"${MTREE} ${MTREEFLAGS}" > > > .endif > > > > > > DESTDIR_MTREEFLAGS=3D -deU > > > > > > Best regards > > > Andreas > > > .... > > > > Thank you! Yes; that fixes it. > > > > (Sorry for failing to recognize that the git hash you cited was related > > to the r348504 - r348529 range....) > > > > Peace, > > david > > -- > > David H. Wolfskill david@catwhisker.org > > "One of the things I learned is it=E2=80=99s not about the political vi= ew, it=E2=80=99s > > about > > the kind of person they are.=E2=80=9D -- political reporter Dave Bryan = (retired) > > > > See http://www.catwhisker.org/~david/publickey.gpg for my public key. > > > > > Great :) > > I just want to point out that I'm not certain my "fix" does the right > thing; it works for me for building packages for amd64 on amd64, I'm not > sure it correctly handles crossbuilding, so I would wait for an upstream > fix for any production workloads. > > Best regards > Andreas > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org= " > From owner-freebsd-current@freebsd.org Mon Jun 3 15:07:36 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 75D3515B3DC9 for ; Mon, 3 Jun 2019 15:07:36 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id C8F8584CA1 for ; Mon, 3 Jun 2019 15:07:35 +0000 (UTC) (envelope-from david@catwhisker.org) Received: by mailman.ysv.freebsd.org (Postfix) id 8C55615B3DC7; Mon, 3 Jun 2019 15:07:35 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7858D15B3DC6 for ; Mon, 3 Jun 2019 15:07:35 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from mx.catwhisker.org (mx.catwhisker.org [198.144.209.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AEC4F84C9F for ; Mon, 3 Jun 2019 15:07:34 +0000 (UTC) (envelope-from david@catwhisker.org) Received: from albert.catwhisker.org (localhost [127.0.0.1]) by albert.catwhisker.org (8.15.2/8.15.2) with ESMTP id x53F7RCS018272; Mon, 3 Jun 2019 15:07:27 GMT (envelope-from david@albert.catwhisker.org) Received: (from david@localhost) by albert.catwhisker.org (8.15.2/8.15.2/Submit) id x53F7R2C018271; Mon, 3 Jun 2019 08:07:27 -0700 (PDT) (envelope-from david) Date: Mon, 3 Jun 2019 08:07:27 -0700 From: David Wolfskill To: Warner Losh Cc: Andreas Nilsson , FreeBSD Current Subject: Re: Post-installworld mergemaster breakage r348504 -> r348529? Message-ID: <20190603150727.GK1170@albert.catwhisker.org> Mail-Followup-To: David Wolfskill , Warner Losh , Andreas Nilsson , FreeBSD Current References: <20190603110454.GH1170@albert.catwhisker.org> <20190603112743.GI1170@albert.catwhisker.org> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="XK4NhNJ9GVfup2vH" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: AEC4F84C9F X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.98 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 15:07:36 -0000 --XK4NhNJ9GVfup2vH Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jun 03, 2019 at 08:15:18AM -0600, Warner Losh wrote: > I just committed this as a stop-gap fix. >=20 > Warner > .... Cool. I encountered the issue on my build box -- laptop was still busy with other stuff. Later, when the laptop was ready for the same update to head, I applied the change proactively, and things Just Worked. :-) Peace, david --=20 David H. Wolfskill david@catwhisker.org "One of the things I learned is it=E2=80=99s not about the political view, = it=E2=80=99s about=20 the kind of person they are.=E2=80=9D -- political reporter Dave Bryan (ret= ired) See http://www.catwhisker.org/~david/publickey.gpg for my public key. --XK4NhNJ9GVfup2vH Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGTBAEBCgB9FiEE4owz2QxMJyaxAefyQLJg+bY2PckFAlz1N69fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUy OEMzM0Q5MEM0QzI3MjZCMTAxRTdGMjQwQjI2MEY5QjYzNjNEQzkACgkQQLJg+bY2 PcnFiggAlzxouMl7RiBsLMWg1IcjXnkoBeGviSF/FwFvGz5YPNAD5yGN89xKlWl2 9//cic9BwIIP6Ery+ukHYAavueo7Bj53AUNL2UcjFCItykg6A6IaV08BP/1+U+xt 00poDUhTo7lXbcoPMyAU+SUBiqiLWWn+Yp6yKh004A4us1XE4Z6i4AY/9ZZbfOnu H4kjSzgxnpuSwXojXnpSuivAoGT1JCV4cHj0YH+kCE5OdPUpbleSJUsuM1/szg0s ANbhE5kITVYdopSgMK+20w9ifOB5wsI1Sa88JCMawE1MHe/hK8/uBnuJkDVZ647h KfeqUsYncJLoOkATsUNGPTN9cV6BXg== =4+87 -----END PGP SIGNATURE----- --XK4NhNJ9GVfup2vH-- From owner-freebsd-current@freebsd.org Mon Jun 3 19:33:37 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BF93E15BBAA0 for ; Mon, 3 Jun 2019 19:33:37 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 786B46BB6A for ; Mon, 3 Jun 2019 19:33:36 +0000 (UTC) (envelope-from ohartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559590403; bh=KXUfuw0hrrNMM4tIl2JVIGk+F7SLCBYO4+SfT4P+nmM=; h=X-UI-Sender-Class:Date:From:To:Subject; b=QOfAE22Ipnn93dEQMtPuAWOR/8Wfk+BMCc39Nxm6QvcbM6STBnXjBPNSR9kyknW/g n/b2D5gLhYlHubN7TsNnJ5Gp1iU9Q3+GROUpgZV8oj9v0et1PJ2OHYmWr8r2/1MXYv M0twrn4ivwmmw9Rs7SaEELlXLu21UqB0Iw0NOdvQ= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from thor.intern.walstatt.dynvpn.de ([77.13.208.217]) by mail.gmx.com (mrgmx003 [212.227.17.190]) with ESMTPSA (Nemesis) id 0M0gcI-1gio3h0h8o-00unaX for ; Mon, 03 Jun 2019 21:33:23 +0200 Date: Mon, 3 Jun 2019 21:32:54 +0200 From: "O. Hartmann" To: FreeBSD CURRENT Subject: installworld breakage r348516 -> r348572 Message-ID: <20190603213321.7c0b722d@thor.intern.walstatt.dynvpn.de> Organization: WALSTATT User-Agent: OutScare 3.1415926 X-Operating-System: ImNotAnOperatingSystem 3.141592527 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: base64 X-Provags-ID: V03:K1:ERwcX0h9UDcY5q/sTQ/UTJCUNRPCIMjNq/0nuXk2nluw2hFaPGk 87Cdvk9sR+pY0I1t6Czcjwy/ttuCqzKfLFS4Rk6J61UHgZyShz6PKShuIjaPKW2Bc3PAym5 x/e7NFReGJ4ECmQT8lnps1/CBr3sO3AQ1cJzn7KKtS5otOj3o1Mr1XSjtvfXQh0Skq+TiY8 EreUIpzykeEWfyTRBRjjA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:3iIeebNPxtw=:XezMSYU+h3/bdfjTzhIuNQ pzTi5v4ozt+bP4XEXTxphuR9rtvUbQfavcXxLAMR1PsvcSL+MZnb8xBevVOhtd1lJAANdg44F 8GIQGwyTyiq40VtmsdnKCNb8kLqYIcFRswZOs5Sj64tkUsI9u5UIK4RSeuZ0b4cv4TvEp25Eg 9JNcdERJV6CHkB5SikO4fGr1LLC1KN1/PGbMFwJklrxuQlV814Ww2fz1/vqMTkxOUy4VRE54j 3LrLusWyWvrMjKV4gz+7TZaDvVWM3te7gesfma80FYfWyiKAlRWYfqCo3/oxhuq2V/oZr7IXU uIyW1T+hY6TS+WBTPwi9zLnR4eDIKEEqtHdLS/L0tX8my5V8K6Ruw2afU6VR4OQKbq0/EizSU T07b1dl8SHOxMkZgM9tSa9d5q2MwUEU5RV7THsa8hzC7es/xQSeJ15RxPMprJC3WAAk1+DZcF vd8icGW/aB3gj+yLj1Thkyjc2GyAfiP7+WNDiXHzqPav3ZcBVYQ3q18nh6l9yAZxhfiiXceQs 54pMJhe85dhQ654FdkBGBWOM2vZ9/j42mwlNKZPXLrtXn5sJbnhpbVxZFLDYFANOnKZsI4ctD QCumSY6giVVlqrV8xR/cAziyj8Ok3k4deLMl8MNlY8IeI8UMiXDl/f5JRbuCPp60Z0H1Hx0bD 11Ex/Zf+yDm9Jy6ENG9ZStPC5ADQWRumUArfmxGRNwuig6rgR1H8yLspIuO7+oMy2Lbex1LLO Wrlp+LPJYPcLb54o5pq57xKVBEsY4Wmj49svA8oF02jCLxgfgRyFRfJkHhW/GYvUhwzF/3ICD h0Y7dQ8P5jZbnoGmFCD9ySWoKwMTNKvI4ZxjoaZoXGuXm/6o5TpLFMAuw9VM6DcLI5mrE/XfY L2iUzXU9RLhi+1LA8R3tKmnxW2vT1kXKejcon7PkPtpOq9qx8HmtINaibFBl3+0LNmM++qqmo 1JW/CeryjZMxlOTQ/6yuDOZtudcKHhDsOpmYPPBs3TdcNwWQ/0y5z X-Rspamd-Queue-Id: 786B46BB6A X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=QOfAE22I X-Spamd-Result: default: False [-4.22 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_ORG_HEADER(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; MIME_BASE64_TEXT(0.10)[]; MX_GOOD(-0.01)[mx01.gmx.net,mx00.gmx.net]; NEURAL_HAM_SHORT(-0.87)[-0.872,0]; FROM_EQ_ENVFROM(0.00)[]; IP_SCORE(-1.14)[ip: (-6.80), ipnet: 212.227.0.0/16(-1.46), asn: 8560(2.56), country: DE(-0.00)]; MIME_TRACE(0.00)[0:+]; RECEIVED_SPAMHAUS_PBL(0.00)[217.208.13.77.zen.spamhaus.org : 127.0.0.11]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[walstatt.org]; RCPT_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_NONE(0.00)[15.15.227.212.list.dnswl.org : 127.0.3.0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 19:33:38 -0000 LS0tLS1CRUdJTiBQR1AgU0lHTkVEIE1FU1NBR0UtLS0tLQ0KSGFzaDogU0hBMjU2DQoNCk1ha2Ug aW5zdGFsbHdvcmxkIGFmdGVyIGEgc3VjY2Vzc2Z1bCBidWlsZCBvZiByMzQ4NTcyIGZhaWxzIGR1 ZSB0bzoNCg0KPj4+IE1ha2luZyBoaWVyYXJjaHkNCi0gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCmNkIC91c3Ivc3JjOyBtYWtl IC1mIE1ha2VmaWxlLmluYzEgIExPQ0FMX01UUkVFPSBoaWVyYXJjaHkNCi0gLS0tIGhpZXJhcmNo eSAtLS0NCmNkIC91c3Ivc3JjL2V0YzsNClBBVEg9L3Vzci9vYmovdXNyL3NyYy9hbWQ2NC5hbWQ2 NC90bXAvdXNyL3NiaW46L3Vzci9vYmovdXNyL3NyYy9hbWQ2NC5hbWQ2NC90bXAvdXNyL2Jpbjov dXNyL29iai91c3Ivc3JjL2FtZDY0LmFtZDY0L3RtcC9sZWdhY3kvdXNyL3NiaW46L3Vzci9vYmov dXNyL3NyYy9hbWQ2NC5hbWQ2NC90bXAvbGVnYWN5L3Vzci9iaW46L3Vzci9vYmovdXNyL3NyYy9h bWQ2NC5hbWQ2NC90bXAvbGVnYWN5L2Jpbjo6L3Vzci9vYmovdXNyL3NyYy9hbWQ2NC5hbWQ2NC90 bXAvdXNyL3NiaW46L3Vzci9vYmovdXNyL3NyYy9hbWQ2NC5hbWQ2NC90bXAvdXNyL2JpbjovdXNy L29iai91c3Ivc3JjL2FtZDY0LmFtZDY0L3RtcC9sZWdhY3kvdXNyL3NiaW46L3Vzci9vYmovdXNy L3NyYy9hbWQ2NC5hbWQ2NC90bXAvbGVnYWN5L3Vzci9iaW46L3Vzci9vYmovdXNyL3NyYy9hbWQ2 NC5hbWQ2NC90bXAvbGVnYWN5L2Jpbjo6L3RtcC9pbnN0YWxsLm9uWU05WVFjDQptYWtlIExPQ0FM X01UUkVFPSBkaXN0cmliLWRpcnMgLS0tIGRpc3RyaWItY2xlYW51cCAtLS0gZm9yIGZpbGUNCmlu IC91c3Ivc2hhcmUvZG9jL3VzZC8xMC5leHJlZiAvdXNyL3NoYXJlL2RvYy91c2QvMTEuZWRpdCAv dXNyL3NoYXJlL2RvYy91c2QvMTIudmkgL3Vzci9zaGFyZS9kb2MvdXNkLzEzLnZpcmVmOw0KZG8g IGlmIFsgLWYgLyR7ZmlsZX0gXTsgdGhlbiAgcm0gLWYgLyR7ZmlsZX07ICBmaTsgIGRvbmUgLS0t IGRpc3RyaWItZGlycyAtLS0gLWRlVSAtaQ0KLSAtZiAvdXNyL3NyYy9ldGMvbXRyZWUvQlNELnJv b3QuZGlzdCAtcCAvIHNoOiAtZGVVOiBub3QgZm91bmQNCioqKiBbZGlzdHJpYi1kaXJzXSBFcnJv ciBjb2RlIDEyNw0KDQpHcmVldGluZ3MsDQoNCm9oDQoNCi0gLS0gDQpPLiBIYXJ0bWFubg0KDQpJ Y2ggd2lkZXJzcHJlY2hlIGRlciBOdXR6dW5nIG9kZXIgw5xiZXJtaXR0bHVuZyBtZWluZXIgRGF0 ZW4gZsO8cg0KV2VyYmV6d2Vja2Ugb2RlciBmw7xyIGRpZSBNYXJrdC0gb2RlciBNZWludW5nc2Zv cnNjaHVuZyAowqcgMjggQWJzLiA0IEJEU0cpLg0KLS0tLS1CRUdJTiBQR1AgU0lHTkFUVVJFLS0t LS0NCg0KaUhVRUFSWUlBQjBXSVFTeThJQnhBUERrcVZCYVRKNDROMVpaUGJhNVJ3VUNYUFYyQVFB S0NSQTROMVpaUGJhNQ0KUnkrUkFQOWludTQvZzNicXlIUlZTS092ODJHeHBrOExVSy9ZVG9Lemo1 NkR0aUNjSWdFQTMxV0NxNUY1amEzdA0KL0V0dlZhN2hrNXlBZXphZkJFaW0vU1JzTkdqRy93TT0N Cj1jZ1VJDQotLS0tLUVORCBQR1AgU0lHTkFUVVJFLS0tLS0NCg== From owner-freebsd-current@freebsd.org Mon Jun 3 19:48:24 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E2A8F15BBFF5 for ; Mon, 3 Jun 2019 19:48:23 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 813386C304 for ; Mon, 3 Jun 2019 19:48:22 +0000 (UTC) (envelope-from andrnils@gmail.com) Received: by mail-lf1-x136.google.com with SMTP id a25so14567837lfg.2 for ; Mon, 03 Jun 2019 12:48:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ts3sT7gJq1NruwQOU9eikPcFDddU6xg6JKru9MZM3bo=; b=CNPe0dEXk1kfrFXxkzin0Ju0PodT4jKhJGzt6aKFq+hWdVSCpE4J1jP2tLU1heHNQc yYGvNEDGP0aOnKaPn0/heyb4mbnuAy01s+78Bw5JGjsaWuGcfq9EGlK8u/eQRlezrTMK sDM5qvG89fT9xoi1rpUY+kYZjFff34lP2gofgjvYj9aYl+aZts5lSEI+zl21ySplen+x dk2uirrP1NZBC//YZyJVkpb0QV5oqmKVSl0JKRNOs1PbSL/GgvaHaeO+0EbpSB15AZwG bbq4yBGypCsWvU7JZ8hejxx+w0ORypC2A2bfkPoUco/HRFij4MBkLT6/SxO2oVfl4Xhb 58FQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ts3sT7gJq1NruwQOU9eikPcFDddU6xg6JKru9MZM3bo=; b=qJ9LW6sVIhELxaSem/wX4sZ/SIwbEt9juq+1GnN0s/bovDJII8o9Fi1MQhJjryiVGK goZ68evwvRqTOxKmnbF6Fc2y7eSHbP4iXkHKbFA/k0SvTcMFPLalMs5MR4SqQwOV9h17 vgTY4dlIKpzcJzL2fx4sLeqE4RcK9iVh8hyH4Yy8Pqnk94lwCzRegFVRj+9SpeDEedzb /wR9k8wik0tocTVnvYALpCjQUEYlbZQOj63xeEacNljUj2HgdPwJUM3AWBzJy6g+Q9i5 6HuyaMozj/OqeeZHALoh9uG5VX+zclHy5b7WQqNt1dQHboVg4cjG8eSP9paD3APufyKc wpww== X-Gm-Message-State: APjAAAV4ltoY396cRfcy4DIuPOXckRwyB7KU5zhRZoYOFZLSEQXlhZJ8 BtpLNhfBhEDKRD6GfLGabSpRPsFMD+648iOiyWwPT1u1fnA= X-Google-Smtp-Source: APXvYqxplViT3xgJ/+o4nViR7DudRsVMoMDMX2LkuPOUpeguzb2073dZHKvEoeeC48VsWgChbMeAtDx3ArwZqqFuPu4= X-Received: by 2002:a19:f00a:: with SMTP id p10mr6313318lfc.68.1559591300984; Mon, 03 Jun 2019 12:48:20 -0700 (PDT) MIME-Version: 1.0 References: <20190603213321.7c0b722d@thor.intern.walstatt.dynvpn.de> In-Reply-To: <20190603213321.7c0b722d@thor.intern.walstatt.dynvpn.de> From: Andreas Nilsson Date: Mon, 3 Jun 2019 21:48:09 +0200 Message-ID: Subject: Re: installworld breakage r348516 -> r348572 To: "O. Hartmann" Cc: FreeBSD CURRENT X-Rspamd-Queue-Id: 813386C304 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=CNPe0dEX; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of andrnils@gmail.com designates 2a00:1450:4864:20::136 as permitted sender) smtp.mailfrom=andrnils@gmail.com X-Spamd-Result: default: False [-6.79 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.92)[-0.921,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; RCVD_TLS_LAST(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[6.3.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; IP_SCORE(-2.86)[ip: (-9.70), ipnet: 2a00:1450::/32(-2.24), asn: 15169(-2.28), country: US(-0.06)]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 19:48:24 -0000 On Mon, Jun 3, 2019 at 9:35 PM O. Hartmann wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Make installworld after a successful build of r348572 fails due to: > > >>> Making hierarchy > - -------------------------------------------------------------- > cd /usr/src; make -f Makefile.inc1 LOCAL_MTREE=3D hierarchy > - --- hierarchy --- > cd /usr/src/etc; > > PATH=3D/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/usr/obj/usr/src/amd64.amd64/tmp/usr/sbin:/usr/obj/usr/src/amd64.a= md64/tmp/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/legacy/usr/sbin:/usr/obj/= usr/src/amd64.amd64/tmp/legacy/usr/bin:/usr/obj/usr/src/amd64.amd64/tmp/leg= acy/bin::/tmp/install.onYM9YQc > make LOCAL_MTREE=3D distrib-dirs --- distrib-cleanup --- for file > in /usr/share/doc/usd/10.exref /usr/share/doc/usd/11.edit > /usr/share/doc/usd/12.vi /usr/share/doc/usd/13.viref; > do if [ -f /${file} ]; then rm -f /${file}; fi; done --- distrib-dirs > --- -deU -i > - -f /usr/src/etc/mtree/BSD.root.dist -p / sh: -deU: not found > *** [distrib-dirs] Error code 127 > > Greetings, > > oh > > - -- > O. Hartmann > > Ich widerspreche der Nutzung oder =C3=9Cbermittlung meiner Daten f=C3=BCr > Werbezwecke oder f=C3=BCr die Markt- oder Meinungsforschung (=C2=A7 28 Ab= s. 4 BDSG). > -----BEGIN PGP SIGNATURE----- > > iHUEARYIAB0WIQSy8IBxAPDkqVBaTJ44N1ZZPba5RwUCXPV2AQAKCRA4N1ZZPba5 > Ry+RAP9inu4/g3bqyHRVSKOv82Gxpk8LUK/YToKzj56DtiCcIgEA31WCq5F5ja3t > /EtvVa7hk5yAezafBEim/SRsNGjG/wM=3D > =3DcgUI > -----END PGP SIGNATURE----- > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org= " > See other mails from today: "make packages broken" "Post-installworld mergemaster breakage r348504 -> r348529" which has info. A fix is supposed to have been commited. Best regards Andreas From owner-freebsd-current@freebsd.org Mon Jun 3 20:31:27 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5119A15BD0A3 for ; Mon, 3 Jun 2019 20:31:27 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id E007E6E0BA for ; Mon, 3 Jun 2019 20:31:26 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 9665815BD0A2; Mon, 3 Jun 2019 20:31:26 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 84C8615BD0A1 for ; Mon, 3 Jun 2019 20:31:26 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from mail.daemonic.se (mail.daemonic.se [IPv6:2607:f740:d:20::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DBA7A6E0B6 for ; Mon, 3 Jun 2019 20:31:25 +0000 (UTC) (envelope-from zeising@freebsd.org) Received: from cid.daemonic.se (localhost [IPv6:::1]) by mail.daemonic.se (Postfix) with ESMTP id 45Hmt33pYZz3c7W for ; Mon, 3 Jun 2019 20:31:23 +0000 (UTC) X-Virus-Scanned: amavisd-new at daemonic.se Received: from mail.daemonic.se ([127.0.0.1]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256) by cid.daemonic.se (mailscanner.daemonic.se [127.0.0.1]) (amavisd-new, port 10587) with ESMTPS id ljZd0vcTggje for ; Mon, 3 Jun 2019 20:31:23 +0000 (UTC) Received: from vivi.daemonic.se (vivi.daemonic.se [IPv6:2001:470:dca9:2::4]) by mail.daemonic.se (Postfix) with ESMTPSA id 45Hmt30Ghxz3c7V for ; Mon, 3 Jun 2019 20:31:22 +0000 (UTC) To: current@freebsd.org From: Niclas Zeising Subject: Enabling synaptics and elantech touchpads by default Message-ID: Date: Mon, 3 Jun 2019 22:31:21 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: DBA7A6E0B6 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.99 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.993,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 20:31:27 -0000 Hi! I've created a reveiew, https://reviews.freebsd.org/D20507, to enable synaptics and elantech touchpads by default. Today, these tunables needs to be set on boot for users to get full use of their touchpads, even when using X. By enabling this, things like two finger scroll will work in X by default, meaning we get a more user friendly appearance. Is there any reason not to do this? Regards -- Niclas Zeising From owner-freebsd-current@freebsd.org Mon Jun 3 23:33:30 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A88CD15C1119 for ; Mon, 3 Jun 2019 23:33:30 +0000 (UTC) (envelope-from greg@unrelenting.technology) Received: from out.migadu.com (out.migadu.com [91.121.223.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.migadu.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1B19374E22 for ; Mon, 3 Jun 2019 23:33:29 +0000 (UTC) (envelope-from greg@unrelenting.technology) Received: (Migadu outbound); Mon, 03 Jun 2019 23:33:28 +0000 Received: from [192.168.2.155] ([62.122.208.146]) by out.migadu.com (Haraka/2.8.16) with ESMTPSA id DD687994-128B-4F6B-9EA0-82EA40CF8685.1 envelope-from (authenticated bits=0) (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-GCM-SHA384 verify=FAIL); Mon, 03 Jun 2019 23:33:28 +0000 Date: Tue, 04 Jun 2019 02:33:27 +0300 User-Agent: K-9 Mail for Android In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Subject: Re: Enabling synaptics and elantech touchpads by default To: freebsd-current@freebsd.org, Niclas Zeising , current@freebsd.org From: Greg V Message-ID: DKIM-Signature: v=1; a=rsa-sha256; bh=iC/OMAIjU9W7CWuu8UnYV9qx6if0mvzx+2m7UBqdRVg=; c=relaxed/simple; d=unrelenting.technology; h=from:subject:date:to; s=default; b=i8ZMcYtaq4ESGvQCohC+DhurHfXccu5Lltxmj4npYsHFNCchgek1lPYPzTx8jDFCX3d/rRMEachG088A/4qPUZRb8Y6sp+zRRNWEiWaxnQ/a92VrUx3yDsBi80C5F3/zcc0RiJVcU48nbbKEQR0P4e9i1Agn/wxoC7qm9dAqT/c= X-Rspamd-Queue-Id: 1B19374E22 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.97 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.975,0]; REPLY(-4.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 23:33:30 -0000 On June 3, 2019 11:31:21 PM GMT+03:00, Niclas Zeising wrote: >Hi! >I've created a reveiew, https://reviews=2Efreebsd=2Eorg/D20507, to enable= =20 >synaptics and elantech touchpads by default=2E > >Today, these tunables needs to be set on boot for users to get full use > >of their touchpads, even when using X=2E By enabling this, things like= =20 >two finger scroll will work in X by default, meaning we get a more user > >friendly appearance=2E > >Is there any reason not to do this? Probably buggy hardware, as usual? But the ONLY system I ever saw a problem on is the ASUS Eee PC 900 (where = elantech support breaks all mouse movement)=2E Which is an extremely irrele= vant joke of a machine=2E I only booted it for the nostalgia/laughs/dmesgd= =2Enycbug posts=2E Definitely +1 to enabling by default=2E Reducing the amount of tunables re= quired for modern desktop use is very good=2E From owner-freebsd-current@freebsd.org Mon Jun 3 23:46:29 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 70E1D15C1411 for ; Mon, 3 Jun 2019 23:46:29 +0000 (UTC) (envelope-from jamie@catflap.org) Received: from donotpassgo.dyslexicfish.net (donotpassgo.dyslexicfish.net [IPv6:2001:19f0:300:2185:123::1]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 82C707537A for ; Mon, 3 Jun 2019 23:46:28 +0000 (UTC) (envelope-from jamie@catflap.org) Received: from donotpassgo.dyslexicfish.net (donotpassgo.dyslexicfish.net [104.207.135.49]) by donotpassgo.dyslexicfish.net (8.14.5/8.14.5) with ESMTP id x53NkPcv070473; Tue, 4 Jun 2019 00:46:25 +0100 (BST) (envelope-from jamie@donotpassgo.dyslexicfish.net) Received: (from jamie@localhost) by donotpassgo.dyslexicfish.net (8.14.5/8.14.5/Submit) id x53NkPtf070472; Tue, 4 Jun 2019 00:46:25 +0100 (BST) (envelope-from jamie) From: Jamie Landeg-Jones Message-Id: <201906032346.x53NkPtf070472@donotpassgo.dyslexicfish.net> Date: Tue, 04 Jun 2019 00:46:25 +0100 Organization: Dyslexic Fish To: imp@bsdimp.com, freebsd-current@freebsd.org Subject: Re: One True Awk upgrade References: In-Reply-To: User-Agent: Heirloom mailx 12.4 7/29/08 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.2.7 (donotpassgo.dyslexicfish.net [104.207.135.49]); Tue, 04 Jun 2019 00:46:25 +0100 (BST) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jun 2019 23:46:29 -0000 Warner Losh wrote: > OK. I've resolved all the diffs between the git-tree I had and what made it > into the tree. the upgrade is now complete, and I've pushed my notion of > what awk should be to the bsd-ota branch in > https://github.com/bsdimp/awk.git I'll work on folding them into upstream, > although some of them are quite old and I'm unsure if they are appropriate > for upstream... Great! Thanks Warner. From owner-freebsd-current@freebsd.org Tue Jun 4 01:38:49 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CA9A715C397C for ; Tue, 4 Jun 2019 01:38:49 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 61E2A807CA for ; Tue, 4 Jun 2019 01:38:49 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from [192.168.0.83] (ip72-208-182-43.ph.ph.cox.net [72.208.182.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: johalun) by smtp.freebsd.org (Postfix) with ESMTPSA id 0E16818ECB for ; Tue, 4 Jun 2019 01:38:48 +0000 (UTC) (envelope-from johalun@FreeBSD.org) To: FreeBSD Current From: Johannes Lundberg Subject: UEFI boot broken in 13? Message-ID: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> Date: Mon, 3 Jun 2019 18:38:47 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 61E2A807CA X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.95 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_SHORT(-0.95)[-0.951,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 01:38:50 -0000 Hi I'm using poudriere-image to create usb memstick images. The images are identical except OS version. They are tested on a laptop with 13-CURRENT installed as only OS, having UEFI boot and root on zfs. 12-STABLE memstick boots fine with in UEFI mode. With 13-CURRENT memstick it boots the installed FreeBSD from the SSD instead (I choose USB UEFI OS in boot menu but it silently boots from the SSD instead). If I switch to legacy boot, the memstick image boots fine. Any ideas? /Johannes From owner-freebsd-current@freebsd.org Tue Jun 4 02:26:04 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B41DE15C5140 for ; Tue, 4 Jun 2019 02:26:04 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CAE738207C; Tue, 4 Jun 2019 02:25:53 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (localhost [127.0.0.1]) by gndrsh.dnsmgr.net (8.13.3/8.13.3) with ESMTP id x542Pk6T045843; Mon, 3 Jun 2019 19:25:46 -0700 (PDT) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: (from freebsd-rwg@localhost) by gndrsh.dnsmgr.net (8.13.3/8.13.3/Submit) id x542Pjb5045842; Mon, 3 Jun 2019 19:25:45 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201906040225.x542Pjb5045842@gndrsh.dnsmgr.net> Subject: Re: UEFI boot broken in 13? In-Reply-To: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> To: Johannes Lundberg Date: Mon, 3 Jun 2019 19:25:45 -0700 (PDT) CC: FreeBSD Current X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-Rspamd-Queue-Id: CAE738207C X-Spamd-Bar: ++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [4.23 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.90)[0.902,0]; MIME_GOOD(-0.10)[text/plain]; MIME_TRACE(0.00)[0:+]; DMARC_NA(0.00)[dnsmgr.net]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.40)[0.401,0]; RCVD_COUNT_THREE(0.00)[3]; RCVD_TLS_LAST(0.00)[]; TO_DN_ALL(0.00)[]; MX_GOOD(-0.01)[gndrsh.dnsmgr.net,gndrsh.dnsmgr.net]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.99)[0.991,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; SUBJECT_ENDS_QUESTION(1.00)[]; ASN(0.00)[asn:13868, ipnet:69.59.192.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[]; IP_SCORE(0.04)[ip: (0.15), ipnet: 69.59.192.0/19(0.07), asn: 13868(0.05), country: US(-0.06)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 02:26:04 -0000 > Hi > > I'm using poudriere-image to create usb memstick images. The images are > identical except OS version. They are tested on a laptop with 13-CURRENT > installed as only OS, having UEFI boot and root on zfs. > > 12-STABLE memstick boots fine with in UEFI mode. Does it actually boot via a UEFI, or did UEFI fall back to CSM and do a legacy boot? What does "sysctl machdep.bootmethod" say? machdep.bootmethod: BIOS > > With 13-CURRENT memstick it boots the installed FreeBSD from the SSD > instead (I choose USB UEFI OS in boot menu but it silently boots from > the SSD instead). If I switch to legacy boot, the memstick image boots fine. > > Any ideas? The .iso building was updated to create hybrid boot images some time back, these .iso images should be usable as boot .iso on a cd/dvd and as memstick images. I would encourage there use over the memstick images, as there is a plan to remove them once we get better experience with the hybrid .iso. It is also possible that something has munged the boot in head. Have you tried a downloaed ^/head snapshot from the last week, as it could also be your build system that is not producing a proper boot image? > /Johannes -- Rod Grimes rgrimes@freebsd.org From owner-freebsd-current@freebsd.org Tue Jun 4 02:48:54 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4107B15C58B8 for ; Tue, 4 Jun 2019 02:48:54 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3BA3E82B99; Tue, 4 Jun 2019 02:48:53 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from [192.168.0.83] (ip72-208-182-43.ph.ph.cox.net [72.208.182.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: johalun) by smtp.freebsd.org (Postfix) with ESMTPSA id C2C3719700; Tue, 4 Jun 2019 02:48:52 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Subject: Re: UEFI boot broken in 13? To: "Rodney W. Grimes" Cc: FreeBSD Current References: <201906040225.x542Pjb5045842@gndrsh.dnsmgr.net> From: Johannes Lundberg X-Tagtoolbar-Keys: D20190603194851358 Message-ID: <04c65c1b-35c3-5bd9-afdb-02e24d6aa521@FreeBSD.org> Date: Mon, 3 Jun 2019 19:48:51 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <201906040225.x542Pjb5045842@gndrsh.dnsmgr.net> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Rspamd-Queue-Id: 3BA3E82B99 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.92 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.92)[-0.920,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 02:48:54 -0000 On 6/3/19 7:25 PM, Rodney W. Grimes wrote: >> Hi >> >> I'm using poudriere-image to create usb memstick images. The images are >> identical except OS version. They are tested on a laptop with 13-CURRENT >> installed as only OS, having UEFI boot and root on zfs. >> >> 12-STABLE memstick boots fine with in UEFI mode. > Does it actually boot via a UEFI, or did UEFI fall back to CSM > and do a legacy boot? > > What does "sysctl machdep.bootmethod" say? > machdep.bootmethod: BIOS It says UEFI (it is also easy to see the difference between legacy and uefi boot on the font / font size used so I didn't doubt this). >> With 13-CURRENT memstick it boots the installed FreeBSD from the SSD >> instead (I choose USB UEFI OS in boot menu but it silently boots from >> the SSD instead). If I switch to legacy boot, the memstick image boots fine. >> >> Any ideas? > The .iso building was updated to create hybrid boot images some > time back, these .iso images should be usable as boot .iso on a > cd/dvd and as memstick images. I would encourage there use over > the memstick images, as there is a plan to remove them once we > get better experience with the hybrid .iso. I don't think that would affect things built with poudriere image. (poudriere image -t usb ....) The jails used are download via ftp for both 12 and 13 (created by poudriere as well). > > It is also possible that something has munged the boot in head. > Have you tried a downloaed ^/head snapshot from the last week, > as it could also be your build system that is not producing > a proper boot image? My 13-CURRENT jail is always latest snapshot. poudriere image does the same regardless of release: download tarballs, extract to dir, makefs, mkimg. I don't see why it would work for 12 but not 13. I can try a newer snapshot later. > >> /Johannes From owner-freebsd-current@freebsd.org Tue Jun 4 05:37:44 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4A1E215C8D20 for ; Tue, 4 Jun 2019 05:37:44 +0000 (UTC) (envelope-from ohartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id BE81E87763 for ; Tue, 4 Jun 2019 05:37:42 +0000 (UTC) (envelope-from ohartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559626650; bh=e5+SNiVqayLXZLQkeacBV9nswjmoDAJHSvYOpp0Nc9s=; h=X-UI-Sender-Class:Date:From:To:Subject; b=Ke+3drUNlCRM+bFlmvdJjq5DCtivTm4BB0qThRDFoPkMW5e8eBDicCo9iMqZ5XKqJ Coe/Zz0vsaNcmRY2KjVgas3K4nKSPxn3XhwDAaWPNIQBwGEi2pCxIOo9p3L2kOZN2O VoJIQtzn9WoNHOr9KqxPR3mCWOKejM5b4WTyFY44= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.83.112]) by mail.gmx.com (mrgmx002 [212.227.17.190]) with ESMTPSA (Nemesis) id 0M2ckv-1ggceq1AZh-00sMBA for ; Tue, 04 Jun 2019 07:32:25 +0200 Date: Tue, 4 Jun 2019 07:32:16 +0200 From: "O. Hartmann" To: freebsd-current Subject: pkg: Cannot open /dev/null:No such file or directory Message-ID: <20190604073209.4e42a0eb@freyja> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K1:mSgCPp4UAd3efrmcvjGsSTTVqdlKD3RtcO20etvxTN8MJVHqCsm 01SgofYObw7+WIIfw9yAYGvgQZmgdFiQlwpj3Ggm97KL33ekxlYLnLWF4oHUiejqt+/Zvq/ ale3ghZfOlMKNuqPjZDw8dAB81vdOYK1zqANqx0in5grDdXctsxO7Q4pN1EiiSXN0HouraU Di6l84kNv6shwKRWLCsVw== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:5CFJhlhIKa4=:AMNxPmafERf0alNe8vgyMd bFebZHHzebWK3sS1r55BUUZbtdV6ad0z11ysUR16R5u7oNxse1vn5Nj7tOC1SAnFpHh6zmP6c BOjS3bcLqfngsJfb56bBr6lE8ccW3xjr+ZuWG/sBpz6G5Dtdv8mr/OWJ9QAjINy8RTH7OfyaN 8SWG1AJbwjAmiz00DK602VaTtTMGlLYKbWTccECi/iBpFXV/TtL8ZvNWxMnwzaYlwjKh/euYa rljpWFrcuiy/nTHSnu14OT7gteJ7AoFUiaRM8vsACBXnP3ssYYK4axAIqfDl4Y6LSIaVFZ40p SbaRneZbdPqnYcxmfs9UZT9+z4I0TSs5ki8ZGouXBcUJV69g8ewNMnXev4waSX9509TlcwSgG kF+2eD/33q5O/IGkggHwv8EqOUQtUBno5dvLGEOHQnh+w5Zdazznqlih/yxmIfgMvWNpNtHOW H+6OFzmoqCFTFaN9+bMC2MrPz7uHwyh4ucR1Q8tUaUPq/EAcVs+8s9rTEWJA0squBMdqBqlfW kPGhIxPU8NuVJsXIw0NQPdi1MxH9zDP9+EOHPKyyYUmbu4YZI1zAbitdtIK4b4Hm/6E4yZPDw r2LCQlIhDwmAcVlyoEDceMaodOCi2K1rrl1RLA9LAcYF+UiWFK296WhBPb3eIFWf12vYoAJx/ e3mEYK4FnswPQiEX4BJV9JmbBx4U6wCRLQBZxWBJVy1QRVojSiXebMx/6v0fOrmt2jruWze62 uhIZFMvDU+yfopYo9VGpuHDS7W2izsXuRuECfI/Ant7U4zSjE4qr3rxRhZotBNg6pcE4aPxGn lk6w0WFDZdk5P5dv+joSS6NiyLoAeaCmct1LXXull7Igml9RvbIBSqhcx2eez3MkHiCk6a1g9 Xvg9/35kVBvwNPd/4PkihwkgA/SlWR5LJPCmo/2tZ0vP0H5uxJ2MnLgKK5hhfbB0ujuAmdQUz ew/VnugZ6mXsYTx/D2PJURcwCnDU7INua46qDu9cScyQwMUyoNa5D X-Rspamd-Queue-Id: BE81E87763 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=Ke+3drUN X-Spamd-Result: default: False [-3.29 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[walstatt.org]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(-0.80)[ip: (-5.10), ipnet: 212.227.0.0/16(-1.46), asn: 8560(2.55), country: DE(-0.00)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; MX_GOOD(-0.01)[cached: mx01.gmx.net]; RCVD_IN_DNSWL_NONE(0.00)[19.15.227.212.list.dnswl.org : 127.0.3.0]; NEURAL_HAM_SHORT(-0.68)[-0.678,0]; R_SPF_NA(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[112.83.88.46.zen.spamhaus.org : 127.0.0.10]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 05:37:44 -0000 Hello List, lately I ran into a serious problem installing packages in a nanoBSD environment, in which the package repository server is "remotely" on site. The issue as documented below occurs on both 12-STABLE r348529 and CURRENT r348600 and must have been introduced shortly, since the last known good installation with the environment of ours was on 21st May 2019. As far as I know,, the package installation is performed via "chroot'ed" environment and somehow /dev/null is out of a sudden not accessible anymore while pkg tries to delegate some output to /dev/null. What happened here? Kind regards and thanks in advance, oh [...] All repositories are up to date. The following 10 package(s) will be affected (of 0 checked): New packages to be INSTALLED: python3: 3_3 [zeit4] sudo: 1.8.27_1 [zeit4] devcpu-data: 1.22 [zeit4] python36: 3.6.8_2 [zeit4] readline: 8.0.0 [zeit4] indexinfo: 0.3.1 [zeit4] libffi: 3.2.1_3 [zeit4] gettext-runtime: 0.19.8.1_2 [zeit4] openldap-sasl-client: 2.4.47 [zeit4] cyrus-sasl: 2.1.27 [zeit4] Number of packages to be installed: 10 The process will require 129 MiB more space. 20 MiB to be downloaded. [1/10] Fetching python3-3_3.txz: . done [2/10] Fetching sudo-1.8.27_1.txz: .......... done [3/10] Fetching devcpu-data-1.22.txz: .......... done [4/10] Fetching python36-3.6.8_2.txz: .......... done [5/10] Fetching readline-8.0.0.txz: .......... done [6/10] Fetching indexinfo-0.3.1.txz: . done [7/10] Fetching libffi-3.2.1_3.txz: ..... done [8/10] Fetching gettext-runtime-0.19.8.1_2.txz: .......... done [9/10] Fetching openldap-sasl-client-2.4.47.txz: .......... done [10/10] Fetching cyrus-sasl-2.1.27.txz: .......... done Checking integrity... done (0 conflicting) [1/10] Installing indexinfo-0.3.1... [1/10] Extracting indexinfo-0.3.1: .... done [2/10] Installing readline-8.0.0... [2/10] Extracting readline-8.0.0: .......... done pkg: Cannot open /dev/null:No such file or directory [3/10] Installing libffi-3.2.1_3... [3/10] Extracting libffi-3.2.1_3: .......... done pkg: Cannot open /dev/null:No such file or directory [4/10] Installing gettext-runtime-0.19.8.1_2... [4/10] Extracting gettext-runtime-0.19.8.1_2: .......... done pkg: Cannot open /dev/null:No such file or directory [5/10] Installing cyrus-sasl-2.1.27... pkg: Cannot open /dev/null:No such file or directory From owner-freebsd-current@freebsd.org Tue Jun 4 05:44:11 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7710715C9057 for ; Tue, 4 Jun 2019 05:44:11 +0000 (UTC) (envelope-from bapt@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 1959C87C9A; Tue, 4 Jun 2019 05:44:11 +0000 (UTC) (envelope-from bapt@FreeBSD.org) Received: from ivaldir.etoilebsd.net (etoilebsd.net [178.32.217.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) (Authenticated sender: bapt) by smtp.freebsd.org (Postfix) with ESMTPSA id CF12A1AC0E; Tue, 4 Jun 2019 05:44:10 +0000 (UTC) (envelope-from bapt@FreeBSD.org) Received: by ivaldir.etoilebsd.net (Postfix, from userid 1001) id 908CA9AF27; Tue, 4 Jun 2019 07:44:09 +0200 (CEST) Date: Tue, 4 Jun 2019 07:44:09 +0200 From: Baptiste Daroussin To: "O. Hartmann" Cc: freebsd-current Subject: Re: pkg: Cannot open /dev/null:No such file or directory Message-ID: <20190604054409.4anei2ljzimqc75m@ivaldir.net> References: <20190604073209.4e42a0eb@freyja> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="34aljkepzn5klhh7" Content-Disposition: inline In-Reply-To: <20190604073209.4e42a0eb@freyja> User-Agent: NeoMutt/20180716 X-Rspamd-Queue-Id: 1959C87C9A X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.97 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.97)[-0.970,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 05:44:11 -0000 --34aljkepzn5klhh7 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Jun 04, 2019 at 07:32:16AM +0200, O. Hartmann wrote: > Hello List, >=20 > lately I ran into a serious problem installing packages in a nanoBSD > environment, in which the package repository server is "remotely" on site= =2E The > issue as documented below occurs on both 12-STABLE r348529 and CURRENT r3= 48600 > and must have been introduced shortly, since the last known good installa= tion > with the environment of ours was on 21st May 2019. >=20 > As far as I know,, the package installation is performed via "chroot'ed" > environment and somehow /dev/null is out of a sudden not accessible anymo= re > while pkg tries to delegate some output to /dev/null. >=20 > What happened here? >=20 > Kind regards and thanks in advance, >=20 > oh >=20 > [...] > All repositories are up to date. > The following 10 package(s) will be affected (of 0 checked): >=20 > New packages to be INSTALLED: > python3: 3_3 [zeit4] > sudo: 1.8.27_1 [zeit4] > devcpu-data: 1.22 [zeit4] > python36: 3.6.8_2 [zeit4] > readline: 8.0.0 [zeit4] > indexinfo: 0.3.1 [zeit4] > libffi: 3.2.1_3 [zeit4] > gettext-runtime: 0.19.8.1_2 [zeit4] > openldap-sasl-client: 2.4.47 [zeit4] > cyrus-sasl: 2.1.27 [zeit4] >=20 > Number of packages to be installed: 10 >=20 What is new is that pkg is using /dev/null as input when running script? th= is is new since pkg 1.11 . Somehow this does not seems to be avaalaible in your environement. Best regards, Bapt --34aljkepzn5klhh7 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEEgOTj3suS2urGXVU3Y4mL3PG3PloFAlz2BSMACgkQY4mL3PG3 Plo4Jw/9G2YWQvX6pNor89h5qtpWoeRM/cTMHypYQ43pLDJ2yma53cMg5Txguxsp Dt419OkxXRXX6vPZfvxwZ2CInNz+srk1YEs12niEm/+wEA0hCZR1VXwrmrk/NWkJ d1TswOQBxKPbn1ktJb/0E25WFqPj2aAbMQwP0ivMrSg29o+fA1epIaJV3d/yxqUr zzXFr53W0rGfgIqBk2ualsEBm6o2d2aTxss9WjNn3u9NlbwdY4v6V2IAqgh6dqrr JIWwfh0Oyw+62IT507ZGVBvxaTswC+feZXSppuN7e1cRBjMLUPgxCCbY4BQ34sNn JPg9pZDOWKvi7yXEzgWEkSTEdk/ksSKqlKXb7WwSJGaK9I6L0tb//W4h0qTy6an9 CoDmjdH9T43DaLlT6ZRRUS+lQcj8BXK+FbJSjUyFYX54/JJlhmIxUDBMo1t6RDWz YRuYUqkAm/ioYdvqA09dR3ml7HXfKAXP8KA77FDjLreKNTtpO0fwDpdjR7o0IcPi UGF2Y+ofw0OIV12+Xb1UgbD1gSAgcc7gndV9qWUD9CMzc3rYJDGSE/dH3sz/wsQg oXCIZ4Xdr8Wv24ELe3zbHgNGflkLah90RwkQR4qV0Y6UhCc8YJcT+h0O3l138BBp cC65V76g+oRp6I8nCGFtXs9DdmAZ4/ONJ2RNNygnf/bNaL69kbY= =/QQT -----END PGP SIGNATURE----- --34aljkepzn5klhh7-- From owner-freebsd-current@freebsd.org Tue Jun 4 05:59:24 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5972215C9467 for ; Tue, 4 Jun 2019 05:59:24 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8B07A8827D for ; Tue, 4 Jun 2019 05:59:23 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from smtp.infracaninophile.co.uk (smtp.infracaninophile.co.uk [81.2.117.100]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.infracaninophile.co.uk", Issuer "Let's Encrypt Authority X3" (verified OK)) (Authenticated sender: matthew/mail) by smtp.freebsd.org (Postfix) with ESMTPSA id 10B5C1AD4A for ; Tue, 4 Jun 2019 05:59:23 +0000 (UTC) (envelope-from matthew@FreeBSD.org) Received: from liminal.local (unknown [IPv6:2001:8b0:151:1:748d:19de:939e:3212]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: m.seaman@infracaninophile.co.uk) by smtp.infracaninophile.co.uk (Postfix) with ESMTPSA id 4BE184B7 for ; Tue, 4 Jun 2019 05:59:20 +0000 (UTC) Authentication-Results: smtp.infracaninophile.co.uk/4BE184B7; dkim=none; dkim-atps=neutral Subject: Re: pkg: Cannot open /dev/null:No such file or directory To: freebsd-current@freebsd.org References: <20190604073209.4e42a0eb@freyja> From: Matthew Seaman Openpgp: preference=signencrypt Autocrypt: addr=matthew@FreeBSD.org; prefer-encrypt=mutual; keydata= mQINBFJIL80BEADi7/VbnnErDU6pjEhI/SzEZ/HbDRkJ5g7HroAtqIRm6nj8ZwOAgZ/2ZnWn 5F+fXTuLsG0FLNtkd17FoVcuCi5e/GPliXI5cmamV7E1Yz4T8UsJ7RQolimyxVexccKd16Tc AA7B9bFlJSKkBUSD0buj7VjT07xWhRzu6Vgi5r0UjLALYJz977uZA0F1aOGOXREDEAOhdcNc kSNjynqAwDA6dCT1Elpi4key1fYjv4jyDF+GU/YXul2Y/rguA8FCkHd9vyym5eAsLQ5mG00V V9fkEHIpH5KorNVnl/ufHXnkZqmHAZVpFDcrshb7aZ/pL45PXyWgLj+e6etelgj3a2bZi0JF cVdXCnBZVP2oIyYblM11ugTbfCwodORU8a5KfPeztMdAtDr4e+32NTrPdPi5rLT+GUsYz+PL 3A3m3u8bdsFp40DlIrBtSByVjqERxcfhphrEB4J8BXHUG7OAtXkZMlW/PGKDwXJq0O6Z5Tcg YHAoEiSWbXiexHgXNJyP+sqnIlhLWhSJGeJ+C83wqI6oYlZUCW00NkPxcIHnQPV/z+5wQVci TMyaWC2YCIHz4Ljs+TnwWMz0E8PNFDfHVbQ0W4PRGV7gRAqxfL+yKufauIEGbEq8rNDbSwL3 bcUCxR4ZDlaUEUwT4J8naf7rjdgiEYHs2Ig3jeK1+ER4FPG1sQARAQABtDBNYXR0aGV3IFNl YW1hbiA8bS5zZWFtYW5AaW5mcmFjYW5pbm9waGlsZS5jby51az6JAlcEEwEKAEECGwMFCwkI BwMFFQoJCAsFFgIDAQACHgECF4ACGQEWIQRyz6whebywJLW1RZADb2ye5/OevwUCWttU4QUJ DFmAlAAKCRADb2ye5/Oevwb5EACipbOazgwl5IbqkQI4gELpCh5dqDASS9DQqAD35n/cI91P 0lrYcdyCQbOXadQi5bswnP4AcJqX83mITXbcApDdxVxHujw7VODI069eV3/I9Qz72mHYYAAj w0CHNx4bKED2YCSVS6+jV5hq2sywNEUxL+4I218Oc+IsLts62m4tQ8UxX9fQ2H1kQOvdrYpj x7je5qJX/yujLc+9WWZ8ZBSdP/HVJUEdRgQotwAlgfMp3mRQEE73MAJisG/olj/dSxd+oHIP NbJt1yxMqhZekuEGqZpm3tWvqYgpGcEXdhphJSxeK6oLpTLghuAb7/WdOBrpfL7c2OQYBgOw DK+7Io9NBt/d/rCxL39jmUONW8ohrhnNQ2SALnyYTvZgruxA4tXxOOyM9up0/8mB5E8YC9ML 5YuxRPNTXYeWCexa0zktnkCgT7PhS33evf5gsA0B9Snv7TFCFN9adPAdHlsppZIWfTHDG8e2 Jik8PmvsUG34XNif5k6Ui3++2ZA8ZoKvOyLeomuno1hN8yk1APw8SbX1SPNz9UVbl8W/YgGj 3GhYOuQt4HcMiLyTby6R4lC4nsBaHS1MX+57f6Zxzf2wNjSKxiJK9qS7azbu/GxpafNhbz1Z +iUDIaJkRWA1Gs8C7SMcfVsI5zDtvqHGYtTCgooVMYJ6vRyB68M4bljUYMxRTrkCDQRSUUGj ARAAsPHwcnupWuOqYbboiYwZnd6dNRSUzMxIXN8vkdkrDfw7DvV9WYuAC9IGJ310N0otfh9A zGDiCPRbKl0YayJ2BIgsFzyAavA/kCCRLP5hMZ1mKkZ4K8Fs16EvtmarzPibSBfDQ0wcwzNf nSL2gZVG1JwRHHZ9TtiUsuAIh0R/qRh9+8AcFkS5Pfxb1PzJC/YuWOdlj6cO58u+2FfmNiGm oB6kl1LahmbtGgO8GRInkOYUYlWSUAA4Flw4FzWHBkEGv/STAp++KAZu2Tdl5UZH9iXm+Hsf 4sqt+/ILJketmO2RK2o2ECVwE2a/hQdOjjqmcscd1M5znweKSCk6dR/K4Cv05bZ7KVRCm2vK vuEBpltm/43/ls7OnFwz1UVswX9ch9t5tgSwbGxtTWJ/Mr3ybCz0EE4WaJBI8HTuVZWaJwXM ozz26BZCOV56flkZjDuyRhvRjZG+QhdbbumBDpa6wu3MCjSG8wn4RlNjuQdjDCo6bdqyovGg f8RW6UNCmStZkpTZYZfs8MTEcltmaFiJQjnY39pWa+Fp0aWwcwOVlAkp2wX6FzQeIEbPW515 vAlCjXneJIN7jss4Y2QJtFFQaCw0c+NloESFFhCLvYBhMPf2kccnDu25VRupkLp6njQs94Nf jtSb8mzOa2EhAHY81pRfdetOPosi23P6zIGKLXkAEQEAAYkEuwQYAQoAJgIbAhYhBHLPrCF5 vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG8mAonBvSAEGQEKAGYFAlJRQaNfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDY1M0E2OEI5 MTNBNEU2Q0YzRTFFMTMyNkJCMjNBRjUxOEUxQTQwMTMACgkQuyOvUY4aQBNlUBAAlCLRtOug Y70Q3lkGsFSNJZm9oqPJGorOsH+emDdsiZSe5Ut5P2MG+XlIofQOfxvupltzw2pFuJOvHEMS 0rod6lLJ6joInhf0ZQH3P6jF/d2Y8iR9+2nqBtUf27OsHVLRMd/5WHVgyMjjyNBq0urIdv4E wV8Y9CDtGBGeiYyMstaBxHdEH+oM9VZB92lv485p4V8t8k1BgNn7UjQzOMBlITAB7WsUcXGi zTjMMe1tX/IT+f00I4PWAn3w5q8ldvtsWf+muVpIaGpZBMrxBEPxYBD3WGMxiymthQQxgZAB 03GatfLjzixld5Zn8WuGiPOxOTBkJAudhxPvfkO+3jgLGSa7TN46HgNH36OdeEr4SMdspR0i 0lmW1hwHmpmyw3XYLy4BwmhuV9z1XQN3qab8FBxOpxcCxnbO4HoDgXAahQbRNSA7umzz+I7S UcZVnCCG3hCG4BLxklZhBw4RmUtRHiL8vu+MPKrcBnbZ8uJ2s3E6mhB0yM0UnA3pYhAysgwB q3n9jLYN0atzVmHL8Fxjyc7z1EJPgqFdfHfMYl/eLYmCuGNfMsSGlH9O7tWoE10qkDlLmNB7 jbiJNgTf9rc50QKKUqumqp4a1UMEnt+7yf//JqUD7Jf0iJrglLgUyPKSY5te9rJqHPy1wIXT 6pChY5ic8jmtXKsCZaaxL8rEsq0JEANvbJ7n856/RNkQAKiZK5wNuRyNJS21MUJxnP7biEW4 1QuGhV/7Ryw5XXIor8H7SZHCnVR1fCYnJWRwRYn0SyZGoERW/57rgibf8/gkPw741AkCKOhL TDNgvNriEjfWj3I0X6M90AZXhcnGVJTS/moV65g4lUo6jX1GiJyTCD4b9SLyNDzPgiWO2I3W R+Xf/W81PK1820CN7HpIZUrLfGF+Nr6kXUxeOeSpi7ZMB/p3e7ZSzY0Lp7PFqGfL9N1Jg26X 8DVaf/Em0AorutLx84DqqMfO02ySaCq0B83VYzbNB3Ascy4c2JNIvwMiyUbsOEzDKkqB3sYb 0iJtnty9DKvMaLps00eM1+GcYpLsspY4NZQeJTVC+WetRqzFM4k2JH1q3hwymYgIsxDam6kn U3m0bN19WLQYmS5HLPZbkmtpm3P49g6KLFxZHzklS7x8VUOMJ3O97xXScBC9bePB3tqQRDSs wX3YmIywTYVInEeFleNaXH3UoS3Dhw7KP3i/BNreWDM+oZhbc2OkgWzQzXfT+l17EcP9/xML 0CIgM/cJPwMOrKrdqgfL6zAYDUK0IGFgRoxgnAbnpPHCr7ykrELNLbGtnzchzCxnbIyrSVAb m+Dm5MnjQRiNFXbuvpkuVVFqo6a0OhX1cwTuCIzSEfSggRaOOEqXTk559dDOXDqVx9lVKniK vbGzkmhAuQINBFJRQiABEADC0axEKC09VCYGgsH20lUwtAXd6VUVCNENBlW+MXQYsKfCLqO+ XP6vM0pA+sSswaBeSB/Eu3XgdKhuYGKHqAOo4wyKvwk3h9IWmgVNMM8ZQFi/PP2ya56/tuWZ 7kkG2M2OfWQpnBHa97wSN0KWDjZHrQXQMggDq5EqimNc2+hFaB2zIGrP0tjXVrHLJEmJRLq2 ugTxpGKLlNOtBNEsWmiN+MafXpKM6HLDq1scCvrhRICheBsnGtcyGaErwpjNaLA70I0+B552 DfTj+PICOGCMnp4jlP6rmVG7RifZoE5DrkcdTim/IU0pLaO/Epts5lwDodEOW9CKQFH8dswT bp6xhKJf+y1dIwhoOIkEUspoME3rgLtn72+QQW4jw/4pjA7MQu9VOF9bUN/nxTfyn/Rct3Bq sBZPJURdorewPgoBsPxMaA7t8JRoRyuVwXGMacw+wdmv2lldsdUOGokSCB596FoXAcKWndiY dgNjMWJaODy2va9Vlv65hGQRXWcoI2ytMCSwSzslly+V+0jo0ZWoUpd+6BuYRvG1QUW5/Fco aPPJsr/UfU0jzg6bCAw/xw1nuGaiZTqNiNjklrGIKyi0UyY28DGGADn3j9obY7pOrI9nFicc NtxURyhmgHP9tiTYNTVaGPyJh+WV3ZH/Yb7TStZadLoWb5vXAs0DQj+qnQARAQABiQI8BBgB CgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbqkACgkQA29snufznr9M zBAAvn4C8wWYyiObQbqgaAm8GjqlSi0lGEv7ydmcu2ElAAyD0dnxbEMKEGgBpQumGD8/1pdZ FYw3EIKWiazpvMVw+6fFz9GZdviuM1refUYm3duDejaNoH75zmIG9LRTOJ6RBkPd3oQznT40 X5K+ARqLaJDPAzjb6DH7HYINlvNvf89M4CVN0gofv7dcCqtBTF8CtXB3iG0cFAis/12PwpfH 3YzWq529jnJJCLChTD5eEBi2JNLzQRHMeqy8D4Bnkb+Ahkwgbzs5GXGYaXoZeyFKThTAK/sg eJ9Cz15azfKW+EWMUOcvCurqz2QajlLe04N9mU4vPp92VTo274CtfIg/shSguYXnEZ0I/sz3 VFn3Kn2bRYeRu6PyusNUsQ397Uw5wDVmqzQqz+MnOkP6xAJjOvnD05cdj17G4rJ8gTgmzDSA 6v0AfzhUygy6Qf0UgrWrFaFIL4zQWsp9sap/QTMm92SBhLOE/Kc7nkkueEeVp0TtbkWByxLq 77Gbp0m4iZB8zylaac118hY+/vJ87aTuKF4CiCcezaI5FMg8/VVczO7/LV/n8Uu8QUOYEatR cfOB2JNXxpI/LqXVzvXpUidJbwpXY2aZprgzGhahBocuRL9jY8qp4in5CkhyU+rZyHkpQMHI +i45KRHO5GDSDMQcDF2LYGRbDUMg7G1MYTJwzsG5Ag0EUkgvzQEQANi5h27KsPhVw6AKlUo8 htPapW7b4RS26/z2pJe1IJ+lejrD5LveuRxdO3V+5hxqdBMEYNuQRmOlgsjiXkM5XFIgBeEF VGBaDv5yKPZXNfqIJC2nNehcR+rWHq84yrVb/MAvEvfQTvn3GeCTDd51xYnZYVO0An44TLLe 9cKL/i5d4I7flz/NK4DMpSqBRs0z7Tj9uF22LtYDJhNnQPolF4f+ADRLGMsbNHpCKwLcuzCR NlWN+eTY9peGZEfDoJT39u4wdg2ut9aSTv3B+l5HHkfYSS2gNf5yQ3YOVbQp/D6vZvNBCS0n Y5G5ApFil2ZAdoqfllqeQ74eH/dEPqOK1LCiBznKPHoLvTAJgA9v+Lhb9qw1jbIVD56Y88ZW c2iONscDlN2dboAYXGu3pcc8KNFkfc/j3MKRfq6N2l+t/n4ueebtLZypDJ3v9X7cQAkaW90R DhEuPpvvd+MEZGDYH3ZtIokqXZ3G3yiAy4M4TGXg4jX2pQ8ccXciimcp3DaXvqcV/SKnF20Q l6lm0r9sNp8ZBWUkLeMnDnpMdSjlONGuG9TsM50gaDi+kJuy9/fnlA0UGMpQNmBc1wsNAHl/ Q3ObZHUQtsZZN0gYEusDHpNC87SHodMS5YTc/eKx02asEoIoue/vUejkI6dvHWZv93+13y3c ZBhHyfF6SEr5dNkjABEBAAGJAjwEGAEKACYCGwwWIQRyz6whebywJLW1RZADb2ye5/OevwUC WttVSQUJDFmA/AAKCRADb2ye5/Oev9SOD/48JvgAf/PkjW0+TTE5vDaqdlEmNBu3K/vFX4T7 u0YT+qzLGUGYUvISiti9Dl7dV8kTg/Yr20EbHpj2a1Iys03YbR3mn/p6dv9abyqkaSESHN/g PPk1rlEi/j3lyoQsjDN6bpBEwT7Kbgri+Lwtkwp0vGm8I5AOguGlnCuNqsJ2jnHJ6YnEaKKp imIkr8wJVWxmx0OfnZxWrhMr5txD2DG675r1/IyOkU6SnApoD15+fJQmrsSmCKo3cZUMvM5Q 9lUJgdKuC89jJ1NujCzk7SC/EP6xSW0KFGzpqK0leIfh1riQ8DNs9CWreLANKtq35qbDUeGy BHwki0krsRRuNfg+0c+Rc5XOl+vuGmwfblKguIkAKSMSsjslXHqom+9s+mhOqJUSjAHsazlL BkVn00DfooDQBeeOwDlRwmQi+xcV3FomZMf5+4ARmsfzGtRIiJp5pfjek/P9vjeW+UqlE2az teXCmaK0G2LaLVVNnJzrUVQAqpA5eMtd3Ay8IGlhbrfznmAplgUH0aYhR1twIbUF8MeyQYIH fofR+lOnp3/vufJFZWve4S6tbK/OA69+Xr4wKAG95XBw03qZtPFbWu9yk5AYuS02U4akBhFv NfSx4Bs2rcrXZh63VBrlNqecueJdOQiQuY6nGoUa5fiE9glZF5ib9PVa522bBwaI2mW1tbkC DQRSUUKTARAAt6FH3HbDFoumOWUuJlDgOQs3wdp2n3IKv7gqzbDdgaoWW7hDTvjO0Cb6p2PG UKEoxMQQoIdDO0pQ9rgr4Sh4VSVC9WMO/fUwqdrIs2nACIg4OwvNhIccW08S+N72f+yuXWOQ /dv79cwruE26/BEXgIP09MYcOWwcUCXzOoUR3er+jzcsN9uFjcsBVUJLIEru1askHRzCUa5P 9S9GAFBwN49HC5IJWEzdLP27FjjOG5UG3+QZahHrjG1i6S3bIYXtaGsqNyfkp9Is7Wpj2kk+ s9Ua+YMG/V5YVlbANIexa1yr75p1W9biqXpCWnB3TaHSfI0G1t9w8K2qhR/Z1/YLIcRzZ2aH JnvbzJYw5Cs1jfNpFytbASsxj0rbReouftlBvVWFRxsZ+oG1ZXL64/SVKMZAnfBNxd1uajp+ HtoQtYoTu88la6zcdnAhOD5JdOntN2VF8iQnDfPgkidfuSZ1C059xaRPTSRJBgMRDtOlDxgz 7Pxx/7L2jwxRY1dq6NGioflY7CCpGc7bi1K6xnf3lBL8X2nGpRAVsg9Lx1ShIWkgNbTAcPXp XcXlJ1xqz8HS8Twadh6gIfk/RNchBIED9lkVCKHYp/XQb8T8vMwn/kTWUm5WlPkQUFQN4D1b 6+dJw4bwn/wiRS8did1MU1OytJB6tljfEUCx0uKkzqr+33MAEQEAAYkEuwQYAQoAJgIbAhYh BHLPrCF5vLAktbVFkANvbJ7n856/BQJa21VJBQkMUG42AonBvSAEGQEKAGYFAlJRQpNfFIAA AAAALgAoaXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp5OdNFg// ZqeVdGoKkMvALPzZjGz84+6l0kcMxSN4TfWmec0YpSmDEzCw4/SZoGqHlZb8lcTevmNrNXg6 c+wVw6P+Ycl20Nzb98Kt9C5sz+zGVmPPK+3O9gaPnEqlIKnnbxKXXNHQdd8Mf0UTpifMqX0I kWOqhe/tQKGoQ9+feKvLIaToIe/NjosW6vJ9YAgFqZ0015zwbElhMNFmgDMOI2SgjBZ9ngP1 U82Mqb7/7G9GxHtnwuJBSnPJgN8tav2O9uWPC0N8deyZBH4y9ERBPTFMc46wjkW030olcq7g 4hZ55rpPIEyGQZCq4u1gGibbiQJZEyUQT7BJm70/PeUr3uNjPlQODV/lF5TBvqGHEmlSQfo6 Yb/QQx07CK9bvhUSO2XP3ybS8JwoMZlgZzZcjiPiQF9ot6152/Cp/XrsKgtk+fg5ARZpyywR lQk1JCHRZvhgXIxqNYA04uwdPFcLI4vPiDaLS8mhXHLRZsSpHmIBqqrnam5Lq7iDc39UZrSJ MM40oy3iAOI2B7AOCbzxRuEplJd3E/tEqrnFGcPVN+h52ka74lEyfkwA2RrASWJJcXLN3/Vs izEj8okepefzjU/UPnU8sirzeWWo8Z4uKddovk//NwAPUJbee4vZLjYE6MWdpEoZP9CZXbtI PWuc9Djg16aHOgv44JPokDMaHA27A4rw2KwJEANvbJ7n856/SPkP/1bGUde7lnRTNd8c0ZrU tEi+OOibKyh7BjLUpzlihj3rGl9ljAF0eCdBrL1We3MDDcyi+XO7VZLiecZTlG6LLXFvEFjY pyPRx3bXlWk1/ahEiBoLWxedseNdFrO+H5XX6ODmKFFLhXgpsXnAxtM6Mxmrx0CGW4qzfUi7 Vsqj86gqlcet0/k5RqPMAhrGX5fNnQNWSAwumeFKM8UgDpKY0u7M2tS07B0ozXOSpqGTSJhX 6Ld2Nl95CL3wbSGuh1pDUOysAnzK5Rl/OQ9LtYpWomAKg6yn7gKYij5XmekAg/E+ybr5Gyx2 PgMQUGtuNmBRWP1qKtVUbrOekiuNz7kpdrP7M2O7i/cxWjGpVtjDNWuGkFgY3c+sKKawBma8 1K4rg044nkGwFX98vfEHVGu+HOd3D+Mv47nv4LQvzynBG/YflwaPmLhpw7HCPvpa4W7y8+5A KxDqWlM2NvrLwmwbmz9dQMGtjnNRm4uHfPX8AyzBoMtDrxNLIvDYlLqh+G2Q1shNNNdRNXn9 Z1pvri6KAHmH9GlISuM/jQfItout+Gtx9QUlNX3aIsdScTLA3jnMOpHcALCGI+XMiBNaVuYU xHgHh+MNYhmjQZZqASBCvVj1HyibDPZa/iQ4DBGBRlJb+8saPPqYVDQhosWSF20aJKwepZII OFjpMgmCIqZAnqK4uQINBFJRQrgBEADUWFag56O3CaycayGght1rYWYz7P9/3s7OlqAuEAId 8/kSz8jXzAb/Qb6t0247a2MD0gxnjgZQy2OiQOsOTrc31L6tUrLVATL5Q3oKIh9hOlNMA+cR jsgY3UmMaSw+Gftp64EJDBQwBXWT7CSUEJw4PqzwMPiTHRkmqQfzdfNagFJVqZ0e+cznoLzI 9WvkccwLW1kicBYEysX5yOXUQ9/PcKqRWcbxLFznJ16JsxL1DeUct5WRWUxECY2rM0t+AkNR a3NpzskiMUSzFhiGmJo9yyy1RS4drjMhEn/IcM1sO21ZF/WWuUVkul65qngFnaFDDRQ5lU3A agWhLhmppmK/yabSVfqz38B1APoBWuldYprslTbAOJrL2xFtiH7m9VYbP2aGdwr9V/C27kiN Wnm/lYzP9Z+dTFkxw2V+BOjiLWzDDD6pEE7YDhiPyoopadOyXtoJf3aK1OI+DBu3piBA/CDD DvavruM+3mjxUxcOo8w8rMaJzDUDLG0yOyhKWef3UW5ly3CKXe8+m/MZe0GavNBJt0ObLQpP mnn9b2kP/xS0ssszo8uzlfSMiGi9AedAoRQ7vFXfI0MBb0M8gJ6Ht/+j1b5Al9ABeeA3PRuu +aBJwBRdFp4AV5BsCa0Qb3aqVJUPuBvtY56aWWB9sSfQ1qeu/loRxkJbHhaPJswscQARAQAB iQI8BBgBCgAmAhsMFiEEcs+sIXm8sCS1tUWQA29snufznr8FAlrbVUkFCQxQbhEACgkQA29s nufznr+YBw//TJtAC9d/FYQQHKQg/QOEkcAL8Qx4HA2SICnhKqv64jPcYIUYocOO8Qayh+IV Da6MGkbsWdweUFuexMsW+17dqETfQjUApx32TUwF44WgIEfARLW2zRdRcXfsT4A2sQJCvNJr JnH3lywiJi+V848Q4sC3sSJREpcJd07oc2jxSKZyYZ1DBPfK1MyiwcBt2uFCTXdyFMham2aY LDP2JYvFP08tjTUAIKhe4B0bPTtldCf5sH5q8xrpaHnKHf0n7qMmK7NtGW/9R6WiCruiNsLn O95fms1tzKKfA4QXIYCEWl8XsRKwp51HZDjQu/KxPsjm6BL4eThnae9t3Zs5J0LiPxoFbN+p W7anft3YCeezB8+gus7I1Rn5yJMRyYRRVHtZZTBDQfoDqHgLY14GYtFGOT0IR/OuAzYM1CoM vVExgqVWixDwF5RH1OHO1TANqTGcrRm1lvasCWIphpoQVtkN4/PXGa+NhzsRmr/c5OUYxQNr oE8cdsK8mOIBRz9D2JpF7d2nr1X+vA4zk2JL61aCnc62BfSYNZWhCcOPJZUhFT9BqAkew0kk JzQ3jwHGAhfcfozTHoFsD08qAW0OUriEtH+EOXl+dYbjlNUjFPjJu49cZbtp/1TpsYOBdME1 QLM1TPanYXa7tb+IrRZN+Oi9i9VVym16DK7q21k3j0qRC0s= Message-ID: <6438ffc1-437b-e177-475d-fed8fb12d9c9@FreeBSD.org> Date: Tue, 4 Jun 2019 06:59:19 +0100 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190604073209.4e42a0eb@freyja> Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="fh0f3mQfc1nu7955VHXz7UITjeBrd6whZ" X-Rspamd-Queue-Id: 8B07A8827D X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.99 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.99)[-0.986,0]; ASN(0.00)[asn:11403, ipnet:2610:1c1:1::/48, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 05:59:24 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --fh0f3mQfc1nu7955VHXz7UITjeBrd6whZ Content-Type: multipart/mixed; boundary="dX6jTJaEjNn3ZUtrf4lbhm6i43GyuBbDO"; protected-headers="v1" From: Matthew Seaman To: freebsd-current@freebsd.org Message-ID: <6438ffc1-437b-e177-475d-fed8fb12d9c9@FreeBSD.org> Subject: Re: pkg: Cannot open /dev/null:No such file or directory References: <20190604073209.4e42a0eb@freyja> In-Reply-To: <20190604073209.4e42a0eb@freyja> --dX6jTJaEjNn3ZUtrf4lbhm6i43GyuBbDO Content-Type: text/plain; charset=utf-8 Content-Language: en-GB Content-Transfer-Encoding: quoted-printable On 04/06/2019 06:32, O. Hartmann wrote: > As far as I know,, the package installation is performed via "chroot'ed= " > environment and somehow /dev/null is out of a sudden not accessible any= more > while pkg tries to delegate some output to /dev/null. Assuming you're chroot'd to /chroot, then: mount -t devfs devfs /chroot/dev should allow pkg(8) to work as usual. Cheers, Matthew --dX6jTJaEjNn3ZUtrf4lbhm6i43GyuBbDO-- --fh0f3mQfc1nu7955VHXz7UITjeBrd6whZ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEEGfFU7L8RLlBUTj8wAFE/EOCp5OcFAlz2CLdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDE5 RjE1NEVDQkYxMTJFNTA1NDRFM0YzMDAwNTEzRjEwRTBBOUU0RTcACgkQAFE/EOCp 5OfPSg//b5GK2B3qf9vrI47M7j95mXYbV6wrJAKVd6FqnHVXhJVSPlqNY6X6sAyz qpU5VyERt3fEmBXs0lEzQGgUrV7wK2dk7nOVwOakm8Elb3l9sf8+kcIrCwWqGcEG 792o09WJxWWuORy/RlXgRLkVAInh7nJBqKhjR7dRmNmW7Yp4Zf3KCeM+Tylh2vPe A8xSczv4R2UEFCRdMU1tN/8n3FVNPS5G3aVZXaXGeQqT/BKBcnNYMMxaMDAc2jpO YLzXzUXzmd33or5DI+6Cx+6z5aJCcGGSZpjDzgM0Lwxnb7q/Yw3bUdWdrv8lNCCl qXGffUWNoTrHuw7jakvlM0xl7hglpUdeuaEhHtBbTUjChPu2/68GStt9ghsrHK2F 2Cl8EM50URQSWjcuIfOUCOzAZPZq7BGDPdwoz1H5PK4A+0JGq2XmlSqa36QBpI6C nHTnF9WxGWdpY++7JeH9zSXQTJxdJ0ExXtpZ8jNAxorbFcJFuxyWjqZKz73njnoy h5Ipgujq+US3+3hCcqm6S56PAHcr3xZaxVgsP5rz4+euDf8hUwXFr3e4pvF5KTss rXpVhPbdhraLNKTRL1nAl3vki0SOqCL6ksFwGFQ7iDFVapTv8Ldwj/QvfJkq2uBj /P91kn2Xm+1kl6CkPlmFbWn424xsKNSKsbSl44toD/xZV+v1Zv8= =fNH/ -----END PGP SIGNATURE----- --fh0f3mQfc1nu7955VHXz7UITjeBrd6whZ-- From owner-freebsd-current@freebsd.org Tue Jun 4 06:04:18 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5DA8315C9785 for ; Tue, 4 Jun 2019 06:04:18 +0000 (UTC) (envelope-from tsoome@me.com) Received: from pv50p00im-ztdg10021801.me.com (pv50p00im-ztdg10021801.me.com [17.58.6.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 239EF887C5 for ; Tue, 4 Jun 2019 06:04:16 +0000 (UTC) (envelope-from tsoome@me.com) Received: from nazgul.lan (148-52-235-80.sta.estpak.ee [80.235.52.148]) by pv50p00im-ztdg10021801.me.com (Postfix) with ESMTPSA id 602F8360B20; Tue, 4 Jun 2019 06:04:08 +0000 (UTC) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\)) Subject: Re: UEFI boot broken in 13? From: Toomas Soome In-Reply-To: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> Date: Tue, 4 Jun 2019 09:04:05 +0300 Cc: FreeBSD Current Content-Transfer-Encoding: quoted-printable Message-Id: References: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> To: Johannes Lundberg X-Mailer: Apple Mail (2.3445.104.11) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-06-04_05:, , signatures=0 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 mlxscore=0 mlxlogscore=966 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1812120000 definitions=main-1906040042 X-Rspamd-Queue-Id: 239EF887C5 X-Spamd-Bar: ------ X-Spamd-Result: default: False [-6.40 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; FREEMAIL_FROM(0.00)[me.com]; R_SPF_ALLOW(-0.20)[+ip4:17.58.0.0/16]; MV_CASE(0.50)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[me.com:+]; RCPT_COUNT_TWO(0.00)[2]; DMARC_POLICY_ALLOW(-0.50)[me.com,quarantine]; MX_GOOD(-0.01)[mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, m x6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.co m, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud .com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icloud.com, mx6.mail.icloud.com, mx4.mail.icloud.com, mx5.mail.icloud.com, mx2.mail.icloud.com, mx3.mail.icloud.com, mx1.mail.icl oud.com,mx6.mail.icloud.com,mx4.mail.icloud.com,mx5.mail.icloud.com,mx2.mail.icloud.com,mx3.mail.icloud.com,mx1.mail.icloud.com,mx6.mail.icloud.com,mx4.mail.icloud.com,mx5.mail.icloud.com,mx2.mail.icloud.com,mx3.mail.icloud.com,mx1.mail.icloud.com,mx6.mail.icloud.com,mx4.mail.icloud.com,mx5.mail.icloud.com,mx2.mail.icloud.com,mx3.mail.icloud.com,mx1.mail.icloud.com,mx6.mail.icloud.com,mx4.mail.icloud.com,mx5.mail.icloud.com,mx2.mail.icloud.com,mx3.mail.icloud.com]; NEURAL_HAM_SHORT(-0.97)[-0.973,0]; RCVD_IN_DNSWL_LOW(-0.10)[56.6.58.17.list.dnswl.org : 127.0.5.1]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[me.com]; ASN(0.00)[asn:714, ipnet:17.58.0.0/20, country:US]; MID_RHS_MATCH_FROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[148.52.235.80.zen.spamhaus.org : 127.0.0.10]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[me.com:s=04042017]; FROM_HAS_DN(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[text/plain]; SUBJECT_ENDS_QUESTION(1.00)[]; DWL_DNSWL_LOW(-1.00)[me.com.dwl.dnswl.org : 127.0.5.1]; TO_MATCH_ENVRCPT_SOME(0.00)[]; IP_SCORE(-2.82)[ip: (-8.91), ipnet: 17.58.0.0/20(-2.66), asn: 714(-2.44), country: US(-0.06)]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 06:04:18 -0000 > On 4 Jun 2019, at 04:38, Johannes Lundberg = wrote: >=20 > Hi >=20 > I'm using poudriere-image to create usb memstick images. The images = are > identical except OS version. They are tested on a laptop with = 13-CURRENT > installed as only OS, having UEFI boot and root on zfs. >=20 > 12-STABLE memstick boots fine with in UEFI mode. >=20 > With 13-CURRENT memstick it boots the installed FreeBSD from the SSD > instead (I choose USB UEFI OS in boot menu but it silently boots from > the SSD instead). If I switch to legacy boot, the memstick image boots = fine. >=20 > Any ideas? >=20 > /Johannes >=20 If your system does provide UEFI shell, start it and try to start boot = loader from memstick manually to get the messages. And make sure you = have latest. rgds, toomas=20= From owner-freebsd-current@freebsd.org Tue Jun 4 08:23:43 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8C0F615A7F9B for ; Tue, 4 Jun 2019 08:23:43 +0000 (UTC) (envelope-from o.hartmann@walstatt.org) Received: from mout.gmx.net (mout.gmx.net [212.227.15.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "mout.gmx.net", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id C4E978CD47; Tue, 4 Jun 2019 08:23:42 +0000 (UTC) (envelope-from o.hartmann@walstatt.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1559636610; bh=eef6wv3510X9Xu+kzeFDXba0DaCWo+GHmXBARcBM+Gk=; h=X-UI-Sender-Class:Date:From:Cc:Subject:In-Reply-To:References; b=GtTpAMW1WmJfXnNhOKuGzxG1ABwFrKSynMJvnCq84xJYQIM00aJvOinC4mmvrHUk6 2CH98AcXsifqczbAgRUOfq7vRyyt4524x9JGLMJ/7+7fGhSmKxQD7Qabux5gtD2OPa YVfIAFPHCsWAzFdZyPo5a5OQjiUm/QZVXcxMZSAs= X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c Received: from freyja ([46.88.83.112]) by mail.gmx.com (mrgmx003 [212.227.17.190]) with ESMTPSA (Nemesis) id 0Lpbqo-1gsz5T3o7q-00fQn5; Tue, 04 Jun 2019 10:23:30 +0200 Date: Tue, 4 Jun 2019 10:23:27 +0200 From: "O. Hartmann" Cc: Baptiste Daroussin , Matthew Seaman Hello., freebsd-current Subject: Re: pkg: Cannot open /dev/null:No such file or directory Message-ID: <20190604102322.5e6f3dac@freyja> In-Reply-To: <20190604054409.4anei2ljzimqc75m@ivaldir.net> References: <20190604073209.4e42a0eb@freyja> <20190604054409.4anei2ljzimqc75m@ivaldir.net> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable X-Provags-ID: V03:K1:7Mxo8jJsIqjGYH6dyfvc8odgnEdP+3DWbnXc/1QhzRzBub1Fiuo qnWUaXHRB0z2Nzfhcx40mWJUSRwZx832YixXhLqgYxI5cyPJ6k7BzQ7Y6knorBneGkMGtl1 kw9llKg4ABCsxqS41VVg0RKADidvB7yZ6eV/mhGQy2FjMglvCwX7CPk38qseSCJHvcwC8I3 Q5OS/DLS2dMpEdjyQ5cQw== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:eozzcWxIVAE=:mRbIImdKUJToNCwwljslxG 7v4lNxivCqG3hE+NsXOBigi8XSIJpN4DsiuMbORYh3LDcg/5EwmToGmmJtb8UQjcQNoWf19Uw l5gHHnKAf7DvJ4q/km1lorupSQbOXWAEYWKMxfUjbdIFJg1piUVsxbbnL+v43A+N7VDQDKSUI agTJJ8+4cpSFk9Af+F1eS+fKWPTHoMQb/2A3QzzQecizKi8M9XdqOqb+g2OBhFBIAqZyJVdbL vBa3xzbtAH1bJ0heGMlpzfT65sfuRyHjF0JGVtDqpyYUVOxddGEwq1/WiI9MwDP08qIjqI51Z /gWzCEUeRqe4mpmrGouR7wX434cXJIHeaUfUpN2lJJbhu5aJupPDO55VD3h9AH9B5GwyKEOI/ wbx4IZcArPtW+MmqlsC7BFymHNhkLrq18BATPv6n3uzEiO3lWHvApfQ3geZTBbSFZyDfzfyUk mLywXVOZRC4t2Kn8rY5IARNyxA1KirgsKbpe1+goSuONtsaYSIAO7hspoWEArCxd1DM3gm02N DLomllznSqZ8IR1NU3OvZPdnKAN/cxNT4NesScuU5AsibEs/VFBtIhgREDPWEw8HrqoRofW0+ xSq2o6Ct2AF4VPq+bkV1vDbA+pXeFII5CCSHGQpofiftLx0qxE5RzEDl0JpL25uZ1lKOb5YfO rlYTu4Gl3k8uKmgAFBS6uHfjt5d4/jXflPLPVotKy6x1G2Kwc5DV+x+ULXBUyZy5GBSe4u6Bu dmEkIPaeSjgrhs8Z3APFgWy/8MsW21KO5HHq7dQxR9/nfMsTMki/I1GS4/V2v24SDBlbPpmCP lcKRdZj3MTtClfWirRuog3aA6fqr0qgGnkb8w5Db9m4IPiDo6IS2W6wUWFBCGfp+83979jyag qujJMBr62aRTj9x5M3nzLwZQsgjbccU3XgbbvttRa1LJWse2QkJUj5TkvtHGlWrm4z9dk4o8c RjHwbuGPq2CdFN7j++Hv/6uQjqefr24szF9QgbIONIc3xoJK68Wyc X-Rspamd-Queue-Id: C4E978CD47 X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmx.net header.s=badeba3b8450 header.b=GtTpAMW1 X-Spamd-Result: default: False [-1.58 / 15.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_DKIM_ALLOW(-0.20)[gmx.net:s=badeba3b8450]; NEURAL_HAM_MEDIUM(-0.99)[-0.994,0]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; TO_DN_SOME(0.00)[]; IP_SCORE(-1.03)[ip: (-6.25), ipnet: 212.227.0.0/16(-1.46), asn: 8560(2.55), country: DE(-0.00)]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[walstatt.org]; NEURAL_HAM_LONG(-1.00)[-0.997,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; DKIM_TRACE(0.00)[gmx.net:+]; MX_GOOD(-0.01)[cached: mx01.gmx.net]; RCVD_IN_DNSWL_NONE(0.00)[18.15.227.212.list.dnswl.org : 127.0.3.0]; MISSING_TO(2.00)[]; R_SPF_NA(0.00)[]; NEURAL_HAM_SHORT(-0.75)[-0.745,0]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_NOT_FQDN(0.50)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8560, ipnet:212.227.0.0/16, country:DE]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[112.83.88.46.zen.spamhaus.org : 127.0.0.10] X-Mailman-Approved-At: Tue, 04 Jun 2019 10:14:45 +0000 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 08:23:43 -0000 On Tue, 4 Jun 2019 07:44:09 +0200 Baptiste Daroussin wrote: > On Tue, Jun 04, 2019 at 07:32:16AM +0200, O. Hartmann wrote: > > Hello List, > > > > lately I ran into a serious problem installing packages in a nanoBSD > > environment, in which the package repository server is "remotely" on s= ite. > > The issue as documented below occurs on both 12-STABLE r348529 and CUR= RENT > > r348600 and must have been introduced shortly, since the last known go= od > > installation with the environment of ours was on 21st May 2019. > > > > As far as I know,, the package installation is performed via "chroot'e= d" > > environment and somehow /dev/null is out of a sudden not accessible an= ymore > > while pkg tries to delegate some output to /dev/null. > > > > What happened here? > > > > Kind regards and thanks in advance, > > > > oh > > > > [...] > > All repositories are up to date. > > The following 10 package(s) will be affected (of 0 checked): > > > > New packages to be INSTALLED: > > python3: 3_3 [zeit4] > > sudo: 1.8.27_1 [zeit4] > > devcpu-data: 1.22 [zeit4] > > python36: 3.6.8_2 [zeit4] > > readline: 8.0.0 [zeit4] > > indexinfo: 0.3.1 [zeit4] > > libffi: 3.2.1_3 [zeit4] > > gettext-runtime: 0.19.8.1_2 [zeit4] > > openldap-sasl-client: 2.4.47 [zeit4] > > cyrus-sasl: 2.1.27 [zeit4] > > > > Number of packages to be installed: 10 > > > What is new is that pkg is using /dev/null as input when running script?= this > is new since pkg 1.11 . Somehow this does not seems to be avaalaible in = your > environement. > > Best regards, > Bapt Hello, thanks for the hint! Packages are installed via the pkg -c ${WORLD_ROOT_DIR} option, chroot'ed,= as far as I can see and therefore, there is no /dev/null device. Mathew's hint solved the problem. Greetings, oh From owner-freebsd-current@freebsd.org Tue Jun 4 13:11:52 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 838DF15B0108 for ; Tue, 4 Jun 2019 13:11:52 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from dec.sakura.ne.jp (dec.sakura.ne.jp [210.188.226.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2FF7096BF5; Tue, 4 Jun 2019 13:11:49 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from fortune.joker.local (124-18-96-116.dz.commufa.jp [124.18.96.116]) (authenticated bits=0) by dec.sakura.ne.jp (8.15.2/8.15.2/[SAKURA-WEB]/20080708) with ESMTPA id x54CSVfR058237; Tue, 4 Jun 2019 21:28:32 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Tue, 4 Jun 2019 21:28:31 +0900 From: Tomoaki AOKI To: freebsd-current@freebsd.org Cc: johalun@FreeBSD.org, imp@FreeBSD.org Subject: Re: UEFI boot broken in 13? Message-Id: <20190604212831.360fd1a0c34c9f329e3084fc@dec.sakura.ne.jp> In-Reply-To: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> References: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> Reply-To: junchoon@dec.sakura.ne.jp Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd12.0) Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="Multipart=_Tue__4_Jun_2019_21_28_31_+0900_MxCTCUDeohEuf_Wy" X-Rspamd-Queue-Id: 2FF7096BF5 X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [5.86 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[junchoon@dec.sakura.ne.jp]; MV_CASE(0.50)[]; HAS_ATTACHMENT(0.00)[]; TO_DN_NONE(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; HAS_ORG_HEADER(0.00)[]; MX_GOOD(-0.01)[dec.sakura.ne.jp]; FROM_EQ_ENVFROM(0.00)[]; RECEIVED_SPAMHAUS_PBL(0.00)[116.96.18.124.zen.spamhaus.org : 127.0.0.10]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:9370, ipnet:210.188.224.0/19, country:JP]; SUBJECT_ENDS_QUESTION(1.00)[]; MID_RHS_MATCH_FROM(0.00)[]; MIME_UNKNOWN(0.10)[text/x-diff]; ARC_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; MIME_GOOD(-0.10)[multipart/mixed,text/plain]; DMARC_NA(0.00)[sakura.ne.jp]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.99)[0.990,0]; NEURAL_SPAM_SHORT(0.99)[0.994,0]; MIME_TRACE(0.00)[0:+,1:+,2:~]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; IP_SCORE(0.39)[ipnet: 210.188.224.0/19(0.63), asn: 9370(1.36), country: JP(-0.05)] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 13:11:52 -0000 This is a multi-part message in MIME format. --Multipart=_Tue__4_Jun_2019_21_28_31_+0900_MxCTCUDeohEuf_Wy Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Hi. Try attached patch for stand/efi/boot1/boot1.c. This partially reverts r347193 and works at least for me. Without this, boot1.efi (bootx64.efi) forcibly boot from first physical HDD/SSD, even if forcibly booted from other physical drive via BIOS (UEFI firmware) menu. Remaining parts of r347193 and following some commits does not affect. *Hand-crafted reverse patch from commit mail [1]. Reverting whole r347193 is fine, too. [1] https://lists.freebsd.org/pipermail/svn-src-head/2019-May/124677.html On Mon, 3 Jun 2019 18:38:47 -0700 Johannes Lundberg wrote: > Hi > > I'm using poudriere-image to create usb memstick images. The images are > identical except OS version. They are tested on a laptop with 13-CURRENT > installed as only OS, having UEFI boot and root on zfs. > > 12-STABLE memstick boots fine with in UEFI mode. > > With 13-CURRENT memstick it boots the installed FreeBSD from the SSD > instead (I choose USB UEFI OS in boot menu but it silently boots from > the SSD instead). If I switch to legacy boot, the memstick image boots fine. > > Any ideas? > > /Johannes > > > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" -- Tomoaki AOKI --Multipart=_Tue__4_Jun_2019_21_28_31_+0900_MxCTCUDeohEuf_Wy Content-Type: text/x-diff; name="REV_r347193-2_Reach_over_and_pull_in_devpath.c_from_libefi-stand_efi_boot1_boot1.c.diff" Content-Disposition: attachment; filename="REV_r347193-2_Reach_over_and_pull_in_devpath.c_from_libefi-stand_efi_boot1_boot1.c.diff" Content-Transfer-Encoding: 7bit Author: imp Date: Mon May 6 18:38:46 2019 New Revision: 347193 URL: https://svnweb.freebsd.org/changeset/base/347193 Log: Reach over and pull in devpath.c from libefi This allows us to remove three nearly identical functions because the differences don't matter, and the size difference is trivial. Modified: head/stand/efi/boot1/Makefile head/stand/efi/boot1/boot1.c Modified: head/stand/efi/boot1/boot1.c ============================================================================== --- head/stand/efi/boot1/boot1.c Mon May 6 18:24:07 2019 (r347192) +++ head/stand/efi/boot1/boot1.c Mon May 6 18:38:46 2019 (r347193) @@ -79,6 +79,53 @@ Free(void *buf, const char *file __unused, int line __ } /* + * nodes_match returns TRUE if the imgpath isn't NULL and the nodes match, + * FALSE otherwise. + */ +static BOOLEAN +nodes_match(EFI_DEVICE_PATH *imgpath, EFI_DEVICE_PATH *devpath) +{ + size_t len; + + if (imgpath == NULL || imgpath->Type != devpath->Type || + imgpath->SubType != devpath->SubType) + return (FALSE); + + len = DevicePathNodeLength(imgpath); + if (len != DevicePathNodeLength(devpath)) + return (FALSE); + + return (memcmp(imgpath, devpath, (size_t)len) == 0); +} + +/* + * device_paths_match returns TRUE if the imgpath isn't NULL and all nodes + * in imgpath and devpath match up to their respective occurrences of a + * media node, FALSE otherwise. + */ +static BOOLEAN +device_paths_match(EFI_DEVICE_PATH *imgpath, EFI_DEVICE_PATH *devpath) +{ + + if (imgpath == NULL) + return (FALSE); + + while (!IsDevicePathEnd(imgpath) && !IsDevicePathEnd(devpath)) { + if (IsDevicePathType(imgpath, MEDIA_DEVICE_PATH) && + IsDevicePathType(devpath, MEDIA_DEVICE_PATH)) + return (TRUE); + + if (!nodes_match(imgpath, devpath)) + return (FALSE); + + imgpath = NextDevicePathNode(imgpath); + devpath = NextDevicePathNode(devpath); + } + + return (FALSE); +} + +/* * load_loader attempts to load the loader image data. * * It tries each module and its respective devices, identified by mod->probe, @@ -261,7 +308,7 @@ probe_handle(EFI_HANDLE h, EFI_DEVICE_PATH *imgpath, B if (!blkio->Media->LogicalPartition) return (EFI_UNSUPPORTED); - *preferred = efi_devpath_match(imgpath, devpath); + *preferred = device_paths_match(imgpath, devpath); /* Run through each module, see if it can load this partition */ for (i = 0; i < NUM_BOOT_MODULES; i++) { --Multipart=_Tue__4_Jun_2019_21_28_31_+0900_MxCTCUDeohEuf_Wy-- From owner-freebsd-current@freebsd.org Tue Jun 4 14:01:40 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9855615B1720 for ; Tue, 4 Jun 2019 14:01:39 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 48F5F69DD6 for ; Tue, 4 Jun 2019 14:01:38 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mailman.ysv.freebsd.org (Postfix) id 001BC15B171F; Tue, 4 Jun 2019 14:01:38 +0000 (UTC) Delivered-To: current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8D56915B171C; Tue, 4 Jun 2019 14:01:37 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: from mail-wm1-x32a.google.com (mail-wm1-x32a.google.com [IPv6:2a00:1450:4864:20::32a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 0FC6B69DCB; Tue, 4 Jun 2019 14:01:36 +0000 (UTC) (envelope-from etnapierala@gmail.com) Received: by mail-wm1-x32a.google.com with SMTP id 22so189962wmg.2; Tue, 04 Jun 2019 07:01:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:mail-followup-to :mime-version:content-disposition:user-agent; bh=VnWuZdDsVYUYmBvyON+a9n5IcKTpqHPlN52WdVxhcd4=; b=R1c//OTGzSpvtDAw1h44pkrBWyX+PRB9MG0hxyjAhkdAi8b54iOS25SgVdlGBe3V8V Igs632FWL9enI/pAG4YHpuuGbta9jTECVTi3pz7PyRlkuE9hZ8cgpM+0YyIT+eCpEHeH hiCmC62Lnbo5dokQFbiw/qnBss3UXmHmh4QlKCEs+S1kDCiYDnTnuDfLTXvOh/Ik9k1/ guhAmqS/8zxdVs2vU4e6mb23i1A1aGtrZDkyiumXuIkG0U1DBHGMMfjYf3iH9U1keptS +Gr9eE69bdaFIuPpTutXqkCkWaNuSzixe0E9gkmdhDYMG0VTLUPHclKrT8mp1nGqjOX8 +5bw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :mail-followup-to:mime-version:content-disposition:user-agent; bh=VnWuZdDsVYUYmBvyON+a9n5IcKTpqHPlN52WdVxhcd4=; b=am1N3zLczHKWCwBY1vFR+N+82FzS5XtQjplvjBnOfTcAzXWrr92te9tIKspUE0x5kv gQEhmEOAD3THbqPh2DBkaaIE4jeffiUcvM+bOKWu+/leU7a6/45Q/KoLJp27Ojj15rl6 GKDvikOYh3QkI+hFSazh6mcmfKiihKolCrXmGUVpJsrLb8QnPQJp9isC8eh5XnURjfWb w0WBqVYvaX0Lt+98INtQ5JwHl5JNbTu8lxgGgGBTYrOWu+RbYK46vAlXqnh6y0f65w5b Kq59pD1oU3eaLw1SVlGa6o/2aEZCmLnCjrskpwka0NvRIihFXfAYR7lfEX+OkLzW9m5p GRkw== X-Gm-Message-State: APjAAAV+SFc44cofxZRRNvSzDIFBZ7ZV4YhB4euF6D04OFFFFVKR4Uaw FYgLo4k5H71TmbzNER6iysqE+5gG X-Google-Smtp-Source: APXvYqyMsF+OEbZQVYC5hDhd4ydiGS38An+gd3zL6iCmIaB2CKG0OQp/xN/28mkmWbznpQxDd3EtvQ== X-Received: by 2002:a1c:407:: with SMTP id 7mr6853725wme.113.1559656892863; Tue, 04 Jun 2019 07:01:32 -0700 (PDT) Received: from v2 (c0600.int.cl.cam.ac.uk. [128.232.86.88]) by smtp.gmail.com with ESMTPSA id k10sm11225291wmk.14.2019.06.04.07.01.31 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 04 Jun 2019 07:01:31 -0700 (PDT) Sender: =?UTF-8?Q?Edward_Tomasz_Napiera=C5=82a?= Date: Tue, 4 Jun 2019 14:03:40 +0100 From: Edward Tomasz =?utf-8?Q?Napiera=C5=82a?= To: hackers@freebsd.org Cc: current@freebsd.org, stable@freebsd.org Subject: FreeBSD Quarterly Status Report - First Quarter 2019 Message-ID: <20190604130340.GA2359@v2> Mail-Followup-To: hackers@freebsd.org, current@freebsd.org, stable@freebsd.org MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="AhhlLboLdkugWU4S" Content-Disposition: inline User-Agent: Mutt/1.12.0 (2019-05-25) X-Rspamd-Queue-Id: 0FC6B69DCB X-Spamd-Bar: ------- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=R1c//OTG; spf=pass (mx1.freebsd.org: domain of etnapierala@gmail.com designates 2a00:1450:4864:20::32a as permitted sender) smtp.mailfrom=etnapierala@gmail.com X-Spamd-Result: default: False [-7.60 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; TO_DN_NONE(0.00)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[gmail.com:+]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.95)[-0.952,0]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[trasz@freebsd.org,etnapierala@gmail.com]; MIME_TRACE(0.00)[0:+,1:+]; RCVD_TLS_LAST(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[trasz@freebsd.org,etnapierala@gmail.com]; FORGED_RECIPIENTS(0.00)[hackers@freebsd.org ..,hackers@freebsd.org ...]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; IP_SCORE(-2.84)[ip: (-9.59), ipnet: 2a00:1450::/32(-2.26), asn: 15169(-2.29), country: US(-0.06)]; RCVD_IN_DNSWL_NONE(0.00)[a.2.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; MID_RHS_NOT_FQDN(0.50)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 14:01:40 -0000 --AhhlLboLdkugWU4S Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable FreeBSD Project Quarterly Status Report - 1st Quarter 2019 As spring leads into summer, we reflect back on what the FreeBSD project has accomplished in the first quarter of 2019. Events included FOSDEM and AsiaBSDCon, the FreeBSD Journal is now free to everyone, ASLR is available in -CURRENT and KPTI can be controlled per-process. The run up to 11.3-RELEASE has begun, and a team is applying syzkaller guided fuzzing to the kernel, plus so much more. Catch up on many new and ongoing efforts throughout the project, and find where you can pitch in. __________________________________________________________________ FreeBSD Team Reports * Continuous Integration * FreeBSD Core Team * FreeBSD Foundation * FreeBSD Release Engineering Team * Ports Collection Projects * AXP803 PMIC driver update * Broadcom ARM64 SoC support * C Runtime changes * Capsicum * CFT - Package Base * ENA FreeBSD Driver Update * FreeBSD boot security improvements * FUSE * Kernel ZLIB Update * LLVM's lld as the FreeBSD system linker * mlx5 Drivers Update * PCI Express Resets * Security-Related changes Architectures * FreeBSD/RISC-V Update Ports * FreeBSD GNOME status report * FreeBSD KDE status report Third-Party Projects * FreeBSD Wiki Apple Intel Mac mini update * Fuzzing FreeBSD with syzkaller * sysctlmibinfo API 1.0 * sysctlview 1.0 * University of Waterloo Co-operative Education Students __________________________________________________________________ FreeBSD Team Reports Entries from the various official and semi-official teams, as found in the Administration Page. Continuous Integration Links FreeBSD Jenkins Instance URL: https://ci.FreeBSD.org FreeBSD CI artifact archive URL: https://artifact.ci.FreeBSD.org/ FreeBSD Jenkins wiki URL: https://wiki.freebsd.org/Jenkins freebsd-testing Mailing List URL: https://lists.FreeBSD.org/mailman/listinfo/freebsd-testing freebsd-ci Repository URL: https://github.com/freebsd/freebsd-ci Tickets related to freebsd-testing@ URL: https://preview.tinyurl.com/y9maauwg Hosted CI wiki URL: https://wiki.freebsd.org/HostedCI FreeBSD CI weekly report URL: https://hackfoldr.org/freebsd-ci-report/ Contact: Jenkins Admin Contact: Li-Wen Hsu The FreeBSD CI team maintains continuous integration system and related tasks for the FreeBSD project. The CI system regularly checks the changes committed to the project's Subversion repository can be successfully built, and performs various tests and analysis of the results. The results from build jobs are archived in an artifact server, for the further testing and debugging needs. The CI team members examine the failing builds and unstable tests, and work with the experts in that area to fix the code or adjust test infrastructure. Starting from this quarter, we started to publish CI weekly report at freebsd-testing@ mailing list. The archive is available at https://hackfoldr.org/freebsd-ci-report/ We also worked on extending test executing environment to improve the code coverage, temporarily disabling flakey test cases, and opening tickets to work with domain experts. The details are of these efforts are available in the weekly CI reports. We published the draft FCP for CI policy and are ready to accept comments. Please see freebsd-testing@ related tickets for more information. Work in progress: * Fixing the failing test cases and builds * Adding drm ports building test against -CURRENT * Implementing automatic tests on bare metal hardware * Implementing the embedded testbed * Planning for running ztest and network stack tests * Help more 3rd software get CI on FreeBSD through a hosted CI solution __________________________________________________________________ FreeBSD Core Team Contact: FreeBSD Core Team The FreeBSD Core Team is the governing body of FreeBSD. Core initiated a Release Engineering Charter Modernization working group. The purpose of the working group is to present (to Core) a modernized version of the Release Engineering Charter and a first version of a new Release Engineering Team Operations Plan. The group hopes to complete its goals and dissolve by 2019-06-30. The Core Team invites all members of the FreeBSD community to complete the 2019 FreeBSD Community Survey. https://www.research.net/r/freebsd2019 The purpose of the survey is to collect quantitative data from the public in order to help guide the project's priorities and efforts. It will remain open for 17 days and close at midnight May 13 UTC (Monday 5pm PDT). (Editor's note: Survey has finished) Core voted to approve source commit bits for Johannes Lundberg (johalun@) and Mitchell Horne (mhorne@) and associate membership for Philip Jocks. Core also voted to revoke Michael Dexter's documentation bit. After a long lapse of not closing idle source commit bits, core has taken in the commit bit for these developers. We thank each for contributing to the project as a source committer. * Alfred Perlstein (alfred@) * Eric Badger (badger@) * Daniel Eischen (deischen@) * Ermal Lu=E7i (eri@) * Tony Finch (fanf@) * Justin T. Gibbs (gibbs@) * Imre Vad=E1sz (ivadasz@) * Julio Merino (jmmv@) * John W. De Boskey (jwd@) * Kai Wang (kaiw@) * Luigi Rizzo (luigi@) * Neel Natu (neel@) * Craig Rodrigues (rodrigc@) * Stanislav Sedov (stas@) * Thomas Quinot (thomas@) * Andrew Thompson (thompsa@) * Pyun YongHyeon (yongari@) * Zbigniew Bodek (zbb@) __________________________________________________________________ FreeBSD Foundation Contact: Deb Goodkin The FreeBSD Foundation is a 501(c)(3) non-profit organization dedicated to supporting and promoting the FreeBSD Project and community worldwide. Funding comes from individual and corporate donations and is used to fund and manage software development projects, conferences and developer summits, and provide travel grants to FreeBSD contributors. The Foundation purchases and supports hardware to improve and maintain FreeBSD infrastructure and provides resources to improve security, quality assurance, and release engineering efforts; publishes marketing material to promote, educate, and advocate for the FreeBSD Project; facilitates collaboration between commercial vendors and FreeBSD developers; and finally, represents the FreeBSD Project in executing contracts, license agreements, and other legal arrangements that require a recognized legal entity. Here are some highlights of what we did to help FreeBSD last quarter: We kicked off the year with an all-day board meeting in Berkeley, where FreeBSD began, to put together high-level plans for 2019. This included prioritizing technologies and features we should support, long-term planning for the next 2-5 years, and philosophical discussions on our purpose and goals. Partnerships and Commercial User Support We began the year by meeting with a few commercial users, to help them navigate working with the Project, and understanding how they are using FreeBSD. We're also in the process of setting up meetings for Q2 and throughout the rest of 2019. Because we're a 501(c)(3) non-profit, we don't directly support commercial users. However, these meetings allow us to focus on facilitating collaboration with the community. Fundraising Efforts Our work is 100% funded by your donations. We kicked off the year with many individual and corporate donations, including donations and commitments from NetApp, Netflix, Intel, Tarsnap, Beckhoff Automation, E-Card, VMware, and Stormshield. We are working hard to get more commercial users to give back to help us continue our work supporting FreeBSD. Please consider making a donation to help us continue and increase our support for FreeBSD at: www.FreeBSDfoundation.org/donate/. We also have the Partnership Program, to provide more benefits for our larger commercial donors. Find out more information at https://www.FreeBSDfoundation.org/FreeBSD-foundation-partnership-program/ and share with your companies! OS Improvements The Foundation improves the FreeBSD operating system by employing our technical staff to maintain and improve critical kernel subsystems, add features and functionality, and fix problems. This also includes funding separate project grants like the arm64 port, porting the blacklistd access control daemon, and the integration of VIMAGE support, to make sure that FreeBSD remains a viable solution for research, education, computing, products and more. Over the quarter there were 241 commits from nine Foundation-sponsored staff members and grant recipients. We kicked off or continued the following projects last quarter: * FUSE file system kernel support (update and bug fixes) * Linuxulator testing and diagnostics improvements * SDIO and WiFi infrastructure improvements * x86-64 scalability and performance improvements * OpenZFS Online RAID-Z Expansion Having software developers on staff has allowed us to jump in and work directly on projects to improve FreeBSD like: * amd64 and i386 pmap improvements and bugfixes * address userland threading library issues * improve i386 support to keep the platform viable * improve FreeBSD on RISC-V * application of the Capsicum sandboxing framework * build system improvements and bug fixes * respond to reports of security issues * implement vulnerability mitigations * tool chain updates and improvements * adding kernel code coverage support for the Syzkaller coverage-guided system call fuzzer * improved Syzkaller support for FreeBSD * improve the usability of freebsd-update * improve network stack stability and address race conditions * ensure FreeBSD provides userland interfaces required by contemporary applications * implement support for machine-dependent optimized subroutines * update and correct documentation and manpages * DTrace bug fixes * update the FreeBSD Valgrind port and try to upstream the changes Continuous Integration and Quality Assurance The Foundation provides a full-time staff member who is working on improving our automated testing, continuous integration, and overall quality assurance efforts. During the first quarter of 2019, Foundation staff continued improving the project's CI infrastructure, working with contributors to fix failing build and test cases, and working with other teams in the project for their testing needs. In this quarter, we started publishing the CI weekly report on the freebsd-testing@ mailing list. See the FreeBSD CI section of this report for more information. Release Engineering The Foundation provides a full-time staff member to oversee the release engineering efforts. This has provided timely and reliable releases over the last five years. During the first quarter of 2019, the FreeBSD Release Engineering team continued providing weekly development snapshots for 13-CURRENT, 12-STABLE, and 11-STABLE. In addition, the Release Engineering team published the schedule for the upcoming 11.3-RELEASE cycle, the fourth release from the stable/11 branch, which builds on the stability and reliability of 11.2-RELEASE. The upcoming 11.3-RELEASE schedule can be found at: https://www.freebsd.org/releases/11.3R/schedule.html FreeBSD 11.3 is currently targeted for final release in early July 2019. Please see the FreeBSD Release Engineering Team section of this quarterly status report for additional details surrounding the above mentioned work. Supporting FreeBSD Infrastructure The Foundation provides hardware and support to improve FreeBSD infrastructure. Last quarter, we continued supporting FreeBSD hardware located around the world. FreeBSD Advocacy and Education A large part of our efforts are dedicated to advocating for the Project. This includes promoting work being done by others with FreeBSD; producing advocacy literature to teach people about FreeBSD and help make the path to starting using FreeBSD or contributing to the Project easier; and attending and getting other FreeBSD contributors to volunteer to run FreeBSD events, staff FreeBSD tables, and give FreeBSD presentations. The FreeBSD Foundation sponsors many conferences, events, and summits around the globe. These events can be BSD-related, open source, or technology events geared towards underrepresented groups. We support the FreeBSD-focused events to help provide a venue for sharing knowledge, to work together on projects, and to facilitate collaboration between developers and commercial users. This all helps provide a healthy ecosystem. We support the non-FreeBSD events to promote and raise awareness of FreeBSD, to increase the use of FreeBSD in different applications, and to recruit more contributors to the Project. Check out some of the advocacy and education work we did last quarter: * Attended FOSDEM 2019 where we: staffed the FreeBSD Stand, sponsored the co-located FreeBSD Developer Summit, and gave the 25 Years of FreeBSD presentation in the BSD Dev room. * Sponsored and presented at SANOG33 in Thimphu, Bhutan * Represented FreeBSD at APRICOT 2019 in Yuseong-gu, Daejeon South Korea * Sponsored the USENIX FAST conference in Boston, MA as an Industry Partner * Ran our first ever FreeBSD track at SCALE 17x, which included an all-day Getting Started with FreeBSD workshop. We were thrilled with the turnout of almost 30 participants and received a lot of positive feedback. Thanks to Roller Angel who taught the class with the help of Deb Goodkin and Gordon Tetlow. We also promoted FreeBSD at the FreeBSD table in the Expo Hall. * Sponsored, presented, and exhibited at FOSSASIA in Singapore * Sponsored AsiaBSDCon 2019 * Committed to sponsoring Rootconf, BSDCan, and EuroBSDcon * Created registration systems for the Aberdeen Hackathon and the upcoming 2019 Vienna FreeBSD Security Hackathon * Provided FreeBSD advocacy material * Provided 3 travel grants to FreeBSD contributors to attend many of the above events. We continued producing FreeBSD advocacy material to help people promote FreeBSD around the world. Read more about our conference adventures in the conference recaps and trip reports in our monthly newsletters. We help educate the world about FreeBSD by publishing the professionally produced FreeBSD Journal. We're excited to announce that with the release of the January/February 2019 issue, the FreeBSD Journal is now a free publication. Find out more and access the latest issues at www.FreeBSDfoundation.org/journal/. You can find out more about events we attended and upcoming events at www.FreeBSDfoundation.org/news-and-events/. We also engaged with a new website developer to help us improve our website to make it easier for community members to find information more easily and to make the site more efficient. Legal/FreeBSD IP The Foundation owns the FreeBSD trademarks, and it is our responsibility to protect them. We also provide legal support for the core team to investigate questions that arise. Go to www.FreeBSDfoundation.org to find out how we support FreeBSD and how we can help you! __________________________________________________________________ FreeBSD Release Engineering Team Links FreeBSD 11.3-RELEASE schedule URL: https://www.freebsd.org/releases/11.3R/schedule.html FreeBSD development snapshots URL: https://download.freebsd.org/ftp/snapshots/ISO-IMAGES/ Contact: FreeBSD Release Engineering Team The FreeBSD Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining the respective branches, among other things. During the first quarter of 2019, the FreeBSD Release Engineering team published the initial schedule for the upcoming the 11.3-RELEASE. FreeBSD 11.3-RELEASE will be the fourth release from the stable/11 branch, building on the stability and reliability of 11.2-RELEASE. FreeBSD 11.3-RELEASE is currently targed for release in early July, 2019. Additionally throughout the quarter, several development snapshots builds were released for the head, stable/12, and stable/11 branches. Much of this work was sponsored by the FreeBSD Foundation. __________________________________________________________________ Ports Collection Links About FreeBSD Ports URL: https://www.FreeBSD.org/ports/ Contributing to Ports URL: https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributing/= ports-contributing.html FreeBSD Ports Monitoring URL: http://portsmon.freebsd.org/index.html Ports Management Team URL: https://www.freebsd.org/portmgr/index.html Contact: Ren=E9 Ladan Contact: FreeBSD Ports Management Team As always, below is a summary of what happened in the Ports Tree during the last quarter. During 2019q1, the number of ports dropped slightly to just over 32,500. At the end of the quarter, we had 2092 open port PRs. The last quarter saw 8205 commits from 167 committers. So more PRs were closed and more commits were made than in 2018q4. During the last quarter, we welcomed Kai Knoblich (kai@) and said goodbye to Matthew Rezny (rezny@). On the infrastructure side, two new USES were introduced (azurepy and sdl) and USES=3Dgecko was removed. The default versions of Lazarus and LLVM were bumped to 2.0.0 and 8.0 respectively. Some big port frameworks that were end-of-life were removed: PHP 5.6, Postgresql 9.3, Qt4, WebKit-Gtk and XPI. Firefox was updated to 66.0.2, Firefox-ESR to 60.6.1, and Chromium was updated to 72.0.3626.121. During the last quarter, antoine@ ran 30 exp-runs for package updates, moving from GNU ld to LLVM ld, and switching clang to DWARF4. __________________________________________________________________ Projects Projects that span multiple categories, from the kernel and userspace to the Ports Collection or external projects. AXP803 PMIC driver update Contact: Ganbold Tsagaankhuu The AXP803 is a highly integrated PMIC that targets Li-battery (Li-ion or Li-polymer) applications. It provides flexible power management solution for processors such as the Allwinner A64 SoC. This SoC is used by Pinebook. The following updates were performed on the AXP803 driver: * Enabled necessary bits when activating interrupts. This allows reading some events from the interrupt status registers. These events are reported to devd via system "PMU" and subsystem "Battery", "AC" and "USB" such as plugged/unplugged, battery absent, charged and charging. * Added sensors support for AXP803/AXP813. Sensor values such as battery charging, charge state, voltage, charging current, discharging current, battery capacity can be obtained via sysctl. * Added sysctl for setting battery charging current. The charging current can be set using steps from 0 to 13. These steps correspond to 200mA to 2800mA, with a granularity of 200mA/step. __________________________________________________________________ Broadcom ARM64 SoC support Contact: Michal Stanek Contact: Marcin Wojtas The Semihalf team continued working on FreeBSD support for the Broadcom BCM5871X SoC series BCM5871X are quad-core 64-bit ARMv8 Cortex-A57 communication processors targeted for networking applications such as 10G routers, gateways, control plane processing and NAS. Completed since the last update: * iProc PCIe root complex (internal and external buses) * OTP (One Time Programmable memory) driver In progress: * BNXT Ethernet support * Crypto engine acceleration for IPsec offloading. Todo: * Upstreaming of work. This work is expected to be submitted/merged to HEAD in the second half of 2019. This project was sponsored by Juniper Networks, Inc. __________________________________________________________________ C Runtime changes Contact: Konstantin Belousov Several changes where made to the C runtime which generally improves the environment provided to an application. Fix for libraries with initial exec TLS mode Some libraries, most prominent of which is NVidia-provided and thus binary-only libGL.so.1, use so called initial exec mode for TLS variables access. This is the fastest mode of TLS access, but its drawback is that it only reliably work when the main binary is linked against the library, i.e. dlopen-ing the library to load it at runtime is not guaranteed to work. This mode works by placing the TLS variables for objects in one area allocated during the executable initialization, which somewhat explains the name of the mode. An obvious consequence is that if such library is loaded later, there is no space in the TLS area for an application to put its TLS variables. The FreeBSD dynamic linker is aware of misbehaviour of the app builders, and provides some amount of slack in the TLS area to give space for such libraries. But it appeared that the initial content of the TLS segment from libraries was not distributed among the threads' TLS areas, still breaking libraries which use initial exec mode for TLS. Another issue that somewhat mitigates mis-use of the mode is the DF_STATIC_TLS flag in the dynamic section. This flag allows the linker to check for the space earlier and avoid loading dependencies if there is no total required space. This linker flag was implemented by the BFD ld linker, but not by the LLVM lld linker. The FreeBSD dynamic linker was fixed to properly distribute TLS initialization data to all threads' initial segments, which required reasonably extensive per-architecture changes to libc and libthr. Simultaneously, LLD was improved to mark libraries using initial exec TLS mode with the appropriate flag. These measures should make FreeBSD more resilent to improperly linked libraries. The most interesting fix is to users of the nvidia libgl library, because it cannot be fixed by relinking. Use rtld malloc in libthr The FreeBSD implementation of mutexes in libthr allocates some memory to keep the mutex data needed for mutex initialization. In contrast, the malloc implementation used by FreeBSD, jemalloc(3), requires working pthread mutexes for operation. This creates a chicken-and-egg problem during executable startup, and requires jemalloc to provide fragile hacks to make it possible to initialize mutexes. This has been a constant source of mismatches on imports of new versions of jemalloc. The FreeBSD rtld implementation already contained a very light-weight malloc implementation, suitable for limited use in pre-C-runtime environments. This seemed to be the ideal fit for an allocator for the pthread private mutexes memory. By using this allocator, a method to address the cyclic dependencies between jemalloc and libthr could finally be implemented. The entry points in the rtld malloc.c were renamed to avoid a clash with the libc exported symbols, and now the file is linked statically into libthr, providing an allocator for private mutexes and pthread key storage. The later was already switched to direct use of mmap(2) for similar reasons. Now less memory is wasted when key storage requires less than a page. Destructors order bug Alexander Kabaev (kan@) noted that C++ destructors for the static objects from the linked shared libraries are executed before C++ destructors of the static objects from the main binary. This was verified both for clang++ and g++, but amusingly not for __attribute__(((destructor))). The bug was introduced when init functions and init arrays for main binary startup are called from the rtld instead of csu (C startup code linked to the binary, typically from crt1.o). The cause is due to the somewhat complicated way of how destructors are called both by fini/fini arrays and rtld-registered atexit(3) handler. Solution is to register rtld atexit(3) handler before main binary init functions are called, using new internal ABI __libc_atexit() function. It is amusing that the bug was not noticed for so many years. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Capsicum Links Capsicum Wiki Page URL: https://wiki.FreeBSD.org/Capsicum Contact: Enji Cooper Contact: Mark Johnston Contact: Ed Maste Contact: Mariusz Zaborski Contact: Bora =D6zarslan Three themes for Capsicum work were: * Importing Google's Capsicum test suite into FreeBSD * Porting and sandboxing openrsync for FreeBSD * Applying capsicum to additional base system utilities The Googletest-based Capsicum test cases are now integrated into FreeBSD. After some discussion with David Drysdale - the main maintainer and developer for the Capsicum port on Linux - we decided that from now the FreeBSD will be upstream for Capsicum test cases. The next major step was sandboxing openrsync. In the course of that work we extended our fileargs service with two new functionalities. We modified the fileargs service to allow limiting the operations which can be performed, and can now delegate lstat to the Casper service. Furthermore, openrsync highly depends on the fts API. We spend some time in optimizing fts and making it sandbox friendly by introducing fts_openat function and removing the need to change the working directory to traverse the paths. The changes to the fts API are now in the tests phase. Moreover, we improved bootstrapping for non-FreeBSD machines. Thanks to this work we can now build tools needed to bootstrap FreeBSD which use Casper services. In the base system strings is now sandboxed as a result. We also sandboxed rtsol, rtsold, and savecore. We host biweekly Capsicum calls. The notes from the meetings are published in FreeBSD's Capsium meeting repository on GitHub. If you would like to join the call do not hesitate to send us an email. __________________________________________________________________ CFT - Package Base Links Package Base CFT - FAQ URL: https://trueos.github.io/pkgbase-docs/ Contact: Kris Moore The TrueOS project has been working on a Package Base implementation, and is pleased to issue its first CFT to the FreeBSD community. The TrueOS packaging work has been in development for close to 6 months, and differs from the original FreeBSD package base effort, in that it is an "out of tree" implementation. It allows any version of FreeBSD to be packaged, and only requires a patch to poudriere, as well as some minor ports enhancements, the first which is currently in review. For more information on the current status, please refer to the FAQ page. Additionally there will be a working-group at BSDCan 2019, and we encourage porters to attend and join the discussion. This project was sponsored by iXsystems Inc. __________________________________________________________________ ENA FreeBSD Driver Update Links ENA README URL: https://github.com/amzn/amzn-drivers/blob/master/kernel/fbsd/ena/R= EADME Contact: Michal Krawczyk Contact: Marcin Wojtas ENA (Elastic Network Adapter) is the smart NIC available in the virtualized environment of Amazon Web Services (AWS). The ENA driver supports multiple transmit and receive queues and can handle up to 100 Gb/s of network traffic, depending on the instance type on which it is used. ENAv2 has been under development for FreeBSD, similar to Linux and DPDK. Since the last update internal review and improvements of the patches were done, followed by validation on various AWS instances. To do: * Upstream of the ENAv2 patches Recently, AWS released the A1 instances which are arm64 instances. The FreeBSD kernel was fixed, so the ENA can be used on those instances with no issues. There were changes required in resource activation in the ENA driver r345371 and the addition of a missing bus release method to the nexus module for aarch64 r345373. With these changes, the ENA driver can run on A1 instances without any known issues. This project was sponsored by Amazon.com Inc. __________________________________________________________________ FreeBSD boot security improvements Links Veriexec manifest verification in kernel URL: https://svnweb.freebsd.org/changeset/base/345830 TPM as entropy source URL: https://svnweb.freebsd.org/changeset/base/345438 UEFI support in libsecureboot URL: https://svnweb.freebsd.org/changeset/base/344840 Contact: Michal Stanek Contact: Marcin Wojtas Contact: Kornel Duleba FreeBSD gained TPM 2.0 (Trusted Platform Module) support at the end of 2018. A kernel configuration option, TPM_HARVEST, was also added to use the TPM RNG as system entropy source. When used this way, the TPM can be harvested every ten seconds for entropy which is mixed into the OS entropy pool. The kernel option is currently disabled by default in amd64 GENERIC kernel configuration. UEFI Secure Boot support, developed by Semihalf, has been merged with sjg's Veriexec support, resulting in a unified library named libsecureboot. This library is used for verification of kernel and modules by the loader. The library uses BearSSL as the cryptographic backend. The library supports loading trusted and blacklisted certificates from UEFI (DB/DBx databases) and can use them as trust anchors for the verification. The library is also used by Veriexec to verify and parse the authentication database (called 'manifest') in the kernel. Previously the manifest was verified and parsed by a userspace application, then sent to the kernel via /dev/veriexec, which was a significant limitation and a security weakness. To do: * Backport to stable branches. Special thanks to sjg and Juniper for fruitful cooperation around Veriexec and the libsecureboot development. This project was sponsored by Stormshield. __________________________________________________________________ FUSE Contact: Alan Somers FUSE (File system in USErspace) allows a userspace program to implement a file system. It is widely used to support out-of-tree file systems like NTFS, as well as for exotic pseudo file systems like sshfs. FreeBSD's fuse driver was added as a GSoC project in 2012. Since that time, it has been largely neglected. The FUSE software is buggy and out-of-date. Our implementation is about 11 years behind. The FreeBSD Foundation has agreed to fund a project to improve the state of the FreeBSD FUSE driver. So far I've written a test suite for the fusefs(5) module, fixed 1 previously reported bug, discovered and fixed 6 new bugs, fixed all of fusefs's Coverity CIDs, made some minor performance enhancements and done some general cleanup. During the next quarter I plan to continue fixing bugs, and I'll also raise the driver's API level as high as I can before the quarter runs out. We're currently at 7.8; the highest defined level is 7.28. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Kernel ZLIB Update Links Review D19706 URL: https://reviews.freebsd.org/D19706 Contact: Yoshihiro Ota The FreeBSD system still uses an ancient (over 20 year-old) version of zlib (version 1.0.4). The FreeBSD kernel zlib implementation has special enhancements only used by netgraph. There is a separate version of code derived from unzip 5.12 used to inflate gzip files in the kernel which could be replaced with a more modern zlib. More detailed information is written in sys/modules/zlib/README in the review. In order to use the latest zlib, version 1.2.11, work has been done to revisit all existing zlib uses in the system. Most of the code works with the newer version of zlib as is. The unzip code will need some conversion work to use the newer zlib. A few callers will be made simplier by using some newer APIs available in the updated zlib. There are some zombie programs that have been broken and I would like to delete. This will clean up zombie programs and duplicated zlib code. This will also make future zlib version updates easier. These changes touch some very sensitive areas of the system, such as kernel loading, or are architecture specific like armv6/armv7, and also touch some legacy code like kgzip+kgzldr on i386. Testers and active users of these legacy zlib code are welcomed. * armv elf_trampoline Arm up to v5 can boot from gzipped kernel. This code is modified to use newer API for simplicity. Please verify gzipped kernel still boots with new code (Current code has fall back to legacy zlib in case of failure). Please also elaborate how to link such kernel, too. I'm still trying to figure that out. * netgraph compression/decompression Please help testing and/or teach how to test. Netgraph compiles in the FreeBSD zlib version inside. * gzipped a.out Does anyone use gzipped a.out executables, still? If so, does someone have an easy and safe program to run? Is a.out format i386 only? * zfs boot Can we boot from gzipped file system today? * CTF Checking how I can test. __________________________________________________________________ LLVM's lld as the FreeBSD system linker Links LLD on the FreeBSD Wiki URL: https://wiki.freebsd.org/LLD lld exp-run =20 URL: https://bugs.freebsd.org/214864 Contact: Ed Maste In FreeBSD-HEAD and 12.0 the default FreeBSD system linker (i.e., /usr/bin/ld) is LLVM's lld, on amd64, arm64, and armv7. For i386 in 12.0 lld is used as the bootstrap linker (i.e., to build the kernel and base system) but it is not enabled as the system linker because of multiple issues building FreeBSD ports with it enabled. The primary issue affecting i386 with lld is that many ports build position-dependent code (i.e., non-PIC) for use in shared libraries. This either comes from omitting the -fPIC compiler flag, or using hand-written position-dependent assembly. Compared with other CPU architectures i386 position-independent code is rather inefficient, which may be responsible for port authors making an explicit decision to avoid PIC. By default lld does not allow position-dependent code in shared objects (in particular, it does not permit relocations against read-only segments - typically containing the`.text` section). Over the last quarter many commits were made to the ports tree to fix the build when the system linker is lld - either building PIC code, or adding the -znotext linker flag to permit relocations against read-only segments, or just switching the port to link with GNU ld if it is incompatible with lld in some other way. At this point there are only a few dozen open bug reports for issues linking ports with lld as the system linker, and I expect FreeBSD 12.1 to use lld as the system linker on i386 as well. Tasks: * Fix freepascal/Lazarus ports with lld * Triage and address remaining port failures * Holistic review of lld workarounds in the ports tree, to identify changes that are no longer needed, should be addressed in lld, or should be sent upstream This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ mlx5 Drivers Update Links Mellanox OFED for FreeBSD Documentation URL: http://www.mellanox.com/page/products_dyn?product_family=3D193&mta= g=3Dfreebsd_driver Contact: Slava Shwartsman, Hans Petter Selasky, Konstantin Belousov The mlx5 driver provides support for PCI Express adapters based on ConnectX-4(LX), ConnectX-5(EX) and ConnectX-6(DX). The mlx5en driver provides support for Ethernet and the mlx5ib driver provides support for InfiniBand and RDMA over Converged Ethernet, RoCE. Following updates done in mlx5 drivers: * Added support for ConnectX-6 and ConnectX-6dx devices, which support of up to 200Gb/s interface speeds! * Added TLS hardware offload support for ConnectX-6dx devices. TLS Tx crypto offload is a new feature for network devices. It enables the kernel TLS socket to skip encryption and authentication operations on the transmit side of the data path, delegating those to the NIC. In turn, the network adapter encrypts packets that belong to an offloaded TLS socket on the fly. The Mellanox network adapter does not modify any packet headers. It expects to receive fully framed TCP packets with TLS records as payload. The NIC replaces plaintext with ciphertext and fills the authentication tag. The adapter does not hold any state beyond the context needed to encrypt the next expected packet, i.e. expected TCP sequence number and crypto state. * Add support for Dynamic Receive Queue Interrupt Moderation. Dynamic Interrupt Moderation (DIM) refers to any action made by hardware and/or software on run time to control interrupt rate on the system. The moderation action itself should not interfere with the system's operation and should not require any human interaction. In networking, dynamic interrupt moderation is used for controlling the rate of interrupts generated by the hardware for multiple traffic scenarios. * Enhanced support for self-healing mechanism: In a rare occasion when Mellanox network adapters fail, due to a firmware bug for example, the driver will sense the catastrophic error. As a result of this failure detection, the device driver can trigger a firmware reset for the device so it can recover - without the need to reboot the entire host. * Added support for in-driver firmware updating using mlx5tool. This project was sponsored by Mellanox Technologies. __________________________________________________________________ PCI Express Resets Contact: Konstantin Belousov Sometimes the need to reset a device attached to the system presents itself. Preferrably this device reset can be accomplished without causing the whole machine to reboot. It is easy to do with USB devices if the physical access is available -- you can just re-plug the device. For in-chassis devices, built-in, or on add-on cards, it is not possible to reset the device with physical action, unless the device is hot-plugged. Nonetheless, for typical modern PCIe devices, and most built-in PCI-emulation devices, the reset can be initiated using software actions. If device is a real plugged-in PCIe device, then reset can be initiated by disabling and then re-training PCIe-link by the upstream port controls. For most PCI devices, which support the PCI power management specification, the proven way to accomplish the reset is to put the device into state D3 (off) and then return to the previous power state. FreeBSD was missing a way to conveniently request user- or driver-initiated reset of devices. While it was possible to manually fiddle with registers using pciconf, this is impractical for users, and requires a lot of boilerplate code from drivers. A new BUS_RESET_CHILD() method was added to the newbus bus interface, and implementations added for PCIe bridges and PCI devices. The libdevctl(3) library call and devctl(8) command provide convenient userspace accessors for applications and administrators. During the reset, the device driver must stop its operations with the device. One way to achieve this is to detach drivers before reset, and re-attach after the device afterwards. This is mostly fine for network interfaces, but other devices require more coordination to handle properly. For example, an NVMe disk device being detached it means that all mounted volumes abruptly disapper from VFS view. Due to this, the BUS_RESET_CHILD() method allows the caller to select either detach/re-attach or suspend/resume driver actions around the reset. Mellanox uses the infrastructure to perform reset of the mlx(5) card after firmware reset without server reboot. It is believed that 'devctl reset' will be more widely useful. This project was sponsored by Mellanox Technologies. __________________________________________________________________ Security-Related changes Contact: Konstantin Belousov ASLR The ASLR (Address Space Layout Randomization) patch from review D5603 was committed into svn. While debate continues about the current and forward-looking value ASLR provides, having an implementation in the FreeBSD source tree makes it easily available to those who wish to use it. This also moves the conversation past the relative merits to more comprehensive security controls. KPTI per-process control The KPTI (Kernel Page Table Isolation) implementation was structured so that most selections of page isolation mode were local to the current address space. In other words, the global control variable pti was almost unused in the code paths, instead the user/kernel %cr3 values were directly loaded into registers or compared to see if the user page table was trimmed. Some missed bits of code were provided by Isilon, and then bugs were fixed and last places of direct use of pti were removed. Now when the system starts in the pti-enabled mode, proccontrol(1) can be used by root to selectively disable KPTI mode for children of a process. The motivation is that if you trust the program that you run, you can get the speed of non-pti syscalls back, but still run your normal user session in PTI mode. E.g., firefox would be properly isolated. Feature-control bits Every FreeBSD executable now contains a bit mask intended for enabling/disabling security-related features which makes sense for the binary. This mask is part of the executable segments loaded on image activation, and thus is part of any reasonable way to authenticate the binary content. For instance, the ASLR compatibility is de-facto the property of the image and not of the process executing the image. The first (zero) bit in the mask controls ASLR opt-out. Other OSes (e.g. Solaris) used an OS-specific dynamic flag, which has the same runtime properties but leaves less bits to consume in the feature-control mask. The feature-control mask is read both by kernel and by rtld during image activation. It is expected that more features will be added to FreeBSD and the mask can be used for enabling/disabling those features.. It is expected that a tool to manipulate the mask will be provided shortly, see review D19290. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ Architectures Updating platform-specific features and bringing in support for new hardware platforms. FreeBSD/RISC-V Update Contact: Ruslan Bukin Contact: Mitchell Horne Contact: Mark Johnston Work has continued on RISC-V port in the past quarter. Support for transparent superpage promotion was added to the RISC-V port, meaning that applications will now automatically use large page mappings when possible. Per-CPU pmap activation tracking was added, reducing the overhead of various pmap operations. This noticeably improves the responsiveness of FreeBSD when running in a multi-CPU virtual machine. A RISC-V implementation of minidumps was completed. Support for debugging RISC-V kernel dumps will land in devel/gdb after the next GDB release. It is now possible to compile the in-tree LLVM's RISC-V target by setting WITH_LLVM_TARGET_RISCV=3DYES in /etc/src.conf. The use of LLVM to compile the RISC-V port is currently experimental and further investigation is ongoing. Work is ongoing to bring up FreeBSD on SiFive's HiFive Unleashed development board now that one has been obtained by a FreeBSD developer. We also expect to work on support for a new version of the SBI specification. This project was sponsored by The FreeBSD Foundation, DARPA, AFRL. __________________________________________________________________ Ports Changes affecting the Ports Collection, whether sweeping changes that touch most of the tree, or individual ports themselves. FreeBSD GNOME status report Links GNOME FreeBSD =20 URL: https://freebsd.org/gnome/ GNOME development Repo URL: https://github.com/freebsd/freebsd-ports-gnome Contact: Koop Mast Contact: Eric Turgeon Ports activity in this quarter were: * The x11-toolkits/gtk30 port updated to 3.24.5 and later to 3.24.7. * The www/webkit2-gtk3 port was updated to 2.24.0. * And the old insecure webkit-gtk2 and webkit-gtk3 where finally removed. Work in progress, the branches are available in the GNOME development repo, see the link above. * Eric Turgeon is working on MATE 1.22 in the mate-1.22 branch. And is almost complete. * Charlie Li (IRC: vishwin) is working on a long overdue update of the cinnamon desktop. This update is almost complete. The only real blocker is that the screensaver can't be unlocked after it activates. The work is in the cinnamon branch. * Koop Mast works on GNOME 3.32. The desktop is usable apart from gdm which is currently non-functional. Due to lack of free time the work is going slowly. This work is available in the gnome-3.32 branch. People who are willing to contribute can find us on #freebsd-gnome on freenode. __________________________________________________________________ FreeBSD KDE status report Links KDE FreeBSD URL: https://freebsd.kde.org/ Contact: Adriaan de Groot Contact: Tobias C. Berner The two biggest accomplishements this quarter were: * Qt4 and all its consumers have been removed from the ports tree. * www/qt5-webengine has been updated from the ancient 5.9.4 to 5.12.x by kai@ Further we have kept the KDE Frameworks, Plasma and Applications ports up to date with upstreams releases, which thanks to upstreams' FreeBSD-CI uses less and less patches. All the kde@ maintained ports (including cmake) have been kept up to date with their releases. The plans for the next quarter are in no particular order * Cleanup PyQt ports and pyqt.mk * Improve qt.mk components * Update sddm to 0.18.x * Implement user management functionality in system settings (write non-logind backend) People who are willing to contribute can find us on #kde-freebsd on freenode, and the kde@FreeBSD.org mailing list. Further we accept pull-requests and contributions on github.com/freebsd/freebsd-ports-kde. __________________________________________________________________ Third-Party Projects Many projects build upon FreeBSD or incorporate components of FreeBSD into their project. As these projects may be of interest to the broader FreeBSD community, we sometimes include brief updates submitted by these projects in our quarterly report. The FreeBSD project makes no representation as to the accuracy or veracity of any claims in these submissions. FreeBSD Wiki Apple Intel Mac mini update Links FreeBSD Wiki URL: https://wiki.freebsd.org/IntelMacMini Contact: Trevor Roydhouse The FreeBSD Wiki page for the Apple Intel Mac minis has been comprehensively updated over the last quarter to drag it from 2009 into 2019. There are now detailed instructions for installing FreeBSD as the only operating system on models from 2007 through 2014 and itemised model specific information detailing FreeBSD support. If anyone is interested, help is needed to provide more specific information for the macmini 1,1 and 6,1 through 8,1 models and to test patches for the asmc(4) driver for temperature sensor feedback and for setting fan speed. If you would like to help and have access to these Mac minis, please contact me. Future tasks: * Create and test more patches for asmc(4) to cover all Intel Mac minis * Provide more information for 2006, 2012, 2014 and 2018 Mac minis * Instructions for dual boot (macOS/FreeBSD) installations __________________________________________________________________ Fuzzing FreeBSD with syzkaller Links syzkaller URL: https://github.com/google/syzkaller Contact: Mark Johnston Contact: Andrew Turner Contact: Michael Tuexen Contact: Ed Maste Syzkaller is a coverage-guided system call fuzzer. It was originally developed for Linux. It programmatically creates programs consisting of sequences of random system calls and executes them in a VM (virtual machine). Using feedback from a kernel code coverage facility called kcov, syskaller mutates the generated test programs in an attempt to expand the executed coverage of code paths within the kernel. Sometimes exercising a seldom or infrequently used code path will crash the kernel. When syzkaller manages to crash the running kernel in the VM, it attempts to generate a minimal test case which reproduces the crash, simplifying debugging. Syzkaller is very effective at finding kernel bugs and has uncovered hundreds of issues in Linux. Over the past couple of years, syzkaller's author, Dmitry Vyukov, has added support for other operating systems, including FreeBSD. Recently, a number of FreeBSD developers have been using syzkaller to find and fix bugs in the FreeBSD kernel. If interested, one can search the commit logs for "syzkaller" to find examples. Syzkaller can be run on a FreeBSD or Linux host to fuzz FreeBSD running in QEMU instances. It can also fuzz FreeBSD instances running on GCE (Google Compute Engine). Additionally, Google maintains a dedicated cluster of GCE hosts to continuously fuzz the latest builds of several different OS kernels. A FreeBSD target was recently added. Subscribe to the syzkaller-freebsd-bugs Google Group to receive notifications for newly discovered bugs. Work is ongoing to improve syzkaller's coverage of FreeBSD's system calls. In particular, syzkaller needs to be taught about all of the target kernel's entry points and argument types in order to be useful. Many of the standard POSIX system calls are already covered, but most FreeBSD-specific system calls are not. Similarly, many ioctl(2) definitions are missing. Some in-progress work aims to add support for bhyve as a VM backend for syzkaller, making it easier to fuzz FreeBSD VMs hosted on FreeBSD. Currently that can be done using QEMU, but QEMU on FreeBSD lacks support for hardware acceleration. See the PR for the implementation. Finally, a number of bugs identified by syzkaller have yet to be fixed. If you are interested in helping out with any of the above, please mail the contacts listed above. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ sysctlmibinfo API 1.0 Links gitlab.com/alfix/sysctlmibinfo URL: https://gitlab.com/alfix/sysctlmibinfo Contact: Alfonso Sabato Siciliano Port: devel/libsysctlmibinfo The sysctl() system call can get or set the value of a 'property' of the system. A 'property' has others info (description, type, label, etc.), they are necessary to build an utility like /sbin/sysctl, example: % sysctl -d kern.ostype kern.ostype: Operating system type % sysctl -t kern.ostype kern.ostype: string Primarily sysctlmibinfo wraps the undocumented kernel interface and provides an easy C API: sysctlmif_name(), sysctlmif_description(), sysctlmif_info(), sysctlmif_label(), sysctlmif_nextnode() and sysctlmif_nextleaf(), to retrieve the info of a 'property'. Moreover sysctlmibinfo provides a high level API: defines a struct sysctlmif_object and has some function: sysctlmif_filterlist(), sysctlmif_grouplist() and sysctlmif_tree(), to build lists and trees of objects. You can use this library to quickly build a custom sysctl utility. For example, the core of deskutils/sysctlview (a graphical explorer for the sysctl MIB Tree) is just a call to sysctlmif_tree() and a visit to the resulting tree to show its sysctlmif_object nodes. Note, actually a 'property' is an OID of the sysctl MIB, it is implemented by a struct sysctl_oid defined in sys/sysctl.h. __________________________________________________________________ sysctlview 1.0 Links gitlab.com/alfix/sysctlview URL: https://www.gitlab.com/alfix/sysctlview Contact: Alfonso Sabato Siciliano Port: deskutils/sysctlview The FreeBSD's kernel maintains a Management Information Base where the objects are properties to tuning the system using the sysctl() syscall and the /sbin/sysctl utility. The sysctlview utility is a "graphical sysctl MIB explorer", it depends on gtkmm (to build a GUI) and sysctlmibinfo (to retrieve the info from the kernel). The version 1.0 provides two "TreeView": * "Main" to show 'name', 'description', 'type', 'format' and 'value' * "Flags" to show 'name' and a column for each 'flag' defined in sys/sysctl.h The rows are "clickable" to display others info (e.g., 'label'). Currently sysctlview can show numeric and string values, the support for some opaque value will be added in the future. __________________________________________________________________ University of Waterloo Co-operative Education Students Contact: Ed Maste For the January-April 2019 term the FreeBSD Foundation has again brought on two co-operative education (co-op) students from the University of Waterloo. Gerald Aryeetey is a 2nd year Computer Engineering student. Gerald started looking at a FreeBSD tool chain issue - our static library archiver (ar) did not read or write archives in the 64-bit format. Gerald submitted a libarchive change to support 64-bit archives followed by change to FreeBSD's ar to add 64-bit support. Gerald later looked at a number of freebsd-update issues in FreeBSD's bugzilla database, and submitted many fixes. Around a dozen have been committed to FreeBSD, and more are in review. Gerald also worked on the FreeBSD Foundation's hardware continuous integration effort. The prototype installation is building FreeBSD on a commit-by-commit basis and testing on a BeagleBone Black and a Pine64 LTS. The prototype will be converted to a permanent, public installation in the near future, after which additional test devices will be added. For his final project Gerald intends to write a device driver for the Microchip LAN743x PCIe NIC. Bora =D6zarslan is a 3rd year student in Computing and Financial Management. Bora's initial focus was also on tool chain issues in FreeBSD, starting with improvements or bug fixes in FreeBSD's readelf (from the ELF Tool Chain project). Bora developed a tool to modify feature control bits in ELF binaries - for example, allowing binaries incompatible with ASLR to request to opt-out. As part of his readelf work Bora also added support to report the status of the feature control bits. Bora continued investigating security topics, looking at applying Capsicum sandboxing to Kristaps' BSD licensed rsync implementation, openrsync. This work required first implementing fileargs_lstat support in cap_fileargs (which as now been committed) as well as changes to the fts directory hierarchy routines (which have not yet been committed to FreeBSD). For the rest of the work term Bora will investigate and test unmodified Linux Docker containers on FreeBSD, to evaluate the state of Linuxulator support. This project was sponsored by The FreeBSD Foundation. __________________________________________________________________ --AhhlLboLdkugWU4S Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQGmBAEBCgCQFiEEbvjBe1hu6u1NeinjJCKD+Vwk/7oFAlz2bCxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDZF RjhDMTdCNTg2RUVBRUQ0RDdBMjlFMzI0MjI4M0Y5NUMyNEZGQkESHHRyYXN6QGZy ZWVic2Qub3JnAAoJECQig/lcJP+6vQEH/1PyJpCjUnDgEnJbQH1pbfE35cGSVznN ru6aT8XbSYR/qaAUs2aZ/hzaXTm7KqEfnid/UHr25gw4kQq1BBEqJcm7vzrTJmik w/M1ZhH4CbvWmYdz/avH4AJo91ayjPfl9tniAVAoMHVhcO/y2K/6pv4M/7LsY1bp dG7vU9VEe+QOrA/5NURf72E5RwYAn/E7jllqc8FUHuy/54iSMkbYw5bf5lYD2nQP v1VTWjdwp8kIbA23ci4vHyHE1HEggY7Ukrgnh1GprEwIVtKqhxwi5fcSFK+s0v13 FvI54ZSrQLAtQAxFVzXrPrEb4loHcBHtGU37WdbW4nCzC3I7ynZWVI4= =jsrm -----END PGP SIGNATURE----- --AhhlLboLdkugWU4S-- From owner-freebsd-current@freebsd.org Tue Jun 4 14:16:42 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2710B15B23B4 for ; Tue, 4 Jun 2019 14:16:42 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qt1-x831.google.com (mail-qt1-x831.google.com [IPv6:2607:f8b0:4864:20::831]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3D6FE6AF55 for ; Tue, 4 Jun 2019 14:16:41 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qt1-x831.google.com with SMTP id i34so500591qta.6 for ; Tue, 04 Jun 2019 07:16:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ok8qAvEm2Y9PZ3+TXkn+9dY8s60G1t6s7hgOONMBBQE=; b=xH8LS5PbOzwyK7bNe2aF0ibUZK/ZX3kDU6A1xI8GGe5usNouCZ34f69grgeg7vYaqn YBp30Z5MV6IAdnIxgoNoShOWVfiLLNJQLyqh3YJALBuvQFX2ZeOxsqPRmCFALdauMIpf WRpAEWyAzEC3exLqjEaEsqg3mEFqeTJb0tZHQ1bVU50SW9XPg1b0+NHjGEDo4Ny6x57q eonGrMLtjR5xYJvxx3BOAyIHdMG4Tt9DeqTzqIpT+5Xedzj2SXXBgkehB68W+ZHVoKzy Y4Za6Ku5JeNvEUFrKNMZJnNHhRCdA80NrCpVdAccbDqEkfFQ5ARqWm9WRDOWXRGoaT05 40Ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ok8qAvEm2Y9PZ3+TXkn+9dY8s60G1t6s7hgOONMBBQE=; b=jOmlgWGudopb/eYNfu24o3RXgHn0mQh1VSBJRKztDu908q/kW0pB4ATE13XAybjhEc jUSG8vRjSzJD0vk0BXJQDuGNnKRTkw6evCJlBPxDz/UUmoCouyXRSPQeDSGEhrG79qz7 22z/MaGZ9soLgPOTCDf6bLRP9JwUQDsoMqDOe54Ggxxt2fX8HLLyPb73ob6ZlQ7nVSEm CWSLyaLw428jGQ9+h2tNP57sacDp3YrPD/2ewZ961J4WfuYVkYLmbsJDy0iWESx1111a YhMk18+HJCBHS1+71Nzvx9vJousP00kXW83QYHSAO2CWc+8zxyndlbgPfwYRnePOirMr kz6w== X-Gm-Message-State: APjAAAUqn5Rn690Ntzip10SNzNAs7pxS446FYDkq4fdj5lpAGeOGiBeX 69er86K1cy4pit6859BhylnVOXwtNV6aYU48+7dfVg== X-Google-Smtp-Source: APXvYqyW+rTl3L+ITS294c80PVyTsjyV60kPYYeCilPs+55jpf9iposgPqGvQzEoxrFpm1r5VTKab7UWkVRBHgF5U44= X-Received: by 2002:ac8:6105:: with SMTP id a5mr28207593qtm.242.1559657800398; Tue, 04 Jun 2019 07:16:40 -0700 (PDT) MIME-Version: 1.0 References: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> <20190604212831.360fd1a0c34c9f329e3084fc@dec.sakura.ne.jp> In-Reply-To: <20190604212831.360fd1a0c34c9f329e3084fc@dec.sakura.ne.jp> From: Warner Losh Date: Tue, 4 Jun 2019 08:16:29 -0600 Message-ID: Subject: Re: UEFI boot broken in 13? To: Tomoaki AOKI Cc: FreeBSD Current , Johannes Lundberg , Warner Losh X-Rspamd-Queue-Id: 3D6FE6AF55 X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=xH8LS5Pb X-Spamd-Result: default: False [-4.94 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; IP_SCORE(-3.00)[ip: (-9.39), ipnet: 2607:f8b0::/32(-3.24), asn: 15169(-2.29), country: US(-0.06)]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: ALT1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[1.3.8.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.93)[-0.931,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_LAST(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 14:16:42 -0000 On Tue, Jun 4, 2019 at 7:11 AM Tomoaki AOKI wrote: > Hi. > > Try attached patch for stand/efi/boot1/boot1.c. > This partially reverts r347193 and works at least for me. > > Without this, boot1.efi (bootx64.efi) forcibly boot from > first physical HDD/SSD, even if forcibly booted from other > physical drive via BIOS (UEFI firmware) menu. > > Remaining parts of r347193 and following some commits does not > affect. > > *Hand-crafted reverse patch from commit mail [1]. > Reverting whole r347193 is fine, too. > > [1] > https://lists.freebsd.org/pipermail/svn-src-head/2019-May/124677.html I'll take a look. My experience is that even prior to this patch, forcibly booting also failed though due to ordering issues... Warner From owner-freebsd-current@freebsd.org Tue Jun 4 14:58:56 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7059D15B33E1 for ; Tue, 4 Jun 2019 14:58:56 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6DD246C8AA for ; Tue, 4 Jun 2019 14:58:55 +0000 (UTC) (envelope-from wlosh@bsdimp.com) Received: by mail-qk1-x730.google.com with SMTP id a132so2990996qkb.13 for ; Tue, 04 Jun 2019 07:58:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bsdimp-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=l2+Ox9/0Uxb8+LmRB1dTJ4ax7rZTRa5bL1opHlIso+E=; b=VfL0VXsY93w+ykkoIZLhDOSWd3aWGnAkTIX/HhkV+dFK5sOE7G4x3fqeYPDQu6n9oH r3ZNvpSTooS3uDF6IX0EubtuTIPWuTt8E/pS95LQQ2We5nP3gPnm7gG7CQUqHQucSVpK J9EcHVQ7Ot3qvhokHPgCKyarRvo/EQGEWiwtbd9DF3A2PRbsqoajCqmwjt2wT4/0NVBh VXFyiakt4vDgT8YYLV+F25Qkb1/kb736e9LNzpZUcYr7U7nA2u0/Fmfywo04OsNtmhfz Pzrm+0+PTYh8g3QJYoo7ox3wKXwI5dHrqgpbGW3yR+3yMXcqq2f7DyfyM1OwqHOr6BNR xsJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=l2+Ox9/0Uxb8+LmRB1dTJ4ax7rZTRa5bL1opHlIso+E=; b=M9y280IxBTwQ9/0Ovnez7il2xTJWn9qdkLrRXcT8+nAIwg1LlQkaFaIFiS8O44Ixx9 PGQjhiIrEGrHQdIFkr+cBJNXaZ9piTR8ANCzP6W7sbQcmxyMSvCHdFiMEfdz+s7howsM PEqoTWUgLl/7Qch5lRI/mQGCpam99zCMa9xkBpIfKDuT//4fQBbeuQiOqZTHfRb/CAON 6Uu0M/fYwFRV3jtd8uYuGEk9YuAfM9VNBC+Ocf12noZid/oohsdnY4IncBGUrbdMk2oX 3sgu/jSdnnmD9BZvDsHkEbwKnd0IkRLKo3Cj8u5MTY6XyGbjw4D1goFwB4qk2cVE6Z02 SaTg== X-Gm-Message-State: APjAAAVH2Omr0RE0WD+Ql0Wxr/Krbr1R7QK6b00ZGCg+sPy7x1fD4FHV mZx2GEhoW2kGKW/3r6YAj5YI6/DYzB0/9Ea7MHc1KA== X-Google-Smtp-Source: APXvYqy4N9eZ5ZDBXeruzAjvYZEQed9rpdKHmzwVeXeIm1We/KR3pbBUTPT1LUv0bBTQEb3pkaSQpKh3eq4KqfEgNGI= X-Received: by 2002:a37:4b48:: with SMTP id y69mr27578457qka.77.1559660334457; Tue, 04 Jun 2019 07:58:54 -0700 (PDT) MIME-Version: 1.0 References: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> <20190604212831.360fd1a0c34c9f329e3084fc@dec.sakura.ne.jp> In-Reply-To: From: Warner Losh Date: Tue, 4 Jun 2019 08:58:43 -0600 Message-ID: Subject: Re: UEFI boot broken in 13? To: Tomoaki AOKI Cc: FreeBSD Current , Johannes Lundberg , Warner Losh X-Rspamd-Queue-Id: 6DD246C8AA X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=bsdimp-com.20150623.gappssmtp.com header.s=20150623 header.b=VfL0VXsY X-Spamd-Result: default: False [-3.89 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[bsdimp-com.20150623.gappssmtp.com:s=20150623]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[4]; IP_SCORE(-3.01)[ip: (-9.47), ipnet: 2607:f8b0::/32(-3.24), asn: 15169(-2.29), country: US(-0.06)]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-current@freebsd.org]; DMARC_NA(0.00)[bsdimp.com]; URI_COUNT_ODD(1.00)[7]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; TO_MATCH_ENVRCPT_SOME(0.00)[]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[bsdimp-com.20150623.gappssmtp.com:+]; MX_GOOD(-0.01)[cached: ALT1.aspmx.l.google.com]; RCVD_IN_DNSWL_NONE(0.00)[0.3.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; NEURAL_HAM_SHORT(-0.87)[-0.871,0]; R_SPF_NA(0.00)[]; FORGED_SENDER(0.30)[imp@bsdimp.com,wlosh@bsdimp.com]; SUBJECT_ENDS_QUESTION(1.00)[]; MIME_TRACE(0.00)[0:+,1:+]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; FROM_NEQ_ENVFROM(0.00)[imp@bsdimp.com,wlosh@bsdimp.com]; RCVD_TLS_LAST(0.00)[]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 14:58:56 -0000 On Tue, Jun 4, 2019 at 8:16 AM Warner Losh wrote: > > > On Tue, Jun 4, 2019 at 7:11 AM Tomoaki AOKI > wrote: > >> Hi. >> >> Try attached patch for stand/efi/boot1/boot1.c. >> This partially reverts r347193 and works at least for me. >> >> Without this, boot1.efi (bootx64.efi) forcibly boot from >> first physical HDD/SSD, even if forcibly booted from other >> physical drive via BIOS (UEFI firmware) menu. >> >> Remaining parts of >> https://reviews.freebsd.org/D20513https://reviews.freebsd.org/D20513 and >> following some commits does not >> affect. >> >> *Hand-crafted reverse patch from commit mail [1]. >> Reverting whole r347193 is fine, too. >> >> [1] >> https://lists.freebsd.org/pipermail/svn-src-head/2019-May/124677.html > > > I'll take a look. My experience is that even prior to this patch, forcibly > booting also failed though due to ordering issues... > More testing reveals that the issues prior to r347193 turned out to be different, and r347193 really did break things. I've opted to fix this in a slightly different way: https://reviews.freebsd.org/D20513 Aoki-san, can you please check to see if the above review fixes things for you as well? Thanks! Warner From owner-freebsd-current@freebsd.org Tue Jun 4 15:54:07 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5E6FF15B5BD5 for ; Tue, 4 Jun 2019 15:54:07 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (br1.CN84in.dnsmgr.net [69.59.192.140]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4E0C86FF76; Tue, 4 Jun 2019 15:54:05 +0000 (UTC) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: from gndrsh.dnsmgr.net (localhost [127.0.0.1]) by gndrsh.dnsmgr.net (8.13.3/8.13.3) with ESMTP id x54Fs3Fh048524; Tue, 4 Jun 2019 08:54:03 -0700 (PDT) (envelope-from freebsd-rwg@gndrsh.dnsmgr.net) Received: (from freebsd-rwg@localhost) by gndrsh.dnsmgr.net (8.13.3/8.13.3/Submit) id x54Fs3wt048523; Tue, 4 Jun 2019 08:54:03 -0700 (PDT) (envelope-from freebsd-rwg) From: "Rodney W. Grimes" Message-Id: <201906041554.x54Fs3wt048523@gndrsh.dnsmgr.net> Subject: Re: pkg: Cannot open /dev/null:No such file or directory In-Reply-To: <6438ffc1-437b-e177-475d-fed8fb12d9c9@FreeBSD.org> To: Matthew Seaman Date: Tue, 4 Jun 2019 08:54:03 -0700 (PDT) CC: freebsd-current@freebsd.org X-Mailer: ELM [version 2.4ME+ PL121h (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII X-Rspamd-Queue-Id: 4E0C86FF76 X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [3.01 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.72)[0.716,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; DMARC_NA(0.00)[dnsmgr.net]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.51)[0.508,0]; RCVD_COUNT_THREE(0.00)[3]; IP_SCORE(0.04)[ip: (0.15), ipnet: 69.59.192.0/19(0.07), asn: 13868(0.05), country: US(-0.06)]; MX_GOOD(-0.01)[cached: gndrsh.dnsmgr.net]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_SPAM_LONG(0.85)[0.848,0]; R_SPF_NA(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:13868, ipnet:69.59.192.0/19, country:US]; MID_RHS_MATCH_FROM(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 15:54:07 -0000 > On 04/06/2019 06:32, O. Hartmann wrote: > > As far as I know,, the package installation is performed via "chroot'ed" > > environment and somehow /dev/null is out of a sudden not accessible anymore > > while pkg tries to delegate some output to /dev/null. > > Assuming you're chroot'd to /chroot, then: > > mount -t devfs devfs /chroot/dev Perhaps it is time to update the documentation in chroot(8) to at least provide a pointer to the fact you now need to do either the above, or somehow populate a /chroot/dev directory? Can you even still statically create device nodes and have that work, or is that now totally imposible with the full conversion to devfs? > should allow pkg(8) to work as usual. > > Cheers, > > Matthew -- Rod Grimes rgrimes@freebsd.org From owner-freebsd-current@freebsd.org Tue Jun 4 17:02:39 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id E1F2615B7861 for ; Tue, 4 Jun 2019 17:02:38 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [96.47.72.83]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6B38A72E0A; Tue, 4 Jun 2019 17:02:38 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Received: from [192.168.0.83] (ip72-208-182-43.ph.ph.cox.net [72.208.182.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) (Authenticated sender: johalun) by smtp.freebsd.org (Postfix) with ESMTPSA id 0A10228348; Tue, 4 Jun 2019 17:02:37 +0000 (UTC) (envelope-from johalun@FreeBSD.org) Subject: Re: pkg: Cannot open /dev/null:No such file or directory To: Baptiste Daroussin Cc: freebsd-current References: <20190604073209.4e42a0eb@freyja> <20190604054409.4anei2ljzimqc75m@ivaldir.net> From: Johannes Lundberg Openpgp: preference=signencrypt Autocrypt: addr=johalun0@gmail.com; keydata= mQINBFxFmoIBEADoFO5jY+Fmsg44KiZjufEmpEf4kt7nCOfxNG9SruWpoXUaq0B296F+fIZC hNZqv1v7lGTsfoWRusxJmLd5CQgHHxEyruZbbPpNsQ/JKoDY3GGmrmWfN/SX3y0t0kdB9HsW mJcvZhK7we52f4gxddIVBS9nQoVoONX+hzXf8zwOAa0ik0EPgEwpIKS4j9lLq4bU+mqVKdRR bPeDujEA/qbsCKhaFJkPzXZtzEe6srq4RK1doEztwnKz02b+8gs642TRkWDQeTRZputrAaoN Un4R76A1QpXWyrFG1dQu48IGHi3KbkrvNyq6R1aUBIA0+CG1npIbxmc2mtSjoyvdipmDRbBD +mhECIxmYfBT6818zuj91XjrfOyfVdV2BryBvqFkJLkS3N3QElBIiVdDgdrqiNFWiOlDMxNI tdP16oQBNo8IB27/0YHpnQEw1MafZv5gG5DO0zLtLy88ASAfL7BYf90JP19rT4JIwnxsXxyv kEJnzhsXf0QVObEiAu1MqeFyWfZ8PpunmvEmJ0VChOL+v/kIx1E9cxhhzMZhqiMXfyM4zx2+ BF1FwAwJYPuJLu2B3L0uVBu+M1YvSOmKAbXPDP8PsqPjgSBTYI51MUjuuxN6jSsHDuK6G5k4 pUWR8axa+wafhd6Vz8zVwdTJZ9LdxgLLVg0kprBgccPHhPAZVQARAQABtCZKb2hhbm5lcyBM dW5kYmVyZyA8am9oYWx1bjBAZ21haWwuY29tPokCVAQTAQgAPhYhBIl1Pb3+hI60ivmRSULn yG4BGvSeBQJcRZqCAhsjBQkJZgGABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEELnyG4B GvSe9O0P/RzeQAu1R37RlONZTXNn+qIAHvHbZEhzrCibzaZnwYdC31wGrYmXNDyiQIqOngFf QJuufQtH/+95OESJsjR+42L/pNfFdaEWxiI003qE7uCMzLK5UWUXd/5d5vYY0CaPyNCj1tyM ZIq7x4CaR3QLTh/Fw4zMUI/ZPH2S5SxVFGv0ZZFAdNYILD3qCkAS/9HmXsqufBWbfutA8TTf wyJfywmvf7ENjlZ4QOjb242ZY9NndqbmqTgWVAws+PN5e9AT8HkadscCTCSkYnxJyYG2El27 DpAAkekYplb/C0j82KSz2fy9RgwD+tTqt88DJOeFbIbrYt44u7KLHpzaZeqyUtn0reHCkE0W lnKH2kXXbuswFB4sONxI/J5+qSmOsAm5ItO3voyjm/swpmFR1yBlxo4th26gbO5NfBOK9YsY zHKgiRDv6ZdnHo+htphRxcCDHsFPzkQe5jouI25dvMZYl1LaTS/09lwYVwVIB2SFmMtFZ7rB N4NBSzPlpsg+g4dJNqiw6Rfa2Q/wUv+MzTJgLtHjDccXlpm33Nc09UytHFtNn26PO/zrM39r TwzdLu1mg0x2WWEWTIqe4CaczQU9SIg49BSyJNoPSZx3V7nMhTKbOeQKR5aV3dXI66aENw86 pa1tipuUKCPmope/GTJatUgPiD3JkyiD+7c1zQX2UAGmuQINBFxFmoIBEACb55RAkM59huAx 4Ddd8WBjsw25qf7rzxeRKAQ7or/8LvJBYQDPXZy0RhkRiu+P+MjxwGb6HVh+LDyAYDn9d8Mt ZqCP/dOGNcl7pkb6IhfRc3i5neckXCYfbm0cigiX9JkqZSt3KT96zbjCxsFZKyIyEFsMl46q 7wKWK5Irj3zxV/Z51JNTJyMLcIRWhY8G6qlMNFgZkz2Hv63w6BRekKVImOmOdThLAscy5ybq 2CIUeAwPG7lMYG9rgcPdn3tMPeWlLmUmi5pSwOQ3AKg3xFrW3WfegjRHdqpeuXoeTjYPPCW4 gyl59uv6E12a6eivItCxj67vlBXgOr4um+zoPyXG/WfidIFtWaEgyBrlGR1Klk7SIcqjEHUA FdiM+PweY4opHXXKn60NOZCqBJ59K43drOQgRouz8E2T3yEoYg40xAfY3lhJV/Vx5+kSTjmy sT2xotlPn/GzfaAEvNuJDK+Mec3LvfbbDoOWFolNyEvoMQqF5Q3A8eGqYsoVGBPxyzNvF2iY LkymxiXpgrSN0Q/LOK7pFlWwbVC8Z6g5I0J9ecgD55dGLoX2luLir787XX/JxGffzbRnP9NE ifenJGrQmx4CyEaz/CHQqSbROm5Uo/YFUX9J7OfUO4mtu90j773j32I3psey/Fz3EC/A2PHv Ghb0KsWYpS3Pj5TV1gGyswARAQABiQI8BBgBCAAmFiEEiXU9vf6EjrSK+ZFJQufIbgEa9J4F AlxFmoICGwwFCQlmAYAACgkQQufIbgEa9J7qOQ//YG/4e69YTSjtiYLXzBI8tRU2Sx+NFByx zx+C/r0EBThLtgRwCqEUZRB7iIDSO8aZ0Qa3vwWRohlD1tn/LBdDFfMmuQkNVdLIrjBoGBB9 B5xHdZJ9xnTZEwpTtk6IWolT4j+8rpGemGKKiFo3X6l02On4Qb4iM7h6rcDb76mfwooNYzB3 8PPcLvyOWb/9iCXAb5N7doo5zmOl15DVwvIF04eXU0q1FFj/iS1zNmtZ5Got82O1TQFV+de4 Rb3YA80IZhhhCiHHJqkMKeKQogRqU+UNDBARUBxfUtKsJtQzTQ2JUGwkb6X6bx53FTLP6O9q hDoODVweE1LdB1k1H5Nn+gawPdRMBqj43Y2amK7KEgoTBrwU04CLpKiaAC0S+EcJFfJcwtpK k3F+uTtP/hnhFnWbn8SgRkHKXKWqSCt63NstXhMzAJut1gEzV+CcPNKqa/sFgQaYEvzCS5Kl F/PXj0++f3TIFqT+2ZNNp8Bz8dT7gh8RPPg5oYQiCHH8K1RAmq7gKqmwyg0qgOazHnped+od X4f3qx320JAP6NP9wglDm6eht48NJzb0sffN8z34wrP66oz8oPKtS5CFV0m/384hEg0lmi3W wo2Hno7rA1etTPJX0dI6/GLlQDtNTHvKQ077HQdWVOMQVWC9j7YH7Zr9NjtOvxcNVRX3fxpJ 6CE= X-Tagtoolbar-Keys: D20190604100236617 Message-ID: Date: Tue, 4 Jun 2019 10:02:36 -0700 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <20190604054409.4anei2ljzimqc75m@ivaldir.net> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable Content-Language: en-US X-Rspamd-Queue-Id: 6B38A72E0A X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-2.98 / 15.00]; local_wl_from(0.00)[FreeBSD.org]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; NEURAL_HAM_SHORT(-0.98)[-0.984,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_HAM_LONG(-1.00)[-1.000,0] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jun 2019 17:02:39 -0000 On 6/3/19 10:44 PM, Baptiste Daroussin wrote: > On Tue, Jun 04, 2019 at 07:32:16AM +0200, O. Hartmann wrote: >> Hello List, >> >> lately I ran into a serious problem installing packages in a nanoBSD >> environment, in which the package repository server is "remotely" on s= ite. The >> issue as documented below occurs on both 12-STABLE r348529 and CURRENT= r348600 >> and must have been introduced shortly, since the last known good insta= llation >> with the environment of ours was on 21st May 2019. >> >> As far as I know,, the package installation is performed via "chroot'e= d" >> environment and somehow /dev/null is out of a sudden not accessible an= ymore >> while pkg tries to delegate some output to /dev/null. >> >> What happened here? >> >> Kind regards and thanks in advance, >> >> oh >> >> [...] >> All repositories are up to date. >> The following 10 package(s) will be affected (of 0 checked): >> >> New packages to be INSTALLED: >> python3: 3_3 [zeit4] >> sudo: 1.8.27_1 [zeit4] >> devcpu-data: 1.22 [zeit4] >> python36: 3.6.8_2 [zeit4] >> readline: 8.0.0 [zeit4] >> indexinfo: 0.3.1 [zeit4] >> libffi: 3.2.1_3 [zeit4] >> gettext-runtime: 0.19.8.1_2 [zeit4] >> openldap-sasl-client: 2.4.47 [zeit4] >> cyrus-sasl: 2.1.27 [zeit4] >> >> Number of packages to be installed: 10 >> > What is new is that pkg is using /dev/null as input when running script= ? this is > new since pkg 1.11 . Somehow this does not seems to be avaalaible in yo= ur > environement. Hi Same things applies to poudriere-image. I had to add a mount devfs command to the image.sh script. > > Best regards, > Bapt From owner-freebsd-current@freebsd.org Wed Jun 5 10:03:06 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id DBA3315A7FAC for ; Wed, 5 Jun 2019 10:03:05 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from dec.sakura.ne.jp (dec.sakura.ne.jp [210.188.226.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C5A4374922; Wed, 5 Jun 2019 10:03:02 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from fortune.joker.local (124-18-96-116.dz.commufa.jp [124.18.96.116]) (authenticated bits=0) by dec.sakura.ne.jp (8.15.2/8.15.2/[SAKURA-WEB]/20080708) with ESMTPA id x55A2tJC090828; Wed, 5 Jun 2019 19:02:55 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Wed, 5 Jun 2019 19:02:55 +0900 From: Tomoaki AOKI To: freebsd-current@freebsd.org Cc: imp@bsdimp.com, johalun@freebsd.org Subject: Re: UEFI boot broken in 13? Message-Id: <20190605190255.b1f45507d1744fec1a7f6162@dec.sakura.ne.jp> In-Reply-To: References: <71a0c9f7-0b1f-3757-fc04-4c0d0a1e1085@FreeBSD.org> <20190604212831.360fd1a0c34c9f329e3084fc@dec.sakura.ne.jp> Reply-To: junchoon@dec.sakura.ne.jp Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; amd64-portbld-freebsd12.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: C5A4374922 X-Spamd-Bar: +++++ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [5.22 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; HAS_REPLYTO(0.00)[junchoon@dec.sakura.ne.jp]; MV_CASE(0.50)[]; TO_DN_NONE(0.00)[]; REPLYTO_ADDR_EQ_FROM(0.00)[]; HAS_ORG_HEADER(0.00)[]; MX_GOOD(-0.01)[cached: dec.sakura.ne.jp]; RECEIVED_SPAMHAUS_PBL(0.00)[116.96.18.124.zen.spamhaus.org : 127.0.0.10]; IP_SCORE(0.38)[ipnet: 210.188.224.0/19(0.60), asn: 9370(1.37), country: JP(-0.05)]; R_DKIM_NA(0.00)[]; ASN(0.00)[asn:9370, ipnet:210.188.224.0/19, country:JP]; SUBJECT_ENDS_QUESTION(1.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_SPAM_SHORT(0.47)[0.474,0]; MIME_GOOD(-0.10)[text/plain]; RCVD_TLS_LAST(0.00)[]; AUTH_NA(1.00)[]; NEURAL_SPAM_MEDIUM(0.97)[0.970,0]; DMARC_NA(0.00)[sakura.ne.jp]; MIME_TRACE(0.00)[0:+]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(1.00)[1.000,0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 10:03:06 -0000 On Tue, 4 Jun 2019 08:58:43 -0600 Warner Losh wrote: > On Tue, Jun 4, 2019 at 8:16 AM Warner Losh wrote: > > > > > > > On Tue, Jun 4, 2019 at 7:11 AM Tomoaki AOKI > > wrote: > > > >> Hi. > >> > >> Try attached patch for stand/efi/boot1/boot1.c. > >> This partially reverts r347193 and works at least for me. > >> > >> Without this, boot1.efi (bootx64.efi) forcibly boot from > >> first physical HDD/SSD, even if forcibly booted from other > >> physical drive via BIOS (UEFI firmware) menu. > >> > >> Remaining parts of > >> https://reviews.freebsd.org/D20513https://reviews.freebsd.org/D20513 and > >> following some commits does not > >> affect. > >> > >> *Hand-crafted reverse patch from commit mail [1]. > >> Reverting whole r347193 is fine, too. > >> > >> [1] > >> https://lists.freebsd.org/pipermail/svn-src-head/2019-May/124677.html > > > > > > I'll take a look. My experience is that even prior to this patch, forcibly > > booting also failed though due to ordering issues... > > > > More testing reveals that the issues prior to r347193 turned out to be > different, and r347193 really did break things. I've opted to fix this in a > slightly different way: > > https://reviews.freebsd.org/D20513 > > Aoki-san, can you please check to see if the above review fixes things for > you as well? Thanks! > > Warner Thanks! Confirms OK for me, and also confirmed committed as r348658 and r348659. Johannes, can you confirm head after r348659 works fine for you, too? > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" -- Tomoaki AOKI From owner-freebsd-current@freebsd.org Wed Jun 5 19:15:32 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B1FB815B65B8; Wed, 5 Jun 2019 19:15:32 +0000 (UTC) (envelope-from lwhsu.freebsd@gmail.com) Received: from mail-yb1-f193.google.com (mail-yb1-f193.google.com [209.85.219.193]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 527768F4A6; Wed, 5 Jun 2019 19:15:31 +0000 (UTC) (envelope-from lwhsu.freebsd@gmail.com) Received: by mail-yb1-f193.google.com with SMTP id x32so2063ybh.1; Wed, 05 Jun 2019 12:15:31 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=EGyRIy/I+y8dOx7NEWu4MAykeevn2xCwLGf9YqyaQcE=; b=MkJCPZxvtA5vX+/n6N/QgEcxRQbyeThM/ZCe6eVDQZoUwWNt7ndY4eW5Yn98gqgeNB /gN35afirA2W2SaP+waePgMjymJQr4Ak5XB7nWl33hP8wEQ7N/zEev5lRlGuNhe3GX70 bKHQ/ayhft7LJX3T20K7W7Bor/Ak/IhVtTAZaNNMwdkBqLqjXFarAmp4sGc298RYfHBm yQNqJcQENBYkKGdjOCT7vXy7O964FrQct0WrWb31fhrimAZjlxRMRQCpZhRSNequI7EZ PUxLRfIfzBnRilp932TACJfuswzDZjJjcAbCE8cvU1I2JBlXdI7ltZBm45+l+Irau+XE 3F9Q== X-Gm-Message-State: APjAAAX2B2C+CMDcewuy9wANu99aP65ENtrbORDvHObi7gD5P30l6QRz AL6cym6rdkYGz6B3CoaXEY0Fu6Ht/iUqsxSPwPvFZ0olH38= X-Google-Smtp-Source: APXvYqx+yhUI1PVURwfy1G/ogAoQH2En0h2B7vzbThYPvehF0dhdrOo1ns6NhY953tdRo0ml96B8XhSnwuwFzwcW+9Y= X-Received: by 2002:a25:cb97:: with SMTP id b145mr16980561ybg.110.1559757962337; Wed, 05 Jun 2019 11:06:02 -0700 (PDT) MIME-Version: 1.0 From: Li-Wen Hsu Date: Wed, 5 Jun 2019 14:05:50 -0400 Message-ID: Subject: FreeBSD CI Weekly Report 2019-06-02 To: freebsd-testing@freebsd.org Cc: freebsd-current@freebsd.org, freebsd-stable@freebsd.org Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 527768F4A6 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of lwhsufreebsd@gmail.com designates 209.85.219.193 as permitted sender) smtp.mailfrom=lwhsufreebsd@gmail.com X-Spamd-Result: default: False [-3.97 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_NEQ_ENVFROM(0.00)[lwhsu@freebsd.org,lwhsufreebsd@gmail.com]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; R_SPF_ALLOW(-0.20)[+ip4:209.85.128.0/17]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_TLS_LAST(0.00)[]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.81)[-0.812,0]; RCVD_IN_DNSWL_NONE(0.00)[193.219.85.209.list.dnswl.org : 127.0.5.0]; IP_SCORE(-1.15)[ipnet: 209.85.128.0/17(-3.39), asn: 15169(-2.30), country: US(-0.06)]; FORGED_SENDER(0.30)[lwhsu@freebsd.org,lwhsufreebsd@gmail.com]; RWL_MAILSPIKE_POSSIBLE(0.00)[193.219.85.209.rep.mailspike.net : 127.0.0.17]; MIME_TRACE(0.00)[0:+]; R_DKIM_NA(0.00)[]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:209.85.128.0/17, country:US]; TAGGED_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jun 2019 19:15:33 -0000 (Please send the followup discussions to freebsd-testing@ list.) FreeBSD CI Weekly Report 2019-06-02 =================================== Here is a summary of the FreeBSD Continuous Integration results for the period from 2019-05-27 to 2019-06-02. During this period, we have: * 1752 builds (97.8% passed, 2.2% failed) were executed on aarch64, amd64, armv6, armv7, i386, mips, mips64, powerpc, powerpc64, powerpcspe, riscv64, sparc64 architectures for head, stable/12, stable/11 branches. * 327 test runs (36.7% passed, 63.3% unstable) were executed on amd64, i386, riscv64 architectures for head, stable/12, stable/11 branches. * 23 doc builds (100% passed) (The statistics from experimental jobs are omitted) If any of the issues found by CI are in your area of interest or expertise please investigate the PRs listed below. The latest web version of this report is available at https://hackmd.io/s/ryVi1WiaN and archive is available at http://hackfoldr.org/freebsd-ci-report/, any help is welcome. ## Removed Failing Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * sys.geom.class.eli.init_test.init * sys.geom.class.eli.init_test.init_a * sys.geom.class.eli.init_test.init_alias * sys.geom.class.eli.integrity_test.copy * sys.geom.class.eli.integrity_test.data * sys.geom.class.eli.integrity_test.hmac Those geli(8) test cases are failing because some algorithms are deprecated in [r348206](https://reviews.freebsd.org/rS348206) and the return value and output are changed. The fix to the test cases are under development. Those tests are removed in [r348454](https://reviews.freebsd.org/rS348454), while it is still wothy to adjust the test code to check if the deprecated algorithms are correctly marked deprecated in the future. * https://ci.freebsd.org/job/FreeBSD-head-i386-test/ * Same as amd64 ## Failing Tests * https://ci.freebsd.org/job/FreeBSD-head-amd64-test/ * sys.netinet.socket_afinet.socket_afinet_bind_zero Affected by mac_portacl(4), which is loaded by MAC tests. Need to specify AF_INET to workaround and fix is being discussed. * https://ci.freebsd.org/job/FreeBSD-head-i386-test/ * i386 test is current suffering from loading ipsec(4) kernel module, which is needed after https://svnweb.freebsd.org/changeset/base/347410 , causes kernel panic. For more information, see: * https://bugs.freebsd.org/238012 * https://bugs.freebsd.org/230857 * https://reviews.freebsd.org/D17512 * Same as amd64: * sys.netinet.socket_afinet.socket_afinet_bind_zero * Others: * sys.netpfil.pf.forward.v6 * sys.netpfil.pf.forward.v4 * sys.netpfil.pf.set_tos.v4 * sys.opencrypto.runtests.main * https://ci.freebsd.org/job/FreeBSD-stable-12-i386-test/ * sys.netpfil.pf.forward.v6 * sys.netpfil.pf.forward.v4 * sys.netpfil.pf.set_tos.v4 * lib.libc.regex.exhaust_test.regcomp_too_big * lib.libregex.exhaust_test.regcomp_too_big * sys.opencrypto.runtests.main Failed with: ``` File "/usr/tests/sys/opencrypto/cryptodev.py", line 179, in __init__ ioctl(_cryptodev, CIOCGSESSION2, s, 1) IOError: [Errno 22] Invalid argument ``` * https://ci.freebsd.org/job/FreeBSD-stable-11-i386-test/ * local.kyua.* (31 cases) * local.lutok.* (3 cases) ## Fixed Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * There are ~980 test cases failure with message: `dtrace: failed to compile script err.D_AGG_SCALAR.maxnoarg.d: [D_UNKNOWN] "/usr/lib/dtrace/mbuf.d", line 114: failed to copy type of 'm_data': Type information is in parent and unavailable` Fixed by https://svnweb.freebsd.org/changeset/base/348329 ## Failing and Flaky Tests (from experimental jobs) * https://ci.freebsd.org/job/FreeBSD-head-amd64-dtrace_test/ * Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d https://bugs.freebsd.org/237641 * https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/ * This job is currently suffering from timeout because of https://bugs.freebsd.org/237652 * There are ~60 failing cases, including flakey ones, see https://ci.freebsd.org/job/FreeBSD-head-amd64-test_zfs/lastCompletedBuild/testReport/ for more details ## Disabled Tests * lib.libc.sys.mmap_test.mmap_truncate_signal https://bugs.freebsd.org/211924 * sys.fs.tmpfs.mount_test.large https://bugs.freebsd.org/212862 * sys.fs.tmpfs.link_test.kqueue https://bugs.freebsd.org/213662 * sys.kqueue.libkqueue.kqueue_test.main https://bugs.freebsd.org/233586 * usr.bin.procstat.procstat_test.command_loogle.com/ine_arguments https://bugs.freebsd.org/233587 * usr.bin.procstat.procstat_test.environment https://bugs.freebsd.org/233588 ## Open Issues * https://bugs.freebsd.org/237077 possible race in build: /usr/src/sys/amd64/linux/linux_support.s:38:2: error: expected relocatable expression * https://bugs.freebsd.org/237403 Tests in sys/opencrypto should be converted to Python3 * https://bugs.freebsd.org/237641 Flakey test case: common.misc.t_dtrace_contrib.tst_dynopt_d * https://bugs.freebsd.org/237652 tests.hotspare.hotspare_test.hotspare_snapshot_001_pos timeout since somewhere in (r346814, r 346845] * https://bugs.freebsd.org/237655 Non-deterministic panic when running pf tests in interface ioctl code (NULL passed to strncmp) * https://bugs.freebsd.org/237656 "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests * https://bugs.freebsd.org/237657 sys.kern.pdeathsig.signal_delivered_ptrace timing out periodically on i386 ### Cause build fails * [233735: Possible build race: genoffset.o /usr/src/sys/sys/types.h: error: machine/endian.h: No such file or directory](https://bugs.freebsd.org/233735) * [233769: Possible build race: ld: error: unable to find library -lgcc_s](https://bugs.freebsd.org/233769) ### Others [Tickets related to testing@](https://preview.tinyurl.com/y9maauwg) ## Other News * https://issues.tmatesoft.com/issue/SVNKIT-740 The patch is asked to be updated and help wanted. * https://bugs.freebsd.org/235356 Help on how to reproduce and analyze is wanted. * "FreeBSD CI Tasks and Ideas", discussed in the [DevSummit201905](https://wiki.freebsd.org/DevSummit/201905/): https://hackmd.io/bWCGgdDFTTK_FG0X7J1Vmg From owner-freebsd-current@freebsd.org Sat Jun 8 02:57:30 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 2932215BF8C6 for ; Sat, 8 Jun 2019 02:57:30 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-eopbgr660070.outbound.protection.outlook.com [40.107.66.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.protection.outlook.com", Issuer "GlobalSign Organization Validation CA - SHA256 - G3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id F0D8C6EC2C for ; Sat, 8 Jun 2019 02:57:28 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from YQXPR01MB3128.CANPRD01.PROD.OUTLOOK.COM (52.132.93.160) by YQXPR01MB2488.CANPRD01.PROD.OUTLOOK.COM (52.132.92.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.14; Sat, 8 Jun 2019 02:57:27 +0000 Received: from YQXPR01MB3128.CANPRD01.PROD.OUTLOOK.COM ([fe80::f9fe:559f:fdc:9e5a]) by YQXPR01MB3128.CANPRD01.PROD.OUTLOOK.COM ([fe80::f9fe:559f:fdc:9e5a%3]) with mapi id 15.20.1965.011; Sat, 8 Jun 2019 02:57:27 +0000 From: Rick Macklem To: "freebsd-current@FreeBSD.org" Subject: adding a syscall to libc? Thread-Topic: adding a syscall to libc? Thread-Index: AQHVHaUq4CSrPmO6/E+nutIFTmCjBA== Date: Sat, 8 Jun 2019 02:57:27 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 7e36fbce-66ba-4012-a8dd-08d6ebbd0a59 x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:YQXPR01MB2488; x-ms-traffictypediagnostic: YQXPR01MB2488: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:9508; x-forefront-prvs: 0062BDD52C x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(396003)(366004)(136003)(39860400002)(199004)(189003)(51874003)(40764003)(8936002)(6436002)(64756008)(6916009)(66446008)(66556008)(2501003)(305945005)(66476007)(73956011)(52536014)(9686003)(2906002)(66946007)(478600001)(76116006)(55016002)(86362001)(99286004)(25786009)(2351001)(186003)(74316002)(68736007)(46003)(33656002)(74482002)(102836004)(476003)(486006)(7696005)(53936002)(316002)(81166006)(81156014)(256004)(5640700003)(14454004)(14444005)(786003)(6506007)(5660300002)(4744005)(71200400001)(71190400001)(8676002); DIR:OUT; SFP:1101; SCL:1; SRVR:YQXPR01MB2488; H:YQXPR01MB3128.CANPRD01.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; received-spf: None (protection.outlook.com: uoguelph.ca does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: VUBuytgWs/zmB0c4GezCjwcNhT1RV6Xea5kR1qyftvq4SNP5yZAUxYH+4BfvV/N/BaSAR3JBg4GhXv6FjCeORYRWMIv2saKK61oXlnbLWxX6HFnLBUGzzXyd34SVWrgAh90sG0jdk7TGMNNWVU1DPyTcCd/7bQxrST7DWIoQ6q5jTCmFMpdiCcdwY+lRnQnKNPDxBBOtvsdssVzpJwye4YwKH08ki3VTvulhzBX8cYTLQMD7V6PDk6ofdCopneqLtJ60Zo+emwe7Gqix5N25cfpLY5cTTEBxkChHNoM6v26IL6xeZJNP9il2XxfY5/UroOHGLeAACTr/Me4brrPpWEr1gZpcv4iQF+nbyt34H8Zg2GE4/SmWgT6dkEYJ+xqciCOvmvblZjAFuF7sHWDrwNimNLkSpYzAsX/XBEulh58= Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: uoguelph.ca X-MS-Exchange-CrossTenant-Network-Message-Id: 7e36fbce-66ba-4012-a8dd-08d6ebbd0a59 X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2019 02:57:27.3189 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: be62a12b-2cad-49a1-a5fa-85f4f3156a7d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rmacklem@uoguelph.ca X-MS-Exchange-Transport-CrossTenantHeadersStamped: YQXPR01MB2488 X-Rspamd-Queue-Id: F0D8C6EC2C X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; spf=pass (mx1.freebsd.org: domain of rmacklem@uoguelph.ca designates 40.107.66.70 as permitted sender) smtp.mailfrom=rmacklem@uoguelph.ca X-Spamd-Result: default: False [-3.23 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:40.107.0.0/16]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; SUBJECT_ENDS_QUESTION(1.00)[]; DMARC_NA(0.00)[uoguelph.ca]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; RCVD_COUNT_THREE(0.00)[3]; IP_SCORE(-1.02)[ipnet: 40.64.0.0/10(-2.85), asn: 8075(-2.17), country: US(-0.06)]; MX_GOOD(-0.01)[mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com,mx2.hc184-76.ca.iphmx.com,mx1.hc184-76.ca.iphmx.com]; NEURAL_HAM_SHORT(-0.91)[-0.909,0]; RCVD_IN_DNSWL_NONE(0.00)[70.66.107.40.list.dnswl.org : 127.0.3.0]; TO_DN_EQ_ADDR_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:8075, ipnet:40.64.0.0/10, country:US]; RCVD_TLS_LAST(0.00)[] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jun 2019 02:57:30 -0000 Hi, I've started working of a copy_file_range() syscall for FreeBSD. I think I = have the kernel patched and ready for some testing. However, I'm confused about what I need to do in src/lib/libc/sys? - Some syscalls have little .c files, but other ones do not. When is one of these little .c files needed and, when not needed, what el= se needs to be done? (I notice that syscall.mk in src/sys/sys automagically,= but I can't see what else, if anything, needs to be done?) Thanks in advance for your help, rick ps: I am using the Linux man pages for the syscall ABI. At some point, I'll= put this in phabricator and post here for comments/review. From owner-freebsd-current@freebsd.org Sat Jun 8 10:28:26 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3B48915C7B8A for ; Sat, 8 Jun 2019 10:28:26 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from kib.kiev.ua (kib.kiev.ua [IPv6:2001:470:d5e7:1::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 54BAC84642 for ; Sat, 8 Jun 2019 10:28:25 +0000 (UTC) (envelope-from kostikbel@gmail.com) Received: from tom.home (kib@localhost [127.0.0.1]) by kib.kiev.ua (8.15.2/8.15.2) with ESMTPS id x58ASGrW065719 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Sat, 8 Jun 2019 13:28:20 +0300 (EEST) (envelope-from kostikbel@gmail.com) DKIM-Filter: OpenDKIM Filter v2.10.3 kib.kiev.ua x58ASGrW065719 Received: (from kostik@localhost) by tom.home (8.15.2/8.15.2/Submit) id x58ASGf3065718; Sat, 8 Jun 2019 13:28:16 +0300 (EEST) (envelope-from kostikbel@gmail.com) X-Authentication-Warning: tom.home: kostik set sender to kostikbel@gmail.com using -f Date: Sat, 8 Jun 2019 13:28:16 +0300 From: Konstantin Belousov To: Rick Macklem Cc: "freebsd-current@FreeBSD.org" Subject: Re: adding a syscall to libc? Message-ID: <20190608102816.GR75280@kib.kiev.ua> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.0 (2019-05-25) X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_ADSP_CUSTOM_MED,FORGED_GMAIL_RCVD,FREEMAIL_FROM, NML_ADSP_CUSTOM_MED autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tom.home X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jun 2019 10:28:26 -0000 On Sat, Jun 08, 2019 at 02:57:27AM +0000, Rick Macklem wrote: > Hi, > > I've started working of a copy_file_range() syscall for FreeBSD. I think I have the > kernel patched and ready for some testing. > However, I'm confused about what I need to do in src/lib/libc/sys? > - Some syscalls have little .c files, but other ones do not. > When is one of these little .c files needed and, when not needed, what else > needs to be done? (I notice that syscall.mk in src/sys/sys automagically, but > I can't see what else, if anything, needs to be done?) Most important is to add the new syscall public symbol to sys/Symbol.map into the correct version, FBSD_1.6 for CURRENT-13. Do no bother with __sys_XXX and __XXX aliases. 'Tiny .c files' are typically used for one of two purposes: - Convert raw kernel interface into something expected by userspace, often this coversion uses more generic and non-standard interface to implement more usual function. Examples are open(2) or waitid(2) which are really tiny wrappers around openat(2) and wait6(2) in today libc. - Allow libthr to hook into libc to provide additional services. Libthr often has to modify semantic of raw syscall, and libc contains the tables redirecting to implementation, the tables are patched on libthr load. Since tables must fill entries with some address in case libthr is not loaded, tiny functions which wrap syscalls are created for use in that tables. I think you do not need anything that complications for start, in which case adding new syscall consists of the following steps: - Add the syscall to sys/kern/syscalls.master, and if reasonable, to sys/compat/freebsd32/syscalls.master. - Consider if the syscall makes sense in capsicumized environment, and if yes, list the syscall in sys/kern/capabilities.conf. Typically, if syscall provides access to the global files namespace, it must be not allowed. On the other hand, if syscall only operates on already opened file descriptors, then it is suitable (but of course there are lot of nuances). - Add syscall prototype to the user-visible portion of header, hiding it under the proper visibility check. - Add syscall symbol to lib/libc/sys/Symbol.ver. - Implement the syscall. There are some additional details that might require attention: - If compat32 syscall going to be implemented, or you know that Linuxolator needs to implement same syscall and would like to take advantage of the code, provide int kern_YOURSYSCALL(); wrapper and declare it in sys/syscallsubr.h. Real implementations of host-native and compat32 sys_YOURSYSCALL() should be just decoding of uap members and call into kern_YOURSYSCALL. - Consider the need to add auditing for new syscall. - Add man page for the syscall, at lib/libc/sys/YOURSYSCALL.2, and connect it to the build in lib/libc/sys/Makefile.inc. - When creating review for the change, do not include diff for generated files after make sysent. Similarly, when doing the commit, first commit everything non-generated, then do make -C sys/kern sysent (and make sysent -C sys/compat/freebsd32 sysent if appropriate) and commit the generated files in follow-up. > > Thanks in advance for your help, rick > ps: I am using the Linux man pages for the syscall ABI. At some point, I'll put this > in phabricator and post here for comments/review. > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" From owner-freebsd-current@freebsd.org Sat Jun 8 11:47:41 2019 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9F69715C9ACE for ; Sat, 8 Jun 2019 11:47:41 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: from mail-yw1-xc29.google.com (mail-yw1-xc29.google.com [IPv6:2607:f8b0:4864:20::c29]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 41CA286F50 for ; Sat, 8 Jun 2019 11:47:41 +0000 (UTC) (envelope-from oliver.pinter@hardenedbsd.org) Received: by mail-yw1-xc29.google.com with SMTP id 186so1778409ywo.4 for ; Sat, 08 Jun 2019 04:47:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HSvta/ab8mNeX3QhYj4D0RA3PuZw8fUGdStTGBsQMX8=; b=CyFSsa9MjIqx7njVoyMs3HoPuHZOlm0Y+MI1Rwxqkenfu/INoimcYzGWGT80K6PYqU zxAKxQugUWaHIK4WtiT2ssIjTOVL6e6YOki6EfEr9mXqXdKJgXFf4zLGzoZbxYTiPSmY pm2qf4EepQix2QjDNwZNgICRMDAcXAvFeq/+DGLPcN+DlCL+kBq7hzj5RQjnV6zIHmjD 5tHNCR4yTYfcThDHbbzoMITWq2TgOjLgDF302hYdjigYYexJupxWdIuFQVZodqZ7Bvb9 1wzPkEzR6rzNgp+sH2DQkXyBRUmEdqtep5lmA4/5qotIiWdKaK5yzEPrPR5wEUS0U5Ds NLCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HSvta/ab8mNeX3QhYj4D0RA3PuZw8fUGdStTGBsQMX8=; b=UmSiOoTEJ17Lb3Sj6EngXTcdTK+sdpIeJX99k2JQ1wbwWLB8aOfIzkFNN0and90IF6 MkToH+mwt9YQiT9v2Mrt8otPCGwWntABXF6R7GyUHB5hDPNFtTebLoXEi106iJZWHpWT ucOml2syZikXVufC0QI2qC8b2fnkkTYtp15oGRWO7pC3iZQIFArcDgJlhaVF9g2m1K8f 1xnDa94hulHCYjC8ZgmXOJJc/sO4SzhdJN8+7xSG0OfMpCf4glEj0eOLHkVMGhC57Def FmxSXz5aJ7EE0XpLbPi1sKlmGoVAg6IaOwCBNxvP/KeiX7qT9otH3HNjCauTIZgFMfDZ aLCw== X-Gm-Message-State: APjAAAXVWi5gNoNzEzn7USZKrca5NlWnzkzx1IbJaiy1hb36q7+4Iuo7 f3BpbyfweHjEL4TXZ7+bIgcmC8cF9Ufs8QtBU5DsYbqG4MY= X-Google-Smtp-Source: APXvYqxz3h8uiPaiRcQncDoSMfGR+Bgsf+LbqDxZoQn8RMIYPJB2HZQWjq3OqCdjMnMO0EqTcrSJ+ZCEtq9sUIJT6GU= X-Received: by 2002:a81:3a46:: with SMTP id h67mr28184055ywa.455.1559994460469; Sat, 08 Jun 2019 04:47:40 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:2c91:0:0:0:0:0 with HTTP; Sat, 8 Jun 2019 04:47:39 -0700 (PDT) In-Reply-To: <20190608102816.GR75280@kib.kiev.ua> References: <20190608102816.GR75280@kib.kiev.ua> From: Oliver Pinter Date: Sat, 8 Jun 2019 13:47:39 +0200 Message-ID: Subject: Re: adding a syscall to libc? To: Konstantin Belousov Cc: Rick Macklem , "freebsd-current@FreeBSD.org" X-Rspamd-Queue-Id: 41CA286F50 X-Spamd-Bar: ------ Authentication-Results: mx1.freebsd.org X-Spamd-Result: default: False [-6.97 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-0.999,0]; NEURAL_HAM_SHORT(-0.97)[-0.970,0]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; REPLY(-4.00)[] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jun 2019 11:47:41 -0000 On Saturday, June 8, 2019, Konstantin Belousov wrote: > On Sat, Jun 08, 2019 at 02:57:27AM +0000, Rick Macklem wrote: > > Hi, > > > > I've started working of a copy_file_range() syscall for FreeBSD. I think > I have the > > kernel patched and ready for some testing. > > However, I'm confused about what I need to do in src/lib/libc/sys? > > - Some syscalls have little .c files, but other ones do not. > > When is one of these little .c files needed and, when not needed, what > else > > needs to be done? (I notice that syscall.mk in src/sys/sys > automagically, but > > I can't see what else, if anything, needs to be done?) > Most important is to add the new syscall public symbol to sys/Symbol.map > into the correct version, FBSD_1.6 for CURRENT-13. Do no bother with > __sys_XXX and __XXX aliases. > > 'Tiny .c files' are typically used for one of two purposes: > - Convert raw kernel interface into something expected by userspace, > often this coversion uses more generic and non-standard interface to > implement more usual function. Examples are open(2) or waitid(2) > which are really tiny wrappers around openat(2) and wait6(2) in > today libc. > - Allow libthr to hook into libc to provide additional services. Libthr > often has to modify semantic of raw syscall, and libc contains the > tables redirecting to implementation, the tables are patched on libthr > load. Since tables must fill entries with some address in case libthr > is not loaded, tiny functions which wrap syscalls are created for > use in that tables. > > I think you do not need anything that complications for start, in which > case adding new syscall consists of the following steps: > - Add the syscall to sys/kern/syscalls.master, and if reasonable, > to sys/compat/freebsd32/syscalls.master. > - Consider if the syscall makes sense in capsicumized environment, > and if yes, list the syscall in sys/kern/capabilities.conf. Typically, > if syscall provides access to the global files namespace, it must be not > allowed. On the other hand, if syscall only operates on already opened > file descriptors, then it is suitable (but of course there are lot of > nuances). > - Add syscall prototype to the user-visible portion of header, > hiding it under the proper visibility check. > - Add syscall symbol to lib/libc/sys/Symbol.ver. > - Implement the syscall. There are some additional details that might > require attention: > - If compat32 syscall going to be implemented, or you know > that Linuxolator needs to implement same syscall and would > like to take advantage of the code, provide > int kern_YOURSYSCALL(); > wrapper and declare it in sys/syscallsubr.h. Real > implementations > of host-native and compat32 sys_YOURSYSCALL() should be just > decoding of uap members and call into kern_YOURSYSCALL. > - Consider the need to add auditing for new syscall. > - Add man page for the syscall, at lib/libc/sys/YOURSYSCALL.2, and connect > it to the build in lib/libc/sys/Makefile.inc. > - When creating review for the change, do not include diff for generated > files after make sysent. Similarly, when doing the commit, first commit > everything non-generated, then do make -C sys/kern sysent (and > make sysent -C sys/compat/freebsd32 sysent if appropriate) and commit > the generated files in follow-up. The best place for this little writeup would be in the wiki. ;) > > > > > Thanks in advance for your help, rick > > ps: I am using the Linux man pages for the syscall ABI. At some point, > I'll put this > > in phabricator and post here for comments/review. > > _______________________________________________ > > freebsd-current@freebsd.org mailing list > > https://lists.freebsd.org/mailman/listinfo/freebsd-current > > To unsubscribe, send any mail to " > freebsd-current-unsubscribe@freebsd.org" > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" >