Siju George writes: > Just a quick heads-up that, after an official "Freeze period", > NetBSD-current is almost at the stage where we can branch the > repository for 5.0. We're aware that there are some bugs that need > fixing:
> http://releng.netbsd.org/pr-list.html > but we're feature complete, and able to start the process off for > real. > In the dim and distant past, we used to encourage people to run > what was to become the release by switching current's sup server over > to provide sources from the branch. These days, we distribute NetBSD > in a huge number of other ways; however, we'd still like to encourage > people to try out the sources from the branch, and the binaries that > releng provide, in order that we can make 5.0 the best version of > NetBSD ever. For getting sources by CVS, further information can be > found in: > > http://www.netbsd.org/docs/guide/en/chap-fetch.html#chap-fetch-cvs-netbsd-current > http://www.netbsd.org/mirrors/#anoncvs > whilst the binaries from the release engineering daily builds can be > downloaded directly: > ftp://ftp.netbsd.org/pub/NetBSD-daily/netbsd-5/ > http://www.netbsd.org/mirrors/ > Much has changed since 4.0; some highlights are: > + during the development of NetBSD 5.0, the kernel version was bumped > 73 times. The previous record was 29 > + there is a new kernel threading model which has better performance > than the previous implementation > + we have introduced the file system journalling (WAPBL) > functionality, kindly donated by Wasabi Systems > + much work has been done in the file system arena > + the Xen port has updated to Xen 3.3, and has support for PAE domains > and amd64 domains (both dom0 and domU) > + Xorg is now a part of our base system > + providing multilib functionality (64bit platforms such as amd64 and > sparc64 can now compile and run 32bit binaries seamlessly) > + almost every subsystem has been improved. > + our contributed external software has moved to a new framework, so > as to make license issues clearer > + many more device drivers are present in tree > + all security-critical software is now compiled by default with stack > protection; this makes stack overflow and stack smashing attacks > more difficult to exploit > + address space layout randomization is now supported on selected > platforms > + NetBSD now supports creating position independent executables (PIE) > that can completely randomize the layout of stack, code, data, shared > library layout per executable invocation > So we'd really like to encourage you to help us out by running code > from the 5.0 branch, and to help us by shaking bugs out - send-pr is > our friend in this - any and all bug reports gratefully received. > With thanks for your help, > Alistair Crooks > For the core and release engineering teams, > The NetBSD Foundation Thanks for posting this. I've never tried NetBSD, so I think I should give it a try too, current feature set looks cool, comparable to FreeBSD 8.0-CURRENT . Ashish -- () ascii ribbon campaign - against HTML e-mail /\ www.asciiribbon.org - against proprietary attachments ·-- ·- ···· ·--- ·- ···- ·- ·--·-· --· -- ·- ·· ·-·· ·-·-·- -·-· --- -- % dig +short cname cdac.in @::1 ms.gov.in
pgpTB4zHbwMZ3.pgp
Description: PGP signature
_______________________________________________ bsd-india mailing list [email protected] http://www.bsd-india.org/mailman/listinfo/bsd-india
