I've just run syspatch on a 6.5 box and obviously I've allocated the space
poorly but because of that, this happened:
drogo# syspatch
Get/Verify syspatch65-001_rip6cks... 100% |***********************| 196 KB
00:00
Installing patch 001_rip6cksum
Get/Verify syspatch65-002_srtp.tgz 100% |*************************| 4316 KB
00:00
Installing patch 002_srtp
Get/Verify syspatch65-003_mds.tgz 100% |**************************| 49488 KB
00:02
Installing patch 003_mds
/: write failed, file system is full
tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/pmap.o: No space
left on devi
ce
/: write failed, file system is full
tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/powernow-k8.o: No
space left
on device
tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/ppp_tty.o: No
space left on d
evice
tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/process_machdep.o:
No space l
eft on device
...
... Lots of this; doesn't need repeating.
...
tar: Unable to create usr/share/relink/kernel/GENERIC.MP/xen.o: No space left
on device
tar: Failed write to file var/syspatch/65-003_mds/003_mds.patch.sig: No space
left on devi
ce
Relinking to create unique kernel... done; reboot to load the new kernel
Errata can be reviewed under /var/syspatch
drogo# df -h
Filesystem Size Used Avail Capacity Mounted on
/dev/sd2a 254M 153M 88.3M 63% /
/dev/sd2d 3.4G 1.7G 1.6G 52% /usr
/dev/sd2e 254M 18.0M 223M 7% /var
/dev/sd3a 1.8T 326G 1.4T 19% /srv
/dev/vnd3a 19.7G 3.2G 15.5G 17% /var/www/htdocs/OpenBSD
drogo# ls -l /bsd*
-rwx------ 1 root wheel 15623498 Jun 6 18:57 /bsd
-rwx------ 1 root wheel 15629498 May 20 02:17 /bsd.booted
-rw------- 1 flak wheel 10224165 Apr 30 08:35 /bsd.rd
-rwx------ 1 root wheel 15527075 Apr 30 08:35 /bsd.sp
drogo# date
Thu Jun 6 18:58:23 UTC 2019
I'm not sure what this means it's stuffed into /bsd but I've kept it,
/bsd.booted and the relink directory and repaired and relinked manually. I'm
not attaching them to this because obviously they're too big but here's the
relink.log:
drogo# cat /srv/broken-20190606/kernel/GENERIC.MP/relink.log
(SHA256) /bsd: OK
LD="ld" sh makegap.sh 0xcccccccc gapdummy.o
ld -T ld.script -X --warn-common -nopie -o newbsd ${SYSTEM_HEAD} vers.o ${OBJS}
text data bss dec hex
12913621 546360 671744 14131725 d7a20d
mv newbsd newbsd.gdb
ctfstrip -S -o newbsd newbsd.gdb
rm -f bsd.gdb
mv -f newbsd bsd
umask 077 && cp bsd /nbsd && mv /nbsd /bsd && sha256 -h /var/db/kernel.SHA256
/bsd
Kernel has been relinked and is active on next reboot.
SHA256 (/bsd) = 40b52473bed49fca4f4d4218cd0d5062902d7f3398d3e833888b8494dc2f0b55
drogo# cat /srv/broken-20190606/kernel.SHA256
SHA256 (/bsd) = 40b52473bed49fca4f4d4218cd0d5062902d7f3398d3e833888b8494dc2f0b55
I didn't think to check what the return code from syspatch was but I suspect it
was zero.
In a little while I'll dig around in syspatch/relink to see if I can figure out
what's going on (I'm in the middle of something else now and system patching
was itself just a yak) but I wanted to post this in case anyone already
familiar with those two processes can jump straight to the problem.
Cheers,
Matthew