On Thu, Jul 4, 2019, 06:37 Eugene Grosbein wrote:
> We should resurrect "early" rc.d script. Its removal in 6.x as opposed to
> rewrite was a mistake
> as such script is irreplaceable for multiple situations including pretty
> ordinary ones
> like enabling kernel crashdumps to gmirror.
>
+1 :-)
03.07.2019 19:29, Ed Maste wrote:
> On Wed, 3 Jul 2019 at 11:21, Doug Hardie wrote:
>>
>> That is going to be a bit tricky to do on a headless server that is remote.
>> None of mine have consoles. They are all accessed via SSH. Any ideas how
>> this situation can be handled?
>
> Probably
On Wed, 3 Jul 2019 at 11:21, Doug Hardie wrote:
>
> That is going to be a bit tricky to do on a headless server that is remote.
> None of mine have consoles. They are all accessed via SSH. Any ideas how
> this situation can be handled?
Probably an rc.d script with BEFORE: root that invokes
On Jul 3, 2019, at 05:41, Ed Maste wrote:
>
>> On Wed, 3 Jul 2019 at 06:05, Doug Hardie wrote:
>>
>>> Afterwards, reboot the system and run:
>>>
>>> # fsck -t ufs -f -p -T ufs:-z
>>>
>>> to clean up your existing filesystems.
>>
>> After rebooting the system I get:
>>
>> master# fsck -t
On 7/2/2019 8:49 PM, FreeBSD Security Advisories wrote:
> Special note: This update also adds the -z flag to fsck_ffs to have it scrub
> the leaked information in the name padding of existing directories. It only
> needs to be run once on each UFS/FFS filesystem after a patched kernel is
>
On Wed, 3 Jul 2019 at 06:05, Doug Hardie wrote:
>
> > Afterwards, reboot the system and run:
> >
> > # fsck -t ufs -f -p -T ufs:-z
> >
> > to clean up your existing filesystems.
>
> After rebooting the system I get:
>
> master# fsck -t ufs -f -p -T ufs:-z
> /dev/ada0p2: NO WRITE ACCESS
>
>
> # freebsd-update fetch
> # freebsd-update install
>
> Afterwards, reboot the system and run:
>
> # fsck -t ufs -f -p -T ufs:-z
>
> to clean up your existing filesystems.
After rebooting the system I get:
master# fsck -t ufs -f -p -T ufs:-z
/dev/ada0p2: NO WRITE ACCESS
/dev/ada0p2:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
=
FreeBSD-SA-19:10.ufsSecurity Advisory
The FreeBSD Project
Topic: