1Release notes for FreeBSD 13.0. 2 3This file describes new user-visible features, changes and updates relevant to 4users of binary FreeBSD releases. Each entry should describe the change in no 5more than several sentences and should reference manual pages where an 6interested user can find more information. Entries should wrap after 80 7columns. Each entry should begin with one or more commit IDs on one line, 8specified as a comma separated list and/or range, followed by a colon and a 9newline. Entries should be separated by a newline. 10 11Changes to this file should not be MFCed. 12 13074a91f746bd: 14 The aesni(4) and armv8crypto(4) devices are now included in 15 GENERIC on amd64, i386, and arm64. 16 172e1c94aa1fd5: 18 Add support for enforcing W^X mapping policy for user 19 processes. The policy is not enforced by default but can be 20 enabled by setting the kern.elf32.allow_wx and 21 kern.elf64_allow_wx sysctls to 1. Individual binaries can be 22 exempted from the policy by elfctl(1) via the wxneeded 23 feature. 24 254979620ece98: 26 Add AES-XTS support to armv8crypto(4) providing accelerated 27 software support for the default GELI cipher on arm64 systems. 28 29r368667: 30 GDB 6.1.1 was removed. Users of crashinfo(8) should install the 31 gdb package or devel/gdb port. 32 33r368559: 34 The hme(4) driver was removed. 35 36r367660: 37 Fixes the case where gssd will not startup because /usr is a separate 38 local file system that is not yet mounted. It does not fix the case 39 where /usr is a separately mounted remote file system (such as NFS). 40 This latter case can be fixed by adding mountcritremote to the 41 REQUIRED line. Unfortunately doing so implies that all Kerberized 42 NFS mounts in /etc/fstab will need the "late" mount option. 43 This was not done, since the requirement for "late" would introduce 44 a POLA violation. 45 46r367423: 47 This commit added a new startup scripts variable called 48 nfsv4_server_only which uses the -R option on mountd added by r367026. 49 When nfsv4_server_only is set to "YES" in /etc/rc.conf, the NFS server 50 only handles NFSv4 and does not register with rpcbind. As such, rpcbind 51 does not need to be running. Useful for sites which consider rpcbind a 52 security issue. 53 54r366267: 55 Kernel option ACPI_DMAR was renamed to IOMMU. amd64's IOMMU subsystem 56 was split out from amd64 DMAR support and is now generic, i.e., it can 57 be used by all architectures. 58 59r364896: 60 A series of commits ending with r364896 added NFS over TLS 61 to the kernel. This is believed to be compatible with 62 the Internet Draft titled "Towards Remote Procedure Call Encryption 63 By Default" (expected to soon become an RFC). 64 The mount_nfs(8) and exports(5) man pages describe the mount and 65 export option(s) related to NFS over TLS. 66 For NFS over TLS to work, the rpctlscd(8) { client } or rpctlssd(8) 67 { server } must be running on a kernel built with "options KERN_TLS" 68 on an architecture where PMAP_HAS_DMAP != 0. 69 70r364725: 71 Changes to one obscure devd event generated on resume need to 72 be documented. The old form will still be generated in 13, but not 73 in 14. 74 75r363679: 76 Applications using regex(3), e.g. sed/grep, will no longer accept 77 redundant escapes for most ordinary characters. 78 79r363253: 80 SCTP support has been removed from GENERIC kernel configurations. 81 The SCTP stack is now built as sctp.ko and can be dynamically loaded. 82 83r363233: 84 Merge sendmail 8.16.1: See contrib/sendmail/RELEASE_NOTES for details. 85 86r363180: 87 The safexcel(4) crypto offload driver has been added. 88 89r363084: 90 nc(1) now implements SCTP mode, enabled by specifying the --sctp option. 91 92r362681: 93 A new implementation of bc and dc has been imported. It offers 94 better standards compliance, performance, localization and comes 95 with extensive test cases that are optionally installed. 96 Use WITHOUT_GH_BC=yes to build and install the world with the 97 previous version instead of the new one, if required. 98 99r362158, r362163: 100 struct export_args has changed so that the "user" specified for 101 the -maproot and -mapall exports(5) options may be in more than 102 16 groups. 103 104r361884: 105 sed(1) has learned about hex escapes (e.g. \x27) and will now do the 106 right thing with them, removing the need for printf magic or obnoxious 107 escaping in many scenarios. 108 109r361238, r361798, r361799: 110 ZFS will now unconditionally reject read(2) of a directory with EISDIR. 111 Additionally, read(2) of a directory is now rejected with EISDIR by 112 default and may be re-enabled for non-ZFS filesystems that allow it with 113 the sysctl(8) MIB 'security.bsd.allow_read_dir'. 114 115 Aliases for grep to default to '-d skip' may be desired if commonly 116 non-recursively grepping a list that includes directories and the 117 possibility of EISDIR errors in stderr is not tolerable. Example 118 aliases, commented out, have been installed in /root/.cshrc and 119 /root/.shrc. 120 121r361066: 122 Add exec.prepare and exec.release hooks for jail(8) and jail.conf(5). 123 exec.prepare runs before mounts, so can be used to populate new jails. 124 exec.release runs after unmounts, so can be used to remove ephemeral 125 jails. 126 127r360920,r360923,r360924,r360927,r360928,r360931,r360933,r360936: 128 Remove support for ARC4, Blowfish, Cast, DES, Triple DES, MD5, 129 MD5-KPDK, MD5-HMAC, SHA1-KPDK, and Skipjack algorithms from 130 the kernel open cryptographic framework (OCF). 131 132r360562: 133 Remove support for ARC4, Blowfish, Cast, DES, Triple DES, 134 MD5-HMAC, and Skipjack algorithms from /dev/crypto. 135 136r360557: 137 Remove support for DES, Triple DES, Blowfish, Cast, and 138 Camellia ciphers from IPsec(4). Remove support for MD5-HMAC, 139 Keyed MD5, Keyed SHA1, and RIPEMD160-HMAC from IPsec(4). 140 141r359945: 142 Remove support for Triple DES, Blowfish, and MD5 HMAC from 143 geli(4). 144 145r359786-r359787: 146 Remove support for DES, Triple DES, and RC4 from in-kernel GSS 147 authentication. 148 149r357627: 150 remove elf2aout. 151 152r357560-r357565: 153 init(8), service(8), and cron(8) will now adopt user/class environment 154 variables (excluding PATH, by default, which will be overwritten) by 155 default. Notably, environment variables for all cron jobs and rc 156 services can now be set via login.conf(5). 157 158r357455: 159 sparc64 has been removed from FreeBSD. 160 161r355677: 162 Adds support for NFSv4.2 (RFC-7862) and Extended Attributes 163 (RFC-8276) to the NFS client and server. 164 NFSv4.2 is comprised of several optional features that can be supported 165 in addition to NFSv4.1. This patch adds the following optional features: 166 - posix_fadvise(POSIX_FADV_WILLNEED/POSIX_FADV_DONTNEED) 167 - posix_fallocate() 168 - intra server file range copying via the copy_file_range(2) syscall 169 --> Avoiding data tranfer over the wire to/from the NFS client. 170 - lseek(SEEK_DATA/SEEK_HOLE) 171 - Extended attribute syscalls for "user" namespace attributes as defined 172 by RFC-8276. 173 174 For the client, NFSv4.2 is only used if the mount command line option 175 minorversion=2 is specified. 176 For the server, two new sysctls called vfs.nfsd.server_min_minorversion4 177 and vfs.nfsd.server_max_minorversion4 have been added that allow 178 sysadmins to limit the minor versions of NFSv4 supported by the nfsd 179 server. 180 Setting vfs.nfsd.server_max_minorversion4 to 0 or 1 will disable NFSv4.2 181 on the server. 182 183r356263: 184 armv5 support has been removed from FreeBSD. 185 186r354517: 187 iwm(4) now supports most Intel 9260, 9460 and 9560 Wi-Fi devices. 188 189r354269: 190 sqlite3 is updated to sqlite3-3.30.1. 191 192r352668: 193 cron(8) now supports the -n (suppress mail on succesful run) and -q 194 (suppress logging of command execution) options in the crontab format. 195 See the crontab(5) manpage for details. 196 197r352304: 198 ntpd is no longer by default locked in memory. rlimit memlock 32 199 or rlimit memlock 0 can be used to restore this behaviour. 200 201r351863: 202 rc.subr(8) now honors ${name}_env in all rc(8) scripts. Previously, 203 environment variables set by a user via ${name}_env were ignored 204 if the service defined a custom *_cmd variable to control the behavior 205 of the run_rc_command function, e.g., start_cmd, instead of relying on 206 the variables like command and command_args, 207 208r351770,r352920,r352922,r352923: 209 dd(1) now supports conv=fsync, conv=fdatasync, oflag=fsync, oflag=sync, 210 and iflag=fullblock flags, compatible with illumos and GNU. 211 212r351522: 213 Add kernel-side support for in-kernel Transport Layer Security 214 (KTLS). KTLS permits using sendfile(2) over sockets using 215 TLS. 216 217r351397: 218 WPA is updated from 2.8 to 2.9. 219 220r351361: 221 Add probes for lockmgr(9) to the lockstat DTrace provider, add 222 corresponding lockstat(1) events, and document the new probes in 223 dtrace_lockstat.4. 224 225r351356: 226 Intel RST is a new 'feature' that remaps NVMe devices from 227 their normal location to part of the AHCI bar space. This 228 will eliminate the need to set the BIOS SATA setting from RST 229 to AHCI causing the nvme drive to be erased before FreeBSD 230 will see the nvme drive. FreeBSD will now be able to see the 231 nvme drive now in the default config. 232 233r351201, r351372: 234 Add a vop_stdioctl() call, so that file systems that do not support 235 holes will have a trivial implementation of lseek(SEEK_DATA/SEEK_HOLE). 236 The algorithm appears to be compatible with the POSIX draft and 237 the implementation in Linux for the case of a file system that 238 does not support holes. Prior to this patch, lseek(2) would reply 239 -1 with errno set to ENOTTY for SEEK_DATA/SEEK_HOLE on files in 240 file systems that do not support holes. 241 r351372 maps ENOTTY to EINVAL for lseek(SEEK_DATA/SEEK_HOLE) for 242 any other cases, such as a ENOTTY return from vn_bmap_seekhole(). 243 244r350665: 245 The fuse driver has been renamed to fusefs(5) and been substantially 246 rewritten. The new driver includes many bug fixes and performance 247 enhancements, as well as the following user-visible features: 248 * Optional kernel-side permissions checks (-o default_permissions) 249 * mknod(2), socket(2), and pipe(2) support 250 * server side locking with fcntl(2) 251 * FUSE operations are now interruptible when mounted with -o intr 252 * server side handling of UTIME_NOW during utimensat(2) 253 * mount options may be updated with "mount -u" 254 * fusefs file system may now be exported over NFS 255 * RLIMIT_FSIZE support 256 * support for fuse file systems using protocols as old as 7.4 257 258 FUSE file system developers should also take note of the following new 259 features: 260 * The protocol level has been raised from 7.8 to 7.23 261 * kqueue support on /dev/fuse 262 * server-initiated cache invalidation via FUSE_NOTIFY_REPLY 263 264r350471: 265 gnop(8) can now configure a delay to be applied to read and write 266 request delays. See the -d, -q and -x parameters. 267 268r350315, r350316: 269 Adds a Linux compatible copy_file_range(2) syscall. 270 271r350307: 272 libcap_random(3) has been removed. Applications can use native 273 APIs to get random data in capability mode. 274 275r349529,r349530: 276 Add support for using unmapped mbufs with sendfile(2). 277 278r349352: 279 nand(4) and related components have been removed. 280 281r349349: 282 The UEFI loader now supports HTTP boot. 283 284r349335: 285 bhyve(8) now implements a High Definition Audio (HDA) driver, allowing 286 guests to play to and record audio data from the host. 287 288r349286: 289 swapon(8) can now erase a swap device immediately before enabling it, 290 similar to newfs(8)'s -E option. This behaviour can be specified by 291 adding -E to swapon(8)'s command-line parameters, or by adding the 292 "trimonce" option to a swap device's /etc/fstab entry. 293 294r347908-r347923: 295 The following network drivers have been removed: bm(4), cs(4), de(4), 296 ed(4), ep(4), ex(4), fe(4), pcn(4), sf(4), sn(4), tl(4), tx(4), txp(4), 297 vx(4), wb(4), xe(4). 298 299r347532: 300 Wired page accounting has been split into kernel wirings and user 301 wirings (e.g., by mlock(2)). Kernel wirings no long count towards 302 the global limit, which is renamed to vm.max_user_wired. bhyve -S 303 allocates user-wired memory and is now subject to that limit. 304 305$FreeBSD$ 306