<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src, branch release/14.4.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F14.4.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F14.4.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2026-03-06T00:00:00Z</updated>
<entry>
<title>Update in preparation for 14.4-RELEASE</title>
<updated>2026-03-06T00:00:00Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-03-06T00:00:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a456f852d14544460204036ea55f45a9c7e04972'/>
<id>urn:sha1:a456f852d14544460204036ea55f45a9c7e04972</id>
<content type='text'>
- Bump BRANCH to RELEASE
- Add the anticipated RELEASE announcement date
- Set a static __FreeBSD_version

Approved by:	re (implicit)
Sponsored by:	OpenSats Initiative
</content>
</entry>
<entry>
<title>14.4: Update to RC1</title>
<updated>2026-02-27T00:00:00Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-02-27T00:00:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=041aa28386d3d78cb549c626702306bb179dc98e'/>
<id>urn:sha1:041aa28386d3d78cb549c626702306bb179dc98e</id>
<content type='text'>
Approved by:	re (implicit)
Sponsored by:	OpenSats Initiative
</content>
</entry>
<entry>
<title>Switch from "quarterly" to "release" pkgs on DVD</title>
<updated>2026-02-26T22:41:52Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-02-26T22:41:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=12143e3e3a5c642449e05c4d048d1aa6eb3f0a80'/>
<id>urn:sha1:12143e3e3a5c642449e05c4d048d1aa6eb3f0a80</id>
<content type='text'>
Approved by:	re (implicit)
Sponsored by:	OpenSats Initiative
</content>
</entry>
<entry>
<title>libfetch: Fail hard if interrupted while connecting</title>
<updated>2026-02-26T18:00:38Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2026-02-21T01:18:15Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=ca76ec7c4e563292a0c75781683b0421a4439a02'/>
<id>urn:sha1:ca76ec7c4e563292a0c75781683b0421a4439a02</id>
<content type='text'>
This fixes an issue where the first address that DNS returns is blocked
by a packet filter, so we hang for a while, then the user hits Ctrl-C,
interrupting connect(2), whereupon we move on to the next address, get
a connection, request the file, and return to fetch(1), which sees that
SIGINT was caught and bails.

Note that we make no attempt to enforce fetchTimeout in the connection
phase, and never have.  It's feasible, but non-trivial, so we'll leave
it as an exercise for future us.

PR:		293312
MFC after:	1 week
Reviewed by:	imp
Differential Revision:	https://reviews.freebsd.org/D55406

(cherry picked from commit afbdcd402bb439bd3d487baaad63b68e95929265)
(cherry picked from commit cca6f5eadb796b03379eb21f38c74ca46a64e45b)
</content>
</entry>
<entry>
<title>bsdinstall: fix EFI boot entry creation</title>
<updated>2026-02-26T16:50:15Z</updated>
<author>
<name>Ahmad Khalifa</name>
<email>vexeduxr@FreeBSD.org</email>
</author>
<published>2026-02-24T20:11:32Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3cf73e195af3d4693d1e52de0a91b6d4b3fb8b5c'/>
<id>urn:sha1:3cf73e195af3d4693d1e52de0a91b6d4b3fb8b5c</id>
<content type='text'>
update_uefi_bootentry assumes that the caller sets FREEBSD_BOOTNAME and
mntpt, which isn't the case anymore. The result is that there is no
"FreeBSD" boot entry created/updated after install. Most machines manage
to boot from the removable media path (if the loader is installed there
too), but some don't.

Take the loader's path as an argument and rename the variable used in
the ZFS mirror loop so mntpt can be reused below.

Also mark nentries as a local variable so it doesn't leak out of the
function.

PR:		293385
Fixes:		494de51bc0074472d1b01604f085daea0844f240
MFC after:	2 days
Reviewed by:	imp
Differential Revision:	https://reviews.freebsd.org/D55469

(cherry picked from commit 0fd91c489134643ac9e38c0f55ba7464fe892c5e)
(cherry picked from commit cfdd90abab51581120da75b45018a79237228b33)
</content>
</entry>
<entry>
<title>nullfs: Fix handling of doomed vnodes in nullfs_unlink_lowervp()</title>
<updated>2026-02-26T03:12:43Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2026-02-25T15:31:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=49684d7d93d318391c4a2b33b74f5cc3fba61143'/>
<id>urn:sha1:49684d7d93d318391c4a2b33b74f5cc3fba61143</id>
<content type='text'>
nullfs_unlink_lowervp() is called with the lower vnode locked, so the
nullfs vnode is locked too.  The following can occur:
1. the vunref() call decrements the usecount 2-&gt;1,
2. a different thread calls vrele() on the vnode, decrements the
   usecount 0-&gt;1, then blocks on the vnode lock,
3. the first thread tests vp-&gt;v_usecount == 0 and observes that it is
   true,
4. the first thread incorrectly unlocks the lower vnode.

Fix this by testing VN_IS_DOOMED directly.  Since
nullfs_unlink_lowervp() holds the vnode lock, the value of the
VIRF_DOOMED flag is stable.

Thanks to leres@ for patiently helping to track this down.

PR:		288345
MFC after:	1 week
Reviewed by:	kib
Differential Revision:	https://reviews.freebsd.org/D55446

(cherry picked from commit 8b64d46fab87af3ae062901312187f3a04ad2d67)
(cherry picked from commit 6ed373227680b016b4cfa5af1b802ef23a121513)
</content>
</entry>
<entry>
<title>pkg-stage.sh: Add ext2 and ntfs</title>
<updated>2026-02-26T00:23:37Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-02-22T00:38:01Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=20cff160e140cbc595fd2da12bba628a5413439d'/>
<id>urn:sha1:20cff160e140cbc595fd2da12bba628a5413439d</id>
<content type='text'>
Having these packages available on release media may help users who
need to sneakernet other packages (e.g. firmware) from systems running
Linux or Windows.

Suggested by:	vladlen, ziaee
MFC after:	3 days

(cherry picked from commit 6881fd278d80ac63b4d511fc130a79ff16d1bb48)
(cherry picked from commit a2c2de82c053ba7596f90ebf7d7ea6cb41938587)
</content>
</entry>
<entry>
<title>pkg-stage.sh: Add emacs@nox and vim</title>
<updated>2026-02-26T00:23:31Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-02-22T00:33:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6ecd231b9e68f2d143927b54606a444141dd5094'/>
<id>urn:sha1:6ecd231b9e68f2d143927b54606a444141dd5094</id>
<content type='text'>
We have a bit of space left on the 14.4 DVDs; add packages for two
editors, one of which is useful.

Direct commit to stable/14: These packages were added to 15.0 but
at the same time as removing kde, because shipping distribution sets
*and* a pkgbase repository on 15 significantly cuts into the space
available.  On 14 we can keep kde and still add these packages.

With hat:	re
MFC after:	3 days

(cherry picked from commit d982b7bd4ebfa483a8fa03411fa798add225e6f5)
</content>
</entry>
<entry>
<title>rtsock: Fix stack overflow</title>
<updated>2026-02-24T16:02:21Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2026-02-23T15:52:50Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7465d0b094b7ad8a41ba1df8305c4a8aaa83eb4b'/>
<id>urn:sha1:7465d0b094b7ad8a41ba1df8305c4a8aaa83eb4b</id>
<content type='text'>
Approved by:	so
Approved by:	re (cperciva)
Security:	FreeBSD-SA-26:05.route
Security:	CVE-2026-3038
Fixes:		92be2847e845 ("rtsock: Avoid copying uninitialized padding bytes")

(cherry picked from commit f3be7df50f01d9a6ead9f27b55bb4dfd7dc4f9d2)
(cherry picked from commit 1eb2beb3686c50a870ed7688f753f89dd0f0ab3e)
</content>
</entry>
<entry>
<title>14.3: Update to BETA3</title>
<updated>2026-02-20T00:00:00Z</updated>
<author>
<name>Colin Percival</name>
<email>cperciva@FreeBSD.org</email>
</author>
<published>2026-02-20T00:00:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0c49d9fafc333c96ab6a724cfb14789d7fb85150'/>
<id>urn:sha1:0c49d9fafc333c96ab6a724cfb14789d7fb85150</id>
<content type='text'>
Approved by:	re (implicit)
Sponsored by:	OpenSats Initiative
</content>
</entry>
</feed>
