<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE article PUBLIC "-//FreeBSD//DTD DocBook XML V5.0-Based Extension//EN"
"../../../../../share/xml/freebsd50.dtd" [
<!ENTITY % release PUBLIC "-//FreeBSD//ENTITIES Release Specification//EN" "../share/xml/release.ent">
%release;
<!ENTITY % sponsor PUBLIC "-//FreeBSD//ENTITIES Sponsor Specification//EN" "../share/xml/sponsor.ent">
%sponsor;
<!ENTITY % vendor PUBLIC "-//FreeBSD//ENTITIES Vendor Specification//EN" "../share/xml/vendor.ent">
%vendor;
<!ENTITY security SYSTEM "../share/xml/security.xml">
<!ENTITY errata SYSTEM "../share/xml/errata.xml">
]>
<article xmlns="http://docbook.org/ns/docbook"
xmlns:xlink="http://www.w3.org/1999/xlink" version="5.0">
<info>
<title>&os; &release.current; Release Notes</title>
<author>
<orgname>The &os; Project</orgname>
</author>
<pubdate>$FreeBSD$</pubdate>
<copyright>
<year>2020</year>
<holder role="mailto:doc@FreeBSD.org">The &os; Documentation
Project</holder>
</copyright>
<legalnotice xml:id="trademarks" role="trademarks">
&tm-attrib.freebsd;
&tm-attrib.ibm;
&tm-attrib.ieee;
&tm-attrib.intel;
&tm-attrib.sparc;
&tm-attrib.general;
</legalnotice>
<abstract>
<para>The release notes for &os; &release.current; contain
a summary of the changes made to the &os; base system on the
&release.branch; development line. This document lists
applicable security advisories that were issued since the last
release, as well as significant changes to the &os; kernel and
userland. Some brief remarks on upgrading are also
presented.</para>
</abstract>
</info>
<sect1 xml:id="intro">
<title>Introduction</title>
<para>This document contains the release notes for &os;
&release.current;. It describes recently added, changed, or
deleted features of &os;. It also provides some notes on
upgrading from previous versions of &os;.</para>
<para releasetype="current">The &release.type; distribution to
which these release notes apply represents the latest point
along the &release.branch; development branch since
&release.branch; was created. Information regarding pre-built,
binary &release.type; distributions along this branch can be
found at <uri
xlink:href="&release.url;">&release.url;</uri>.</para>
<para releasetype="snapshot">The &release.type; distribution to
which these release notes apply represents a point along the
&release.branch; development branch between &release.prev; and
the future &release.next;. Information regarding pre-built,
binary &release.type; distributions along this branch can be
found at <uri
xlink:href="&release.url;">&release.url;</uri>.</para>
<para releasetype="release">This distribution of &os;
&release.current; is a &release.type; distribution. It can be
found at <uri xlink:href="&release.url;">&release.url;</uri> or
any of its mirrors. More information on obtaining this (or
other) &release.type; distributions of &os; can be found in the
<link
xlink:href="&url.books.handbook;/mirrors.html"><quote>Obtaining
&os;</quote> appendix</link> to the <link
xlink:href="&url.books.handbook;/">&os;
Handbook</link>.</para>
<para>All users are encouraged to consult the release errata
before installing &os;. The errata document is updated with
<quote>late-breaking</quote> information discovered late in the
release cycle or after the release. Typically, it contains
information on known bugs, security advisories, and corrections
to documentation. An up-to-date copy of the errata for &os;
&release.current; can be found on the &os; Web site.</para>
<para>This document describes the most user-visible new or changed
features in &os; since &release.prev;. In general, changes
described here are unique to the &release.branch; branch unless
specifically marked as &merged; features.</para>
<para>Typical release note items document recent security
advisories issued after &release.prev;, new drivers or hardware
support, new commands or options, major bug fixes, or
contributed software upgrades. They may also list changes to
major ports/packages or release engineering practices. Clearly
the release notes cannot list every single change made to &os;
between releases; this document focuses primarily on security
advisories, user-visible changes, and major architectural
improvements.</para>
</sect1>
<sect1 xml:id="upgrade">
<title>Upgrading from Previous Releases of &os;</title>
<para arch="amd64,i386">Binary upgrades between RELEASE versions
(and snapshots of the various security branches) are supported
using the &man.freebsd-update.8; utility. The binary upgrade
procedure will update unmodified userland utilities, as well as
unmodified GENERIC kernels distributed as a part of an official
&os; release. The &man.freebsd-update.8; utility requires that
the host being upgraded have Internet connectivity.</para>
<para>Source-based upgrades (those based on recompiling the &os;
base system from source code) from previous versions are
supported, according to the instructions in
<filename>/usr/src/UPDATING</filename>.</para>
<important>
<para>Upgrading &os; should only be attempted after backing up
<emphasis>all</emphasis> data and configuration files.</para>
</important>
</sect1>
<sect1 xml:id="security-errata">
<title>Security and Errata</title>
<para>This section lists the various Security Advisories and
Errata Notices since &release.prev;.</para>
<sect2 xml:id="security">
<title>Security Advisories</title>
<informaltable frame="none" pgwide="1">
<tgroup cols="3">
<colspec colwidth="40%"/>
<colspec colwidth="30%"/>
<colspec colwidth="30%"/>
<thead>
<row>
<entry>Advisory</entry>
<entry>Date</entry>
<entry>Topic</entry>
</row>
</thead>
<tbody>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-19:25.mcepsc.asc">FreeBSD-SA-19:25.mcepce</link></entry>
<entry>12 November 2019</entry>
<entry><para>Machine Check Exception on Page Size
Change</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-19:26.mcu.asc">FreeBSD-SA-19:26.mcu</link></entry>
<entry>12 November 2019</entry>
<entry><para>Intel CPU Microcode Update</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:01.libfetch.asc">FreeBSD-SA-20:01.libfetch</link></entry>
<entry>28 January 2020</entry>
<entry><para>&man.fetch.3; buffer overflow</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:03.thrmisc.asc">FreeBSD-SA-20:03.thrmisc</link></entry>
<entry>28 January 2020</entry>
<entry><para>Kernel stack data disclosure</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:04.tcp.asc">FreeBSD-SA-20:04.tcp</link></entry>
<entry>18 March 2020</entry>
<entry><para>TCP IPv6 SYN cache kernel information
disclosure</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:05.if_oce_ioctl.asc">FreeBSD-SA-20:05.if_oce_ioctl</link></entry>
<entry>18 March 2020</entry>
<entry><para>Insufficient &man.ioctl.2; privilege
checking</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:06.if_ixl_ioctl.asc">FreeBSD-SA-20:06.if_ixl_ioctl</link></entry>
<entry>18 March 2020</entry>
<entry><para>Insufficient &man.ioctl.2; privilege
checking</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:07.epair.asc">FreeBSD-SA-20:07.epair</link></entry>
<entry>18 March 2020</entry>
<entry><para>Incorrect user-controlled pointer
use</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:08.jail.asc">FreeBSD-SA-20:08.jail</link></entry>
<entry>18 March 2020</entry>
<entry><para>Kernel memory disclosure with nested
jails</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:09.ntp.asc">FreeBSD-SA-20:09.ntp</link></entry>
<entry>18 March 2020</entry>
<entry><para>Multiple denial of service</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:10.ipfw.asc">FreeBSD-SA-20:10.ipfw</link></entry>
<entry>21 April 2020</entry>
<entry><para>Invalid &man.mbuf.9; handling</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:11.openssl.asc">FreeBSD-SA-20:11.openssl</link></entry>
<entry>21 April 2020</entry>
<entry><para>Remote denial of service</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:12.libalias.asc">FreeBSD-SA-20:12.libalias</link></entry>
<entry>12 May 2020</entry>
<entry><para>Insufficient packet length
validation</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:13.libalias.asc">FreeBSD-SA-20:13.libalias</link></entry>
<entry>12 May 2020</entry>
<entry><para>Memory disclosure vulnerability</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:15.cryptodev.asc">FreeBSD-SA-20:15.cryptodev</link></entry>
<entry>12 May 2020</entry>
<entry><para>Use-after-free condition</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:16.cryptodev.asc">FreeBSD-SA-20:16.cryptodev</link></entry>
<entry>12 May 2020</entry>
<entry><para>Insufficient MAC key length check</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:17.usb.asc">FreeBSD-SA-20:17.usb</link></entry>
<entry>9 June 2020</entry>
<entry><para><acronym>HID</acronym> descriptor parsing
error</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:19.unbound.asc">FreeBSD-SA-20:19.unbound</link></entry>
<entry>8 July 2020</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:20.ipv6.asc">FreeBSD-SA-20:20.ipv6</link></entry>
<entry>8 July 2020</entry>
<entry><para>Race condition and use-after-free</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:21.usb_net.asc">FreeBSD-SA-20:21.usb_net</link></entry>
<entry>5 August 2020</entry>
<entry><para>Memory corruption</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:22.sqlite.asc">FreeBSD-SA-20:22.sqlite</link></entry>
<entry>5 August 2020</entry>
<entry><para>Multiple vulnerabilities</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:23.sendmsg.asc">FreeBSD-SA-20:23.sendmsg</link></entry>
<entry>5 August 2020</entry>
<entry><para>Privilege escalation</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:25.sctp.asc">FreeBSD-SA-20:25.sctp</link></entry>
<entry>2 September 2020</entry>
<entry><para>Use-after-free bug</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:26.dhclient.asc">FreeBSD-SA-20:26.dhclient</link></entry>
<entry>2 September 2020</entry>
<entry><para>Heap overflow</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:27.ure.asc">FreeBSD-SA-20:27.ure</link></entry>
<entry>15 September 2020</entry>
<entry><para>Packet-in-packet attack</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:28.bhyve_vmcs.asc">FreeBSD-SA-20:28.bhyve_vmcs</link></entry>
<entry>15 September 2020</entry>
<entry><para>Privilege escalation via VMCS</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:29.bhyve_svm.asc">FreeBSD-SA-20:29.bhyve_svm</link></entry>
<entry>15 September 2020</entry>
<entry><para>SVM guest escape</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-SA-20:30.ftpd.asc">FreeBSD-SA-20:30.ftpd</link></entry>
<entry>15 September 2020</entry>
<entry><para>Privilege escalation</para></entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect2>
<sect2 xml:id="errata">
<title>Errata Notices</title>
<informaltable frame="none" pgwide="1">
<tgroup cols="3">
<colspec colwidth="40%"/>
<colspec colwidth="30%"/>
<colspec colwidth="30%"/>
<thead>
<row>
<entry>Errata</entry>
<entry>Date</entry>
<entry>Topic</entry>
</row>
</thead>
<tbody>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-19:19.loader.asc">FreeBSD-EN-19:19.loader</link></entry>
<entry>12 November 2019</entry>
<entry><para>UEFI Loader Memory Fragmentation</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:01.ssp.asc">FreeBSD-EN-20:01.ssp</link></entry>
<entry>28 January 2020</entry>
<entry><para>Imprecise orderring of canary
initialization</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:03.sshd.asc">FreeBSD-EN-20:03.sshd</link></entry>
<entry>18 March 2020</entry>
<entry><para>Misleading log messages upon successful
login</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:05.mlx5en.asc">FreeBSD-EN-20:05.mlx5en</link></entry>
<entry>18 March 2020</entry>
<entry><para>Fix packet forwarding performance</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:06.ipv6.asc">FreeBSD-EN-20:06.ipv6</link></entry>
<entry>18 March 2020</entry>
<entry><para>Incorrect checksum calculations</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:07.quotad.asc">FreeBSD-EN-20:07.quotad</link></entry>
<entry>21 April 2020</entry>
<entry><para>Regression with certain <acronym>NFS</acronym>
servers</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:08.tzdata.asc">FreeBSD-EN-20:08.tzdata</link></entry>
<entry>12 May 2020</entry>
<entry><para>Timezone database update</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:09.igb.asc">FreeBSD-EN-20:09.igb</link></entry>
<entry>12 May 2020</entry>
<entry><para>Fix failure to switch to inactive
state</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:10.build.asc">FreeBSD-EN-20:10.build</link></entry>
<entry>12 May 2020</entry>
<entry><para>Incorrect build host clang version
detection</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:11.ena.asc">FreeBSD-EN-20:11.ena</link></entry>
<entry>9 June 2020</entry>
<entry><para>Stability issues in &man.ena.4;</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:12.iflib.asc">FreeBSD-EN-20:12.iflib</link></entry>
<entry>9 June 2020</entry>
<entry><para>Watchdog timeout resetting idle
queues</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:13.bhyve.asc">FreeBSD-EN-20:13.bhyve</link></entry>
<entry>8 July 2020</entry>
<entry><para>Crash with PCI device passthrough</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:14.linuxkpi.asc">FreeBSD-EN-20:14.linuxkpi</link></entry>
<entry>8 July 2020</entry>
<entry><para>Kernel panic</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:15.mps.asc">FreeBSD-EN-20:15.mps</link></entry>
<entry>8 July 2020</entry>
<entry><para>Kernel panic</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:16.vmx.asc">FreeBSD-EN-20:16.vmx</link></entry>
<entry>5 August 2020</entry>
<entry><para>Packet loss and degraded
performance</para></entry>
</row>
<row>
<entry><link
xlink:href="&security.url;/FreeBSD-EN-20:17.linuxthread.asc">FreeBSD-EN-20:17.linuxthread</link></entry>
<entry>2 September 2020</entry>
<entry><para>Kernel panic</para></entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect2>
</sect1>
<sect1 xml:id="userland">
<title>Userland</title>
<para>This section covers changes and additions to userland
applications, contributed software, and system utilities.</para>
<sect2 xml:id="userland-config">
<title>Userland Configuration Changes</title>
<para revision="364883" contrib="sponsor" sponsor="&ff;">A new
&man.rc.conf.5; variable has been added,
<literal>linux_mounts_enable</literal>, which controls if
&linux;-specific filesystems are mounted in
<filename class="directory">/compat/linux</filename> if
<literal>linux_enable</literal> is set to
<literal>YES</literal>.</para>
<para revision="365540">The &man.devd.8; utility has been
updated to change the default &man.syslogd.8; notification for
resume from <literal>kern</literal> to
<literal>kernel</literal>.</para>
</sect2>
<sect2 xml:id="userland-programs">
<title>Userland Application Changes</title>
<para revision="353134">The &man.cron.8; utility has been
updated to support two new flags in &man.crontab.5;,
<literal>-n</literal> and <literal>-q</literal>, which
suppress mail on successful runs and suppress logging of
command execution, respectively.</para>
<para revision="355520">The &man.dd.1; utility has been updated
to include new operands:</para>
<para revision="357568">The &man.fsck.msdosfs.8; utility has
been updated to include a variety of enhancements, including
reducing the memory footprint, a new flag,
<literal>-M</literal>, which disables the use of &man.mmap.2;,
and others.</para>
<para revision="357078">The &man.showmount.8; utility has been
updated to implement support for long options.</para>
<para revision="357082">The &man.certctl.8; utility has been
added.</para>
<para revision="359739">The &man.syslogd.8; utility has been
updated to add property-based filters.</para>
<para revision="362602">The &man.mountd.8; utility has been
updated to fix incorrect group listing under certain
conditions when <literal>-maproot</literal> or
<literal>-mapall</literal> is used for exports.</para>
<para revision="362687">The &man.sed.1; utility has been updated
to read commands from &man.stdin.4; when <quote><literal>-f
-</literal></quote> is specified.</para>
<itemizedlist>
<listitem>
<para><literal>conv=fsync</literal></para>
</listitem>
<listitem>
<para><literal>conf=fdatasync</literal></para>
</listitem>
<listitem>
<para><literal>oflag=fsync</literal></para>
</listitem>
<listitem>
<para><literal>oflag=sync</literal></para>
</listitem>
<listitem>
<para><literal>iflag=fullblock</literal></para>
</listitem>
</itemizedlist>
<para>See &man.dd.1; for usage details.</para>
<para revision="363441">The &man.hostapd.8; and
&man.wpa.supplicant.8; utilities have been updated to support
802.11n, 802.11w, 802.11ac, and 802.11ax.</para>
<para revision="364115">The &man.sesutil.8; utility has been
updated to include a <literal>show</literal> subcommand
to print output in a user-friendly way.</para>
<para revision="364334">The &man.bhyve.8; utility has been
updated to support setting additional
<acronym>AHCI</acronym> controller parameters.</para>
<para>The &man.jail.8; utility has been updated to allow
running &linux; in a jailed environment.</para>
</sect2>
<sect2 xml:id="userland-contrib">
<title>Contributed Software</title>
<para revision="354191" contrib="sponsor"
sponsor="&darpa_afrl;">The &man.tcsh.1; utility has been
updated to version 6.21.00.</para>
<para revision="355503">The &man.less.1; utility has been
updated to version v551.</para>
<para revision="355603">The &man.libbsdxml.3; library has
been updated to version 2.2.9.</para>
<para revision="355745">The &man.resolvconf.8; utility has
been updated to version 3.9.2.</para>
<para revision="356340">The &man.pcap.3; library has been
updated to version 1.9.1.</para>
<para revision="356340">The &man.tcpdump.1; utility has been
updated to version 4.9.3.</para>
<para revision="356532">The &man.mtree.8; utility has been
updated to address an issue with <literal>-f</literal> not
considering type changes, fix username logic with
<literal>-c</literal> when &man.getlogin.2; fails, and to fix
<literal>-O</literal> not descending when a hash collision
occurs.</para>
<para revision="358779" contrib="sponsor" sponsor="&ff;">The
Elf Tool Chain has been updated to upstream revision
r3769.</para>
<para revision="359635">The &man.xz.1; utility has been updated
to version 5.2.5.</para>
<para revision="360278"><application>OpenSSL</application> has
been updated to version 1.1.1g.</para>
<para revision="360313" contrib="sponsor"
sponsor="&ff;"><application>OpenSSH</application> has been
updated to version 7.9p1.</para>
<para revision="360361">The timezone database files have been
updated to version 2020a.</para>
<para revision="361435">The &man.unbound.8; utility has been
updated to version 1.10.1.</para>
<para revision="362132">The &man.libarchive.3; library has been
updated to version 3.4.3.</para>
<para revision="362180">The private
<application>apr</application> library has been updated to
version 1.7.0.</para>
<para revision="362180">The
<application>svn{,lite}</application> utility has been updated
to version 1.14.0 LTS.</para>
<para revision="362716">The &man.ntpd.8; suite of utilities have
been updated to version 4.2.8p15.</para>
<para revision="362842">The &man.file.1; utility has been
updated to version 5.39.</para>
<para revision="362987">The &man.bc.1; utility has been updated
to version 3.1.1.</para>
<para revision="363179">The private
<application>sqlite3</application> utility has been updated to
version 3.32.3.</para>
<para revision="363352">The <acronym>BSD</acronym> &man.make.1;
utility has been updated to version 20200719.</para>
<para revision="363465">The <application>Sendmail</application>
utility has been updated to version 8.16.1.</para>
<para revision="363474">The &man.nc.1; utility has been updated
to include a new <literal>--sctp</literal> flag.</para>
<para revision="363494">The <application>clang</application>,
<application>llvm</application>,
<application>lld</application>,
<application>lldb</application>,
<application>compiler-rt</application> utilities and
<application>libc++</application> have been updated to version
10.0.1.</para>
</sect2>
<sect2 xml:id="userland-deprecated-programs">
<title>Deprecated Applications</title>
<para revision="355075">The &man.amd.8; utility has been marked
as deprecated, and targeted for removal in
&os; 13.0.</para>
</sect2>
<sect2 xml:id="userland-libraries">
<title>Runtime Libraries and API</title>
<para revision="363037">The <literal>ifconfig</literal> library
has been updated to report the status of a &man.bridge.4;
interface, similarly to &man.lagg.4;.</para>
</sect2>
</sect1>
<sect1 xml:id="kernel">
<title>Kernel</title>
<para>This section covers changes to kernel configurations, system
tuning, and system control parameters that are not otherwise
categorized.</para>
<sect2 xml:id="kernel-general">
<title>General Kernel Changes</title>
<para revision="363017">The &man.read.2; system call has been
changed to disable <function>read()</function> calls on
directories by default. A new &man.sysctl.8; has been added,
<literal>security.bsd.allow_read_dir</literal>, which when set
to <literal>1</literal> will restore the previous
behavior.</para>
<para revision="363712">The &man.ixl.4; driver has now been
enabled by default for &os;/&arch.powerpc64;.</para>
<para revision="364002">The
<literal>machdep.kdb_on_nmi</literal> &man.sysctl.8; has been
removed. The <literal>machdep.panic_on_nmi</literal>
&man.sysctl.8; tunable has changed to directly enter the
debugger.</para>
<para revision="364003" contrib="sponsor" sponsor="&ix;">Support
for <acronym>APEI</acronym> (<acronym>ACPI</acronym> Platform
Error Interfaces) has been added.</para>
</sect2>
</sect1>
<sect1 xml:id="drivers">
<title>Devices and Drivers</title>
<para>This section covers changes and additions to devices and
device drivers since &release.prev;.</para>
<sect2 xml:id="drivers-device">
<title>Device Drivers</title>
<para revision="361044">The &man.ubsec.4; driver has been marked
as deprecated, and will be removed in &os; 13.0.</para>
<para revision="364431">The &man.ufm.4; driver has been marked
as deprecated, and will be removed in &os; 13.0.</para>
<para revision="365542">The &man.apm.4; driver has been marked
as deprecated, and will be removed in &os; 13.0.</para>
<para revision="365542" contrib="sponsor" sponsor="&ff;">The
&man.ctau.4; and &man.cx.4; drivers have been marked as
deprecated, and will be removed in &os; 13.0.</para>
</sect2>
</sect1>
<sect1 xml:id="storage">
<title>Storage</title>
<para>This section covers changes and additions to file systems
and other storage subsystems, both local and networked.</para>
<sect2 xml:id="storage-general">
<title>General Storage</title>
<para revision="352741">The &man.mps.4; driver has been removed
from the 32-bit <filename>GENERIC</filename> kernel
configuration.</para>
<para revision="365702" contrib="sponsor"
sponsor="&klara;">The &man.virtio.blk.4; driver has been
updated to support <acronym>TRIM</acronym>.</para>
</sect2>
</sect1>
<sect1 xml:id="boot">
<title>Boot Loader Changes</title>
<para>This section covers the boot loader, boot menu, and other
boot-related changes.</para>
<sect2 xml:id="boot-loader">
<title>Boot Loader Changes</title>
<para> </para>
</sect2>
</sect1>
<sect1 xml:id="network">
<title>Networking</title>
<para>This section describes changes that affect networking in
&os;.</para>
<sect2 xml:id="network-general">
<title>General Network</title>
<para revision="354060">The &man.tap.4; and &man.tun.4; devices
have been updated to create <filename
class="directory">/dev</filename> aliases when they are
renamed.</para>
<para revision="358970" contrib="sponsor"
sponsor="&chelsio;">The &man.cxgbe.4; driver has been updated
to version 1.24.12.0.</para>
<para revision="359694">The &man.ipfw.4; driver has been updated
to support RFC6598/Carrier Grade NAT subnets.</para>
<para revision="359697">The &man.ng.nat.4; driver has been
updated to allow attaching to an ethernet interface.</para>
<para revision="363876" contrib="sponsor"
sponsor="&intelcorp;">The &man.ixl.4; driver has been updated
to version 1.11.29.</para>
<para revision="365381" contrib="sponsor"
sponsor="&amazon;">The &man.ena.4; driver has been updated to
version 2.2.0.</para>
<para revision="365670" contrib="sponsor"
sponsor="&netgate;">Updates to the wireless networking stack
and various drivers have been introduced to provide better
802.11n and 802.11ac support.</para>
</sect2>
</sect1>
<sect1 xml:id="ports">
<title>Ports Collection and Package Infrastructure</title>
<para>This section covers changes to the &os; Ports
Collection, package infrastructure, and package maintenance and
installation tools.</para>
<sect2 xml:id="ports-packages ">
<title>Packaging Changes</title>
<para> </para>
</sect2>
</sect1>
<sect1 xml:id="future-releases">
<title>General Notes Regarding Future &os; Releases</title>
<sect2 xml:id="future-releases-cputype">
<title>Default <varname>CPUTYPE</varname> Change</title>
<para>Starting with &os;-13.0, the default
<varname>CPUTYPE</varname> for the &arch.i386;
architecture will change from <literal>486</literal> to
<literal>686</literal>.</para>
<para>This means that, by default, binaries produced will
require a 686-class <acronym>CPU</acronym>, including but
not limited to binaries provided by the &os; Release
Engineering team. &os; 13.0 will continue to support
older <acronym>CPU</acronym>s, however users needing this
functionality will need to build their own releases for
official support.</para>
<para>As the primary use for i486 and i586
<acronym>CPU</acronym>s is generally in the embedded market,
the general end-user impact is expected to be minimal, as new
hardware with these <acronym>CPU</acronym> types has long
faded, and much of the deployed base of such systems is
nearing retirement age, statistically.</para>
<para>There were several factors taken into account for this
change. For example, i486 does not have 64-bit atomics, and
while they can be emulated in the kernel, they cannot be
emulated in the userland. Additionally, the 32-bit amd64
libraries have been i686 since their inception.</para>
<para>As the majority of 32-bit testing is done by developers
using the lib32 libraries on 64-bit hardware with the
<varname>COMPAT_FREEBSD32</varname> option in the kernel,
this change ensures better coverage and user experience.
This also aligns with what the majority of &linux;
distributions have been doing for quite some time.</para>
<para>This is expected to be the final bump of the default
<varname>CPUTYPE</varname> in &arch.i386;.</para>
<para>
<important>
<para>This change does not affect the &os; 12.x or
11.x series of releases.</para>
</important>
</para>
</sect2>
</sect1>
</article>