I've just run syspatch on a 6.5 box and obviously I've allocated the space 
poorly but because of that, this happened:

drogo# syspatch
Get/Verify syspatch65-001_rip6cks... 100% |***********************|   196 KB    
00:00
Installing patch 001_rip6cksum
Get/Verify syspatch65-002_srtp.tgz 100% |*************************|  4316 KB    
00:00
Installing patch 002_srtp
Get/Verify syspatch65-003_mds.tgz 100% |**************************| 49488 KB    
00:02
Installing patch 003_mds

/: write failed, file system is full

tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/pmap.o: No space 
left on devi
ce

/: write failed, file system is full

tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/powernow-k8.o: No 
space left
on device

tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/ppp_tty.o: No 
space left on d
evice

tar: Failed write to file usr/share/relink/kernel/GENERIC.MP/process_machdep.o: 
No space l
eft on device

...
... Lots of this; doesn't need repeating.
...

tar: Unable to create usr/share/relink/kernel/GENERIC.MP/xen.o: No space left 
on device

tar: Failed write to file var/syspatch/65-003_mds/003_mds.patch.sig: No space 
left on devi
ce
Relinking to create unique kernel... done; reboot to load the new kernel
Errata can be reviewed under /var/syspatch
drogo# df -h
Filesystem     Size    Used   Avail Capacity  Mounted on
/dev/sd2a      254M    153M   88.3M    63%    /
/dev/sd2d      3.4G    1.7G    1.6G    52%    /usr
/dev/sd2e      254M   18.0M    223M     7%    /var
/dev/sd3a      1.8T    326G    1.4T    19%    /srv
/dev/vnd3a    19.7G    3.2G   15.5G    17%    /var/www/htdocs/OpenBSD
drogo# ls -l /bsd*
-rwx------  1 root  wheel  15623498 Jun  6 18:57 /bsd
-rwx------  1 root  wheel  15629498 May 20 02:17 /bsd.booted
-rw-------  1 flak  wheel  10224165 Apr 30 08:35 /bsd.rd
-rwx------  1 root  wheel  15527075 Apr 30 08:35 /bsd.sp
drogo# date
Thu Jun  6 18:58:23 UTC 2019

I'm not sure what this means it's stuffed into /bsd but I've kept it, 
/bsd.booted and the relink directory and repaired and relinked manually. I'm 
not attaching them to this because obviously they're too big but here's the 
relink.log:

drogo# cat /srv/broken-20190606/kernel/GENERIC.MP/relink.log
(SHA256) /bsd: OK
LD="ld" sh makegap.sh 0xcccccccc gapdummy.o
ld -T ld.script -X --warn-common -nopie -o newbsd ${SYSTEM_HEAD} vers.o ${OBJS}
text    data    bss     dec     hex
12913621        546360  671744  14131725        d7a20d
mv newbsd newbsd.gdb
ctfstrip -S -o newbsd newbsd.gdb
rm -f bsd.gdb
mv -f newbsd bsd
umask 077 && cp bsd /nbsd && mv /nbsd /bsd &&  sha256 -h /var/db/kernel.SHA256 
/bsd

Kernel has been relinked and is active on next reboot.

SHA256 (/bsd) = 40b52473bed49fca4f4d4218cd0d5062902d7f3398d3e833888b8494dc2f0b55
drogo# cat /srv/broken-20190606/kernel.SHA256
SHA256 (/bsd) = 40b52473bed49fca4f4d4218cd0d5062902d7f3398d3e833888b8494dc2f0b55

I didn't think to check what the return code from syspatch was but I suspect it 
was zero.

In a little while I'll dig around in syspatch/relink to see if I can figure out 
what's going on (I'm in the middle of something else now and system patching 
was itself just a yak) but I wanted to post this in case anyone already 
familiar with those two processes can jump straight to the problem.

Cheers,

Matthew

Reply via email to