From owner-freebsd-ports@FreeBSD.ORG Mon Jan 19 15:15:24 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 7AB744D1; Mon, 19 Jan 2015 15:15:24 +0000 (UTC) Received: from mx2.paymentallianceintl.com (mx2.paymentallianceintl.com [216.26.158.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx2.paymentallianceintl.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 30494AC6; Mon, 19 Jan 2015 15:15:23 +0000 (UTC) Received: from firewallnew (162-230-214-65.lightspeed.lsvlky.sbcglobal.net [162.230.214.65]) by mx2.paymentallianceintl.com (8.15.1/8.15.1) with ESMTPS id t0JFFFZa014239 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 19 Jan 2015 10:15:16 -0500 (EST) (envelope-from mikej@mikej.com) X-Authentication-Warning: mx2.paymentallianceintl.com: Host 162-230-214-65.lightspeed.lsvlky.sbcglobal.net [162.230.214.65] claimed to be firewallnew Received: from mail.mikej.com (firewall [192.168.6.63]) by firewallnew (8.15.1/8.14.9) with ESMTP id t0JFErLj060235; Mon, 19 Jan 2015 10:15:14 -0500 (EST) (envelope-from mikej@mikej.com) X-Authentication-Warning: firewallnew: Host firewall [192.168.6.63] claimed to be mail.mikej.com MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 19 Jan 2015 10:14:52 -0500 From: Michael Jung To: freebsd-ports@freebsd.org Cc: owner-freebsd-ports@freebsd.org Subject: PKG - Fail to kill children In-Reply-To: References: Message-ID: X-Sender: mikej@mikej.com User-Agent: Roundcube Webmail/1.0.4 X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Jan 2015 15:15:24 -0000 On 2015-01-19 09:20, Michael Jung wrote: > FreeBSD 10.1-RELEASE #0 r276896: > pkg 1.4.4 or pkg 1.4.6 > poudriere 3.1.1 under 11.0-CURRENT r275419 > > On i386 only pkg complains with "Fail to kill children". I have > checked some but not all packages > and they appear to be updated as expected so this > is a heads up. > > I do not see this behaviour with pkg on amd64 clients. I see this > behaviour on more than one i386 client. > > Anything further I can provide? > > --mikej > > > [root@jackson /usr/home/mikej]# pkg upgrade > Updating 0_local repository catalogue... > 0_local repository is up-to-date. > All repositories are up-to-date. > Checking for upgrades (6 candidates): 100% > Processing candidates (6 candidates): 100% > The following 6 packages will be affected (of 0 checked): > > Installed packages to be UPGRADED: > unzip: 6.0_2 -> 6.0_3 > pciids: 20150105 -> 20150117 > openssl: 1.0.1_17 -> 1.0.1_18 > duo: 1.9.13 -> 1.9.13_1 > ccache: 3.2.1 -> 3.2.1_1 > bash: 4.3.30_1 -> 4.3.33 > > The process will require 1 KB more space. > 4 MB to be downloaded. > > Proceed with this action? [y/N]: y > Fetching unzip-6.0_3.txz: 100% 121 KB 123.9k/s 00:01 > Fetching pciids-20150117.txz: 100% 185 KB 189.4k/s 00:01 > Fetching openssl-1.0.1_18.txz: 100% 2 MB 851.7k/s 00:03 > Fetching duo-1.9.13_1.txz: 100% 70 KB 71.2k/s 00:01 > Fetching ccache-3.2.1_1.txz: 100% 80 KB 81.8k/s 00:01 > Fetching bash-4.3.33.txz: 100% 1 MB 594.3k/s 00:02 > Checking integrity... done (0 conflicting) > [1/6] Upgrading unzip from 6.0_2 to 6.0_3... > pkg: Fail to kill children > [1/6] Extracting unzip-6.0_3: 100% > pkg: Fail to kill children > [2/6] Upgrading pciids from 20150105 to 20150117... > pkg: Fail to kill children > [2/6] Extracting pciids-20150117: 100% > pkg: Fail to kill children > [3/6] Upgrading openssl from 1.0.1_17 to 1.0.1_18... > pkg: Fail to kill children > pkg: Fail to kill children > [3/6] Extracting openssl-1.0.1_18: 100% > pkg: Fail to kill children > [4/6] Upgrading duo from 1.9.13 to 1.9.13_1... > You may need to manually remove /usr/local/etc/login_duo.conf if it's > no longer needed. > pkg: Fail to kill children > [4/6] Extracting duo-1.9.13_1: 100% > pkg: Fail to kill children > [5/6] Upgrading ccache from 3.2.1 to 3.2.1_1... > pkg: Fail to kill children > [5/6] Extracting ccache-3.2.1_1: 100% > Create compiler links... > create symlink for cc > create symlink for cc (world) > create symlink for c++ > create symlink for c++ (world) > create symlink for CC > create symlink for CC (world) > create symlink for gcc > create symlink for gcc (world) > create symlink for g++ > create symlink for g++ (world) > create symlink for gcc48 > create symlink for gcc48 (world) > create symlink for g++48 > create symlink for g++48 (world) > pkg: Fail to kill children > [6/6] Upgrading bash from 4.3.30_1 to 4.3.33... > pkg: Fail to kill children > [6/6] Extracting bash-4.3.33: 100% > pkg: Fail to kill children > Message for openssl-1.0.1_18: > Copy /usr/local/openssl/openssl.cnf.sample to > /usr/local/openssl/openssl.cnf > and edit it to fit your needs. > Message for duo-1.9.13_1: > ================================================================= > Configuration file /usr/local/etc/login_duo.conf was created. > You must edit it to add your Duo integration and secret keys. > > If you are using the PAM module, a line similar to the following > should be added to your service(s) of choice in /etc/pam.d: > auth required /usr/local/lib/security/pam_duo.so > > Additionally, you must edit /usr/local/etc/pam_duo.conf > > duo headers have been installed to /usr/local/include/duo > ================================================================= > Message for ccache-3.2.1_1: > NOTE: > Please read /usr/local/share/doc/ccache/ccache-howto-freebsd.txt for > information on using ccache with FreeBSD ports and src. > Message for bash-4.3.33: > ====================================================================== > > bash requires fdescfs(5) mounted on /dev/fd > > If you have not done it yet, please do the following: > > mount -t fdescfs fdesc /dev/fd > > To make it permanent, you need the following lines in /etc/fstab: > > fdesc /dev/fd fdescfs rw 0 0 > > ====================================================================== > [root@jackson /usr/home/mikej]# > > > So ccache for example did get upgraded. > > [root@jackson /usr/home/mikej]# ccache -V > ccache version 3.2.1 > > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to > "freebsd-ports-unsubscribe@freebsd.org"