From owner-freebsd-ports@FreeBSD.ORG Sat Jul 19 19:16:05 2014 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 705995F6 for ; Sat, 19 Jul 2014 19:16:05 +0000 (UTC) Received: from mail.ignoranthack.me (ignoranthack.me [199.102.79.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5266C2600 for ; Sat, 19 Jul 2014 19:16:05 +0000 (UTC) Received: from [192.168.200.205] (c-50-131-5-126.hsd1.ca.comcast.net [50.131.5.126]) (using SSLv3 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: sbruno@ignoranthack.me) by mail.ignoranthack.me (Postfix) with ESMTPSA id 6550E193A3A for ; Sat, 19 Jul 2014 19:16:04 +0000 (UTC) Subject: Current xbuild for mips64 From: Sean Bruno Reply-To: sbruno@freebsd.org To: ports list Content-Type: text/plain; charset="us-ascii" Date: Sat, 19 Jul 2014 12:16:03 -0700 Message-ID: <1405797363.996.5.camel@bruno> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 19 Jul 2014 19:16:05 -0000 I'm running a build via qemu for mips64. I see a list of slowly growing failures for this architecture. If you are bored and want to take a stab at looking into them, here is the current build: http://chips.ysv.freebsd.org/index.html sean p.s. libffi/pyton are the biggest blockers here (patches can be found at https://phabric.freebsd.org/D428 pending review/regression test). pcre, cmake and libxml2 are probably the next targets for anyone looking to explore.