From owner-freebsd-current@FreeBSD.ORG Wed Jul 9 15:45:57 2003 Return-Path: Delivered-To: freebsd-current@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 00AA037B401 for ; Wed, 9 Jul 2003 15:45:57 -0700 (PDT) Received: from obsecurity.dyndns.org (adsl-64-169-104-32.dsl.lsan03.pacbell.net [64.169.104.32]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9963043F3F for ; Wed, 9 Jul 2003 15:45:55 -0700 (PDT) (envelope-from kris@obsecurity.org) Received: from rot13.obsecurity.org (rot13.obsecurity.org [10.0.0.5]) by obsecurity.dyndns.org (Postfix) with ESMTP id EA0E066B60; Wed, 9 Jul 2003 15:45:51 -0700 (PDT) Received: by rot13.obsecurity.org (Postfix, from userid 1000) id A7D92BBD; Wed, 9 Jul 2003 15:45:51 -0700 (PDT) Date: Wed, 9 Jul 2003 15:45:51 -0700 From: Kris Kennaway To: Alexander Kabaev Message-ID: <20030709224551.GA43204@rot13.obsecurity.org> References: <20030709170956.621dc901.ak03@gte.com> <20030709.152640.130543203.imp@bsdimp.com> <20030709181025.10a50df1.ak03@gte.com> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="jI8keyz6grp/JLjh" Content-Disposition: inline In-Reply-To: <20030709181025.10a50df1.ak03@gte.com> User-Agent: Mutt/1.4.1i cc: current@freebsd.org cc: "M. Warner Losh" Subject: Re: The upcoming GCC 3.3+ upgrade X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 09 Jul 2003 22:45:57 -0000 --jI8keyz6grp/JLjh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Jul 09, 2003 at 06:10:25PM -0400, Alexander Kabaev wrote: > The patches for GCC 3.3 were circulating for a quite some time now and > Kris did a package building pass on a package cluster with them > recently. The run finished with 703 ports broken. I am not sure how many > were broken before, but I am pretty sure the change is significant.=20 > http://211.43.211.135/errorlogs/i386-5-full/ About 1900 fewer packages built than on the previous 5.x build, although there were only about another 500 ports that failed to build (the rest were not built because they depend on a broken package). Most of the new breakage (on i386) is from 3 or 4 causes, and should be mostly mechanical to fix. I'll try and coordinate an effort to fix these problems on ports@ once the new gcc is committed, and we develop some sample patches to fix the various new kinds of breakage to demonstrate to others how to do it. Kris --jI8keyz6grp/JLjh Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (FreeBSD) iD8DBQE/DJsdWry0BWjoQKURAm4qAKCYbXYwGh/mNPPXN+TbCDjjbIqnhwCg90+x aVBD73TtoBctRL26gdnVh4Y= =eNs7 -----END PGP SIGNATURE----- --jI8keyz6grp/JLjh--