From owner-freebsd-ports@FreeBSD.ORG Mon Jan 19 14:21:05 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id D34E76DF for ; Mon, 19 Jan 2015 14:21:05 +0000 (UTC) Received: from mx2.paymentallianceintl.com (mx2.paymentallianceintl.com [216.26.158.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx2.paymentallianceintl.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9633633B for ; Mon, 19 Jan 2015 14:21:04 +0000 (UTC) Received: from firewallnew (162-230-214-65.lightspeed.lsvlky.sbcglobal.net [162.230.214.65]) by mx2.paymentallianceintl.com (8.15.1/8.15.1) with ESMTPS id t0JEL0Rg010512 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Mon, 19 Jan 2015 09:21:02 -0500 (EST) (envelope-from mikej@mikej.com) X-Authentication-Warning: mx2.paymentallianceintl.com: Host 162-230-214-65.lightspeed.lsvlky.sbcglobal.net [162.230.214.65] claimed to be firewallnew Received: from localhost (localhost [127.0.0.1]) by firewallnew (8.15.1/8.14.9) with ESMTPS id t0JEKXMZ042714 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Mon, 19 Jan 2015 09:20:59 -0500 (EST) (envelope-from mikej@mikej.com) Date: Mon, 19 Jan 2015 09:20:33 -0500 (EST) From: Michael Jung X-X-Sender: mikej@firewallnew To: freebsd-ports@freebsd.org Subject: Fail to kill children Message-ID: User-Agent: Alpine 2.11 (BSF 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Jan 2015 14:21:05 -0000 FreeBSD 10.1-RELEASE #0 r276896: pkg 1.4.4 or pkg 1.4.6 poudriere 3.1.1 under 11.0-CURRENT r275419 On i386 only pkg complains with "Fail to kill children". I have checked some but not all packages and they appear to be updated as expected so this is a heads up. I do not see this behaviour with pkg on amd64 clients. I see this behaviour on more than one i386 client. Anything further I can provide? --mikej [root@jackson /usr/home/mikej]# pkg upgrade Updating 0_local repository catalogue... 0_local repository is up-to-date. All repositories are up-to-date. Checking for upgrades (6 candidates): 100% Processing candidates (6 candidates): 100% The following 6 packages will be affected (of 0 checked): Installed packages to be UPGRADED: unzip: 6.0_2 -> 6.0_3 pciids: 20150105 -> 20150117 openssl: 1.0.1_17 -> 1.0.1_18 duo: 1.9.13 -> 1.9.13_1 ccache: 3.2.1 -> 3.2.1_1 bash: 4.3.30_1 -> 4.3.33 The process will require 1 KB more space. 4 MB to be downloaded. Proceed with this action? [y/N]: y Fetching unzip-6.0_3.txz: 100% 121 KB 123.9k/s 00:01 Fetching pciids-20150117.txz: 100% 185 KB 189.4k/s 00:01 Fetching openssl-1.0.1_18.txz: 100% 2 MB 851.7k/s 00:03 Fetching duo-1.9.13_1.txz: 100% 70 KB 71.2k/s 00:01 Fetching ccache-3.2.1_1.txz: 100% 80 KB 81.8k/s 00:01 Fetching bash-4.3.33.txz: 100% 1 MB 594.3k/s 00:02 Checking integrity... done (0 conflicting) [1/6] Upgrading unzip from 6.0_2 to 6.0_3... pkg: Fail to kill children [1/6] Extracting unzip-6.0_3: 100% pkg: Fail to kill children [2/6] Upgrading pciids from 20150105 to 20150117... pkg: Fail to kill children [2/6] Extracting pciids-20150117: 100% pkg: Fail to kill children [3/6] Upgrading openssl from 1.0.1_17 to 1.0.1_18... pkg: Fail to kill children pkg: Fail to kill children [3/6] Extracting openssl-1.0.1_18: 100% pkg: Fail to kill children [4/6] Upgrading duo from 1.9.13 to 1.9.13_1... You may need to manually remove /usr/local/etc/login_duo.conf if it's no longer needed. pkg: Fail to kill children [4/6] Extracting duo-1.9.13_1: 100% pkg: Fail to kill children [5/6] Upgrading ccache from 3.2.1 to 3.2.1_1... pkg: Fail to kill children [5/6] Extracting ccache-3.2.1_1: 100% Create compiler links... create symlink for cc create symlink for cc (world) create symlink for c++ create symlink for c++ (world) create symlink for CC create symlink for CC (world) create symlink for gcc create symlink for gcc (world) create symlink for g++ create symlink for g++ (world) create symlink for gcc48 create symlink for gcc48 (world) create symlink for g++48 create symlink for g++48 (world) pkg: Fail to kill children [6/6] Upgrading bash from 4.3.30_1 to 4.3.33... pkg: Fail to kill children [6/6] Extracting bash-4.3.33: 100% pkg: Fail to kill children Message for openssl-1.0.1_18: Copy /usr/local/openssl/openssl.cnf.sample to /usr/local/openssl/openssl.cnf and edit it to fit your needs. Message for duo-1.9.13_1: ================================================================= Configuration file /usr/local/etc/login_duo.conf was created. You must edit it to add your Duo integration and secret keys. If you are using the PAM module, a line similar to the following should be added to your service(s) of choice in /etc/pam.d: auth required /usr/local/lib/security/pam_duo.so Additionally, you must edit /usr/local/etc/pam_duo.conf duo headers have been installed to /usr/local/include/duo ================================================================= Message for ccache-3.2.1_1: NOTE: Please read /usr/local/share/doc/ccache/ccache-howto-freebsd.txt for information on using ccache with FreeBSD ports and src. Message for bash-4.3.33: ====================================================================== bash requires fdescfs(5) mounted on /dev/fd If you have not done it yet, please do the following: mount -t fdescfs fdesc /dev/fd To make it permanent, you need the following lines in /etc/fstab: fdesc /dev/fd fdescfs rw 0 0 ====================================================================== [root@jackson /usr/home/mikej]# So ccache for example did get upgraded. [root@jackson /usr/home/mikej]# ccache -V ccache version 3.2.1