notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: graphics/OpenEXR/files/patch-IlmImfUtil__Makefile.in
SVNWeb

Number of commits found: 3

Fri, 1 Dec 2017
[ 01:58 mandree ] Original commit   Revision:455244
455244 devel/synfig/Makefile
455244 editors/calligra/Makefile
455244 graphics/OpenEXR/Makefile
455244 graphics/OpenEXR/distinfo
455244 graphics/OpenEXR/files/patch-IlmImfUtil__Makefile.in
455244 graphics/OpenEXR/files/patch-IlmImf_ImfFastHuf.cpp
455244 graphics/OpenEXR/files/patch-IlmImf__ImfSystemSpecific.cpp
455244 graphics/OpenEXR/pkg-plist
455244 graphics/ampasCTL/Makefile
455244 graphics/appleseed/Makefile

(Only the first 10 of 49 ports in this commit are shown above. View all ports for this commit)
Security update OpenEXR and ilmbase to 2.2.1.

While here, fix libIlmImfUtil_la_LDFLAGp so that when linking libIlmImfUtil,
the locally built libIlmImf gets precedence over the one in /usr/local,
to permit upgrades in a running system with the older version installed.

This changes the library's SONAME, so bump PORTREVISION of all dependees.

Unfortunately, this looks a bit too intrusive for an MFH to 2017Q4.

Security:	CVE-2017-9110
Security:	CVE-2017-9111
Security:	CVE-2017-9112
Security:	CVE-2017-9113
Security:	CVE-2017-9114
Security:	CVE-2017-9115
Security:	CVE-2017-9116
Security:	803879e9-4195-11e7-9b08-080027ef73ec
Fri, 9 Sep 2016
[ 18:50 mandree ] Original commit   Revision:421626
421626 graphics/OpenEXR/Makefile
421626 graphics/OpenEXR/files/patch-IlmImfUtil__Makefile.in
421626 graphics/OpenEXR/files/patch-IlmImf_ImfFastHuf.cpp
421626 graphics/OpenEXR/files/patch-IlmImf__ImfSystemSpecific.cpp
421626 graphics/OpenEXR/files/patch-IlmImf__Makefile.in
421626 graphics/OpenEXR/files/patch-exrenvmap__main.cpp
421626 graphics/OpenEXR/files/patch-exrmaketiled__main.cpp
Replace objdump by readelf. Fixes build on arm64.

While here, refresh patches.

PR:		212308
Submitted by:	emaste@
Reported by:	andrew@
MFH:		2016Q3
Differential Revision:	D7842
Fri, 15 Aug 2014
[ 20:37 mandree ] Original commit   Revision:365038
365038 UPDATING
365038 accessibility/jovie/Makefile
365038 accessibility/kaccessible/Makefile
365038 accessibility/kdeaccessibility4/Makefile
365038 accessibility/kmag/Makefile
365038 accessibility/kmousetool/Makefile
365038 accessibility/kmouth/Makefile
365038 arabic/kde4-l10n/Makefile
365038 archivers/ark/Makefile
365038 astro/kstars/Makefile

(Only the first 10 of 522 ports in this commit are shown above. View all ports for this commit)
Upgrade OpenEXR and ilmbase to 2.2.0.

GCC 4.2 in FreeBSD 8.X/9.X base is now too old to compile OpenEXR, so
GCC-based systems will upgrade to the default ports compiler (GCC 4.7
currently.)

Add two patches to OpenEXR to permit building it in a live system with
the older OpenEXR version installed. Bug report filed to upstream Github
at https://github.com/openexr/openexr/issues/130

Couple OpenEXR more tightly to ilmbase and require its exact .so
version.

Add UPDATING note, and bump PORTREVISION of all dependent ports.

Proto-STAGE hugin-devel, and mark it IGNORE because hugin is newer.

Approved by:	portmgr (implicit for bumping PORTREVISION on unstaged ports)

Number of commits found: 3

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
mbedtlsFeb 24
mbedtlsFeb 24
opensmtpdFeb 24
opensmtpdFeb 24
opensmtpdFeb 24
weechatFeb 21
webkit2-gtk3Feb 19
dovecotFeb 13
gitlab-ceFeb 13
grub2-bhyveFeb 12
libexifFeb 11
linux-flashplayerFeb 11
nginxFeb 09
nginx-develFeb 09
ksh93Feb 07

12 vulnerabilities affecting 52 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-02-25 03:07:51


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38466
Broken 645
Deprecated 418
Ignore 916
Forbidden 3
Restricted 150
No CDROM 72
Vulnerable 23
Expired 3
Set to expire 390
Interactive 0
new 24 hours 3
new 48 hours26
new 7 days50
new fortnight72
new month327

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.