openssl-1.1.1l: copying /usr/pkg/share/examples/openssl/openssl.cnf to /usr/pkg/etc/openssl/openssl.cnf rhash-1.4.2nb2: copying /usr/pkg/share/examples/rhash/rhashrc to /usr/pkg/etc/rhashrc heimdal-7.7.0nb3: setting permissions on /usr/pkg/bin/ksu (o=root, g=wheel, m=4511) heimdal-7.7.0nb3: setting permissions on /usr/pkg/bin/otp (o=root, g=wheel, m=4511) =========================================================================== The following files should be created for heimdal-7.7.0nb3: /etc/rc.d/kpasswdd (m=0755) [/usr/pkg/share/examples/rc.d/kpasswdd] /etc/rc.d/kcm (m=0755) [/usr/pkg/share/examples/rc.d/kcm] /etc/rc.d/kadmind (m=0755) [/usr/pkg/share/examples/rc.d/kadmind] =========================================================================== =========================================================================== The following files are used by heimdal-7.7.0nb3 and have the wrong ownership and/or permissions: /etc/rc.d/kdc (m=0755) =========================================================================== heimdal-7.7.0nb3: registering info file /usr/pkg/info/heimdal.info heimdal-7.7.0nb3: registering info file /usr/pkg/info/hx509.info libunistring-0.9.10nb1: registering info file /usr/pkg/info/libunistring.info libidn2-2.3.2: registering info file /usr/pkg/info/libidn2.info libffi-3.4.2nb1: registering info file /usr/pkg/info/libffi.info xmlcatmgr-2.2nb1: copying /usr/pkg/share/examples/xmlcatmgr/catalog.etc.sgml to /usr/pkg/etc/sgml/catalog xmlcatmgr-2.2nb1: copying /usr/pkg/share/examples/xmlcatmgr/catalog.etc.xml to /usr/pkg/etc/xml/catalog xmlcatmgr-2.2nb1: copying /usr/pkg/share/examples/xmlcatmgr/catalog.share.sgml to /usr/pkg/share/sgml/catalog xmlcatmgr-2.2nb1: copying /usr/pkg/share/examples/xmlcatmgr/catalog.share.xml to /usr/pkg/share/xml/catalog pkg_add: package `llvm-13.0.0nb2' was already installed as dependency, now marked as installed manually =========================================================================== $NetBSD: MESSAGE,v 1.1.1.1 2012/03/21 13:31:35 asau Exp $ On NetBSD setting CPU affinity requires super-user privileges. Ordinary users can be allowed to control CPU affinity of their threads via the security.models.extensions.user_set_cpu_affinity sysctl. ===========================================================================