fftw-3.3.8nb1: registering info file /usr/pkg/info/fftw3.info pkg_add: package `libsamplerate-0.1.9' was already installed as dependency, now marked as installed manually pkg_add: package `libsndfile-1.0.28nb2' was already installed as dependency, now marked as installed manually libffi-3.2.1nb4: registering info file /usr/pkg/info/libffi.info pkg_add: package `fftw-3.3.8nb1' was already installed as dependency, now marked as installed manually =========================================================================== $NetBSD: MESSAGE,v 1.1 2008/07/31 03:58:05 bjs Exp $ NOTE: Unfortunately, JACK wants to use a linux /proc filesystem to perform shared memory housekeeping tasks. Therefore, if your platform supports a "Linux-compliant" proc filesystem, we recommend mounting one prior to using jack. On NetBSD, this can be accomplished with the following command: mount_procfs -orw,linux /proc Conventionally, the mount point is /proc. If you wish to use a different pathname for this filesystem, you may define the JACKD_PROCFS_PATH variable in your build environment or mk.conf as shown below. JACKD_PROCFS_PATH= /emul/linux/proc ATTENTION: NetBSD-current users who wish to run jackd with real-time scheduling will likely find that the loader fails to mmap the driver module(s) when using -R. Until this issue is re- solved, one may work around this problem by using the -m (--no-mlock) option. =========================================================================== =========================================================================== $NetBSD: MESSAGE,v 1.5 2014/08/10 10:47:42 wiz Exp $ Execute this command to extract and rehash all CA root certificates distributed by the Mozilla Project, so that they can be used by third party applications using OpenSSL. It also creates a single file certificate bundle in PEM format which can be used by applications using GnuTLS. # mozilla-rootcerts install To mark these certificates as trusted for users of gnupg2, do the following (assuming default PKG_SYSCONFBASE and a Bourne shell): # mkdir -p /usr/pkg/etc/gnupg # cd /usr/pkg/etc/gnupg # for c in /etc/openssl/certs/*.pem; do > openssl x509 -in $c -noout -fingerprint|sed 's|^.*=\(.*\)|\1 S|' > done > trustlist.txt ===========================================================================