From nobody Sun Oct 02 21:26:54 2022 X-Original-To: usb@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4MgcVh67MKz4d7GQ for ; Sun, 2 Oct 2022 21:27:08 +0000 (UTC) (envelope-from tomek@cedro.info) Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1D4" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4MgcVh178Cz3jst for ; Sun, 2 Oct 2022 21:27:07 +0000 (UTC) (envelope-from tomek@cedro.info) Received: by mail-qk1-x730.google.com with SMTP id o7so5691715qkj.10 for ; Sun, 02 Oct 2022 14:27:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cedro.info; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=t+GmJ0XcnuCq08/8SBI/GwstgYxc2pN0NJUouPPY4zQ=; b=BoTUlkfyhQ3NEDHRP0wD8JQMn3fnw1ZchovhVibQPcHb5fiCT9/Bh/af6KCynAQB7R HvssRuc7OjxzaRTTAWfox4BYh4fd/zlCNWOZtzhwDdDPf6FqxTX06C9FYuk5BMegvME6 7viNU/NZ8vk5IzBb3G955qURidC02/Jo134oCVMJwFiem1g/MVY/opW023SkpBwly+cR FOVD7fZdLbYsvYwisS3rPL2cqUxk9ZGl3dx34KkzFHlIt0jqKiPbgcnB8DIvIAV9srEa YVqupO8e//cYJ5e5Av2LyxtZsShndmVwSTjj2eegQQUc+bpfRyh19P0pVXJjCUxEAyOY 4/Aw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=t+GmJ0XcnuCq08/8SBI/GwstgYxc2pN0NJUouPPY4zQ=; b=giIe2c2dDiwptOOs/3jUMTsgNYajzVl55dlzimmkVh/o/3CYGSjfKeAqQcyRUwJNuZ XRheQNX8XTqWhuDgU2SYKlpYCOpcDzikIZZT+dgRaicCmEToMsWsLnnkcuOK4ltrXH4M Y6p6Zw8hGf2Ym5cF3ZVbKX0DQc/pQUs7YvVQfgrhHr13ZASAJUUYFJPbzHssfydLZ0JU dgxyDy8hL8mxTiIIWHVUct711s0ePf4P/GRaIjO/KbkOrtZeD0yzlI29qh9PZbmzTtZW KKdoPRHCXJyOSzcCr+543/XDcngkERllI+/LgzQT+vRPrVQyWj9+zog46F8XMvAMa4bL toIQ== X-Gm-Message-State: ACrzQf2vPNGyw9wn+jD/izS41iq9OGPEjQiF5aVmInAVTB3BVdzFHJy3 xsLYcaKjhGJHNuOZd3KgnGrUTBbBZw9yVw== X-Google-Smtp-Source: AMsMyM7qFxODWcO7e5I03KqexfwS/nzJ/8GfMzs80Cqi053YvSVuAQDHEXRoUhnOT1E7uwkVqGKXLg== X-Received: by 2002:a05:620a:2954:b0:6cf:9084:f7ab with SMTP id n20-20020a05620a295400b006cf9084f7abmr12157616qkp.355.1664746027530; Sun, 02 Oct 2022 14:27:07 -0700 (PDT) Received: from mail-yb1-f172.google.com (mail-yb1-f172.google.com. [209.85.219.172]) by smtp.gmail.com with ESMTPSA id u30-20020a37ab1e000000b006bb9125363fsm9128157qke.121.2022.10.02.14.27.06 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 02 Oct 2022 14:27:06 -0700 (PDT) Received: by mail-yb1-f172.google.com with SMTP id c9so11022014ybf.5 for ; Sun, 02 Oct 2022 14:27:06 -0700 (PDT) X-Received: by 2002:a25:6611:0:b0:6bd:2d:6992 with SMTP id a17-20020a256611000000b006bd002d6992mr10813631ybc.173.1664746026369; Sun, 02 Oct 2022 14:27:06 -0700 (PDT) List-Id: FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-usb List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-usb@freebsd.org X-BeenThere: freebsd-usb@freebsd.org MIME-Version: 1.0 References: In-Reply-To: From: Tomek CEDRO Date: Sun, 2 Oct 2022 23:26:54 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: hackrf / libusb / libusb_interrupt_event_handler To: Hans Petter Selasky Cc: "freebsd-usb@FreeBSD.org" Content-Type: text/plain; charset="UTF-8" X-Rspamd-Queue-Id: 4MgcVh178Cz3jst X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=cedro.info header.s=google header.b=BoTUlkfy; dmarc=none; spf=none (mx1.freebsd.org: domain of tomek@cedro.info has no SPF policy when checking 2607:f8b0:4864:20::730) smtp.mailfrom=tomek@cedro.info X-Spamd-Result: default: False [-3.28 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-0.98)[-0.980]; R_DKIM_ALLOW(-0.20)[cedro.info:s=google]; MIME_GOOD(-0.10)[text/plain]; RCVD_IN_DNSWL_NONE(0.00)[2607:f8b0:4864:20::730:from,209.85.219.172:received]; MLMMJ_DEST(0.00)[usb@freebsd.org]; R_SPF_NA(0.00)[no SPF record]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; RCPT_COUNT_TWO(0.00)[2]; MIME_TRACE(0.00)[0:+]; DKIM_TRACE(0.00)[cedro.info:+]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_TLS_LAST(0.00)[]; FROM_HAS_DN(0.00)[]; ARC_NA(0.00)[]; TO_DN_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[usb@freebsd.org]; RCVD_COUNT_THREE(0.00)[4]; DMARC_NA(0.00)[cedro.info]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US] X-ThisMailContainsUnwantedMimeParts: N On Sun, Oct 2, 2022 at 8:09 PM Tomek CEDRO wrote: > On Sun, Oct 2, 2022 at 5:43 PM Hans Petter Selasky wrote: > > On 10/2/22 16:23, Tomek CEDRO wrote: > > > Hello HPS :-) > > > The new release of HackRF is out 2022.09.1, I would like to update the > > > port.. however there is a linking problem with libusb: > > > > > > ld: error: ../../libhackrf/src/libhackrf.so.0.7.0: undefined reference > > > to libusb_interrupt_event_handler [--no-allow-shlib-undefined] > > > > > > Indeed this function seems missing in our libusb implementation? > > > % nm -gDC /usr/lib/libusb.so.3 | grep libusb_interrupt_event_handler > > > % > > > Any clues on how to fix? :-) > > > > https://cgit.freebsd.org/src/commit/?id=aa87aa52326be7b726664dba65e91ec3d8160f48 > > > > If the function doesn't exist, then you can comment it out. I see hackrf > > will work also w/o this implemented. > > > > I couldn't bump the LIBUSB version, because I don't have overview what > > else I need to implement then. > > --HPS > > Wow, so the fix is already in the source tree!! ? Then it will have to > propagate to STABLE and then RELEASE ? I can confirm that Your patch fixes the issue, enables the 2022.09.1 build and operations! I have managed to flash firmware (hackrf_spiflash), read device info (hackrf_info), sweep some radio frequencies (hackrf_sweep) and receive/transmit (hackrf_transfer). Thank you HPS :-) When it will be safe to provide port update 2022.09.1 to the port tree? Should we create a separate comms/hackrf-2021.03.1 port for the older systems where this LibUSB call is not available? Or maybe it will be possible to build and update LibUSB on the older systems? > I will bump the port to 2021.03.1 for now and when libusb is in the > Release we could bump it further to 2022.09.1? What do you suggest? Port update to 2021.03.1 is ready: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266774 https://github.com/freebsd/freebsd-ports/pull/132 Thank you HPS!! :-) Tomek -- CeDeROM, SQ7MHZ, http://www.tomek.cedro.info