Your message dated Sun, 18 Nov 2018 17:20:16 +0000
with message-id <e1goqk4-00085m...@fasolo.debian.org>
and subject line Bug#913779: fixed in libuv1 1.23.2-2
has caused the Debian Bug report #913779,
regarding libuv1: path_max_zero_st_size incorrectly rebased; patch attached
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
913779: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913779
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libuv1
Version: 1.23.2-1
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu disco ubuntu-patch



In Ubuntu, the attached patch was applied to achieve the following:

  * Fix path_max_zero_st_size to follow renaming of variable upstream.

This should be fairly self-explanatory, I'd imagine.

... Adam


-- System Information:
Debian Release: buster/sid
  APT prefers disco
  APT policy: (500, 'disco')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.18.0-10-lowlatency (SMP w/4 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru libuv1-1.23.2/debian/patches/path_max_zero_st_size 
libuv1-1.23.2/debian/patches/path_max_zero_st_size
--- libuv1-1.23.2/debian/patches/path_max_zero_st_size  2018-10-23 
06:58:34.000000000 -0600
+++ libuv1-1.23.2/debian/patches/path_max_zero_st_size  2018-11-14 
19:29:15.000000000 -0700
@@ -79,13 +79,13 @@
    maxlen = st.st_size;
  
 +  /* Some symlinks in /proc report st_size == 0 */
-+  if (len == 0) {
++  if (maxlen == 0) {
 +#if defined(_POSIX_PATH_MAX)
-+    len = _POSIX_PATH_MAX;
++    maxlen = _POSIX_PATH_MAX;
 +#elif defined(PATH_MAX)
-+    len = PATH_MAX;
++    maxlen = PATH_MAX;
 +#else
-+    len = 4096; /* fallback */
++    maxlen = 4096; /* fallback */
 +#endif
 +  }
 +

--- End Message ---
--- Begin Message ---
Source: libuv1
Source-Version: 1.23.2-2

We believe that the bug you reported is fixed in the latest version of
libuv1, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 913...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Dominique Dumont <d...@debian.org> (supplier of updated libuv1 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 18 Nov 2018 17:32:35 +0100
Source: libuv1
Binary: libuv1-dev libuv1
Architecture: source
Version: 1.23.2-2
Distribution: unstable
Urgency: medium
Maintainer: Dominique Dumont <d...@debian.org>
Changed-By: Dominique Dumont <d...@debian.org>
Description:
 libuv1     - asynchronous event notification library - runtime library
 libuv1-dev - asynchronous event notification library - development files
Closes: 913779
Changes:
 libuv1 (1.23.2-2) unstable; urgency=medium
 .
   * Fix path_max_zero_st_size to follow renaming of variable upstream.
     Thanks to Adam Conrad for the patch (Closes: #913779)
Checksums-Sha1:
 457f92ecfa72917a86969a620ffdd86b7569bf80 2074 libuv1_1.23.2-2.dsc
 13436a5e61de010b636a0e9a569299975cc47b74 16408 libuv1_1.23.2-2.debian.tar.xz
 7c6b0a49ea6338d1eff9edb43c2f56e8dfd740a9 5385 libuv1_1.23.2-2_source.buildinfo
Checksums-Sha256:
 8add56fa84bdffeef6cf9471dd708afdb4f472b9eee9d81ab7b13608d0533f2a 2074 
libuv1_1.23.2-2.dsc
 21cac1810aa28d1b0d6f8a027c9b143f91f4ec01dbec0d5fa8723a51cf9c8ceb 16408 
libuv1_1.23.2-2.debian.tar.xz
 9020a6001dbde7416082b958bdb3188f227318344aef210dfc7e8c246f2ab498 5385 
libuv1_1.23.2-2_source.buildinfo
Files:
 747304199b68fb0063163a666a3d4747 2074 libs optional libuv1_1.23.2-2.dsc
 2b24f0495cf9ba4c2ee1965ff1817382 16408 libs optional 
libuv1_1.23.2-2.debian.tar.xz
 19f0c9b883cc9e8592d251dc8e4d23ae 5385 libs optional 
libuv1_1.23.2-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=dlkc
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to