Re: please add fix for bz 408596 to etch [SRM]

2008-04-05 Thread Luk Claes
On Wed, Apr 02, 2008 at 09:00:28PM +0200, Aurelien Jarno wrote:
 Hi Stable Release Managers,

Hi

 Alex Chiang a écrit :
  Hi Aurelien,
  
  * Aurelien Jarno [EMAIL PROTECTED]:
  Alex Chiang a écrit :
  I'm hitting:
 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=408596
 
  On my ia64/etch install. This is causing problems for me when I
  attempt to use sparse.
 
  Is there any chance you could consider this fix for etch? The fix
  itself looks very benign, and non-intrusive.
  I don't think such a fix is possible for Etch, as this bug does not meet
  the requirements for an update in a stable version. See:
 
  http://release.debian.org/stable/3.1/3.1r8/

Indeed, it doesn't seem to qualify.

Cheers

Luk



r2904 - in glibc-package/trunk/debian: . patches patches/hppa

2008-04-05 Thread aurel32
Author: aurel32
Date: 2008-04-05 11:55:20 + (Sat, 05 Apr 2008)
New Revision: 2904

Added:
   glibc-package/trunk/debian/patches/hppa/cvs-atomic.diff
Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/hppa/submitted-atomic_h.diff
   glibc-package/trunk/debian/patches/series
Log:
  * patches/hppa/cvs-atomic.diff: new patch from upstream to fix atomic
locks witch gcc-4.3.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2008-04-02 13:52:58 UTC (rev 
2903)
+++ glibc-package/trunk/debian/changelog2008-04-05 11:55:20 UTC (rev 
2904)
@@ -8,13 +8,15 @@
   * local/manpages/ld.so.8: fix libraries search order.  Closes: #473458.
   * Update Finish debconf translation, by Esko Arajärvi.  Closes: #473802.
   * Replace patches/mips/submitted-mipsn32.diff by the version merged
-upstream.
+upstream.
+  * patches/hppa/cvs-atomic.diff: new patch from upstream to fix atomic
+locks witch gcc-4.3.
 
   [ Pierre Habouzit ]
   * Add any/cvs-strerror_r.diff to make strerror_r actually thread safe.
 Closes: #456531.
 
- -- Aurelien Jarno [EMAIL PROTECTED]  Wed, 02 Apr 2008 15:11:06 +0200
+ -- Aurelien Jarno [EMAIL PROTECTED]  Fri, 04 Apr 2008 21:44:57 +0200
 
 glibc (2.7-10) unstable; urgency=low
 

Added: glibc-package/trunk/debian/patches/hppa/cvs-atomic.diff
===
--- glibc-package/trunk/debian/patches/hppa/cvs-atomic.diff 
(rev 0)
+++ glibc-package/trunk/debian/patches/hppa/cvs-atomic.diff 2008-04-05 
11:55:20 UTC (rev 2904)
@@ -0,0 +1,32 @@
+2008-04-04  Carlos O'Donell  [EMAIL PROTECTED]
+
+   * sysdeps/unix/sysv/linux/hppa/bits/atomic.h: Remove
+   memory contraint and instead indicate that *mem is
+   written to.
+
+Index: ports/sysdeps/unix/sysv/linux/hppa/bits/atomic.h
+===
+RCS file: /cvs/glibc/ports/sysdeps/unix/sysv/linux/hppa/bits/atomic.h,v
+retrieving revision 1.3
+retrieving revision 1.4
+diff -u -d -p -r1.3 -r1.4
+--- ports/sysdeps/unix/sysv/linux/hppa/bits/atomic.h   3 Dec 2006 23:03:20 
-   1.3
 ports/sysdeps/unix/sysv/linux/hppa/bits/atomic.h   4 Apr 2008 18:57:47 
-   1.4
+@@ -55,7 +55,7 @@ typedef uintmax_t uatomic_max_t;
+ #define LWS 0xb0
+ #define LWS_CAS 0
+ /* Note r31 is the link register */
+-#define LWS_CLOBBER r1, r26, r25, r24, r23, r22, r21, r20, 
r28, r31, memory
++#define LWS_CLOBBER r1, r26, r25, r24, r23, r22, r21, r20, 
r28, r31
+ #define ASM_EAGAIN 11 
+ 
+ #if __ASSUME_LWS_CAS
+@@ -76,7 +76,7 @@ typedef uintmax_t uatomic_max_t;
+   stw%%r28, %0   \n\t   \
+ sub  %%r0, %%r21, %%r21  \n\t   \
+   stw%%r21, %1   \n\t   \
+-  : =m (lws_ret), =m (lws_errno), =m (*mem) \
++  : =m (lws_ret), =m (lws_errno), +m (*mem) \
+ : r (mem), r (oldval), r (newval)   
\
+   : LWS_CLOBBER   \
+  );   
\

Modified: glibc-package/trunk/debian/patches/hppa/submitted-atomic_h.diff
===
--- glibc-package/trunk/debian/patches/hppa/submitted-atomic_h.diff 
2008-04-02 13:52:58 UTC (rev 2903)
+++ glibc-package/trunk/debian/patches/hppa/submitted-atomic_h.diff 
2008-04-05 11:55:20 UTC (rev 2904)
@@ -1,4 +1,4 @@
-2007-05-22  Aurelien Jarno  [EMAIL PROTECTED]
+2008-04-03  Aurelien Jarno  [EMAIL PROTECTED]
 
* sysdeps/unix/sysv/linux/hppa/bits/atomic.h: check for -11 
(-EAGAIN) instead of 11. Loop again when the kernel returns
@@ -10,7 +10,7 @@
 @@ -56,10 +56,14 @@
  #define LWS_CAS 0
  /* Note r31 is the link register */
- #define LWS_CLOBBER r1, r26, r25, r24, r23, r22, r21, r20, 
r28, r31, memory
+ #define LWS_CLOBBER r1, r26, r25, r24, r23, r22, r21, r20, 
r28, r31
 -#define ASM_EAGAIN 11 
  
  #if __ASSUME_LWS_CAS

Modified: glibc-package/trunk/debian/patches/series
===
--- glibc-package/trunk/debian/patches/series   2008-04-02 13:52:58 UTC (rev 
2903)
+++ glibc-package/trunk/debian/patches/series   2008-04-05 11:55:20 UTC (rev 
2904)
@@ -62,6 +62,7 @@
 arm/local-no-hwcap.diff -p0
 arm/submitted-RTLD_SINGLE_THREAD_P.diff -p0
 
+hppa/cvs-atomic_h.diff -p0
 hppa/submitted-atomic_h.diff -p0
 hppa/submitted-fadvise64_64.diff -p0
 hppa/submitted-lt.diff -p0


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Adding shs_CA to belocs-locales-data

2008-04-05 Thread Neskie Manuel
Hi,

I've created a locale shs_CA for Secwepemctsin (Shuswap) in Canada it
has been committed upstream:

http://sourceware.org/cgi-bin/cvsweb.cgi/libc/localedata/locales/shs_CA?cvsroot=glibc

I've also added a patch that add changes locale/iso-639.def and
localedata/SUPPORTED

On a related note.  I'm planning a cross country bike trip and am
planning to visit various Indigenous Communities across Canada to
write locales for their language and introduce people to the l10n
process in Debian and Free/Software World:

 * Mi'kmaq - mic
 * Innu Aimun - nsk
 * Maliseet
 * Mohawk
 * Oneida
 * Ojibway - oji

What would the best way to submit all of this work?  What important
things are there to consider when creating a locale?  I've just been
changing the LC_TIME and LC_ADDRESS sections.

-Neskie Manuel


add_shs_CA
Description: Binary data


Processed: tagging 474226

2008-04-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.26
 tags 474226 + pending
Bug#474226: glibc: Segfaults in tst-rfc3484 during compilation
There were no tags set.
Tags added: pending


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2906 - in glibc-package/trunk/debian: . patches/any

2008-04-05 Thread aurel32
Author: aurel32
Date: 2008-04-05 22:01:49 + (Sat, 05 Apr 2008)
New Revision: 2906

Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/any/cvs-rfc3484.diff
Log:
  * patches/any/cvs-rfc3484.diff: update tests from CVS.  Closes: #474226.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2008-04-05 20:45:14 UTC (rev 
2905)
+++ glibc-package/trunk/debian/changelog2008-04-05 22:01:49 UTC (rev 
2906)
@@ -11,12 +11,13 @@
 upstream.
   * patches/hppa/cvs-atomic.diff: new patch from upstream to fix atomic
 locks witch gcc-4.3.
+  * patches/any/cvs-rfc3484.diff: update tests from CVS.  Closes: #474226.
 
   [ Pierre Habouzit ]
   * Add any/cvs-strerror_r.diff to make strerror_r actually thread safe.
 Closes: #456531.
 
- -- Aurelien Jarno [EMAIL PROTECTED]  Fri, 04 Apr 2008 21:44:57 +0200
+ -- Aurelien Jarno [EMAIL PROTECTED]  Sat, 05 Apr 2008 22:38:25 +0200
 
 glibc (2.7-10) unstable; urgency=low
 

Modified: glibc-package/trunk/debian/patches/any/cvs-rfc3484.diff
===
--- glibc-package/trunk/debian/patches/any/cvs-rfc3484.diff 2008-04-05 
20:45:14 UTC (rev 2905)
+++ glibc-package/trunk/debian/patches/any/cvs-rfc3484.diff 2008-04-05 
22:01:49 UTC (rev 2906)
@@ -11,7 +11,14 @@
(free_scopelist): New function.
(scopecmp): New function.
(gaiconf_init): Also handle scopev4 entries.
+   * posix/tst-rfc3484.c (do_test): Initialize scopes.
+   * posix/tst-rfc3484-2.c (do_test): Likewise.
 
+2007-11-13  Ulrich Drepper  [EMAIL PROTECTED]
+
+   * posix/tst-rfc3484.c: Adjust for addition of prefixlen field.
+   * posix/tst-rfc3484-2.c: Likewise.
+
 2007-11-12  Ulrich Drepper  [EMAIL PROTECTED]
 
* include/ifaddrs.c (struct in6addrinfo): Add prefixlen field.
@@ -754,3 +761,67 @@
  
/* If we previously read the file but it is gone now, free the
 old data and use the builtin one.  Leave the reload flag
+--- libc/posix/tst-rfc3484-2.c
 libc/posix/tst-rfc3484-2.c
+@@ -66,6 +66,7 @@ do_test (void)
+ {
+   labels = default_labels;
+   precedence = default_precedence;
++  scopes = default_scopes;
+ 
+   struct sockaddr_in so1;
+   so1.sin_family = AF_INET;
+--- libc/posix/tst-rfc3484.c
 libc/posix/tst-rfc3484.c
+@@ -85,6 +85,7 @@ do_test (void)
+ {
+   labels = default_labels;
+   precedence = default_precedence;
++  scopes= default_scopes;
+ 
+   struct sockaddr_in so;
+   so.sin_family = AF_INET;
+--- a/posix/tst-rfc3484-2.c
 b/posix/tst-rfc3484-2.c
+@@ -99,6 +99,7 @@ do_test (void)
+   results[0].source_addr_len = sizeof (so1);
+   results[0].source_addr_flags = 0;
+   results[0].service_order = 0;
++  results[0].prefixlen = 16;
+   memcpy (results[0].source_addr, so1, sizeof (so1));
+ 
+   results[1].dest_addr = ai2;
+@@ -106,6 +107,7 @@ do_test (void)
+   results[1].source_addr_len = sizeof (so2);
+   results[1].source_addr_flags = 0;
+   results[1].service_order = 1;
++  results[1].prefixlen = 16;
+   memcpy (results[1].source_addr, so2, sizeof (so2));
+ 
+ 
+@@ -125,6 +127,7 @@ do_test (void)
+   results[1].source_addr_len = sizeof (so1);
+   results[1].source_addr_flags = 0;
+   results[1].service_order = 1;
++  results[1].prefixlen = 16;
+   memcpy (results[1].source_addr, so1, sizeof (so1));
+ 
+   results[0].dest_addr = ai2;
+@@ -132,6 +135,7 @@ do_test (void)
+   results[0].source_addr_len = sizeof (so2);
+   results[0].source_addr_flags = 0;
+   results[0].service_order = 0;
++  results[0].prefixlen = 16;
+   memcpy (results[0].source_addr, so2, sizeof (so2));
+ 
+ 
+--- a/posix/tst-rfc3484.c
 b/posix/tst-rfc3484.c
+@@ -94,6 +94,7 @@ do_test (void)
+   results[i].source_addr_len = sizeof (so);
+   results[i].source_addr_flags = 0;
+   results[i].service_order = i;
++  results[i].prefixlen = 8;
+ }
+ 
+   qsort (results, naddrs, sizeof (results[0]), rfc3484_sort);


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Please unblock glibc/2.7-10

2008-04-05 Thread Aurelien Jarno
Hi,

Could you please allow the migration of glibc/2.7-10 into testing? This
version has no known regression compared to the version in testing, and
is a good candidate for the Lenny release.

Thanks,
Aurelien

-- 
  .''`.  Aurelien Jarno | GPG: 1024D/F1BCDB73
 : :' :  Debian developer   | Electrical Engineer
 `. `'   [EMAIL PROTECTED] | [EMAIL PROTECTED]
   `-people.debian.org/~aurel32 | www.aurel32.net


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



r2907 - in glibc-package/trunk/debian: . patches/localedata

2008-04-05 Thread aurel32
Author: aurel32
Date: 2008-04-05 22:06:53 + (Sat, 05 Apr 2008)
New Revision: 2907

Added:
   glibc-package/trunk/debian/patches/localedata/locale-shs_CA.diff
Modified:
   glibc-package/trunk/debian/changelog
Log:
  * patches/localedata/locale-shs_CA.diff: add Secwepemcts?\195?\173n from CVS.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2008-04-05 22:01:49 UTC (rev 
2906)
+++ glibc-package/trunk/debian/changelog2008-04-05 22:06:53 UTC (rev 
2907)
@@ -12,6 +12,7 @@
   * patches/hppa/cvs-atomic.diff: new patch from upstream to fix atomic
 locks witch gcc-4.3.
   * patches/any/cvs-rfc3484.diff: update tests from CVS.  Closes: #474226.
+  * patches/localedata/locale-shs_CA.diff: add Secwepemctsín from CVS.
 
   [ Pierre Habouzit ]
   * Add any/cvs-strerror_r.diff to make strerror_r actually thread safe.

Added: glibc-package/trunk/debian/patches/localedata/locale-shs_CA.diff
===
--- glibc-package/trunk/debian/patches/localedata/locale-shs_CA.diff
(rev 0)
+++ glibc-package/trunk/debian/patches/localedata/locale-shs_CA.diff
2008-04-05 22:06:53 UTC (rev 2907)
@@ -0,0 +1,180 @@
+2008-03-04  Ulrich Drepper  [EMAIL PROTECTED]
+
+   * SUPPORTED (SUPPORTED-LOCALES): Add shs_CA.UTF-8.
+
+   [BZ #5627]
+   * locales/shs_CA: New file.
+
+--- libc/localedata/SUPPORTED
 libc/localedata/SUPPORTED
+@@ -325,6 +325,7 @@ rw_RW/UTF-8 \
+ sa_IN/UTF-8 \
+ sc_IT/UTF-8 \
+ se_NO/UTF-8 \
++shs_CA/UTF-8 \
+ si_LK/UTF-8 \
+ sid_ET/UTF-8 \
+ sk_SK.UTF-8/UTF-8 \
+--- /dev/null
 libc/localedata/locales/shs_CA
+@@ -0,0 +1,160 @@
++escape_char /
++comment_char  %
++
++% Secwepemctsin (Shuswap) language locale for Canada
++% sorting according to CAN/CSA-Z243.4.1-1992
++% Source: Neskie Manuel
++% Address: 745 Ska-Hiish Dr 
++%  Chase BC V0E 1M3
++% Contact: Neskie Manuel
++% Email: [EMAIL PROTECTED]
++% Tel: +1 - 2506792821
++% Fax: +1 - 2506792821
++% Language: shs
++% Territory: CA
++% Revision: 0.1
++% Date: 2008-01-11
++% Application: general
++% Users: general
++% Distribution and use is free, also
++% for commercial purposes.
++
++LC_IDENTIFICATION
++title  Secwepemctsin locale for Canada
++source Neskie Manuel
++address745 Ska-Hiish Dr, Chase BC V0E 1M3
++contact
++email  [EMAIL PROTECTED]
++tel
++fax
++language   Secwepemctsin
++territory  Canada
++revision   1.0
++date   2008-01-15
++%
++category  shs_CA:2000;LC_IDENTIFICATION
++category  shs_CA:2000;LC_CTYPE
++category  shs_CA:2000;LC_COLLATE
++category  shs_CA:2000;LC_TIME
++category  shs_CA:2000;LC_NUMERIC
++category  shs_CA:2000;LC_MONETARY
++category  shs_CA:2000;LC_MESSAGES
++category  shs_CA:2000;LC_PAPER
++category  shs_CA:2000;LC_NAME
++category  shs_CA:2000;LC_ADDRESS
++category  shs_CA:2000;LC_TELEPHONE
++
++END LC_IDENTIFICATION
++
++LC_COLLATE
++copy iso14651_t1
++
++reorder-after RES-1
++CAP
++
++%  Present in iso14651_t1, but these definitions seem to have been
++%  removed from latest iso14651 tables.
++reorder-after U0041
++U00C6 ae;LIGLIG;CAPCAP;IGNORE
++
++reorder-after U0061
++U00E6 ae;LIGLIG;MINMIN;IGNORE
++
++reorder-end
++
++END LC_COLLATE
++
++LC_CTYPE
++copy en_CA
++END LC_CTYPE
++
++LC_MONETARY
++copy en_CA
++END LC_MONETARY
++
++LC_NUMERIC
++copy en_CA
++END LC_NUMERIC
++
++LC_TIME
++abday  U0053U0078U0065;/
++   U0053U0070U0065;/
++   U0053U0065U006C;/
++   U004BU0065U006C;/
++   U004DU0065U0073;/
++   U0054U0073U0065;/
++   U0054U0071U006D
++day
U0053U0078U0065U0074U0073U0070U0065U0073U0071U0027U0074;/
++   
U0053U0070U0065U0074U006BU0065U0073U0071U0027U0074;/
++   U0053U0065U006CU0065U0073U0071U0027U0074;/
++   
U0053U006BU0065U006CU006CU0065U0073U0071U0027U0074;/
++   U0053U006DU0065U0073U0065U0073U0071U0027U0074;/
++   
U0053U0074U0073U0065U006CU006BU0073U0074U0065U0073U0071U0027U0074;/
++   
U0053U0074U0071U006DU0065U006BU0073U0074U0065U0073U0071U0027U0074
++abmon  U004BU0077U0065;/
++   U0054U0073U0069;/
++   U0053U0071U0065;/
++   U0045U0027U0077;/
++   U0045U006CU006C;/
++   U0054U0073U0070;/
++   U0054U0071U0077;/
++   U0043U0074U0027;/
++   U0051U0065U006C;/
++   U0057U0065U006C;/
++   U0055U0037U006C;/
++   U0054U0065U0074
++mon
U0050U0065U006CU006CU006BU0077U0065U0074U0027U006DU0069U006E;/
++   
U0050U0065U006CU0063U0074U0073U0069U0070U0077U0065U006EU0027U0074U0065U006E;/
++   
U0050U0065U006CU006CU0073U0071U0065U0027U0070U0074U0073;/
++   
U0050U0065U0073U006CU006CU0065U0027U0077U0074U0065U006E;/
++   
U0050U0065U006CU006CU0037U0065U006CU006CU0037U0065U0027U0037U006CU006CU0071U0074U0065U006E;/
++   

Processed: [bts-link] source package glibc

2008-04-05 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 #
 # bts-link upstream status pull for source package glibc
 # see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
 #
 user [EMAIL PROTECTED]
Setting user to [EMAIL PROTECTED] (was [EMAIL PROTECTED]).
 # remote status report for #456531
 #  * http://sourceware.org/bugzilla/show_bug.cgi?id=5443
 #  * remote status changed: NEW - RESOLVED
 #  * remote resolution changed: (?) - FIXED
 #  * closed upstream
 tags 456531 + fixed-upstream
Bug#456531: libc6: strerror_r() not thread-safe
Tags were: pending
Tags added: fixed-upstream

 usertags 456531 - status-NEW
Bug#456531: libc6: strerror_r() not thread-safe
Usertags were: status-NEW.
Usertags are now: .
 usertags 456531 + status-RESOLVED resolution-FIXED
Bug#456531: libc6: strerror_r() not thread-safe
There were no usertags set.
Usertags are now: status-RESOLVED resolution-FIXED.
 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



[bts-link] source package glibc

2008-04-05 Thread bts-link-upstream
#
# bts-link upstream status pull for source package glibc
# see http://lists.debian.org/debian-devel-announce/2006/05/msg1.html
#

user [EMAIL PROTECTED]

# remote status report for #456531
#  * http://sourceware.org/bugzilla/show_bug.cgi?id=5443
#  * remote status changed: NEW - RESOLVED
#  * remote resolution changed: (?) - FIXED
#  * closed upstream
tags 456531 + fixed-upstream
usertags 456531 - status-NEW
usertags 456531 + status-RESOLVED resolution-FIXED

thanks



Re: Please unblock glibc/2.7-10

2008-04-05 Thread Luk Claes
On Sat, Apr 05, 2008 at 08:36:44PM -0300, Otavio Salvador wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 Aurelien Jarno [EMAIL PROTECTED] writes:
 
 Hello Aurelien,
 
 Since glibc builds udeb, next time add debian-boot mailing list on CC
 so we don't lose it.
 
  Could you please allow the migration of glibc/2.7-10 into testing? This
  version has no known regression compared to the version in testing, and
  is a good candidate for the Lenny release.
 
 No objection from d-i POV.

unblocked

Cheers

Luk


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Re: Please unblock glibc/2.7-10

2008-04-05 Thread Otavio Salvador
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Aurelien Jarno [EMAIL PROTECTED] writes:

Hello Aurelien,

Since glibc builds udeb, next time add debian-boot mailing list on CC
so we don't lose it.

 Could you please allow the migration of glibc/2.7-10 into testing? This
 version has no known regression compared to the version in testing, and
 is a good candidate for the Lenny release.

No objection from d-i POV.

- -- 
O T A V I OS A L V A D O R
- -
 E-mail: [EMAIL PROTECTED]  UIN: 5906116
 GNU/Linux User: 239058 GPG ID: 49A5F855
 Home Page: http://otavio.ossystems.com.br
- -
Microsoft sells you Windows ... Linux gives
 you the whole house.
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Processed by Mailcrypt 3.5.8+ http://mailcrypt.sourceforge.net/

iD8DBQFH+A0LLqiZQEml+FURAnHOAJ9COv4U/gALBY1tdwusJPcoyNZeQQCfZqG1
WnxocFSUeGGcSSXSgnjTku8=
=rZYN
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#442858: libc6-prof: programs linked agains libc_p.a crash with a SEGV

2008-04-05 Thread Aurelien Jarno
On Mon, Sep 17, 2007 at 02:25:24PM +0100, Stephane Chazelas wrote:
 Package: libc6-prof
 Version: 2.6.1-4
 Severity: grave
 Justification: renders package unusable
 
 
 Hi,
 
 I don't seem to able build any program linked against the
 profiled version of the glibc.
 
 I can reproduce the problem with any version of gcc (3.3, 3.4,
 4.0, 4.1, 4.2), with 2.6.1-1 and 2.6.1-4. Manually linking
 against libc6-prof_2.3.6.ds1-13etch4_i386.deb using the crt's in
 libc6-dev_2.3.6.ds1-13etch4_i386.deb (on the same unstable
 debian host) is OK.
 

The problem is that the new glibc needs libgcc_s.so.1 for exceptions
handling, which needs in turn libc.so.6. Linking with -lc_p means the
glibc is linked statically, while it is also linked dynamically via
libgcc.

The solution is to link with -static-libgcc -lc_p.

I will add a README to the libc6-prof package to explain how to use it.

-- 
  .''`.  Aurelien Jarno | GPG: 1024D/F1BCDB73
 : :' :  Debian developer   | Electrical Engineer
 `. `'   [EMAIL PROTECTED] | [EMAIL PROTECTED]
   `-people.debian.org/~aurel32 | www.aurel32.net



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]