Samuel Thibault pushed to branch glibc-2.37 at GNU Libc Maintainers / glibc
Commits:
5af8e370 by Samuel Thibault at 2023-06-17T22:23:37+02:00
debian/testsuite-xfail-debian.mk: Update hurd results
- - - - -
2 changed files:
- debian/changelog
- debian/testsuite-xfail-debian.mk
View it on
Aurelien Jarno pushed to branch glibc-2.37 at GNU Libc Maintainers / glibc
Commits:
53489107 by наб at 2023-06-17T11:04:31+02:00
Parallelise locale-gen if possible
Assuming a very generous 200M free/localedef (because I saw a max RSS
of 147M w/time(1)), this will attempt to keep all jobs
Aurelien Jarno pushed to branch glibc-2.37 at GNU Libc Maintainers / glibc
Commits:
06328755 by Aurelien Jarno at 2023-06-17T11:10:28+02:00
releasing package glibc version 2.37-2
- - - - -
1 changed file:
- debian/changelog
View it on GitLab:
Aurelien Jarno pushed new tag debian/2.37-2 at GNU Libc Maintainers / glibc
--
View it on GitLab:
https://salsa.debian.org/glibc-team/glibc/-/tree/debian/2.37-2
You're receiving this email because of your account on salsa.debian.org.
Your message dated Sat, 17 Jun 2023 09:20:45 +
with message-id
and subject line Bug#1037198: fixed in glibc 2.37-2
has caused the Debian Bug report #1037198,
regarding locales: please parallelise locale-gen
to be marked as done.
This means that you claim that the problem has been dealt with.
glibc_2.37-2_source.changes uploaded successfully to localhost
along with the files:
glibc_2.37-2.dsc
glibc_2.37-2.debian.tar.xz
glibc_2.37-2_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
Thank you for your contribution to Debian.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 17 Jun 2023 11:10:20 +0200
Source: glibc
Architecture: source
Version: 2.37-2
Distribution: experimental
Urgency: medium
Maintainer: GNU Libc Maintainers
Changed-By:
Package: libc6
Version: 2.36-9
Documentation tells me that
sysconf(_SC_NPROCESSORS_CONF)
get_nprocs_conf()
gives me the upper bound of CPUs and
sysconf(_SC_NPROCESSORS_ONLN)
get_nprocs()
gives the currently online CPUs.
get_nprocs_conf seems to return "possible" value, and it
Your message dated Sat, 17 Jun 2023 21:36:12 +0900
with message-id <87o7le8dvn.dancerj-dan...@netfort.gr.jp>
and subject line glibc update is available in buster security updates
has caused the Debian Bug report #987432,
regarding glibc Vulnerability in Debian Buster
to be marked as done.
This
9 matches
Mail list logo