Your message dated Sat, 14 Apr 2001 22:55:05 +0200 with message-id <[EMAIL PROTECTED]> and subject line Closed in csh 20010413-1 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Darren Benham (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 13 Jan 2000 13:10:58 +0000 Received: (qmail 2109 invoked from network); 13 Jan 2000 13:10:58 -0000 Received: from sunu450.rz.ruhr-uni-bochum.de (134.147.64.5) by master.debian.org with SMTP; 13 Jan 2000 13:10:58 -0000 Received: (qmail 6393 invoked from network); 13 Jan 2000 13:10:56 -0000 Received: from unknown (HELO ulysses.alg.ruhr-uni-bochum.de) ([EMAIL PROTECTED]) by mailhost.rz.ruhr-uni-bochum.de with SMTP; 13 Jan 2000 13:10:56 -0000 Received: from marcus by ulysses.alg.ruhr-uni-bochum.de with local (Exim 3.03 #1 (Debian)) id 128k5b-00005k-00; Thu, 13 Jan 2000 14:14:59 +0100 From: Marcus Brinkmann <[EMAIL PROTECTED]> Subject: csh: [hurd] use of MAXPATHLEN To: [EMAIL PROTECTED] X-Mailer: bug 3.2.7 Message-Id: <[EMAIL PROTECTED]> Date: Thu, 13 Jan 2000 14:14:59 +0100 Package: csh Version: N/A Severity: normal Hi, (for the Hurd, this is an important bug as csh won't build). dir.c and other files amke unconditional use of MAXPATHLEN. However, on the Hurd this symbol is not defined, because there is no upper limit. The POSIXly right thing is to query a possible run time limit with pathconf(), and if that returns -1, deal with arbitrary path lengths by making good use of malloc()/realloc() [the standard library calls return ENAMETOOLONG and similar if the space is not yet enough]. BTW, in glibc, there exist other interfaces that don't make use of a fixed size buffer, for example get_current_dir_name. You can make use of them if you check for GLIBC and define _GNU_SOURCE before including the header files like this: #ifdef __GLIBC__ #define _GNU_SOURCE #endif #include <unistd.h> Thanks, Marcus -- System Information Debian Release: potato Kernel Version: Linux ulysses 2.2.13 #1 Sat Nov 20 12:44:19 EST 1999 i586 unknown --------------------------------------- Received: (at 54993-done) by bugs.debian.org; 14 Apr 2001 20:37:49 +0000 >From [EMAIL PROTECTED] Sat Apr 14 15:37:49 2001 Return-path: <[EMAIL PROTECTED]> Received: from jagor.srce.hr [161.53.2.130] (root) by master.debian.org with esmtp (Exim 3.12 1 (Debian)) id 14oWnj-0004gB-00; Sat, 14 Apr 2001 15:37:48 -0500 Received: from om (asy48.jmu.carnet.hr [193.198.128.48]) by jagor.srce.hr (8.9.0/8.9.0) with ESMTP id WAA27985; Sat, 14 Apr 2001 22:37:41 +0200 (MET DST) Received: from mvela by om with local (Exim 3.22 #1 (Debian)) id 14oX4X-00006c-00; Sat, 14 Apr 2001 22:55:09 +0200 Date: Sat, 14 Apr 2001 22:55:05 +0200 From: Matej Vela <[EMAIL PROTECTED]> To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Closed in csh 20010413-1 Message-ID: <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.17i X-Accept-Language: en, hr Sender: Matej Vela <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] (This report is being closed manually due to Bug#71600.) The .changes file follows. -----BEGIN PGP SIGNED MESSAGE----- Format: 1.7 Date: Fri, 13 Apr 2001 20:43:09 +0200 Source: csh Binary: csh Architecture: source i386 Version: 20010413-1 Distribution: unstable Urgency: medium Maintainer: Debian QA Group <[EMAIL PROTECTED]> Changed-By: Matej Vela <[EMAIL PROTECTED]> Description: csh - Shell with C-like syntax, standard login shell on BSD systems. Closes: 54993 63650 88780 90859 90860 91435 Changes: csh (20010413-1) unstable; urgency=medium . * New upstream version, re-ported from OpenBSD-current: * csh.c: Include <time.h> for time_t etc. Closes: #90859. * csh.c (main, readf, writef, seekf, closef): funopen substituted with fopencookie. * csh.c (pintr1), proc.c (pprint): fpurge substituted with fflush. (Anything better?) * csh.h: Define MAXPATHLEN to 4096 if it isn't already defined (e.g. on the Hurd). If X11 and Tcl can get away with it, so can we. ;-) Closes: #54993. * glob.c (libglob): * Don't set GLOB_QUOTE, it's already default. * Work around gl_matchc, this time correctly. Closes: #88780. * misc.c (closem): Upstream fixed it to use `sysconf (_SC_OPEN_MAX)' rather than NOFILE. Closes: #63650. * proc.c (dokill), proc.h, siglist.in: Use our own sys_signame array, constructed from siglist.in (taken from pdksh 5.2.14). * Package is orphaned (see #92493); maintainer set to Debian QA Group. * Converted to debhelper. Closes: #91435. * Conforms to Standards version 3.5.2: * Added build dependencies. Closes: #90860. * debian/rules: Support the `debug' build option. * debian/copyright: Updated. * Changed priority to optional, catching up with the override file. * debian/lintian: Override the `binary-without-manpage: csh' Lintian error caused by the /usr/bin/csh -> /bin/csh symlink. * debian/rules: Added a `get-orig-source' target. * Removed pre-bo (<< 5.26-6) compatibility code. Files: d7833337908e960e43aa3379bd49c9c5 721 shells optional csh_20010413-1.dsc fdd1070dd9d9f42299ad36bdaaa076eb 178545 shells optional csh_20010413.orig.tar.gz 72fd1f575296f15bde55efb6a9f2c32e 7367 shells optional csh_20010413-1.diff.gz 08f70f96a4bb3f0b899ae64a9a8b18d5 225564 shells optional csh_20010413-1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iQCVAwUBOtiN5uz+R+WhGHJJAQEyYgP9E5pX2vzCrV4jfNS13RRizHdtKTgvqzf3 shEMqoeOy3NkT716jYzOUHXpeni8ysMpMeBFQkHqDO+Y/2g8Heo4b4NPv1vVqXou 7G4FBFn8GGNqqtG7cR2Q6MK9zQS+C2xYTcdnc3UdDi/9/ioVS1qL9hfu4w4P1hnI ri28fZkzzH0= =X00F -----END PGP SIGNATURE-----