On 04/16/2018 07:05 PM, Andreas Müller wrote:
Hi,

I am not happy plastering patches around for musl. This gets even
worse when I see patches like this [1]: Just wipe away security checks
unconditionally - the developers did introduce this check not just for
fun I guess...

I have seen this already elsewhere so: musl maintainers please take
care not to modify code for glibc!

[1] 
https://github.com/openembedded/openembedded-core/blob/master/meta/recipes-core/systemd/systemd/0001-Use-getenv-when-secure-versions-are-not-available.patch

Andreas

Hi Anreas,

I can see I rebased this patch. So I think I need to reply.

I agree with you that musl related patches should not affect glibc.
How about we using something like SRC_URI_append_libc-musl to organize the musl related patches?
Or do you have some other suggestion?

Best Regards,
Chen Qi
--
_______________________________________________
Openembedded-core mailing list
Openembedded-core@lists.openembedded.org
http://lists.openembedded.org/mailman/listinfo/openembedded-core

Reply via email to