Author: aurel32
Date: 2015-11-22 10:41:08 + (Sun, 22 Nov 2015)
New Revision: 6688
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/patches/kfreebsd/local-sysdeps.diff
Log:
patches/kfreebsd/local-sysdeps.diff, patches/kfreebsd/local-fbt
Author: aurel32
Date: 2015-11-22 17:05:01 + (Sun, 22 Nov 2015)
New Revision: 6689
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/patches/kfreebsd/local-scripts.diff
glibc-package/branches/glibc-2.21/debian/patches/kfreebsd/local-s
On 2015-11-16 21:21, Stefan Fritsch wrote:
> Adding crypt blowfish would improve interopability (e.g. for NIS). So
> far there has been md5 crypt as common algorithm that is supported by
> most platforms, but that is now considered insecure and it has been
> removed from some platforms.
>
> So,
On 2015-11-08 16:13, Sebastian Andrzej Siewior wrote:
> Hi,
>
> fts() with LFS support seems to be fixed in glibc 2.23 [0], [1]. Is it
> likely that this libc can be used in the next debian release?
We can't guarantee anything for stretch yet, but it looks possible given
the timing.
> A backport
Processing commands for cont...@bugs.debian.org:
> tags 534521 + fixed-upstream
Bug #534521 [src:glibc] libc6-dev: /usr/include/fts.h cannot be compiled with
-D_FILE_OFFSET_BITS=64
Bug #317466 [src:glibc] pax cannot access files >2gb
Added tag(s) fixed-upstream.
Added tag(s) fixed-upstream.
> tha
Author: aurel32
Date: 2015-11-22 18:08:16 + (Sun, 22 Nov 2015)
New Revision: 6690
Added:
glibc-package/branches/glibc-2.21/debian/patches/hppa/submitted-gmon-start.diff
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/patches/serie
Author: aurel32
Date: 2015-11-22 18:09:54 + (Sun, 22 Nov 2015)
New Revision: 6691
Modified:
glibc-package/branches/glibc-2.21/debian/testsuite-checking/expected-results-mips64el-linux-gnu-libc
glibc-package/branches/glibc-2.21/debian/testsuite-checking/expected-results-mipsel-linux-gnu
Author: aurel32
Date: 2015-11-22 18:13:29 + (Sun, 22 Nov 2015)
New Revision: 6692
Modified:
glibc-package/branches/glibc-2.21/debian/control
glibc-package/branches/glibc-2.21/debian/control.in/main
Log:
Don't include debian-revision in gnumach-dev build-depends to make lintian happy
Mo
Author: aurel32
Date: 2015-11-22 18:26:33 + (Sun, 22 Nov 2015)
New Revision: 6693
Removed:
glibc-package/branches/glibc-2.21/debian/patches/any/cvs-make-typo.diff
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/patches/git-updates.
Author: aurel32
Date: 2015-11-22 18:37:33 + (Sun, 22 Nov 2015)
New Revision: 6694
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/patches/git-updates.diff
Log:
Update from upstream stable branch:
- Fix FTBFS with libselinux 2.4.
Mo
Author: aurel32
Date: 2015-11-22 19:21:04 + (Sun, 22 Nov 2015)
New Revision: 6696
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
Log:
New changelog entry
Modified: glibc-package/branches/glibc-2.21/debian/changelog
Author: aurel32
Date: 2015-11-22 19:20:53 + (Sun, 22 Nov 2015)
New Revision: 6695
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
Log:
Upload to experimental
Modified: glibc-package/branches/glibc-2.21/debian/changelog
=
glibc_2.21-0experimental3_source.changes uploaded successfully to localhost
along with the files:
glibc_2.21-0experimental3.dsc
glibc_2.21-0experimental3.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host franck.debian.org)
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#793641: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #793641,
regarding glibc: too few static TLS slots
to be marked as done.
This means that you claim that the problem has been dealt wi
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#793641: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #793641,
regarding glibc: too few static TLS slots
to be marked as done.
This means that you claim that the problem has been dealt wi
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Sun, 22 Nov 2015 19:37:39 +0100
Source: glibc
Binary: libc-bin libc-dev-bin libc-l10n glibc-doc glibc-source locales
locales-all nscd multiarch-support libc6 libc6-dev libc6-dbg libc6-pic
libc6-udeb libc6.1 libc6.1-dev
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#799478: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #799478,
regarding glibc: revised atomic and new syscall patches for hppa
to be marked as done.
This means that you claim that the pr
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#805730: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #805730,
regarding glibc: __gmon_start__ symbol proliferation on hppa
to be marked as done.
This means that you claim that the proble
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#753909: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #753909,
regarding libc6-dev: netinet/in.h lacks several IPv6 socket options
to be marked as done.
This means that you claim that the
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#712074: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #712074,
regarding [libc0.1-dev] provide F_DUPFD_CLOEXEC
to be marked as done.
This means that you claim that the problem has been de
Your message dated Sun, 22 Nov 2015 19:34:46 +
with message-id
and subject line Bug#722885: fixed in glibc 2.21-0experimental3
has caused the Debian Bug report #722885,
regarding libc0.1-dev: useless prototype for accept4 on kfreebsd
to be marked as done.
This means that you claim that the pr
Source: glibc
Version: 2.19-22
Severity: normal
Tags: patch
Dear Maintainer,
The attached fixes a problem found building the gmt package. See BZ 19270:
https://sourceware.org/bugzilla/show_bug.cgi?id=19270
Normally gcc optimizes the isnan macro so the __isnanl call is eliminated.
Thus the probl
Author: aurel32
Date: 2015-11-22 22:40:25 + (Sun, 22 Nov 2015)
New Revision: 6697
Modified:
glibc-package/branches/glibc-2.21/debian/changelog
glibc-package/branches/glibc-2.21/debian/testsuite-checking/expected-results-i586-kfreebsd-gnu-libc
glibc-package/branches/glibc-2.21/debian
Processing control commands:
> reassign -1 glibc
Bug #805779 [libogre-1.9.0v5] libogre-1.9.0v5: Exception "dlopen: cannot load
any more object with static TLS" make lib crash at startup
Bug reassigned from package 'libogre-1.9.0v5' to 'glibc'.
No longer marked as found in versions ogre-1.9/1.9.0+
Processing commands for cont...@bugs.debian.org:
> reassign 805779 libc6
Bug #805779 [glibc] libogre-1.9.0v5: Exception "dlopen: cannot load any more
object with static TLS" make lib crash at startup
Bug reassigned from package 'glibc' to 'libc6'.
Ignoring request to alter found versions of bug #
25 matches
Mail list logo