-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 03 Nov 2013 15:20:06 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.157-2
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - Secure Sockets Layer toolkit - libcrypto udeb (udeb)
libssl-dev - Secure Sockets Layer toolkit - development files
libssl-doc - Secure Sockets Layer toolkit
On Fri, Oct 11, 2013 at 12:32:27PM -0700, Steve Langasek wrote:
severity 726009 serious
thanks
This remains a serious bug. Your package, which previously built on
multiple architectures, is now failing to build due to memory exhaustion.
While in some circumstances it is permissible to
On Tue, Oct 08, 2013 at 11:44:26PM +0200, Bill Allombert wrote:
Dear developpers,
Is there other people still using gpm intensively (the console mouse selection
system) ? The Debian package is unmaintained and the upstream project is not
very active either.
I do, but I don't have any
On Thu, Oct 03, 2013 at 11:54:55AM +0200, Vincent Danjean wrote:
The current proposal about Depends/Conflicts/Provides is the following:
ICD Loader:
===
Section: libs
Multi-Arch: same
Architecture: any
Provides: libopencl1
Conflicts: libopencl1
Replaces: libopencl1
Suggests (or
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 01 Oct 2013 18:21:23 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.157-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
On Sun, Sep 22, 2013 at 08:11:10PM +0100, Adam D. Barratt wrote:
Hi,
The next point release for wheezy (7.2) is scheduled for Saturday
October 12th. Stable NEW will be frozen during the preceding weekend.
Can you please clarify what is acceptable for uploads to proposed
updates to get them
On Fri, Sep 13, 2013 at 09:29:30AM -0400, James Cloos wrote:
The root problem (pardon the pun) is that cacert's root certificate is
signed with md5 and gnutls doesn't like that.
A self-signed cert's signature algorithm really isn't that
important. You either trust that cert or you don't.
On Fri, Sep 13, 2013 at 10:51:06PM +0200, Kurt Roeckx wrote:
The problem in the referenced URI is that gnutls refuses to tolerate
a less secure DH key size. Here, gnutls refuses to tolerate a less
secure hash algorithm.
I think gnutls by default has a minimum size of 727 for the DH
size
On Fri, Sep 13, 2013 at 11:31:38PM +0200, Paul Wise wrote:
On Fri, Sep 13, 2013 at 10:51 PM, Kurt Roeckx wrote:
A self-signed cert's signature algorithm really isn't that
important. You either trust that cert or you don't.
Surely this work would apply to self-signed certs too?
http
On Fri, Aug 30, 2013 at 09:13:59AM +0200, Tollef Fog Heen wrote:
I could see a *huge* load on this pool for this reason.
If so, so what? We are not short of bandwidth and we do have contacts
and offers from CDNs which will make serving this Not A Problem(TM).
So should we take that as
On Wed, Aug 07, 2013 at 09:07:48PM +0100, Neil Williams wrote:
On Wed, 07 Aug 2013 22:01:33 +0530
Ritesh Raj Sarraf r...@researchut.com wrote:
Taking this topic forward, I also reached out to upstream folks,
asking them to fix these build errors on various architectures.
I already did
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sun, 28 Jul 2013 14:32:23 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.156-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 06 Aug 2013 20:50:22 +0200
Source: epic4
Binary: epic4
Architecture: source amd64
Version: 1:2.10.2-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 06 Aug 2013 21:00:20 +0200
Source: epic5
Binary: epic5
Architecture: source amd64
Version: 1.1.6-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
Description
On Mon, Jul 08, 2013 at 08:23:28AM +0200, Helmut Grohne wrote:
Indeed. So maybe mdns is to blame here for part of the trouble? Can you
verify that really the last mdns4 entry makes up for the difference?
mdns has always been a problem in my expierence. I thought there
was a bug open about
On Sun, Jul 07, 2013 at 02:30:33PM +0200, Thomas Hood wrote:
Continuing on from the boot ordering and resolvconf thread;
cc:ed to Helmut in case this gets filtered again; bcc:ed to
683...@bugs.debian.org since this is relevant for how that
issue is addressed...
A related bug is #582916
On Wed, Jul 03, 2013 at 05:35:35PM +0200, Ondrej Surý wrote:
fabien boucher fabien.dot.bouc...@gmail.com
libjson0-dev : json-c
/usr/lib/x86_64-linux-gnu/libjson.so
Also a false positive - this is result of json to json-c library name
transition made by upstream and the
On Thu, Jul 04, 2013 at 11:36:25AM +0800, Paul Wise wrote:
On Tue, Jun 25, 2013 at 1:28 PM, Alexandre Rebert wrote:
We found the bugs using Mayhem [1], an automatic bug finding system
that we've been developing in David Brumley's research lab for a
couple of years. We recently ran Mayhem
On Thu, Jul 04, 2013 at 12:39:05PM +0800, Paul Wise wrote:
On Thu, Jul 4, 2013 at 12:28 PM, Kurt Roeckx wrote:
I think any open source project can ask that
Indeed, however, for a project like Debian it would probably require
some changes in their service or at least an ack for the large
On Wed, Jun 05, 2013 at 09:10:39PM +0200, Anton Gladky wrote:
Dear all,
I have a proposal to give a permission to all DDs to restart builds on
failing archs e.g. execute gb-command.
I think, most of developers are clever enough to define, whether the
built failed accidentally and needs to
On Fri, Jun 07, 2013 at 10:41:47PM +, Thorsten Glaser wrote:
Kurt Roeckx dixit:
If you add that requirement, it can be upto 24 bit smaller than
time_t. But as far as I know, there is no such requirement. In
Sure. As I was saying, software in practice wants that,
such as the mktime
On Fri, Jun 07, 2013 at 07:34:21AM -0400, Kumar Appaiah wrote:
On Fri, Jun 07, 2013 at 11:54:49AM +0200, Mathieu Malaterre wrote:
cmake from sid makes it even harder. RelWithDebInfo now contains
-DNDEBUG ... I have to source-upload all my packages :(
$ grep NDEBUG ChangeLog.manual
On Fri, Jun 07, 2013 at 09:49:00AM +, Thorsten Glaser wrote:
Russ Allbery rra at debian.org writes:
Be aware that x32 has sizeof(time_t) sizeof(long), so you should expect
So has MirBSD/i386 (since 2004-06-19) and NetBSD (since roughly a year).
Most frequent thing is format
On Fri, Jun 07, 2013 at 09:37:45PM +, Thorsten Glaser wrote:
Kurt Roeckx dixit:
tm_year should be an int, not a time_t or long. Note that it
POSIX says it must be a long...
It doesn't say so here. It has it as an int.
Also note that time_t didn't have a requirement to be an integer
On Fri, May 24, 2013 at 12:32:29PM +0200, Dennis van Dok wrote:
The point I'd like to raise is that the current model of CA
certificates seems to take an all-or-nothing approach: either a CA is
trusted (for whatever purpose) or not. For the IGTF CAs, this may not
be the right approach.
One of
On Wed, May 22, 2013 at 10:39:06PM +0200, Helmut Grohne wrote:
On Tue, May 21, 2013 at 10:53:43PM +0200, Lucas Nussbaum wrote:
There was a GSoC project in 2012 about generating sysvinit scripts from
systemd .service files. Was there some communication about its outcome?
I had a look at
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 21 May 2013 22:10:21 +0200
Source: epic5
Binary: epic5
Architecture: source amd64
Version: 1.1.5-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
Description
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 21 May 2013 22:25:40 +0200
Source: lice5
Binary: epic5-script-lice
Architecture: source all
Version: 1:5.2.5-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
ntp- Network Time Protocol daemon and utility programs
ntp-doc- Network Time Protocol documentation
ntpdate- client for setting system time from NTP servers
Closes: 696390
Changes:
ntp (1:4.2.6.p5+dfsg-3) unstable
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libmad0- MPEG audio decoder library
libmad0-dev - MPEG audio decoder development library
Closes: 653676 700437
Changes:
libmad (0.15.1b-8) unstable; urgency=low
.
* Add multiarch support. (Closes: #653676)
Patch by Steve Langasek
On Thu, May 16, 2013 at 08:03:33AM +0100, Lars Wirzenius wrote:
I'd use a PPA-style package repository of some sort, and then advertise
it to people might want to try that version of the package.
Then it makes more sense to upload it to experimental to me.
Kurt
--
To UNSUBSCRIBE, email
On Thu, May 09, 2013 at 08:49:51PM +0100, Lars Wirzenius wrote:
Releases are important
--
Releases are important to many, perhaps most, of our users. Hackers
and hardcore powerusers don't necessarily care about them, of course,
but most others do. A released version of
On Wed, May 08, 2013 at 05:27:01AM +0200, Adam Borowski wrote:
On Wed, May 08, 2013 at 09:46:02AM +0800, Thomas Goirand wrote:
What I think should be fixed is the fact that it doesn't
appear in the filename. I never understood why they
don't. Did I miss something?
Having a colon in
On Sat, Apr 13, 2013 at 06:52:01AM -0300, Ben Armstrong wrote:
- - -=-=-=-=-=- Don't Delete Anything Between These Lines =-=-=-=-=-=-=-=-
[...]
So you're the second person that doesn't follow the headers I've
set:
Reply-To: leader2...@vote.debian.org
Mail-Followup-To: leader2...@vote.debian.org
On Sun, Mar 31, 2013 at 01:03:52PM +0300, Timo Juhani Lindfors wrote:
Kurt Roeckx k...@roeckx.be writes:
- md5_hex($name $alias obfuscate\n), \n;
+ hmac_sha256_hex($name, obfuscate), \n;
part probably needs some further work. Should it be
+ hmac_sha256_hex
On Tue, Apr 24, 2012 at 12:56:19PM +0300, Timo Juhani Lindfors wrote:
Hello,
I think I found a bug in devotee (debian vote engine) that breaks the
secrecy elections.
I just pushed a change for this issue to my git repo at:
On Sat, Mar 30, 2013 at 05:13:23PM +0200, Timo Juhani Lindfors wrote:
Kurt Roeckx k...@roeckx.be writes:
I just pushed a change for this issue to my git repo at:
http://anonscm.debian.org/gitweb/?p=users/kroeckx/devotee.git;a=summary
I would be grateful if people can review
On Sat, Mar 30, 2013 at 03:41:09PM +0100, Kurt Roeckx wrote:
I just pushed a change for this issue to my git repo at:
http://anonscm.debian.org/gitweb/?p=users/kroeckx/devotee.git;a=summary
I would be grateful if people can review that.
I also still need to do something about the order
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
On Fri, Jan 18, 2013 at 10:11:50AM -0600, Paul Johnson wrote:
$ dpkg -l | grep libc6
ii libc6:amd64 2.13-37 amd64
ii libc6:i3862.13-37 i386
ii libc6-amd64 2.13-37 i386
ii libc6-i3862.13-37 amd64
So you basicly have libc6 installed 4 times, twice for i386 and
twice for
On Thu, Oct 11, 2012 at 01:19:58AM +0200, Christoph Anton Mitterer wrote:
Hi folks.
AFAICS, secure APT and similar things (e.g. dpkg's file hash sums) still
use even MD5.
dpkg-genchanges and dak both generate md5, sha1 and sha256. So
.deb files themself are hashed by all 3 of them. A as
On Fri, Oct 12, 2012 at 12:42:57AM +0600, Andrey Rahmatullin wrote:
On Thu, Oct 11, 2012 at 08:18:55PM +0200, Kurt Roeckx wrote:
There are also the md5sums files that are stored in the .deb file.
I'm not really sure what the real use case for them is and
wouldn't have a problem with them
On Mon, Sep 24, 2012 at 07:33:03PM +0200, Joachim Breitner wrote:
Hi,
Am Montag, den 24.09.2012, 11:59 -0500 schrieb Peter Samuelson:
[Joachim Breitner]
Would it be possible to extend the syntax to specify lists of
packages not by name, but by Maintainer,
e.g.
On Fri, Sep 21, 2012 at 08:26:24PM +0100, peter green wrote:
While working on debian one thing I have not managed to find is
documentation on what packages can and can't assume about the build
environment. Does such documentation exist and if not should it be
created.
One thing that is at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Tue, 18 Sep 2012 21:12:08 +0200
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.153-2
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
On Sat, Sep 15, 2012 at 12:15:51AM +0400, Michael Tokarev wrote:
So we have the following options:
1) package just this single file, of 20 bytes long, in a
separate Arch:all package, in it's own separate source.
2) drop ppc support where this file is required.
3) Just ship the
On Sat, Sep 15, 2012 at 01:11:47AM +0400, Michael Tokarev wrote:
On 15.09.2012 01:03, Kurt Roeckx wrote:
On Sat, Sep 15, 2012 at 12:15:51AM +0400, Michael Tokarev wrote:
So we have the following options:
1) package just this single file, of 20 bytes long, in a
separate Arch:all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 31 Aug 2012 22:23:19 +0200
Source: lice5
Binary: epic5-script-lice
Architecture: source all
Version: 1:5.2.4-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 06 Aug 2012 20:10:12 +0200
Source: epic5
Binary: epic5
Architecture: source amd64
Version: 1.1.4-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
Description
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
On Fri, Jul 13, 2012 at 06:13:43PM +0900, Norbert Preining wrote:
Hi everyone,
can we somehome make $subject a target for the *next* release?
It is ridiculous that it is in fact completely arbitrary what
program is used to open files. Currently in my gnome-shell
pdfs are opened with a
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 28 May 2012 13:02:52 +0200
Source: lice5
Binary: epic5-script-lice
Architecture: source all
Version: 1:5.2.3-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k...@roeckx.be
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
On Sat, Apr 07, 2012 at 11:27:46AM +0200, Raphael Hertzog wrote:
Hi,
On Sat, 07 Apr 2012, Julien Cristau wrote:
On Sat, Apr 7, 2012 at 02:17:21 +0200, Kurt Roeckx wrote:
However, I wonder why bindnow isn't on by default. I thought we had
a discussion about this, and didn't really
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 07 Apr 2012 15:54:29 +0200
Source: dutch
Binary: idutch wdutch aspell-nl myspell-nl
Architecture: source all
Version: 1:2.10-1
Distribution: unstable
Urgency: low
Maintainer: Thijs Kinkhorst th...@debian.org
Changed-By: Kurt
-By: Kurt Roeckx k...@roeckx.be
Description:
madplay- MPEG audio player in fixed point
Closes: 619341 625649
Changes:
madplay (0.15.2b-8) unstable; urgency=high
.
* Fix buffer overflow in the alsa output code (Closes: #619341)
Thanks to Ben Winslow r...@bluecherry.net
* Only build
On Sun, Apr 01, 2012 at 11:29:42AM -0700, Kees Cook wrote:
Note that the default flags in both Ubuntu and Debian lack PIE (where
as Gentoo's hardening patchset includes PIE by default). The Debian
hardening documentation has encouraged maintainers to enable PIE too
if they have a sensitive
On Mon, Apr 02, 2012 at 11:00:11PM +0900, Charles Plessy wrote:
Nevertheless, facts such as protein sequences are not copyrightable. This is
somewhat confirmed by the UniProt consortium itself on their website
(http://www.uniprot.org/help/license), and my conclusion is that, in isolation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Fri, 24 Feb 2012 20:23:08 +0100
Source: elfutils
Binary: elfutils libelf1 libelf-dev libdw-dev libdw1 libasm1 libasm-dev
Architecture: source amd64
Version: 0.153-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k
On Mon, Feb 20, 2012 at 12:47:31PM +0100, Jérémy Lal wrote:
Hi,
i am not able to tell if abi-compliance-checker is serious enough to
be able to use its results to ensure ABI-compatibility of C++ libs.
It gives informations like :
http://www.upstream-tracker.org/versions/v8.html
It's the best
On Tue, Feb 14, 2012 at 11:09:44PM +, Sune Vuorela wrote:
On 2012-02-14, Kurt Roeckx k...@roeckx.be wrote:
It was always my understanding that protected wasn't useful,
because it's even more expensive.
Can you come with a bit pointers or numbers about 'expensive' ?
So as far as I
On Wed, Feb 15, 2012 at 12:09:41AM +, Uoti Urpala wrote:
Anyway, the C standard says that there is a requirement that
both the DSO itself as all other objects must be able to take
the address of it and still get the same pointer. And this
obviously fails in your example.
Yes, it
On Wed, Feb 15, 2012 at 07:39:50PM +, Uoti Urpala wrote:
The most obvious way how the non-fPIE case could theoretically work would be
having
such text relocations for main executable; without them you can't expect
things
to work without special tricks.
Yes, and I expect the toolchain
On Mon, Feb 13, 2012 at 10:29:23PM +, Uoti Urpala wrote:
Kurt Roeckx kurt at roeckx.be writes:
So my understanding is that you want to build libraries with -fPIE
instead of -fPIC, and that that creates a different ABI?
What affects the ABI is compiling the library in a way that does
On Tue, Feb 14, 2012 at 08:17:09PM +, Uoti Urpala wrote:
Kurt Roeckx kurt at roeckx.be writes:
What affects the ABI is compiling the library in a way that does not
support
copy relocations. This can be done with visibility attributes or linker
It was always my understanding
On Sun, Jan 29, 2012 at 11:06:27PM +, Sune Vuorela wrote:
Hi
One of my upstreams of a collection of shared libraries is about to make
a change that is going to require all executables built against these
shared libraries to be built with -fPIE (and libraries with -fPIC).
Is there
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libmad0- MPEG audio decoder library
libmad0-dev - MPEG audio decoder development library
Closes: 656814
Changes:
libmad (0.15.1b-7) unstable; urgency=low
.
* Fix arm's MAD_F_MLN thumb case causing problems on arhmf. Patch
by Dave
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
On Sun, Nov 20, 2011 at 08:48:08PM +, Ben Hutchings wrote:
/usr/lib/i386-linux-gnu/i486/libcrypto.so.1.0.0: cpuid
/usr/lib/i386-linux-gnu/i486/libcrypto.so.1.0.0: rdtsc
I should probably drop that i486 variant anyway, since i486
is already the default. I should also consider dropping the
On Sun, Nov 20, 2011 at 07:36:43PM +, Ben Hutchings wrote:
So far as I'm aware, none of the above will be generated directly by
compilers (though they may be available through 'intrinsics'). So it
may be that there is little to be gained by moving to 586-class as a
minimum. If that is
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Sat, 29 Oct 2011 20:08:48 +0200
Source: libtool
Binary: libtool libtool-doc libltdl7 libltdl-dev
Architecture: source all amd64
Version: 2.4.2-1
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed
: 0.6.4-1.2
Distribution: unstable
Urgency: low
Maintainer: Daniel Burrows dburr...@debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
aptitude - terminal-based package manager (terminal interface only)
aptitude-dbg - Debug symbols for the aptitude package manager
aptitude-doc-cs
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Mon, 26 Sep 2011 23:04:40 +0200
Source: ircd-irc2
Binary: ircd-irc2
Architecture: source amd64
Version: 2.11.2p2+dfsg-2
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed-By: Kurt Roeckx k
On Thu, Sep 08, 2011 at 07:34:41PM +0200, Andreas Barth wrote:
- Being able to judge whether the maintainers have done their part in
reaching out to porters is a requisite for the above. And to do so, we
really need more visibility of those exchanges. According to devref
[1], the
On Sat, Sep 10, 2011 at 05:50:29PM +, brian m. carlson wrote:
On Sat, Sep 10, 2011 at 01:27:01PM +, Felipe Sateler wrote:
On Thu, 08 Sep 2011 19:34:41 +0200, Andreas Barth wrote:
I disagree with let's first remove things. If a package like ruby
doesn't build on sparc this bug
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
: Debian OpenSSL Team pkg-openssl-de...@lists.alioth.debian.org
Changed-By: Kurt Roeckx k...@roeckx.be
Description:
libcrypto1.0.0-udeb - crypto shared library - udeb (udeb)
libssl-dev - SSL development libraries, header files and documentation
libssl-doc - SSL development documentation
On Wed, Aug 31, 2011 at 04:30:56AM +, Felipe Sateler wrote:
I think some clarification needs to be done for these types of errors. I
sometimes get a (serious) bug reported against one of my packages because:
1. python errored out with a glibc-detected error
2. gcc broke in some way
On Wed, Aug 31, 2011 at 02:52:53PM +0100, Ian Jackson wrote:
Let me make an alternative proposal:
* The root cause bug in the BTS would be given a special tag
(arch-blocker:arch or something). I will call such a bug which
is open and has existed in this state for 30 days a ripe arch
On Tue, Aug 30, 2011 at 11:05:03AM +0200, Bernhard R. Link wrote:
(And try to imagine how hard it would have been to introduce amd64
if alpha had not elliminated in many years work most of the subtle
64 bit bugs found in most software, I doubt porters alone could have
completed this in that
On Wed, Aug 31, 2011 at 02:42:41PM +0200, Lucas Nussbaum wrote:
On 31/08/11 at 12:58 +0100, Ben Hutchings wrote:
On Wed, 2011-08-31 at 11:57 +0200, Lucas Nussbaum wrote:
[...]
But a different thread library that has clear POSIX compliance bugs[*]
is the kind of things that make me fear
On Mon, Aug 29, 2011 at 01:06:15PM +0200, Lucas Nussbaum wrote:
Sorry, but I disagree here. I don't think it is reasonable to expect
porters to check for build failures in general, especially as many of
them just happen because of generic maintainer errors and
cross-architectures.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 24 Aug 2011 14:10:54 +
Source: libtool
Binary: libtool libtool-doc libltdl7 libltdl-dev
Architecture: source all amd64
Version: 2.4-4
Distribution: unstable
Urgency: low
Maintainer: Kurt Roeckx k...@roeckx.be
Changed
On Thu, Aug 18, 2011 at 11:56:41PM -0400, compn wrote:
mplayer2 is a very poor fork name used to confuse users.
So you think Debian should rename the package to confuse people
even more?
Or is there some other reason you mailed this to the Debian list?
I suggest you take it up with the people
201 - 300 of 758 matches
Mail list logo