Your message dated Wed, 02 Apr 2008 17:17:11 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#472129: fixed in glib2.0 2.16.2-1
has caused the Debian Bug report #472129,
regarding glib2.0: FTBFS on hurd-i386 because of unconditionnal use of ARG_MAX
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
472129: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=472129
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: glib2.0
Version: 2.16.1
Severity: important
Tags: upstream patch
Reported-Upstream: http://bugzilla.gnome.org/show_bug.cgi?id=522335

Hello,

glib2.0 FBTFS on hurd-i386 (hence blocking a huge amount of packages)
because of unconditionnal use of ARG_MAX (it is acually even bogus since
ARG_MAX is in bytes, not number of arguments). hurd-i386 doesn't have
any limit on the length of the command line, here is a patch to
dynamically allocate it.

Samuel

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24.1
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash
--- glib2.0-2.16.1/glib/gtester.c       2008-03-11 00:31:57.000000000 +0000
+++ glib2.0-2.16.1-mine/glib/gtester.c  2008-03-22 11:03:40.000000000 +0000
@@ -273,7 +273,8 @@ launch_test_binary (const char *binary,
   GTestLogBuffer *tlb;
   GSList *slist, *free_list = NULL;
   GError *error = NULL;
-  const gchar *argv[ARG_MAX];
+  int argc = 0;
+  const gchar **argv;
   GPid pid = 0;
   gint report_pipe[2] = { -1, -1 };
   guint child_report_cb_id = 0;
@@ -289,7 +290,34 @@ launch_test_binary (const char *binary,
       return FALSE;
     }
 
+  /* setup argc */
+  for (slist = subtest_args; slist; slist = slist->next)
+    argc++;
+  /* argc++; */
+  if (subtest_quiet)
+    argc++;
+  if (subtest_verbose)
+    argc++;
+  if (!subtest_mode_fatal)
+    argc++;
+  if (subtest_mode_quick)
+    argc++;
+  else
+    argc++;
+  if (subtest_mode_perf)
+    argc++;
+  if (gtester_list_tests)
+    argc++;
+  if (subtest_seedstr)
+    argc++;
+  argc++;
+  if (skip_tests)
+    argc++;
+  for (slist = subtest_paths; slist; slist = slist->next)
+    argc++;
+
   /* setup argv */
+  argv = gmalloc ((argc + 1) * sizeof(gchar *));
   argv[i++] = binary;
   for (slist = subtest_args; slist; slist = slist->next)
     argv[i++] = (gchar*) slist->data;
@@ -343,8 +371,10 @@ launch_test_binary (const char *binary,
       else
         g_warning ("Failed to execute test binary: %s: %s", argv[0], 
error->message);
       g_clear_error (&error);
+      gfree (argv);
       return FALSE;
     }
+  gfree (argv);
 
   subtest_running = TRUE;
   subtest_io_pending = TRUE;

--- End Message ---
--- Begin Message ---
Source: glib2.0
Source-Version: 2.16.2-1

We believe that the bug you reported is fixed in the latest version of
glib2.0, which is due to be installed in the Debian FTP archive:

glib2.0_2.16.2-1.diff.gz
  to pool/main/g/glib2.0/glib2.0_2.16.2-1.diff.gz
glib2.0_2.16.2-1.dsc
  to pool/main/g/glib2.0/glib2.0_2.16.2-1.dsc
glib2.0_2.16.2.orig.tar.gz
  to pool/main/g/glib2.0/glib2.0_2.16.2.orig.tar.gz
libgio-fam_2.16.2-1_i386.deb
  to pool/main/g/glib2.0/libgio-fam_2.16.2-1_i386.deb
libglib2.0-0-dbg_2.16.2-1_i386.deb
  to pool/main/g/glib2.0/libglib2.0-0-dbg_2.16.2-1_i386.deb
libglib2.0-0_2.16.2-1_i386.deb
  to pool/main/g/glib2.0/libglib2.0-0_2.16.2-1_i386.deb
libglib2.0-data_2.16.2-1_all.deb
  to pool/main/g/glib2.0/libglib2.0-data_2.16.2-1_all.deb
libglib2.0-dev_2.16.2-1_i386.deb
  to pool/main/g/glib2.0/libglib2.0-dev_2.16.2-1_i386.deb
libglib2.0-doc_2.16.2-1_all.deb
  to pool/main/g/glib2.0/libglib2.0-doc_2.16.2-1_all.deb
libglib2.0-udeb_2.16.2-1_i386.udeb
  to pool/main/g/glib2.0/libglib2.0-udeb_2.16.2-1_i386.udeb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sebastian Dröge <[EMAIL PROTECTED]> (supplier of updated glib2.0 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 01 Apr 2008 07:40:48 +0200
Source: glib2.0
Binary: libglib2.0-0 libglib2.0-udeb libglib2.0-dev libglib2.0-0-dbg 
libglib2.0-data libglib2.0-doc libgio-fam
Architecture: source all i386
Version: 2.16.2-1
Distribution: unstable
Urgency: low
Maintainer: Loic Minier <[EMAIL PROTECTED]>
Changed-By: Sebastian Dröge <[EMAIL PROTECTED]>
Description: 
 libgio-fam - GLib Input, Output and Streaming Library (fam module)
 libglib2.0-0 - The GLib library of C routines
 libglib2.0-0-dbg - The GLib libraries and debugging symbols
 libglib2.0-data - Common files for GLib library
 libglib2.0-dev - Development files for the GLib library
 libglib2.0-doc - Documentation files for the GLib library
 libglib2.0-udeb - The GLib library of C routines - minimal runtime (udeb)
Closes: 472129
Changes: 
 glib2.0 (2.16.2-1) unstable; urgency=low
 .
   [ Loic Minier ]
   * Drop nautilus conflicts as it triggers a bug in the APT resolver on
     dist-upgrade.
   * Update patch 01_gettext-desktopfiles with a newer version taken from the
     Ubuntu package.
   * Update and enable patch 01_gettext-desktopfiles to also look for
     X-Debian-Gettext-Domain if X-Ubuntu-Gettext-Domain isn't present.
 .
   [ Sebastian Dröge ]
   * New upstream bugfix release:
     + Fixes FTBFS on hurd/i386 (Closes: #472129).
     + debian/patches/04_nfs4.patch,
       debian/patches/80_static-mutex-aliasing-warnings.patch,
       debian/patches/81_c99-inline-warnings.patch:
       - Dropped, merged upstream.
Files: 
 ba500a08bd0acd2db7a2c34d1e85f4d8 1020 libs optional glib2.0_2.16.2-1.dsc
 f1a75b1f89953e7d87484ceffd70eb86 6444067 libs optional 
glib2.0_2.16.2.orig.tar.gz
 d29f585dc24acb825c9321b3d2aff670 30363 libs optional glib2.0_2.16.2-1.diff.gz
 2e0f88ef41b18e25cc21232898ac96f5 678862 misc optional 
libglib2.0-data_2.16.2-1_all.deb
 9a239f2071bd312c65b4e72d70310494 1166812 doc optional 
libglib2.0-doc_2.16.2-1_all.deb
 7c44b679fb6d34efaff287b14c5f9f9b 746340 libs optional 
libglib2.0-0_2.16.2-1_i386.deb
 35b9f8d671e4ae6146fff67bac2867ea 1213968 debian-installer optional 
libglib2.0-udeb_2.16.2-1_i386.udeb
 2f5237d64147a2246c8a8e3f3f3dfa9a 867418 libdevel optional 
libglib2.0-dev_2.16.2-1_i386.deb
 78615dd7d5b2c18c7a081d1e198109a1 1098822 libdevel extra 
libglib2.0-0-dbg_2.16.2-1_i386.deb
 76911163e97a7198b5e3a1c5857e2825 41144 libs optional 
libgio-fam_2.16.2-1_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFH87oIBsBdh1vkHyERAjANAJ9QeGshmP4f27OzOWVAVpJKjTyihQCghkX8
7wkDehqIA73iywlmLG4CSd0=
=uArf
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to