On Fri, Apr 25, 2008 at 10:29:03PM +0200, Florian Weimer wrote: > * Niko Tyni: > > > It doesn't show up on my own sparc uniprocessor host, which has the > > Etch kernel, so it's either specific to new kernels or SMP hosts. As it > > works on sperger in the sid chroot, it would seem that newer versions > > of glibc work better. > > Could you build the latest security update (that will be -7etch3, > available in a coupleo f hours) in an etch chroot and upload it? > > It's not a regression in the security update and it's not been reported > before, so this appears to be a rather benign bug.
Unfortunately my sparc box is physically in a quite unsecure place, so I don't think I can sign the result. Maybe somebody else on debian-sparc could help? Another alternative is to build it with DEB_BUILD_OPTIONS=x-perl-notest, I guess. Cheers, -- Niko Tyni [EMAIL PROTECTED] -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]