Processed: reassign 341675 to cppunit, reassign 342545 to 4.0.2-5, reassign 2 to 4.0.2-5

2005-12-19 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 # Automatically generated email from bts, devscripts version 2.9.10
  # whoops, reassign the right one
 reassign 341675 cppunit 1.10.2-5
Bug#341675: cppunit: FTBFS on hppa
Bug reassigned from package `libgcc2' to `cppunit'.

 reassign 342545 4.0.2-5
Bug#342545: qt-x11-free build fails
Warning: Unknown package '4.0.2-5'
Bug reassigned from package `libc6' to `4.0.2-5'.

 reassign 2 4.0.2-5
Bug number 2 not found.


End of message, stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Flawless Sildenafil/Tadalafil Support ta

2005-12-19 Thread Juana
We are your One Stop Shop for Astronomical ST-\/[EMAIL PROTECTED] Savings

http://uk.geocities.com/GraceMcbride4281/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343853: Bug in glibc: setrlimit

2005-12-19 Thread Daniel Jacobowitz
On Mon, Dec 19, 2005 at 01:54:52AM -0500, Gene Cooperman wrote:
 Perhaps my description was not clear enough, but this would be a very
 strange feature.  When setrlimit() is called in the original process
 as specified, then after that, pthread_create() continues to succeed
 in the original process.  _However_, if the original process creates
 a child process, and if the child process calls pthread_create(),
 then pthread_create() will fail with a non-zero error code.

Yes, that was what I meant by this happens during program
initialization: glibc calls getrlimit() before main() to set the
default stack size, which then does not change for the life of the
program.

-- 
Daniel Jacobowitz
CodeSourcery, LLC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343853: Bug in glibc: setrlimit

2005-12-19 Thread Daniel Jacobowitz
Please use group reply, so that you do not drop the bug tracking system
from CC.

On Mon, Dec 19, 2005 at 10:28:23AM -0500, Gene Cooperman wrote:
 I'd like to repeat this in my own words, to see if I understand your point.
 You seem to be saying that:
 A. The parent process begins with the user's default stack size
 B. The parent calls setrlimit to change the limit on the stack size.
 However, this does not change the actual stack size of the process.
 It only affects how big it can grow.
 C. The parent calls pthread_create(), which receives a copy of the
 current stack size.
 D. The child is created, and its stack size is set to the soft limit
 of the parent's stack size, and not to the parent's current stack size.
 E. When the child calls pthread_create(), it tries to create a second
 stack of that size, and fails.

'The user's default stack size' doesn't mean anything.

There are two stack sizes: those used by the kernel when creating a new
process, and those used by the thread manager when creating a new
thread.  The thread manager initializes its default stack size, based
on the rlimits, when the process is first created.  This is used for
pthread_create if the application doesn't specify its own stack size.

 If the above is correct, then here is what doesn't make sense to me:
 1.  If we execute with the debugging version of glibc:
   LD_LIBRARY_PATH=/usr/lib/debug ./a.out
 then step D above is different:  the child is apparently created
 with some stack size that is strictly smaller than the soft limit
 of the parent's stack size.

One of these glibcs is NPTL, the other (in /usr/lib/debug)
LinuxThreads.  They behave slightly differently.  They implement
roughly the same thing, but the details do vary.  I vaguely recall that
one of them caps at an arbitrary limit and the other does not.

 2.  If the parent's hard limit is not RLIM_INFINITY, but something slightly
 smaller, then step D above is different:  the child is apprently created
 with some stack size that is strictly smaller than either the
 soft limit or the hard limit of the parent's stack size.
 
 Why should the child have its stack initialized the soft limit of the
 parent _only_ if the parent has a hard limit less than RLIM_INFINITY,
 and _only_ if we don't use the libc.so library with debugging symbols 
 retained?
 
 If steps A through E are a feature, then shouldn't the feature continue
 to work _even_ if we are using a debugger and debugging libraries?
 Also what is the motivation for enabling this feature only when
 the hard limit is RLIM_INFINITY?  I understand that RLIM_INFINITY
 implies that the O/S may turn off error checking, but why does that
 imply that the O/S should turn on this feature?

Glibc doesn't care about the hard limit.  It never checks it.  Your
observations must be reflecting something different.

I suggest you take a glibc source tree and look for the places where
NPTL and LinuxThreads consult the stack rlimit, if you need to
understand what is happening any more precisely than I've explained it.

-- 
Daniel Jacobowitz
CodeSourcery, LLC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343140: libc6: resolver always checks search list in /etc/resolv.conf

2005-12-19 Thread GOTO Masanori
At Thu, 15 Dec 2005 17:13:25 -0800,
Edward Buck wrote:
 I guess the problem then is in the ipv6 support and how it implements
 domains in the search path.  Instead of doing ipv6, then ipv4 for
 mx1.hotmail.com, it runs through all possible ipv6 queries, including
 exhausting all domains in the search path, before ipv4 queries are
 attempted.  That seems (is) really inefficient.  As a result of ipv6
 supports, DNS queries have tripled on systems with two domains in their
 search path.
 
 Okay, perhaps this isn't a bug.  It's just ipv6 hell.

Okay, I close it.  If you think there's bugs in libc, please tell me
about it.

-- gotom


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343140: libc6: resolver always checks search list in /etc/resolv.conf

2005-12-19 Thread Stephen Gran
At Thu, 15 Dec 2005 17:13:25 -0800, Edward Buck wrote:
 I guess the problem then is in the ipv6 support and how it implements
 domains in the search path.  Instead of doing ipv6, then ipv4 for
 mx1.hotmail.com, it runs through all possible ipv6 queries, including
 exhausting all domains in the search path, before ipv4 queries are
 attempted.  That seems (is) really inefficient.  As a result of ipv6
 supports, DNS queries have tripled on systems with two domains in their
 search path.
 
 Okay, perhaps this isn't a bug.  It's just ipv6 hell.

I guess the answer to this problem for you is to just disable ipv6
(unless you need it) - blacklisting the kernel module(s) ought to do it,
although there may be some other parts I am unaware of.

HTH, and take care,
-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Bug#149902: Australian time zones

2005-12-19 Thread GOTO Masanori
At Fri, 9 Dec 2005 16:43:48 +1100,
[EMAIL PROTECTED] wrote:
 The official list of timezones for Australia, as provided by the Australian 
 Government, does not include EST anywhere on the page.  AEST is the correct 
 abbreviation.
 
 quote url=http://www.australia.gov.au/about-australia-13time;
 
 There are three times zones in Australia -
 
 * Australian Eastern Standard Time (AEST): Greenwich Mean Time (GMT) plus 
 10 hours for standard time and 11 hours for daylight savings time. AEST is 
 followed in these regions:
   o New South Wales
   o Victoria
   o Queensland
   o Tasmania
   o Australian Capital Territory
 
 * Australian Central Standard Time (ACST): GMT plus 9 ½ hours for 
 standard time and 10 ½ hours for daylight savings time. ACST is followed in 
 these regions:
   o South Australia
   o Northern Territory
 
 * Australian Western Standard Time (AWST): GMT plus 8 hours. AWST is 
 followed in these regions:
   o Western Australia
 
 /quote
 
 This should be re-opened as a bug.  Timeanddate.com do not have the most 
 correct timezone information on their website, the Australian Government do.

Note that you probably want to know why AEST vs EST is long-standing
problem: the short summary is available in glibc source tree
timezone/australasia.  Not only one governmental page but also showing
another information source would be nice idea to change time zone
maintainers.

-- gotom



Bug#340147: /etc/init.d/glibc.sh must use ': exit 0' instead of 'exit 0'

2005-12-19 Thread GOTO Masanori
At Mon, 21 Nov 2005 10:42:14 +0100,
Petter Reinholdtsen wrote:
 The script /etc/init.d/glibc.sh can not be sourced, as it contain
 'exit 0' at the end of the script.  This is against policy, specifying
 that all .sh scripts in /etc/rcS.d/ will be sourced.  I discovered
 this while fixing sysv-rc (bug #339955), as the boot started to fail
 because glibc.sh terminated the script running the files in
 /etc/rcS.d/.
 
 Changing 'exit 0' to ': exit 0' solved the issue.
 
 Setting severity serious, as this Debian Policy §9.3.1 require .sh
 scripts in runlevel S to be sourced, and this is impossible as long as
 this bug is open.

I've modified it as your request.

-- gotom



r1067 - in glibc-package/trunk/debian: . local/etc_init.d

2005-12-19 Thread Masanori Goto
Author: gotom
Date: 2005-12-20 01:07:01 + (Tue, 20 Dec 2005)
New Revision: 1067

Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/local/etc_init.d/glibc.sh
Log:
  * debian/local/etc_init.d/glibc.sh: Change the last 'exit 0' to
': exit 0' to not block sourcing.  (Closes: #340147)



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2005-12-17 15:44:47 UTC (rev 
1066)
+++ glibc-package/trunk/debian/changelog2005-12-20 01:07:01 UTC (rev 
1067)
@@ -1,3 +1,11 @@
+glibc (2.3.5-10) unstable; urgency=low
+
+  [ GOTO Masanori ]
+  * debian/local/etc_init.d/glibc.sh: Change the last 'exit 0' to
+': exit 0' to not block sourcing.  (Closes: #340147)
+
+ -- GOTO Masanori [EMAIL PROTECTED]  Tue, 20 Dec 2005 09:51:34 +0900
+
 glibc (2.3.5-9) unstable; urgency=low
 
   [ Daniel Jacobowitz ]
@@ -115,7 +123,7 @@
 * debian/sysdeps/powerpc.mk: Enable PowerPC NPTL.
   (Closes: #246689, #307984)
 
-* debian/FAQ: Add the description about dropping __ctype_* symbol support
+* debian/README: Add the description about dropping __ctype_* symbol 
support
   of static linked application/libraries in etch.  (Closes: #324526)
 
 * debian/sysdeps/linux.mk: Check SETNJOBS environment variable to specify

Modified: glibc-package/trunk/debian/local/etc_init.d/glibc.sh
===
--- glibc-package/trunk/debian/local/etc_init.d/glibc.sh2005-12-17 
15:44:47 UTC (rev 1066)
+++ glibc-package/trunk/debian/local/etc_init.d/glibc.sh2005-12-20 
01:07:01 UTC (rev 1067)
@@ -15,4 +15,4 @@
 # glibc kernel version check: KERNEL_VERSION_CHECK
 fi
 
-exit 0
+: exit 0


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#339110: [INTL:pt] Portuguese translation for glibc (Debconf)

2005-12-19 Thread GOTO Masanori
At Mon, 14 Nov 2005 23:26:04 +,
Rui Branco wrote:
 Portuguese translation for glibc's debconf messages by Simão Pedro
 Cardoso [EMAIL PROTECTED]
 Feel free to use it.
 
 For translation updates please contact last translator and/or CC the
 Portuguese translation team traduz _at_ debianpt.org

Thanks for your work, but I have a question: there's already
pt_BR.po in libc6 files.  Is your pt.po different from pt_BR.po?  Or
is it just updates from pt_BR.po (so your file should be renamed from
pt.po to pt_BR.po)?

-- gotom



Bug#339318: marked as done (Bug in fesetenv() [LIBC6.1])

2005-12-19 Thread Debian Bug Tracking System
Your message dated Tue, 20 Dec 2005 10:30:13 +0900
with message-id [EMAIL PROTECTED]
and subject line Bug#339318: Bug in fesetenv() [LIBC6.1]
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--
Received: (at submit) by bugs.debian.org; 15 Nov 2005 13:50:55 +
From [EMAIL PROTECTED] Tue Nov 15 05:50:55 2005
Return-path: [EMAIL PROTECTED]
Received: from post.rzg.mpg.de ([130.183.7.21])
by spohr.debian.org with esmtp (Exim 4.50)
id 1Ec1D4-To-US
for [EMAIL PROTECTED]; Tue, 15 Nov 2005 05:50:55 -0800
Received: from mpq3p32.mpq.mpg.de (mpq3p32.mpq.mpg.de [130.183.93.32])
by post.rzg.mpg.de (8.9.2/8.9.2) with ESMTP id OAA3010604
for [EMAIL PROTECTED]; Tue, 15 Nov 2005 14:50:51 +0100
X-Envelope-To: [EMAIL PROTECTED]
Subject: Bug in fesetenv() [LIBC6.1]
From: Juan Jose Garcia Ripoll [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Content-Type: text/plain
Date: Tue, 15 Nov 2005 14:49:57 +0100
Message-Id: [EMAIL PROTECTED]
Mime-Version: 1.0
X-Mailer: Evolution 2.4.1 
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package:libc6.1
Version:2.2.5-11.5

Summary:Under some circumstances, invoking fesetenv() results
in a floating point exception being raised.

Description:

I have a piece of code which may result in underflows. I enclose
the code in between

fenv_t env;
feholdexcept(env);

...

fesetenv(env);

Now the code in [...] is reading floating point numbers which may
be very small and result in underflow floating point signals.
However, since we have used feholdexcept() the signals should not
be produced. And indeed they are not, until we reach fesetenv()
where the signal is raised.

If you read the manual of LIBC for fesetenv()

   The fesetenv function restores the floating point environ-
   ment  from the object *envp.  This object must be known to
   be valid, e.g., the  result  of  a  call  to  fegetenv  or
   feholdexcept  or  equal to FE_DFL_ENV.  This call does not
   raise exceptions.

it says no exception should be raised.




---
Received: (at 339318-done) by bugs.debian.org; 20 Dec 2005 01:30:14 +
From [EMAIL PROTECTED] Mon Dec 19 17:30:14 2005
Return-path: [EMAIL PROTECTED]
Received: from omega.webmasters.gr.jp ([218.44.239.78] helo=webmasters.gr.jp)
by spohr.debian.org with esmtp (Exim 4.50)
id 1EoWKU-gW-Mp
for [EMAIL PROTECTED]; Mon, 19 Dec 2005 17:30:14 -0800
Received: from omega.webmasters.gr.jp (localhost [127.0.0.1])
by webmasters.gr.jp (Postfix) with ESMTP id EF47DDEB1B;
Tue, 20 Dec 2005 10:30:13 +0900 (JST)
Date: Tue, 20 Dec 2005 10:30:13 +0900
Message-ID: [EMAIL PROTECTED]
From: GOTO Masanori [EMAIL PROTECTED]
To: Juan Jose Garcia Ripoll [EMAIL PROTECTED],
Daniel Jacobowitz [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Bug#339318: Bug in fesetenv() [LIBC6.1]
In-Reply-To: [EMAIL PROTECTED]
References: [EMAIL PROTECTED]
[EMAIL PROTECTED]
User-Agent: Wanderlust/2.11.30 (Wonderwall) SEMI/1.14.6 (Maruoka) FLIM/1.14.6 
(Marutamachi) APEL/10.6 Emacs/21.4 (i386-pc-linux-gnu) MULE/5.0 (SAKAKI)
MIME-Version: 1.0 (generated by SEMI 1.14.6 - Maruoka)
Content-Type: text/plain; charset=US-ASCII
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
autolearn=no version=2.60-bugs.debian.org_2005_01_02

At Sun, 20 Nov 2005 12:08:45 -0500,
Daniel Jacobowitz wrote:
 On Tue, Nov 15, 2005 at 02:49:57PM +0100, Juan Jose Garcia Ripoll wrote:
  Package:libc6.1
  Version:2.2.5-11.5
 
 That's a very old glibc version.  It's likely that we can't help you
 with it.  However, could you post a standalone testcase?  Then we can
 at least check whether it is fixed in later versions.

I close this bug because there's no responce from the submitter.

Juan, if you still see your bugs in the recent glibc version (ex:
sarge or sid), please reopen this bug or just report it to us.  It
seems you run on ia64 or alpha - so it probably the actual bug, but we
need to 

Bug#339827: linuxthreads crashes when using user stacks

2005-12-19 Thread GOTO Masanori
At Sun, 20 Nov 2005 14:22:22 -0500,
Daniel Jacobowitz wrote:
 Steve Langasek agreed.  I am planning to bump the requirement up from
 2.2.whatever to 2.4.0 for i486 and powerpc; i486 in order to enable
 floating stacks, and powerpc because we've been getting bug reports
 that indicate that static binaries are already broken there under 2.2,
 and no one wants to debug it.
 
 Any objections before I do this?

Is it already done?  If it's pended, I'll ask it to
[EMAIL PROTECTED]  The security support for 2.2 series was finished,
we have no reason to support 2.2 kernel.

Note that the current status of the support kernel versions are:

amd64   2.6.0
i386(i686)  2.6.0
i386(amd64) 2.6.0
*(nptl) 2.6.0
ppc64   2.6.0
s390x   2.4.1
sparc64 2.4.18
sparcv9 2.4.18
sparcv9b2.4.18

others  2.2.0

They'll be changed to:

i386(i486)  2.4.1
powerpc 2.4.1 (?)

BTW, note that some architectures like m68k could not compile the
recent glibc with kernel 2.4.x or 2.6.x.

-- gotom


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#344105: libc6: [powerpc] _dl_map_object_from_fd removes data segment execute permission

2005-12-19 Thread Anton Blanchard
Package: libc6
Version: 2.3.5-9
Severity: normal
Tags: patch


When using a kernel with a 64kB page size we noticed a glibc issue where
execute permission can be removed from the GOT. Since the GOT needs to be
executable we then die (it uses a trick with a blrl instruction in
order to find the GOT address).

Details of this bug can be found at:

http://sources.redhat.com/bugzilla/show_bug.cgi?id=1346

The upstream fix, rediffed and tested against 2.3.5-9 is below.


2005-09-20  Roland McGrath  [EMAIL PROTECTED]

[BZ #1346]
* elf/dl-load.c (_dl_map_object_from_fd) [HAVE_Z_RELRO]: Do relro
magic on __stack_prot only if [SHARED].  Skip mprotect if __stack_prot
lies outside the page-rounded-down relro region.

--- elf/dl-load.c~  2005-12-14 22:27:00.0 -0600
+++ elf/dl-load.c   2005-12-14 22:35:59.0 -0600
@@ -1314,22 +1314,36 @@
 
   if (__builtin_expect ((stack_flags ~ GL(dl_stack_flags))  PF_X, 0))
 {
+  if (__builtin_expect (__check_caller (RETURN_ADDRESS (0), allow_ldso),
+   0) != 0)
+   {
+ errstring = N_(invalid caller);
+ goto call_lose;
+   }
+
   /* The stack is presently not executable, but this module
 requires that it be executable.  We must change the
 protection of the variable which contains the flags used in
 the mprotect calls.  */
-#ifdef HAVE_Z_RELRO
+#if defined HAVE_Z_RELRO  defined SHARED
   if (mode  __RTLD_DLOPEN)
{
- uintptr_t p = ((uintptr_t) __stack_prot)  ~(GLRO(dl_pagesize) - 1);
- size_t s = (uintptr_t) __stack_prot - p + sizeof (int);
+ const uintptr_t p = (uintptr_t) __stack_prot  -GLRO(dl_pagesize);
+ const size_t s = (uintptr_t) (__stack_prot + 1) - p;
 
- __mprotect ((void *) p, s, PROT_READ|PROT_WRITE);
- if (__builtin_expect (__check_caller (RETURN_ADDRESS (0),
-   allow_ldso|allow_libc) == 0,
-   0))
+ struct link_map *const m = GL(dl_rtld_map);
+ const uintptr_t relro_end = ((m-l_addr + m-l_relro_addr
+   + m-l_relro_size)
+   -GLRO(dl_pagesize));
+ if (__builtin_expect (p + s = relro_end, 1))
+   {
+ /* The variable lies in the region protected by RELRO.  */
+ __mprotect ((void *) p, s, PROT_READ|PROT_WRITE);
+ __stack_prot |= PROT_READ|PROT_WRITE|PROT_EXEC;
+ __mprotect ((void *) p, s, PROT_READ);
+   }
+ else
__stack_prot |= PROT_READ|PROT_WRITE|PROT_EXEC;
- __mprotect ((void *) p, s, PROT_READ);
}
   else
 #endif


-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: powerpc (ppc)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-rc6-gdf7addbb
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1)

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#339827: linuxthreads crashes when using user stacks

2005-12-19 Thread Daniel Jacobowitz
On Tue, Dec 20, 2005 at 10:38:47AM +0900, GOTO Masanori wrote:
 At Sun, 20 Nov 2005 14:22:22 -0500,
 Daniel Jacobowitz wrote:
  Steve Langasek agreed.  I am planning to bump the requirement up from
  2.2.whatever to 2.4.0 for i486 and powerpc; i486 in order to enable
  floating stacks, and powerpc because we've been getting bug reports
  that indicate that static binaries are already broken there under 2.2,
  and no one wants to debug it.
  
  Any objections before I do this?
 
 Is it already done?  If it's pended, I'll ask it to
 [EMAIL PROTECTED]  The security support for 2.2 series was finished,
 we have no reason to support 2.2 kernel.

No, it isn't :-(  I didn't get around to it; if you could, that would
be great.

 Note that the current status of the support kernel versions are:
 
   amd64   2.6.0
   i386(i686)  2.6.0
   i386(amd64) 2.6.0
   *(nptl) 2.6.0
   ppc64   2.6.0
   s390x   2.4.1
   sparc64 2.4.18
   sparcv9 2.4.18
   sparcv9b2.4.18
 
   others  2.2.0
 
 They'll be changed to:
 
   i386(i486)  2.4.1
   powerpc 2.4.1 (?)
 
 BTW, note that some architectures like m68k could not compile the
 recent glibc with kernel 2.4.x or 2.6.x.

Might want to check with the s390x and sparc porters, too.  If 2.4 is
dead for those architectures, we don't need to carry it around.  ARM
could probably use a bump, but I'm not sure to what.

-- 
Daniel Jacobowitz
CodeSourcery, LLC


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#343140: libc6: resolver always checks search list in /etc/resolv.conf

2005-12-19 Thread Edward Buck

Stephen Gran wrote:

At Thu, 15 Dec 2005 17:13:25 -0800, Edward Buck wrote:


I guess the problem then is in the ipv6 support and how it implements
domains in the search path.  Instead of doing ipv6, then ipv4 for
mx1.hotmail.com, it runs through all possible ipv6 queries, including
exhausting all domains in the search path, before ipv4 queries are
attempted.  That seems (is) really inefficient.  As a result of ipv6
supports, DNS queries have tripled on systems with two domains in their
search path.

Okay, perhaps this isn't a bug.  It's just ipv6 hell.


I guess the answer to this problem for you is to just disable ipv6
(unless you need it) - blacklisting the kernel module(s) ought to do it,
although there may be some other parts I am unaware of.


I did try commenting out:

#alias net-pf-10 ipv6

in /etc/modprobe.d/aliases.  Unfortunately, that doesn't keep the 
resolver from doing ipv6 queries.  The behavior is the same regardless 
of whether the ipv6 kernel module is loaded (rebooted after the change 
and lsmod shows no ipv6 module).


Is there another way to disable ipv6 queries by the resolver?  I'm 
probably missing something simple but couldn't find anything in the docs.


Thanks.
Regards,
Ed



HTH, and take care,



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#149902: Australian time zones

2005-12-19 Thread Martijn van Oosterhout
On Tue, Dec 20, 2005 at 09:47:56AM +0900, GOTO Masanori wrote:
 Note that you probably want to know why AEST vs EST is long-standing
 problem: the short summary is available in glibc source tree
 timezone/australasia.  Not only one governmental page but also showing
 another information source would be nice idea to change time zone
 maintainers.

Wow, this is a bug come back from the dead. I read the summary in glibc
and think it's wierd. For example, the counts supposedly showing
Eastern Standard Time to be more popular than Australia Eastern
Standard Time are bogus. The first search is obviously going to
include the results of the second. A simple calculation shows that even
then the prefix was four times as common as without.

Current figures from Google:
Australian Eastern Standard Time site:.au 155000
Eastern Standard Time site:.au206000
Eastern Standard Time -Australian Eastern Standard Time site:.au  5

But in my mind the argument is simple: EST is ambiguous, AEST is not.
The issue I had has to do with input, not output. Saying 9:00 EST
is ambiguous, but 9:00 AEST is not even recognised as a valid date.
Obviously you can't remove all ambiguity, but it's certainly worth
removing whenever possible.

There is still no way to specify an Australian timezone to date, which
I suppose is the real bug. Yes, you can affect it with environment
variables, but still...

$ date --date='9:00 Australia/Sydney'
date: invalid date `9:00 Australia/Sydney'
$ date --date='9:00 EST'
Tue Dec 20 15:00:00 CET 2005 --- ??? Not european time. What is it?
$ date --date='9:00 AEST'
date: invalid date `9:00 AEST'

Have a nice day,
-- 
Martijn van Oosterhout   kleptog@svana.org   http://svana.org/kleptog/
 Patent. n. Genius is 5% inspiration and 95% perspiration. A patent is a
 tool for doing 5% of the work and then sitting around waiting for someone
 else to do the other 95% so you can sue them.


pgpB3BlK4mdlT.pgp
Description: PGP signature