[Bug 1783706] Re: [MIR] oath-toolkit
Mathieu Trudel-Lapierre
mathieu.tl at gmail.com
Tue Oct 23 14:41:44 UTC 2018
Confirming, we've used this change (_IO_ftrylockfile replaced by
_IO_EOF_SEEN) in other packages that FTBFS with the new toolchain.
Please also make sure _IO_IN_BACKUP is defined (to 0x100) if it's being
used.
cf. similar changes in coreutils:
Index: coreutils-8.28/lib/fseterr.c
===================================================================
--- coreutils-8.28.orig/lib/fseterr.c
+++ coreutils-8.28/lib/fseterr.c
@@ -29,7 +29,7 @@ fseterr (FILE *fp)
/* Most systems provide FILE as a struct and the necessary bitmask in
<stdio.h>, because they need it for implementing getc() and putc() as
fast macros. */
-#if defined _IO_ftrylockfile || __GNU_LIBRARY__ == 1 /* GNU libc, BeOS, Haiku, Linux libc5 */
+#if defined _IO_EOF_SEEN || __GNU_LIBRARY__ == 1 /* GNU libc, BeOS, Haiku, Linux libc5 */
fp->_flags |= _IO_ERR_SEEN;
#elif defined __sferror || defined __DragonFly__ || defined __ANDROID__
/* FreeBSD, NetBSD, OpenBSD, DragonFly, Mac OS X, Cygwin, Minix 3, Android */
Index: coreutils-8.28/lib/stdio-impl.h
===================================================================
--- coreutils-8.28.orig/lib/stdio-impl.h
+++ coreutils-8.28/lib/stdio-impl.h
@@ -18,6 +18,12 @@
the same implementation of stdio extension API, except that some fields
have different naming conventions, or their access requires some casts. */
+/* Glibc 2.28 made _IO_IN_BACKUP private. For now, work around this
+ problem by defining it ourselves. FIXME: Do not rely on glibc
+ internals. */
+#if !defined _IO_IN_BACKUP && defined _IO_EOF_SEEN
+# define _IO_IN_BACKUP 0x100
+#endif
/* BSD stdio derived implementations. */
--
You received this bug notification because you are a member of Ubuntu
OpenStack, which is subscribed to oath-toolkit in Ubuntu.
https://bugs.launchpad.net/bugs/1783706
Title:
[MIR] oath-toolkit
Status in oath-toolkit package in Ubuntu:
New
Bug description:
[Availability]
In universe
[Rationale]
New dependency for ceph (radosgw)
[Security]
One CVE found:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7322
Resolved in versions in Ubuntu
[Quality assurance]
Upstream tests run as part of package build.
[Dependencies]
All in main
[Standards compliance]
Older style CDBS package but OK.
[Maintenance]
Two non-maintainer uploads in Debian; A new point release is available from 2016
ubuntu-openstack team in Ubuntu
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/oath-toolkit/+bug/1783706/+subscriptions
More information about the Ubuntu-openstack-bugs
mailing list