glibc.git
19 months agolocal-tst-mktime2
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-tst-mktime2

Gbp-Pq: Topic any
Gbp-Pq: Name local-tst-mktime2.diff

19 months agolocal-tcsetaddr
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-tcsetaddr

# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: tcsetattr sanity check on PARENB/CREAD/CSIZE for ptys
# DP: Related bugs: 218131
# DP: Author: Jeff Licquia <licquia@progeny.com>
# DP: Upstream status: [In CVS | Debian-Specific | Pending | Not submitted ]
# DP: Status Details:
# DP: Date: 2003-10-29

# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: tcsetattr sanity check on PARENB/CREAD/CSIZE for ptys
# DP: Related bugs: 218131
# DP: Author: Jeff Licquia <licquia@progeny.com>
# DP: Upstream status: [In CVS | Debian-Specific | Pending | Not submitted ]
# DP: Status Details:
# DP: Date: 2003-10-29

Gbp-Pq: Topic any
Gbp-Pq: Name local-tcsetaddr.diff

19 months agolocal-stubs_h
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-stubs_h

Gbp-Pq: Topic any
Gbp-Pq: Name local-stubs_h.diff

19 months agolocal-nss-upgrade
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-nss-upgrade

# DP: This patch makes future upgrades easier. It resolves problems with
# DP: running daemons having NSS modules upgraded out from under them.

# DP: This patch makes future upgrades easier. It resolves problems with
# DP: running daemons having NSS modules upgraded out from under them.

Gbp-Pq: Topic any
Gbp-Pq: Name local-nss-upgrade.diff

19 months agolocal-ldconfig
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ldconfig

# DP: Make it so that a missing /etc/ld.so.conf does not cause an error
# DP: message, unless --verbose is enabled. This keeps the debian
# DP: installer from barfing during bootstrap of the system.
# DP:
# DP: Updated by gotom, the previous one seems being wrong because it suppresses
# DP: _all_ warnings about "can't open configuration file". otoh, I introduce
# DP: newer patches.  it should be checked using chroot and should be contacted
# DP: to the upstream.
# DP: Date: (Updated 2005-01-02 gotom)

# DP: Make it so that a missing /etc/ld.so.conf does not cause an error
# DP: message, unless --verbose is enabled. This keeps the debian
# DP: installer from barfing during bootstrap of the system.
# DP:
# DP: Updated by gotom, the previous one seems being wrong because it suppresses
# DP: _all_ warnings about "can't open configuration file". otoh, I introduce
# DP: newer patches.  it should be checked using chroot and should be contacted
# DP: to the upstream.
# DP: Date: (Updated 2005-01-02 gotom)

# previous patch.
#--- elf/ldconfig.c 2003-07-08 23:26:27.000000000 +0900
#+++ elf/ldconfig.c.debian 2003-07-08 23:29:43.000000000 +0900
#@@ -920,26 +920,24 @@
# {
#   FILE *file = NULL;
#   char *line = NULL;
#-  const char *canon;
#+  const char *canon = filename;
#   size_t len = 0;
#+  int file_fd;
#
#   if (opt_chroot)
#     {
#       canon = chroot_canon (opt_chroot, filename);
#-      if (canon)
#- file = fopen (canon, "r");
#-      else
#+      if (!canon)
#  canon = filename;
#     }
#-  else
#-    {
#-      canon = filename;
#-      file = fopen (filename, "r");
#-    }
#+
#+  if ((file_fd = open(canon, O_RDONLY | O_EXCL, 0022)) != -1)
#+    file = fdopen (file_fd, "r");
#
#   if (file == NULL)
#     {
#-      error (0, errno, _("Can't open configuration file %s"), canon);
#+      if (opt_verbose)
#+ error (0, errno, _("Can't open configuration file %s"), canon);
#       if (canon != filename)
#  free ((char *) canon);
#       return;

2004-10-25  GOTO Masanori  <gotom@debian.or.jp>

        * elf/ldconfig.c: Don't print error when default ld.so.conf
          is not existed.

Gbp-Pq: Topic any
Gbp-Pq: Name local-ldconfig.diff

19 months agolocal-ldso-disable-hwcap
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ldso-disable-hwcap

# DP: Allow hwcap's to be disabled with the existence of a file. This
# DP: makes it easier to do upgrades with optimized (hwcap) library
# DP: packages.
# DP: Author: Rewritten by Daniel Jacobowitz <dan@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: This isn't going to be acceptable upstream, we
# DP:                 only need it because we support in-place upgrades.
# DP: Date: 2003-10-28, (Updated 2005-01-02 gotom, 2007-05-20 aurel32)

# DP: Allow hwcap's to be disabled with the existence of a file. This
# DP: makes it easier to do upgrades with optimized (hwcap) library
# DP: packages.
# DP: Author: Rewritten by Daniel Jacobowitz <dan@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: This isn't going to be acceptable upstream, we
# DP:                 only need it because we support in-place upgrades.
# DP: Date: 2003-10-28, (Updated 2005-01-02 gotom, 2007-05-20 aurel32)

Gbp-Pq: Topic any
Gbp-Pq: Name local-ldso-disable-hwcap.diff

19 months agolocal-ld-multiarch
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ld-multiarch

2012-05-01  Aurelien Jarno  <aurelien@aurel32.net>

* elf/Makefile(trusted-dirs.st): Fix DL_DST_LIB computation with
two level slibdir directories.

2009-09-08  Aurelien Jarno  <aurelien@aurel32.net>

* Makeconfig: add support for multiarch compat directories.

Gbp-Pq: Topic any
Gbp-Pq: Name local-ld-multiarch.diff

19 months agolocal-fhs-nscd
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-fhs-nscd

Gbp-Pq: Topic any
Gbp-Pq: Name local-fhs-nscd.diff

19 months agolocal-fhs-linux-paths
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-fhs-linux-paths

# DP: Description: Correct linux paths for FHS
# DP: Author: Unknown
# DP: Upstream status: Debian-Specific
# DP: Status Details: GNU doesn't follow the FHS.
# DP: Date: Unknown

# DP: Description: Correct linux paths for FHS
# DP: Author: Unknown
# DP: Upstream status: Debian-Specific
# DP: Status Details: GNU doesn't follow the FHS.
# DP: Date: Unknown

Gbp-Pq: Topic any
Gbp-Pq: Name local-fhs-linux-paths.diff

19 months agolocal-bindresvport_blacklist
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-bindresvport_blacklist

Patch from the OpenSUSE glibc

Gbp-Pq: Topic any
Gbp-Pq: Name local-bindresvport_blacklist.diff

19 months agolocal-asserth-decls
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-asserth-decls

# DP: Description: /usr/include/assert.h
# DP: One must be allowed to include <assert.h> multiple times with different
# DP: values for NDEBUG, so the file is not protected against multiple
# DP: inclusions.  Unfortunately this means that the declarations for
# DP: __assert_fail() and the like may occur multiple times in a compilation
# DP: unit, causing gcc to issue a batch of warnings.
# DP: I believe this can be fixed by protecting the declarations (but only
# DP: those declarations) against repetition.
# DP: Author: Jeroen T. Vermeulen <jtv@xs4all.nl>
# DP: Upstream status: Not submitted
# DP: Status Details: Plan to submit
# DP: Date: 2003-01-01

# DP: Description: /usr/include/assert.h
# DP: One must be allowed to include <assert.h> multiple times with different
# DP: values for NDEBUG, so the file is not protected against multiple
# DP: inclusions.  Unfortunately this means that the declarations for
# DP: __assert_fail() and the like may occur multiple times in a compilation
# DP: unit, causing gcc to issue a batch of warnings.
# DP: I believe this can be fixed by protecting the declarations (but only
# DP: those declarations) against repetition.
# DP: Author: Jeroen T. Vermeulen <jtv@xs4all.nl>
# DP: Upstream status: Not submitted
# DP: Status Details: Plan to submit
# DP: Date: 2003-01-01

Gbp-Pq: Topic any
Gbp-Pq: Name local-asserth-decls.diff

19 months agoInstall ld.so to slibdir instead of rtlddir to fix cross builds
Adam Conrad [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Install ld.so to slibdir instead of rtlddir to fix cross builds

When installing a cross-libc purely for linking purposes but not
runtime use, the linker shouldn't be installed in rtlddir, since
we won't actually be USING it, and thus referencing the rtlddir
path in libc.so ends up blowing up cross-compilers for no reason.

Gbp-Pq: Topic any
Gbp-Pq: Name local-rtlddir-cross.diff

19 months agosubmitted-po-fr-fixes
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-po-fr-fixes

2014-05-05  Aurelien Jarno  <aurelien@aurel32.net>

* po/fr.po: Fix French translation of inappropriate.

Gbp-Pq: Topic all
Gbp-Pq: Name submitted-po-fr-fixes.diff

19 months agolocal-nis-shadow
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-nis-shadow

Gbp-Pq: Topic all
Gbp-Pq: Name local-nis-shadow.diff

19 months agolocal-ldd
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ldd

2013-05-11  Aurelien Jarno  <aurelien@aurel32.net>

* elf/ldd.bash.in: Verify the dynamic linker is working before
using it.

Gbp-Pq: Topic all
Gbp-Pq: Name local-ldd.diff

19 months agolocal-ru_RU
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ru_RU

# DP: Description: Change default charset for 'russian' locale alias
# DP: Related bugs: #62586
# DP: Dpatch author: Ben Collins
# DP: Patch author: Alistair McKinstry
# DP: Upstream status: Submitted
# DP: Status Details: http://sources.redhat.com/bugzilla/show_bug.cgi?id=120
# DP: Date: 2002-03-10

# DP: Description: Change default charset for 'russian' locale alias
# DP: Related bugs: #62586
# DP: Dpatch author: Ben Collins
# DP: Patch author: Alistair McKinstry
# DP: Upstream status: Submitted
# DP: Status Details: http://sources.redhat.com/bugzilla/show_bug.cgi?id=120
# DP: Date: 2002-03-10

Gbp-Pq: Topic all
Gbp-Pq: Name local-ru_RU.diff

19 months agolocal-remove-manual
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-remove-manual

The GNU Libc Reference manual has to be removed for licensing reasons.
But some files have a dependency on manual/errno.texi; the easiest
solution is to drop those dependencies and make sure that MAKEINFO=:
so that no target depends on manual/*.texi files.

Gbp-Pq: Topic all
Gbp-Pq: Name local-remove-manual.diff

19 months agolocal-alias-et_EE
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-alias-et_EE

Gbp-Pq: Topic all
Gbp-Pq: Name local-alias-et_EE.diff

19 months agosubmitted-sparc64-socketcall
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-sparc64-socketcall

2016-03-01  Aurelien Jarno  <aurelien@aurel32.net>

* sysdeps/unix/sysv/linux/sparc/sparc64/syscalls.list (bind, listen,
setsockopt): Remove.

Gbp-Pq: Topic sparc
Gbp-Pq: Name submitted-sparc64-socketcall.diff

19 months agolocal-fpscr_values
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-fpscr_values

Gbp-Pq: Topic sh4
Gbp-Pq: Name local-fpscr_values.diff

19 months agogit-thread-debugging
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-thread-debugging

2018-08-06  Andreas Schwab  <schwab@suse.de>

* sysdeps/riscv/nptl/tls.h (DB_THREAD_SELF): Use REGISTER instead
of CONST_THREAD_AREA.

Gbp-Pq: Topic riscv64
Gbp-Pq: Name git-thread-debugging.diff

19 months agolocal-powerpc8xx-dcbz
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-powerpc8xx-dcbz

Gbp-Pq: Topic powerpc
Gbp-Pq: Name local-powerpc8xx-dcbz.diff

19 months agosubmitted-rld_map
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-rld_map

2010-05-20  Aurelien Jarno  <aurelien@aurel32.net>

* sysdeps/mips/dl-machine.h (ELF_MACHINE_DEBUG_SETUP): test for
RLD_MAP pointer before using it.

Gbp-Pq: Topic mips
Gbp-Pq: Name submitted-rld_map.diff

19 months agosubmitted-gcc34-seccomment
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-gcc34-seccomment

# DP: Description: Make glibc-2.3.5 compile with gcc-3.4/4.0 + binutils 2.16

# DP: Description: Make glibc-2.3.5 compile with gcc-3.4/4.0 + binutils 2.16
#    on m68k fixed by adding #APP.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: Andreas Schwab <schwab@suse.de>
# DP: Upstream status: Pending
# DP: Status Details:
# DP: Date: 2005-08-03

From: Andreas Schwab <schwab@suse.de>

Gbp-Pq: Topic m68k
Gbp-Pq: Name submitted-gcc34-seccomment.diff

19 months agolocal-reloc
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-reloc

# DP: Description: binutils bug workaround
# DP: Related bugs: #263601: m68k: workaround for binutils problem
# DP: Dpatch author: Roman Zippel <zippel@linux-m68k.org>
# DP: Patch author: Richard Zidlicky <rz@linux-m68k.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: Actual fix is to modify m68k binutils.
# DP: Date: 2004-08-09

# DP: Description: binutils bug workaround
# DP: Related bugs: #263601: m68k: workaround for binutils problem
# DP: Dpatch author: Roman Zippel <zippel@linux-m68k.org>
# DP: Patch author: Richard Zidlicky <rz@linux-m68k.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: Actual fix is to modify m68k binutils.
# DP: Date: 2004-08-09

Gbp-Pq: Topic m68k
Gbp-Pq: Name local-reloc.diff

19 months agolocal-dwarf2-buildfix
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-dwarf2-buildfix

# DP: Description: Adding empty m68k framestate.c not to build for dwarf2.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: GOTO Masanori <gotom@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: m68k uses sjlj exceptions, not dwarf2 unwind.
# DP: This patch adds empty framestate.c for m68k to avoid
# DP: dwarf2 build failure.
# DP: Date: 2003-07-19 (Update 2005-03-16 gotom)

# DP: Description: Adding empty m68k framestate.c not to build for dwarf2.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: GOTO Masanori <gotom@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: m68k uses sjlj exceptions, not dwarf2 unwind.
# DP: This patch adds empty framestate.c for m68k to avoid
# DP: dwarf2 build failure.
# DP: Date: 2003-07-19 (Update 2005-03-16 gotom)

2005-03-16  GOTO Masanori  <gotom@debian.org>

* sysdeps/m68k/unwind-pe.c: Update to fix compilation failure.

2003-07-19  GOTO Masanori  <gotom@debian.org>

* sysdeps/m68k/framestate.c: Add to fix compilation failure
with sjlj exception, suggested by Philip Blundell.

Gbp-Pq: Topic m68k
Gbp-Pq: Name local-dwarf2-buildfix.diff

19 months agolocal-no-execfn
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-no-execfn

AT_EXECFN is Linux specific

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-no-execfn.diff

19 months agolocal-getaddrinfo-freebsd-kernel
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-getaddrinfo-freebsd-kernel

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-getaddrinfo-freebsd-kernel.diff

19 months agolocal-scripts
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-scripts

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-scripts.diff

19 months agolocal-fbtl-depends
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-fbtl-depends

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-fbtl-depends.diff

19 months agolocal-fbtl
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-fbtl

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-fbtl.diff

19 months agolocal-sysdeps
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-sysdeps

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-sysdeps.diff

19 months agolocal-grantpt
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-grantpt

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-grantpt.diff

19 months agolocal-config_h_in
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-config_h_in

2009-05-23  Aurelien Jarno <aurelien@aurel32.net>

* config.h.in (__KFREEBSD_KERNEL_VERSION): Add.

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-config_h_in.patch

19 months agosubmitted-auxv
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-auxv

https://sourceware.org/bugzilla/show_bug.cgi?id=15794

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name submitted-auxv.diff

19 months agosubmitted-waitid
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-waitid

Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name submitted-waitid.diff

19 months agounsubmitted-quiet-ldconfig
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
unsubmitted-quiet-ldconfig

Gbp-Pq: Topic i386
Gbp-Pq: Name unsubmitted-quiet-ldconfig.diff

19 months agolocal-biarch
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-biarch

# DP: Description: Allow ldconfig to work on i386/x86-64 biarch systems
# DP: Related bugs:
# DP: Dpatch author: Daniel Jacobowitz
# DP: Patch author: Daniel Jacobowitz
# DP: Upstream status: Debian-Specific
# DP: Status Details: based on Ubuntu change by Jeff Bailey
# DP: Date: 2005-10-13

# DP: Description: Allow ldconfig to work on i386/x86-64 biarch systems
# DP: Related bugs:
# DP: Dpatch author: Daniel Jacobowitz
# DP: Patch author: Daniel Jacobowitz
# DP: Upstream status: Debian-Specific
# DP: Status Details: based on Ubuntu change by Jeff Bailey
# DP: Date: 2005-10-13

Gbp-Pq: Topic i386
Gbp-Pq: Name local-biarch.diff

19 months agogit-renameat2
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-renameat2

commit 1b2184177553ce4ef8458034927ef50854be2af6
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Wed Feb 27 07:53:13 2019 -0800

    hurd: Add renameat2 support for RENAME_NOREPLACE

            * include/stdio.h (__renameat2): New hidden prototype.
            * stdio-common/renameat2.c (__renameat2): Add hidden definition.
            * sysdeps/mach/hurd/renameat.c (__renameat): Move implementation to...
            * sysdeps/mach/hurd/renameat2.c (__renameat2): ... new function, and
            add support for RENAME_NOREPLACE.
            * sysdeps/unix/sysv/linux/renameat2.c (__renameat2): Add hidden definition.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-renameat2.diff

19 months agogit-altstack
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-altstack

commit a0bb5abd09e3d0f66c3dccf70bf74c8b2d7cc1c2
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Thu Jan 24 19:27:00 2019 +0100

    hurd: Fix initial sigaltstack state

            * hurd/hurdsig.c (_hurd_thread_sigstate): Set SS_DISABLE in
            sigaltstack.ss_flags.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-altstack.diff

19 months agogit-AT_EMPTY_PATH
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-AT_EMPTY_PATH

commit ee4d79026da2c21c75cccd5795cb4357643f4f5c
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Tue Jan 22 23:38:36 2019 +0100

    hurd: Support AT_EMPTY_PATH

            * hurd/lookup-at.c (__file_name_lookup_at): When at_flags contains
            AT_EMPTY_PATH, call __dir_lookup and __hurd_file_name_lookup_retry
            directly instead of __hurd_file_name_lookup.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-AT_EMPTY_PATH.diff

19 months agogit-libpthread_setpshared
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-libpthread_setpshared

commit 55137f7dd939bc8403a63f4cade73ff90575b821
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Wed Jan 2 22:21:34 2019 +0100

    hurd: advertise *_setpshared as not supported

    The functions themselves return 0, but initializing a mutex/etc with       .
    pshared set to 1 will fail anyway                                          .

            * sysdeps/htl/pt-barrierattr-setpshared.c
            (pthread_barrierattr_setpshared): Add stub warning.
            * sysdeps/htl/pt-condattr-setpshared.c
            (pthread_condattr_setpshared): Likewise.
            * sysdeps/htl/pt-mutexattr-setpshared.c
            (pthread_mutexattr_setpshared): Likewise.
            * sysdeps/htl/pt-rwlockattr-setpshared.c
            (pthread_rwlockattr_setpshared): Likewise.
            * sysdeps/mach/hurd/htl/pt-mutexattr-setpshared.c
            (pthread_mutexattr_setpshared): Likewise.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-libpthread_setpshared.diff

19 months ago[PATCH] Make F_RDLCK/F_WRLCK atomic
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Make F_RDLCK/F_WRLCK atomic

lockf(LOCK_EX) would for instance drop any existing shared lock before taking
the exclusive lock. F_RDLCK/F_WRLCK need atomic changes, so introduce and use
__LOCK_ATOM

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
* misc/sys/file.h (__LOCK_ATOMIC): New macro.
* sysdeps/mach/hurd/fcntl.c (__libc_fcntl): Use __LOCK_ATOMIC along LOCK_SH and
LOCK_EX.

XXX: Adding to misc/sys/file.h is questionable

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-WRLCK-upgrade.diff

19 months agogit-lockf-0
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-lockf-0

commit b15b1a959040fe8cdfbc51092a7b72032f6c9b86
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Mon Nov 19 20:22:30 2018 +0100

    hurd: Support lockf at offset 0 with size 0 or 1.

            * sysdeps/mach/hurd/f_setlk.c: Include <unistd.h>.
            (__f_setlk): When whence is SEEK_CUR, use __lseek64 to convert it to
            SEEK_SET.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-lockf-0.diff

19 months agogit-fcntl64
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-fcntl64

commit 346ef23f197a0c8ba807c344bd39101b711050ee
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Thu Nov 15 00:52:36 2018 +0100

    hurd: Fix F_*LK* fcntl with __USE_FILE_OFFSET64

    struct flock64 uses 64bit values. This introduces other values for F_GETLK,
    F_SETLK, F_SETLKW to distinguish between both.

            * sysdeps/mach/hurd/bits/fcntl.h (F_GETLK64, F_SETLK64, F_SETLKW64): New
            macros
            [__USE_FILE_OFFSET64] (F_GETLK, F_SETLK, F_SETLKW): Define to F_GETLK64,
            F_SETLK64, F_SETLKW64, respectively.
            * sysdeps/mach/hurd/f_setlk.c: New file.
            * sysdeps/mach/hurd/f_setlk.h: New file.
            * sysdeps/mach/hurd/Makefile [$(subdir) = io] (sysdeps_routines): Add
            f_setlk.
            * sysdeps/mach/hurd/fcntl.c: Include "f_setlk.h".h".
            (__libc_fcntl): Move non-flock operations to...
            * sysdeps/mach/hurd/vfcntl.c (__libc_vfcntl): ... New file.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-fcntl64.diff

19 months agogit-tst-preadvwritev2-common.c
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-tst-preadvwritev2-common.c

commit 18ad0de6513bf8a8e4ba757c069e6806d07920f8
Author: Adhemerval Zanella <adhemerval.zanella@linaro.org>
Date:   Tue Oct 23 14:53:12 2018 -0300

    Fix tst-preadvwritev2 build failure on HURD

    Commit 7a16bdbb9ff41 uses IOV_MAX, which is not defined on hurd.

    Checked on a build for i686-gnu.

            * misc/tst-preadvwritev2-common.c (IOV_MAX): Define if not
            defined.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-tst-preadvwritev2-common.c.diff

19 months agogit-spawn-open
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-spawn-open

commit 7fa495cdf750c257ed897eca189aabc3a62d5f2b
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Sat Nov 10 11:20:12 2018 +0000

    Hurd: Fix ulinks in fd table reallocation

            * hurd/hurd/userlink.h (_hurd_userlink_move): New function.
            * hurd/hurd/port.h (_hurd_port_move): New function.
            * sysdeps/mach/hurd/spawni.c (NEW_ULINK_TABLE): New macro.
            (EXPAND_DTABLE): Use NEW_ULINK_TABLE macro for ulink_dtable.

commit 278fdabd8c45dc215222facd36febfc3f6f2a95d
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Sun Nov 11 20:08:29 2018 +0100

    hurd: Fix spawni's user_link reallocation

    * hurd/hurd/userlink.h (_hurd_userlink_move): Make new_link's
    predecessor point to new_link instead of link.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-spawn-open.diff

19 months agogit-msync
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-msync

commit 2e96e9808eb6e76304907123455668894147d836
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Sat Nov 3 22:47:57 2018 +0100

    hurd: Support msync

            * sysdeps/mach/hurd/msync.c: New file.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-msync.diff

19 months agogit-pci
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-pci

commit fc783076ec496a55c029be14617ea16a24589f55
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Wed Oct 31 22:43:44 2018 +0100

    hurd: Add pci RPC stubs

            * hurd/Makefile (user-interfaces): Add pci.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-pci.diff

19 months agogit-intr-msg
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-intr-msg

commit 32ad5b3328e0ce53ca27e185a89ca44c1d0acd0c
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Tue Oct 9 23:40:09 2018 +0200

    hurd: Fix race between calling RPC and handling a signal

            * sysdeps/mach/hurd/i386/intr-msg.h (INTR_MSG_TRAP): Make
            _hurd_intr_rpc_msg_about_to global point to start of controlled
            assembly snippet. Make it check canceled flag again.
            * hurd/hurdsig.c (_hurdsig_abort_rpcs): Only mutate thread if it passed the
            _hurd_intr_rpc_msg_about_to point.
            * hurd/intr-msg.c (_hurd_intr_rpc_mach_msg): Remove comment on mutation
            issue.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-intr-msg.diff

19 months agogit-interrupt_timeout
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-interrupt_timeout

commit 6849ff19657e8f7e6a83e9aaae07eb45269dc7d4
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Tue Oct 9 22:27:59 2018 +0200

    hurd: set interrupt timeout to 1 minute

    Seeing a server not able to get interrupted for 3s is not so surprising when
    e.g. a lot of writes are happening. 1 minute allows to actually notice the
    issue and be able to debug it.

            * hurd/hurdsig.c (_hurd_interrupted_rpc_timeout): Set to 60000.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-interrupt_timeout.diff

19 months agogit-interrupt_timeout_EIO
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
git-interrupt_timeout_EIO

commit 16d61b858ec0e802008d721e150e48d6083d3921
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Tue Oct 9 22:25:19 2018 +0200

    hurd: Return EIEIO on non-responding interrupted servers

    since we do not actually know whether the RPC was completed or not,
    which makes a huge difference for e.g. write(), so better really error
    out than letting caller think that the RPC did not happen.

            * hurd/intr-msg.c (_hurd_intr_rpc_mach_msg): When the server does not
            answer to interrupt_operation, return EIEIO instead of EINTR.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-interrupt_timeout_EIO.diff

19 months agolocal-hurd_sigstate-PLT
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-hurd_sigstate-PLT

===================================================================

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-hurd_sigstate-PLT.diff

19 months agoEnable global signal distribution in htl
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Enable global signal distribution in htl

* sysdeps/mach/hurd/htl/pt-sigstate-init.c (__pthread_sigstate_init):
Call _hurd_sigstate_set_global_rcv().
* sysdeps/mach/hurd/htl/pt-sigstate-destroy.c
(__pthread_sigstate_destroy): Call _hurd_sigstate_delete().
* sysdeps/mach/hurd/htl/pt-sigstate.c: Include <hurd/msg.h>
(__pthread_sigstate): Use _hurd_sigstate_lock()/_hurd_sigstate_unlock()
and _hurd_sigstate_pending(). Call __msg_sig_post() to wake up thread
with pending signals.
* sysdeps/mach/hurd/Makefile (LDLIBS-pthread.so): Add
$(objdir)/hurd/libhurduser.so.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name libpthread_sigs.diff

19 months agolocal-exec_filename
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-exec_filename

Keep compatibility with experimental implementation

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-exec_filename.diff

19 months agolocal-no_unsupported_ioctls
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-no_unsupported_ioctls

These ioctls are not actually supported (and will probably not be in the
close future), and are not available on Linux either, so don't expose
them to application at the risk of them complaining that they don't work
(e.g. xterm using TIOCLSET).

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-no_unsupported_ioctls.diff

19 months ago[PATCH] hurd: Handle `pid' magical lookup retry
Justus Winter [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] hurd: Handle `pid' magical lookup retry

        * hurd/lookup-retry.c: Handle `pid' magical lookup
        retry.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-magic-pid.diff

19 months ago[PATCH] XXX: make libc_rwlock recursive
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] XXX: make libc_rwlock recursive

Without making the rwlocks recursive, running fakeroot-tcp gets this:

#0  0x0106e91c in mach_msg_trap () at /usr/src/glibc-2.24/build-tree/hurd-i386-libc/mach/mach_msg_trap.S:2
#1  0x0106f090 in __mach_msg (msg=0x20034a0, option=3, send_size=64, rcv_size=32, rcv_name=421, timeout=0, notify=0) at msg.c:110
#2  0x0125a241 in __gsync_wait (task=1, addr=19101080, val1=2, val2=0, msec=0, flags=0)
    at /usr/src/glibc-2.24/build-tree/hurd-i386-libc/mach/RPC_gsync_wait.c:175
#3  0x010b0743 in __dcigettext (domainname=0x8050740 <_libc_intl_domainname@@GLIBC_2.2.6> "libc",
    msgid1=0x8051d88 "undefined symbol: acl_get_fd", msgid2=0x0, plural=0, n=0, category=5) at dcigettext.c:527
#4  0x010af776 in __dcgettext (domainname=0x8050740 <_libc_intl_domainname@@GLIBC_2.2.6> "libc",
    msgid=0x8051d88 "undefined symbol: acl_get_fd", category=5) at dcgettext.c:47
#5  0x0124e427 in __dlerror () at dlerror.c:94
#6  0x01035ae3 in load_library_symbols () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#7  0x01035cc3 in tmp___fxstat64 () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#8  0x01036cd6 in __fxstat64 () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#9  0x010ad831 in _nl_load_locale_from_archive (category=category@entry=0, namep=namep@entry=0x200399c) at loadarchive.c:211
#10 0x010ac45b in _nl_find_locale (locale_path=0x0, locale_path_len=0, category=category@entry=0, name=0x200399c) at findlocale.c:154
#11 0x010abde7 in setlocale (category=0, locale=0x804c2e4 "") at setlocale.c:417
#12 0x0804947f in main (argc=2, argv=0x2003ad4) at programs/locale.c:191

That's very unfortunate: libfakeroot gets initialized from a section
where __libc_setlocale_lock is already locked, and thus the dlerror()
call hangs inside __dcigettext. It happens that Linux doesn't have
the problem probably because pthread_rwlock_wrlock returns a EDEADLK
error instead of hanging, and then the first unlock unlocks, and the
second unlock probably returns an EINVAL. This is all very unsafe, but
that's fakeroot-tcp's matter (see http://bugs.debian.org/845930 for the
follow-up)...

We only use it when constructing the debian installer for -s -r options
anyway.

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-libc_rwlock_recursive.diff

19 months ago[PATCH] Fix SS_ONSTACK support
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Fix SS_ONSTACK support

* sysdeps/mach/hurd/i386/sigreturn.c (__sigreturn2): New function,
unlocks SS and returns to the saved PC.
(__sigreturn): Do not unlock SS, and "return" into __sigreturn2 on the
thread stack instead of the saved PC.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-ONSTACK.diff

19 months agotg-eintr
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
tg-eintr

commit 230b85f414291ac955827aba15cfbd103ab6ebdd
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date:   Thu Jun 9 01:15:10 2016 +0200

    Fix pipe() call returning EINTR sometimes

    because it uses a critical section

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-eintr.diff

19 months agolocal-mach_print
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-mach_print

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-mach_print.diff

19 months agotg-bootstrap
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
tg-bootstrap

This dependency is missing, but would pose problem on Darwin

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-bootstrap.diff

19 months agosubmitted-bind_umask2
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-bind_umask2

2014-08-27  Samuel Thibault  <samuel.thibault@ens-lyon.org>

Fix bind when umask is e.g. 0777.

        * sysdeps/mach/hurd/bind.c (__bind): Pass mode 0666 to __dir_mkfile
        instead of final mode, so that call __ifsock_getsockaddr can always
        succeed, before calling __file_chmod to fix the mode according to umask,
        before calling __dir_link to show the file.

Part of the original fix was committed, the other hasn't been yet, see Roland's
"Harumph" reply to
https://sourceware.org/ml/libc-alpha/2014-08/msg00408.html

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name submitted-bind_umask2.diff

19 months ago[PATCH] Hurd: make sigstates hold a reference on thread ports
Richard Braun [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Hurd: make sigstates hold a reference on thread ports

This change is required in order to correctly release per-thread
resources. Directly reusing the threading library reference isn't
possible since the sigstate is also used early in the main thread,
before threading is initialized.

* hurd/hurd/signal.h (_hurd_self_sigstate): Drop thread reference after
calling _hurd_thread_sigstate.
(_hurd_critical_section_lock): Likewise.
* hurd/hurdsig.c (_hurd_thread_sigstate): Add a reference on the thread.
(_hurd_sigstate_delete): Drop thread reference.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sigstate_thread_reference.diff

19 months agosubmitted-path_mounted
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
submitted-path_mounted

http://sourceware.org/ml/libc-alpha/2013-08/msg00207.html

To: libc-alpha@sourceware.org
Subject: [PATCH 2/2] Define _PATH_MOUNTED as "/etc/mtab"
Date: Thu, 15 Aug 2013 10:43:35 +0200

Change the definition of _PATH_MOUNTED to "/etc/mtab". This is the
value used on Linux.

The change is motivated by the fact that on Debian /etc/mtab is a
symbolic link to /proc/mounts. This patch adjusts the macro for
non-linux systems such as Hurd. Changing this using
sysdeps/mach/hurd/paths.h causes build problems because
/usr/include/hurd/paths.h is shadowed by this file. This change is
proposed in the hope that aligning the non-linux targets with the
glibc for Linux is perceived as a good thing while fixing this problem
on Debian/Hurd along the way.

* sysdeps/generic/paths.h (_PATH_MOUNTED): Change value to "/etc/mtab".

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name submitted-path_mounted.diff

19 months agounsubmitted-clock_t_centiseconds
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
unsubmitted-clock_t_centiseconds

Some applications assume centisecond precision, or at most millisecond precision
(e.g. guile).  This is a work-around for them.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name unsubmitted-clock_t_centiseconds.diff

19 months agoFix poll and select POSIX compliancy details about errors
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Fix poll and select POSIX compliancy details about errors

This fixes the following:

This fixes the following:

- On error, poll must not return without polling, including EBADF, and instead
report POLLHUP/POLLERR/POLLNVAL
- Select must report EBADF if some set contains an invalid FD.

The idea is to move error management to after all select calls, in the
poll/select final treatment. The error is instead recorded in a new `error'
field, and a new SELECT_ERROR bit set.

Thanks Svante Signell for the initial version of the patch.

* hurd/hurdselect.c (SELECT_ERROR): New macro.
(_hurd_select):
- Add `error' field to `d' structures array.
- If a poll descriptor is bogus, set EBADF, but continue with a zero timeout.
- Go through the whole fd_set, not only until _hurd_dtablesize. Return EBADF
there is any bit set above _hurd_dtablesize.
- Do not request io_select on bogus descriptors (SELECT_ERROR).
- On io_select request error, record the error.
- On io_select bogus reply, use EIO error code.
- On io_select bogus or error reply, record the error.
- Do not destroy reply port for bogus FDs.
- On error, make poll set POLLHUP in the EPIPE case, POLLNVAL in the EBADF
case, or else POLLERR.
- On error, make select simulated readiness.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-poll_errors_fixes.diff

19 months agoFix timeout handling in _hurd_select
Richard Braun [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Fix timeout handling in _hurd_select

Rely on servers to implement timeouts, so that very short values (including
0) don't make mach_msg return before valid replies can be received. The
purpose of this scheme is to guarantee a full client-server round-trip,
whatever the timeout value.

This change depends on the new io_select_timeout RPC being implemented by
servers.

* hurd/Makefile (user-interfaces): Add io_reply and io_request.
* hurd/hurdselect.c: Include <sys/time.h>, <hurd/io_request.h> and <limits.h>.
(_hurd_select): Replace the call to __io_select with either __io_select_request
or __io_select_timeout_request, depending on the timeout. Count the number of
ready descriptors (replies for which at least one type bit is set). Implement
the timeout locally when there is no file descriptor.

TODO: see XXX

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-io_select_timeout.diff

19 months ago[PATCH] t/EGREGIOUS-fr
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] t/EGREGIOUS-fr

Fix grammar in french translation for EGREGIOUS

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-EGREGIOUS-fr.diff

19 months ago[PATCH] Correction traduction « Computer bought the farm »
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Correction traduction « Computer bought the farm »

* po/fr.po: Fix EIEIO french translation.

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-EIEIO-fr.diff

19 months ago[PATCH] Allow unknown root directory.
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Allow unknown root directory.

To be efficient, the remap translator simply returns ports from the underlying
filesystem, and thus the root directory found through browsing '..' is the
underlying root, not the remap root. This should not be a reason for getcwd to
fail.

* sysdeps/mach/hurd/getcwd.c (_hurd_canonicalize_directory_name_internal): Do
not remove the heading slash if we got an unknown root directory.
(__getcwd): Do not fail with EGRATUITOUS if we got an unknown root directory.

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-remap_getcwd.diff

19 months ago[PATCH] Workaround to add IPv6 support to getifaddrs
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Workaround to add IPv6 support to getifaddrs

ifreq only contains sockaddr structures, which are not big enough for
IPv6 addresses. This takes another, ugly, approach, by parsing fsysopts
/servers/socket/2 options...

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-ifaddrs_v6.diff

19 months agoFix sbrk in PIE binaries
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Fix sbrk in PIE binaries

In PIE mode, the program gets loaded at very low address, and thus _end is very
low, just before libraries, and thus initializing the brk to it does not make
sense, since there is no room left there. Hardcode the brk to 0x8000000 for now
as a workaround.

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-pie-sbrk.diff

19 months agoFix Hurd implementation of setitimer.
Richard Braun [Wed, 26 Dec 2012 16:31:14 +0000 (16:31 +0000)]
Fix Hurd implementation of setitimer.

    The preemptor sigcode doesn't match since the POSIX sigcode SI_TIMER is
    used when SIGALRM is sent. In addition, The inline version of
    hurd_preempt_signals doesn't update _hurdsig_preempted_set. For these
    reasons, the preemptor would be skipped by post_signal.

    * sysdeps/mach/hurd/setitimer.c (setitimer_locked): Fix preemptor setup.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-setitimer.diff

19 months agotg-single-select-timeout
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
tg-single-select-timeout

commit fffcbbb0b5ff8864086f7b58fdbb8aa4c71943d0
Author: Richard Braun <rbraun@sceen.net>
Date:   Mon Dec 17 09:57:41 2012 +0000

    Fix _hurd_select for single fd sets

    The function attempts to optimize this case by performing one IPC system call
    with the timeout included among the parameters, but in the absence of a reply,
    it will call mach_msg again with the same timeout later, effectively doubling
    the total timeout of the select/poll call.

    Remove this optimization for the time being.

    * hurd/hurdselect.c (_hurd_select): Always call __io_select with no timeout.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-single-select-timeout.diff

19 months agotg-hurdsig-boot-fix
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
tg-hurdsig-boot-fix

2012-09-05  Richard Braun  <rbraun@sceen.net>

       * hurd/hurdsig.c (sigstate_is_global_rcv): Do not return true
       if _HURD_GLOBAL_SIGSTATE is null.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-boot-fix.diff

19 months agolocal-usr
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-usr

Upstream uses prefix=/ while we use prefix=/usr

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-usr.diff

19 months agolibpthread_version
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
libpthread_version

This dates when libpthread was moved to glibc and some features were added.

2.13-31/38/39 dates when the global signal disposition call was added.
TODO: _DEBIAN_ in versions however pose problem. Remove the _DEBIAN_ version
once packages are rebuilt against 2.21.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name libpthread_version.diff

19 months ago[PATCH] t/hooks
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] t/hooks

Add link rules to sort hooks, otherwise they are not properly recorded

2012-04-21  Samuel Thibault  <samuel.thibault@ens-lyon.org>

        * Makerules (shlib.lds): Add hurd hooks sorting rules.

Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hooks.diff

19 months ago[PATCH] Small signal fixes
Jeremie Koenig [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Small signal fixes

    22e7268 Hurd signals: fix sigwait for pending signals
    da8bf5e Hurd signals: clear the pending mask in fork and spawn
    8e87205 Hurd signals: don't drop blocked ignored signals

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-fixes-2.diff

19 months ago[PATCH] implement SA_SIGINFO signal handlers.
Jeremie Koenig [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] implement SA_SIGINFO signal handlers.

    52baaca Hurd signals: Copy bits/sigaction.h
    4232c66 Hurd signals: SA_SIGINFO support
    1831cfe Hurd signals: Use POSIX sigcodes

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-SA_SIGINFO.diff

19 months agolocal-hurdsig-global-dispositions-version
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-hurdsig-global-dispositions-version

jkoenig's work on signals

2.13-19 dates when the global signal disposition call was added.
TODO: _DEBIAN_ in versions however pose problem. Remove the _DEBIAN_ version
once packages are rebuilt against 2.21.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-hurdsig-global-dispositions-version.diff

19 months ago[PATCH] Global signal dispositions.
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Global signal dispositions.

Although they should not change the
default behaviors of signals for cthread programs, these patches add
new functions which can be used by libpthread to enable
POSIX-conforming behavior of signals on a per-thread basis.

YYYY-MM-DD  Jeremie Koenig  <jk@jk.fr.eu.org>

    e407ae3 Hurd signals: implement global signal dispositions
    38eb4b3 Hurd signals: provide a sigstate destructor
    344dfd6 Hurd signals: fix sigwait() for global signals
    fb055f2 Hurd signals: fix global untraced signals.

YYYY-MM-DD  Thomas Schwinge  <thomas@codesourcery.com>

* sysdeps/mach/hurd/fork.c (__fork): In the child, reinitialize
the global sigstate's lock.

This is work in progress.

This cures an issue that would very rarely cause a deadlock in the child
in fork, tries to unlock ss' critical section lock at the end of fork.
This will typically (always?) be observed in /bin/sh, which is not
surprising as that is the foremost caller of fork.

To reproduce an intermediate state, add an endless loop if
_hurd_global_sigstate is locked after __proc_dostop (cast through
volatile); that is, while still being in the fork's parent process.

When that triggers (use the libtool testsuite), the signal thread has
already locked ss (which is _hurd_global_sigstate), and is stuck at
hurdsig.c:685 in post_signal, trying to lock _hurd_siglock (which the
main thread already has locked and keeps locked until after
__task_create).  This is the case that ss->thread == MACH_PORT_NULL, that
is, a global signal.  In the main thread, between __proc_dostop and
__task_create is the __thread_abort call on the signal thread which would
abort any current kernel operation (but leave ss locked).  Later in fork,
in the parent, when _hurd_siglock is unlocked in fork, the parent's
signal thread can proceed and will unlock eventually the global sigstate.
In the client, _hurd_siglock will likewise be unlocked, but the global
sigstate never will be, as the client's signal thread has been configured
to restart execution from _hurd_msgport_receive.  Thus, when the child
tries to unlock ss' critical section lock at the end of fork, it will
first lock the global sigstate, will spin trying to lock it, which can
never be successful, and we get our deadlock.

Options seem to be:

  * Move the locking of _hurd_siglock earlier in post_signal -- but that
    may generally impact performance, if this locking isn't generally
    needed anyway?

    On the other hand, would it actually make sense to wait here until we
    are not any longer in a critical section (which is meant to disable
    signal delivery anyway (but not for preempted signals?))?

  * Clear the global sigstate in the fork's child with the rationale that
    we're anyway restarting the signal thread from a clean state.  This
    has now been implemented.

Why has this problem not been observed before Jérémie's patches?  (Or has
it?  Perhaps even more rarely?)  In _S_msg_sig_post, the signal is now
posted to a *global receiver thread*, whereas previously it was posted to
the *designated signal-receiving thread*.  The latter one was in a
critical section in fork, so didn't try to handle the signal until after
leaving the critical section?  (Not completely analyzed and verified.)

Another question is what the signal is that is being received
during/around the time __proc_dostop executes.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-global-dispositions.diff

19 months ago[PATCH] Signal code refactoring.
Jeremie Koenig [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Signal code refactoring.

These patches should not change the current
behavior, although they do fix a few minor bugs which were made
apparent in the process. They are unchanged from my previous post
earlier this month.

    34f5960 _hurd_internal_post_signal: Split into more functions
    420eec9 _hurd_internal_post_signal: Scope variables more restrictively
    1f5accd _hurd_internal_post_signal: Split out inner functions
    1bb0a1d Hurd signals: refactor check_pending_signals
    1764465 Hurd signals: reindent
    28473d2 Hurd signals: make sigsuspend POSIX-conformant.
    26d091a Hurd signals: fix uninitialized value.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-fixes.diff

19 months agolocal-madvise_warn
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-madvise_warn

Do not warn about madvise not being implemented. It does not have any real
semantic anyway, and that brings some -Werror FTBFS.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-madvise_warn.diff

19 months agolocal-ED
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-ED

This is a long funny story, but even if it's standard-compliant, it poses too
many problems.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-ED.diff

19 months ago[PATCH] Add -lmachuser -lhurduser to libc.so on GNU/Hurd.
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Add -lmachuser -lhurduser to libc.so on GNU/Hurd.

http://lists.gnu.org/archive/html/bug-hurd/2011-03/msg00112.html

2011-03-29  Samuel Thibault  <samuel.thibault@ens-lyon.org>

        * Makerules ($(inst_libdir)/libc.so): Add -lmachuser -lhurduser to
        libc.so on GNU/Hurd.

It's still unclear what we want to aim for.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-mach-hurd-link.diff

19 months ago[PATCH] hurd: SCM_CREDS support
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] hurd: SCM_CREDS support

Svante Signell  <svante.signell@gmail.com>
Samuel Thibault  <samuel.thibault@ens-lyon.org>

* sysdeps/mach/hurd/sendmsg.c (__libc_sendmsg): On SCM_CREDS
control messages, record uids, pass a rendez-vous port in the
control message, and call __auth_user_authenticate_request to
make auth send credentials on that port.  Do not wait for a
reply.
* sysdeps/mach/hurd/recvmsg.c (contains_uid, contains_gid,
check_auth): New functions.
(__libc_recvmsg): On SCM_CREDS control messages, call check_auth
to check the passed credentials thanks to the answer from the
auth server.
* hurd/Makefile (user-interfaces): Add auth_request and
auth_reply.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sendmsg-SCM_CREDS.diff

19 months ago[PATCH] Add support to send file descriptors over Unix sockets
Emilio Pozuelo Monfort [Sat, 17 Jul 2010 20:09:13 +0000 (22:09 +0200)]
[PATCH] Add support to send file descriptors over Unix sockets

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sendmsg-SCM_RIGHTS.diff

19 months ago[PATCH] Fix installation of locales-all
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Fix installation of locales-all

Dirty hack to fix installation of locales-all: instead of just locking the
archive extension (which is not supported on hurd-i386), lock it all.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-locarchive.diff

19 months agolocal-disable-ioctls
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-disable-ioctls

struct ortentry and struct ifalias req are actually not defined
struct arpreq is defined, but can not be passed to an ioctl on the Hurd.
so let's make packages not believe these are available.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-disable-ioctls.diff

19 months ago[PATCH] Allow the kernel to start earlier than VM_MAX_ADDRESS
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Allow the kernel to start earlier than VM_MAX_ADDRESS

VM_MAX_ADDRESS shouldn't be hardcoded in libc, the kernel should be able to
decide about it dynamically. This fixes glibc into supporting that. It's however
a bit hackish.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-bigmem.diff

19 months ago[PATCH] The critical section lock _can_ be held in these place.
Samuel Thibault [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] The critical section lock _can_ be held in these place.

At least since hurd_thread_cancel can be called by another thread and lock our
critical lock.

http://bugs.debian.org/46859


Thomas suggested that there is no need to take the critical section
lock.  I believe that taking the critical section lock is necessary to
prevent the target thread from entering a signal handler.  Roland will
look into the problem.


Taking the critical section lock makes these assertions bogus.

It happens that hurd_thread_cancel is only called from libports and inside
/hurd/term so this is rare in practice.

A reproducer can be found here:

http://lists.gnu.org/archive/html/bug-hurd/2014-05/msg00025.html

2006-08-05  Samuel Thibault  <samuel.thibault@ens-lyon.org>

       * hurd/thread-cancel.c (hurd_thread_cancel): Do not assert that
       `&ss->critical_section_lock' is unlocked.
       * sysdeps/mach/hurd/jmp-unwind.c (_longjmp_unwind): Likewise, and take
       critical section lock before taking the sigstate lock.
       * sysdeps/mach/hurd/spawni.c (__spawni): Likewise.

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-thread-cancel.diff

19 months ago[PATCH] Implement SysV shared memory for GNU/Hurd.
Marcus Brinkmann [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] Implement SysV shared memory for GNU/Hurd.

2005-07-11  Marcus Brinkmann  <marcus@gnu.org>

        * hurd/Makefile (routines): Add sysvshm.
        (distribute): Add sysvshm.h.
        * hurd/sysvshm.h: New file.
        * hurd/sysvshm.c: New file.
        * sysdeps/mach/hurd/bits/stat.h (S_IMMAP0): New macro.
        (S_ISPARE): Unset the S_IMMAP0 flag.
        * sysdeps/mach/hurd/ftok.c: New file.
        * sysdeps/mach/hurd/shmat.c: New file.
        * sysdeps/mach/hurd/shmctl.c: New file.
        * sysdeps/mach/hurd/shmdt.c: New file.
        * sysdeps/mach/hurd/bits/posix_opt.h: Define _XOPEN_SHM to 1.

TODO:

> +  char filename[sizeof (SHM_DIR) - 1 + SHM_NAMEMAX];
> +  struct stat statbuf;
> +
> +  sprintf (filename, SHM_DIR SHM_NAMEPRI, id);
> +  /* SysV requires read access for IPC_STAT.  */
> +  fd = __open (filename, O_NORW);
> +  if (fd < 0)
> +    {
> +      if (errno == ENOENT)
> +     errno = EINVAL;
> +      return -1;
> +    }

Since this is repeated in more than one function, put it into an
internal subroutine.  Then we have only one place doing the
name-generation logic.



> +    case IPC_RMID:
> +      res = __unlink (filename);
> +      /* FIXME: Check error (mapping ENOENT to EINVAL).  */

Fix it.


Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sysvshm.diff

19 months ago[PATCH] getcontext, makecontext, setcontext, swapcontext
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
[PATCH] getcontext, makecontext, setcontext, swapcontext

Adapted from the Linux x86 functions.

Not thoroughly tested, but manual testing as well as glibc tests look fine, and
manual -lpthread testing also looks fine (within the given bounds for a new
stack to be used with makecontext).

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-context_functions.diff

19 months agolocal-enable-ldconfig
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-enable-ldconfig

# DP: Description: Enable ldconfig and such on hurd-i386
# DP: Author: Jeff Bailey <jbailey@nisa.net>
# DP: Related Bugs: #309489
# DP: Upstream status: Not submitted
# DP: Status Details: Upstream disagrees with this patch, but I'm
# DP: putting it in so that we have expected Debian behaviour on the
# DP: Hurd.  We should review this when the ELF standard supports runpath.
# DP: Date: 08 Apr 2003

# DP: Description: Enable ldconfig and such on hurd-i386
# DP: Author: Jeff Bailey <jbailey@nisa.net>
# DP: Related Bugs: #309489
# DP: Upstream status: Not submitted
# DP: Status Details: Upstream disagrees with this patch, but I'm
# DP: putting it in so that we have expected Debian behaviour on the
# DP: Hurd.  We should review this when the ELF standard supports runpath.
# DP: Date: 08 Apr 2003

Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-enable-ldconfig.diff

19 months agolocal-inlining
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
local-inlining

Increase the maximal overall growth of the compilation unit caused
by inlining for dl-reloc.c on hppa. This remove some warnings and
strangely it reduces the size of the final binary.

Gbp-Pq: Topic hppa
Gbp-Pq: Name local-inlining.diff

19 months agoLie about futex_atomic_cmpxchg_inatomic kernel support.
Adam Conrad [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Lie about futex_atomic_cmpxchg_inatomic kernel support.

Bug-Ubuntu: https://launchpad.net/bugs/1436162
Bug-Debian: https://bugs.debian.org/788799
Last-Update: 2015-03-25

In past versions of glibc, we incorrectly assumed all ARM kernels
in all configurations supported futex_atomic_cmpxchg_inatomic. This
was clearly a lie, however it was a lie that we relied on, because
the fallback implementation appears to not play nicely with certain
applications like pulseaudio.  Restore the lie for kernels > 2.6.32
and plug our ears and scream "LA LA LA" about how wrong this is.

Gbp-Pq: Topic arm
Gbp-Pq: Name local-arm-futex.diff

19 months agounsubmitted-ldso-multilib
GNU Libc Maintainers [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
unsubmitted-ldso-multilib

Gbp-Pq: Topic arm
Gbp-Pq: Name unsubmitted-ldso-multilib.diff

19 months agoWork around broken compilers (like fpc) on armhf
Adam Conrad [Tue, 23 Apr 2024 16:23:00 +0000 (19:23 +0300)]
Work around broken compilers (like fpc) on armhf

Forwarded: no

patches/arm/local-vfp-sysdeps.diff: Force the Tag_ABI_HardFP_use
and Tag_ABI_VFP_args EABI tags when building for armhf, so compilers
only linking crti.o will generate what appear to be armhf binaries.

Gbp-Pq: Topic arm
Gbp-Pq: Name local-vfp-sysdeps.diff