Aurelien Jarno [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
Merge glibc (2.31-2) import into refs/heads/workingbranch
Arjun Shankar [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-selinux-deprecations
The SELinux API deprecated several symbols in its 3.1 release, including
security_context_t, matchpathcon, avc_init, and sidput, which are used in
makedb and nscd. While the usage of these should eventually be replaced by
newer interfaces, this commit disables GCC warnings due to the use of the
above symbols.
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-selinux-deprecations.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-surplus-tls-accounting
commit
ffb17e7ba3a5ba9632cee97330b325072fbe41dd
Author: Szabolcs Nagy <szabolcs.nagy@arm.com>
Date: Wed Jun 10 13:40:40 2020 +0100
rtld: Avoid using up static TLS surplus for optimizations [BZ #25051]
On some targets static TLS surplus area can be used opportunistically
for dynamically loaded modules such that the TLS access then becomes
faster (TLSDESC and powerpc TLS optimization). However we don't want
all surplus TLS to be used for this optimization because dynamically
loaded modules with initial-exec model TLS can only use surplus TLS.
The new contract for surplus static TLS use is:
- libc.so can have up to 192 bytes of IE TLS,
- other system libraries together can have up to 144 bytes of IE TLS.
- Some "optional" static TLS is available for opportunistic use.
The optional TLS is now tunable: rtld.optional_static_tls, so users
can directly affect the allocated static TLS size. (Note that module
unloading with dlclose does not reclaim static TLS. After the optional
TLS runs out, TLS access is no longer optimized to use static TLS.)
The default setting of rtld.optional_static_tls is 512 so the surplus
TLS is 3*192 + 4*144 + 512 = 1664 by default, the same as before.
Fixes BZ #25051.
Tested on aarch64-linux-gnu and x86_64-linux-gnu.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
commit
17796419b5fd694348cceb65c3f77601faae082c
Author: Szabolcs Nagy <szabolcs.nagy@arm.com>
Date: Tue Jul 7 10:49:11 2020 +0100
rtld: Account static TLS surplus for audit modules
The new static TLS surplus size computation is
surplus_tls = 192 * (nns-1) + 144 * nns + 512
where nns is controlled via the rtld.nns tunable. This commit
accounts audit modules too so nns = rtld.nns + audit modules.
rtld.nns should only include the namespaces required by the
application, namespaces for audit modules are accounted on top
of that so audit modules don't use up the static TLS that is
reserved for the application. This allows loading many audit
modules without tuning rtld.nns or using up static TLS, and it
fixes
FAIL: elf/tst-auditmany
Note that DL_NNS is currently a hard upper limit for nns, and
if rtld.nns + audit modules go over the limit that's a fatal
error. By default rtld.nns is 4 which allows 12 audit modules.
Counting the audit modules is based on existing audit string
parsing code, we cannot use GLRO(dl_naudit) before the modules
are actually loaded.
commit
0c7b002fac12dcb2f53ba83ee56bb3b5d2439447
Author: Szabolcs Nagy <szabolcs.nagy@arm.com>
Date: Tue Jun 9 09:57:28 2020 +0100
rtld: Add rtld.nns tunable for the number of supported namespaces
TLS_STATIC_SURPLUS is 1664 bytes currently which is not enough to
support DL_NNS (== 16) number of dynamic link namespaces, if we
assume 192 bytes of TLS are reserved for libc use and 144 bytes
are reserved for other system libraries that use IE TLS.
A new tunable is introduced to control the number of supported
namespaces and to adjust the surplus static TLS size as follows:
surplus_tls = 192 * (rtld.nns-1) + 144 * rtld.nns + 512
The default is rtld.nns == 4 and then the surplus TLS size is the
same as before, so the behaviour is unchanged by default. If an
application creates more namespaces than the rtld.nns setting
allows, then it is not guaranteed to work, but the limit is not
checked. So existing usage will continue to work, but in the
future if an application creates more than 4 dynamic link
namespaces then the tunable will need to be set.
In this patch DL_NNS is a fixed value and provides a maximum to
the rtld.nns setting.
Static linking used fixed 2048 bytes surplus TLS, this is changed
so the same contract is used as for dynamic linking. With static
linking DL_NNS == 1 so rtld.nns tunable is forced to 1, so by
default the surplus TLS is reduced to 144 + 512 = 656 bytes. This
change is not expected to cause problems.
Tested on aarch64-linux-gnu and x86_64-linux-gnu.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
commit
4c6e0415ef206a595c62d5d37e3b9a821782c533
Author: Florian Weimer <fweimer@redhat.com>
Date: Fri Apr 3 13:17:48 2020 +0200
elf: Simplify handling of lists of audit strings
All list elements are colon-separated strings, and there is a hard
upper limit for the number of audit modules, so it is possible to
pre-allocate a fixed-size array of strings to which the LD_AUDIT
environment variable and --audit arguments are added.
Also eliminate the global variables for the audit list because
the list is only needed briefly during startup.
There is a slight behavior change: All duplicate LD_AUDIT environment
variables are now processed, not just the last one as before. However,
such environment vectors are invalid anyway.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Gbp-Pq: Topic any
Gbp-Pq: Name git-surplus-tls-accounting.diff
Adam Conrad [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
Use install_root for test destination override, not DESTDIR
Forwarded: no
Last-Update: 2020-02-08
Gbp-Pq: Topic any
Gbp-Pq: Name local-test-install.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-ld.so-cache-new-format
2018-09-16 Josh Triplett <josh@joshtriplett.org>
* elf/ldconfig.c: Default to the new format for ld.so.cache. glibc has
supported this format for 18+ years.
* elf/dl-cache.c (_dl_load_cache_lookup): Reorder conditionals to look
for the new format first.
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-ld.so-cache-new-format.diff
Adam Conrad [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
Turn off HAVE_FLOAT128 for CUDACC and ICC compilers.
Bug-Ubuntu: https://bugs.launchpad.net/bugs/
1717257
Forwarded: no
Last-Update: 2017-10-11
Gbp-Pq: Topic any
Gbp-Pq: Name local-cudacc-float128.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-resolv-unaligned
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-resolv-unaligned.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-bootstrap-headers
Taken from EGLIBC, r1484 + r1525
2018-03-09 Aurelien Jarno <aurelien@aurel32.net>
* Makefile (install-headers): Amend to install gnu/lib-names-$abi.h.
2014-07-30 Helmut Grohne <helmut@subdivi.de>
* With the advent of multilib gnu/stubs.h became a meta-header that
includes the correct stubs-$abi.h. So install gnu/stubs.h as usual
and install stubs-bootstrap.h as gnu/stubs-$abi.h
2007-02-20 Jim Blandy <jimb@codesourcery.com>
* Makefile (install-headers): Preserve old behavior: depend on
$(inst_includedir)/gnu/stubs.h only if install-bootstrap-headers
is set; otherwise, place gnu/stubs.h on the 'install-others' list.
2007-02-16 Jim Blandy <jimb@codesourcery.com>
* Makefile: Amend make install-headers to install everything
necessary for building a cross-compiler. Install gnu/stubs.h as
part of 'install-headers', not 'install-others'.
If install-bootstrap-headers is 'yes', install a dummy copy of
gnu/stubs.h, instead of computing the real thing.
* include/stubs-bootstrap.h: New file.
Gbp-Pq: Topic any
Gbp-Pq: Name local-bootstrap-headers.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ldconfig-ignore-ld.so
Gbp-Pq: Topic any
Gbp-Pq: Name local-ldconfig-ignore-ld.so.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
unsubmitted-ldso-machine-mismatch
Gbp-Pq: Topic any
Gbp-Pq: Name unsubmitted-ldso-machine-mismatch.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-revert-bz13979
Revert:
X-Git-Tag: glibc-2.16-tps~448
X-Git-Url: http://sourceware.org/git/?p=glibc.git;a=commitdiff_plain;h=
05c2c9618f583ea4acd69b3fe5ae2a2922dd2ddc
Warn if user requests __FORTIFY_SOURCE but it is disabled
[BZ #13979]
* include/features.h: Warn if user requests __FORTIFY_SOURCE
checking but the checks are disabled for any reason.
Gbp-Pq: Topic any
Gbp-Pq: Name local-revert-bz13979.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-disable-libnss-db
Disable libnss-db as the format is not compatible with the libnss-db package, and is
architecture dependent.
Gbp-Pq: Topic any
Gbp-Pq: Name local-disable-libnss-db.diff
Steve Langasek [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
make ldconfig use the built-in system paths
Bug-Ubuntu: https://bugs.launchpad.net/bugs/736932
Make ldconfig use the same view of built-in system paths that ld.so does,
instead of just using SLIBDIR and LIBDIR; this corrects a failure of
ldconfig to cache libraries in non-multiarch directories when building for
multiarch, even though they're on the system path.
Gbp-Pq: Topic any
Gbp-Pq: Name local-ldconfig-multiarch.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-nptl-invalid-td
2010-02-27 Aurelien Jarno <aurelien@aurel32.net>
* pthreadP.h(INVALID_TD_P, INVALID_NOT_TERMINATED_TD_P): detect
NULL pointers.
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-nptl-invalid-td.patch
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-bits-fcntl_h-at
2012-10-08 Wookey <wookey@wookware.org>
* include AT_* defines in sysdeps/unix/sysv/linux/aarch64/bits/fcntl.h
2009-11-19 Aurelien Jarno <aurelien@aurel32.net>
* io/fcntl.h: Move AT_* defines to...
* sysdeps/mach/hurd/bits/fcntl.h: ...here.
* sysdeps/unix/sysv/linux/powerpc/bits/fcntl.h: ...here.
* sysdeps/unix/sysv/linux/s390/bits/fcntl.h: ...here.
* sysdeps/unix/sysv/linux/sh/bits/fcntl.h: ...here.
* sysdeps/unix/sysv/linux/sparc/bits/fcntl.h: ...here.
* sysdeps/unix/sysv/linux/x86/bits/fcntl.h: ...here.
2009-11-19 Aurelien Jarno <aurelien@aurel32.net>
* sysdeps/unix/sysv/linux/alpha/bits/fcntl.h: Define AT_*
constants.
* sysdeps/unix/sysv/linux/arm/bits/fcntl.h: Define AT_*
constants.
* sysdeps/unix/sysv/linux/hppa/bits/fcntl.h: Define AT_*
constants.
* sysdeps/unix/sysv/linux/ia64/bits/fcntl.h: Define AT_*
constants.
* sysdeps/unix/sysv/linux/m68k/bits/fcntl.h: Define AT_*
constants.
* sysdeps/unix/sysv/linux/mips/bits/fcntl.h: Define AT_*
constants.
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-bits-fcntl_h-at.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-missing-etc-hosts
Gbp-Pq: Topic any
Gbp-Pq: Name submitted-missing-etc-hosts.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-nss-overflow
2009-01-12 Arthur Loiret <aloiret@debian.org>
nss/nss_files/files-parse.c: Include <limits.h>.
(INT_FIELD): Convert field to uintmax_t and check for 32-bit overflow.
(INT_FIELD_MAYBE_NULL): Likewise.
Gbp-Pq: Topic any
Gbp-Pq: Name local-nss-overflow.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-tcsetaddr
# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: tcsetattr sanity check on PARENB/CREAD/CSIZE for ptys
# DP: Related bugs: 218131
# DP: Author: Jeff Licquia <licquia@progeny.com>
# DP: Upstream status: [In CVS | Debian-Specific | Pending | Not submitted ]
# DP: Status Details:
# DP: Date: 2003-10-29
# All lines beginning with `# DP:' are a description of the patch.
# DP: Description: tcsetattr sanity check on PARENB/CREAD/CSIZE for ptys
# DP: Related bugs: 218131
# DP: Author: Jeff Licquia <licquia@progeny.com>
# DP: Upstream status: [In CVS | Debian-Specific | Pending | Not submitted ]
# DP: Status Details:
# DP: Date: 2003-10-29
Gbp-Pq: Topic any
Gbp-Pq: Name local-tcsetaddr.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-stubs_h
Gbp-Pq: Topic any
Gbp-Pq: Name local-stubs_h.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-nss-upgrade
# DP: This patch makes future upgrades easier. It resolves problems with
# DP: running daemons having NSS modules upgraded out from under them.
# DP: This patch makes future upgrades easier. It resolves problems with
# DP: running daemons having NSS modules upgraded out from under them.
Gbp-Pq: Topic any
Gbp-Pq: Name local-nss-upgrade.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ldso-disable-hwcap
# DP: Allow hwcap's to be disabled with the existence of a file. This
# DP: makes it easier to do upgrades with optimized (hwcap) library
# DP: packages.
# DP: Author: Rewritten by Daniel Jacobowitz <dan@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: This isn't going to be acceptable upstream, we
# DP: only need it because we support in-place upgrades.
# DP: Date: 2003-10-28, (Updated 2005-01-02 gotom, 2007-05-20 aurel32)
# DP: Allow hwcap's to be disabled with the existence of a file. This
# DP: makes it easier to do upgrades with optimized (hwcap) library
# DP: packages.
# DP: Author: Rewritten by Daniel Jacobowitz <dan@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: This isn't going to be acceptable upstream, we
# DP: only need it because we support in-place upgrades.
# DP: Date: 2003-10-28, (Updated 2005-01-02 gotom, 2007-05-20 aurel32)
Gbp-Pq: Topic any
Gbp-Pq: Name local-ldso-disable-hwcap.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ld-multiarch
2012-05-01 Aurelien Jarno <aurelien@aurel32.net>
* elf/Makefile(trusted-dirs.st): Fix DL_DST_LIB computation with
two level slibdir directories.
2009-09-08 Aurelien Jarno <aurelien@aurel32.net>
* Makeconfig: add support for multiarch compat directories.
Gbp-Pq: Topic any
Gbp-Pq: Name local-ld-multiarch.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-fhs-nscd
Gbp-Pq: Topic any
Gbp-Pq: Name local-fhs-nscd.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-fhs-linux-paths
# DP: Description: Correct linux paths for FHS
# DP: Author: Unknown
# DP: Upstream status: Debian-Specific
# DP: Status Details: GNU doesn't follow the FHS.
# DP: Date: Unknown
# DP: Description: Correct linux paths for FHS
# DP: Author: Unknown
# DP: Upstream status: Debian-Specific
# DP: Status Details: GNU doesn't follow the FHS.
# DP: Date: Unknown
Gbp-Pq: Topic any
Gbp-Pq: Name local-fhs-linux-paths.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-bindresvport_blacklist
Patch from the OpenSUSE glibc
Gbp-Pq: Topic any
Gbp-Pq: Name local-bindresvport_blacklist.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-asserth-decls
# DP: Description: /usr/include/assert.h
# DP: One must be allowed to include <assert.h> multiple times with different
# DP: values for NDEBUG, so the file is not protected against multiple
# DP: inclusions. Unfortunately this means that the declarations for
# DP: __assert_fail() and the like may occur multiple times in a compilation
# DP: unit, causing gcc to issue a batch of warnings.
# DP: I believe this can be fixed by protecting the declarations (but only
# DP: those declarations) against repetition.
# DP: Author: Jeroen T. Vermeulen <jtv@xs4all.nl>
# DP: Upstream status: Not submitted
# DP: Status Details: Plan to submit
# DP: Date: 2003-01-01
# DP: Description: /usr/include/assert.h
# DP: One must be allowed to include <assert.h> multiple times with different
# DP: values for NDEBUG, so the file is not protected against multiple
# DP: inclusions. Unfortunately this means that the declarations for
# DP: __assert_fail() and the like may occur multiple times in a compilation
# DP: unit, causing gcc to issue a batch of warnings.
# DP: I believe this can be fixed by protecting the declarations (but only
# DP: those declarations) against repetition.
# DP: Author: Jeroen T. Vermeulen <jtv@xs4all.nl>
# DP: Upstream status: Not submitted
# DP: Status Details: Plan to submit
# DP: Date: 2003-01-01
Gbp-Pq: Topic any
Gbp-Pq: Name local-asserth-decls.diff
Adam Conrad [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
Install ld.so to slibdir instead of rtlddir to fix cross builds
When installing a cross-libc purely for linking purposes but not
runtime use, the linker shouldn't be installed in rtlddir, since
we won't actually be USING it, and thus referencing the rtlddir
path in libc.so ends up blowing up cross-compilers for no reason.
Gbp-Pq: Topic any
Gbp-Pq: Name local-rtlddir-cross.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-po-fr-fixes
2014-05-05 Aurelien Jarno <aurelien@aurel32.net>
* po/fr.po: Fix French translation of inappropriate.
Gbp-Pq: Topic all
Gbp-Pq: Name submitted-po-fr-fixes.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-nis-shadow
Gbp-Pq: Topic all
Gbp-Pq: Name local-nis-shadow.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ldd
2013-05-11 Aurelien Jarno <aurelien@aurel32.net>
* elf/ldd.bash.in: Verify the dynamic linker is working before
using it.
Gbp-Pq: Topic all
Gbp-Pq: Name local-ldd.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ru_RU
# DP: Description: Change default charset for 'russian' locale alias
# DP: Related bugs: #62586
# DP: Dpatch author: Ben Collins
# DP: Patch author: Alistair McKinstry
# DP: Upstream status: Submitted
# DP: Status Details: http://sources.redhat.com/bugzilla/show_bug.cgi?id=120
# DP: Date: 2002-03-10
# DP: Description: Change default charset for 'russian' locale alias
# DP: Related bugs: #62586
# DP: Dpatch author: Ben Collins
# DP: Patch author: Alistair McKinstry
# DP: Upstream status: Submitted
# DP: Status Details: http://sources.redhat.com/bugzilla/show_bug.cgi?id=120
# DP: Date: 2002-03-10
Gbp-Pq: Topic all
Gbp-Pq: Name local-ru_RU.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-remove-manual
The GNU Libc Reference manual has to be removed for licensing reasons.
But some files have a dependency on manual/errno.texi; the easiest
solution is to drop those dependencies and make sure that MAKEINFO=:
so that no target depends on manual/*.texi files.
Gbp-Pq: Topic all
Gbp-Pq: Name local-remove-manual.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-alias-et_EE
Gbp-Pq: Topic all
Gbp-Pq: Name local-alias-et_EE.diff
H.J. Lu [Thu, 16 Jul 2020 10:37:10 +0000 (03:37 -0700)]
[PATCH] nptl: Zero-extend arguments to SETXID syscalls [BZ #26248]
nptl has
/* Opcodes and data types for communication with the signal handler to
change user/group IDs. */
struct xid_command
{
int syscall_no;
long int id[3];
volatile int cntr;
volatile int error;
};
/* This must be last, otherwise the current thread might not have
permissions to send SIGSETXID syscall to the other threads. */
result = INTERNAL_SYSCALL_NCS (cmdp->syscall_no, 3,
cmdp->id[0], cmdp->id[1], cmdp->id[2]);
But the second argument of setgroups syscal is a pointer:
int setgroups(size_t size, const gid_t *list);
But on x32, pointers passed to syscall must have pointer type so that
they will be zero-extended. The kernel XID arguments are unsigned and
do not require sign extension. Change xid_command to
struct xid_command
{
int syscall_no;
unsigned long int id[3];
volatile int cntr;
volatile int error;
};
so that all arguments are zero-extended. A testcase is added for x32 and
setgroups returned with EFAULT when running as root without the fix.
Gbp-Pq: Topic x32
Gbp-Pq: Name submitted-fix-nptl-setgroups-x32.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-fpscr_values
Gbp-Pq: Topic sh4
Gbp-Pq: Name local-fpscr_values.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-powerpc8xx-dcbz
Gbp-Pq: Topic powerpc
Gbp-Pq: Name local-powerpc8xx-dcbz.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-rld_map
2010-05-20 Aurelien Jarno <aurelien@aurel32.net>
* sysdeps/mips/dl-machine.h (ELF_MACHINE_DEBUG_SETUP): test for
RLD_MAP pointer before using it.
Gbp-Pq: Topic mips
Gbp-Pq: Name submitted-rld_map.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-gcc34-seccomment
# DP: Description: Make glibc-2.3.5 compile with gcc-3.4/4.0 + binutils 2.16
# DP: Description: Make glibc-2.3.5 compile with gcc-3.4/4.0 + binutils 2.16
# on m68k fixed by adding #APP.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: Andreas Schwab <schwab@suse.de>
# DP: Upstream status: Pending
# DP: Status Details:
# DP: Date: 2005-08-03
From: Andreas Schwab <schwab@suse.de>
Gbp-Pq: Topic m68k
Gbp-Pq: Name submitted-gcc34-seccomment.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-reloc
# DP: Description: binutils bug workaround
# DP: Related bugs: #263601: m68k: workaround for binutils problem
# DP: Dpatch author: Roman Zippel <zippel@linux-m68k.org>
# DP: Patch author: Richard Zidlicky <rz@linux-m68k.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: Actual fix is to modify m68k binutils.
# DP: Date: 2004-08-09
# DP: Description: binutils bug workaround
# DP: Related bugs: #263601: m68k: workaround for binutils problem
# DP: Dpatch author: Roman Zippel <zippel@linux-m68k.org>
# DP: Patch author: Richard Zidlicky <rz@linux-m68k.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: Actual fix is to modify m68k binutils.
# DP: Date: 2004-08-09
Gbp-Pq: Topic m68k
Gbp-Pq: Name local-reloc.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-dwarf2-buildfix
# DP: Description: Adding empty m68k framestate.c not to build for dwarf2.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: GOTO Masanori <gotom@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: m68k uses sjlj exceptions, not dwarf2 unwind.
# DP: This patch adds empty framestate.c for m68k to avoid
# DP: dwarf2 build failure.
# DP: Date: 2003-07-19 (Update 2005-03-16 gotom)
# DP: Description: Adding empty m68k framestate.c not to build for dwarf2.
# DP: Related bugs:
# DP: Dpatch author: GOTO Masanori <gotom@debian.org>
# DP: Patch author: GOTO Masanori <gotom@debian.org>
# DP: Upstream status: Debian-Specific
# DP: Status Details: m68k uses sjlj exceptions, not dwarf2 unwind.
# DP: This patch adds empty framestate.c for m68k to avoid
# DP: dwarf2 build failure.
# DP: Date: 2003-07-19 (Update 2005-03-16 gotom)
2005-03-16 GOTO Masanori <gotom@debian.org>
* sysdeps/m68k/unwind-pe.c: Update to fix compilation failure.
2003-07-19 GOTO Masanori <gotom@debian.org>
* sysdeps/m68k/framestate.c: Add to fix compilation failure
with sjlj exception, suggested by Philip Blundell.
Gbp-Pq: Topic m68k
Gbp-Pq: Name local-dwarf2-buildfix.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-no-execfn
AT_EXECFN is Linux specific
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-no-execfn.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-getaddrinfo-freebsd-kernel
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-getaddrinfo-freebsd-kernel.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-scripts
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-scripts.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-fbtl-depends
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-fbtl-depends.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-fbtl
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-fbtl.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-sysdeps
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-sysdeps.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-grantpt
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-grantpt.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-config_h_in
2009-05-23 Aurelien Jarno <aurelien@aurel32.net>
* config.h.in (__KFREEBSD_KERNEL_VERSION): Add.
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name local-config_h_in.patch
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-auxv
https://sourceware.org/bugzilla/show_bug.cgi?id=15794
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name submitted-auxv.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-waitid
Gbp-Pq: Topic kfreebsd
Gbp-Pq: Name submitted-waitid.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-asin-acos-raise-invalid
This workarounds GCC bug PR 95115 introduced in GCC 10. This is similar to
what is done in the float version.
Gbp-Pq: Topic riscv64
Gbp-Pq: Name local-asin-acos-raise-invalid.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
unsubmitted-quiet-ldconfig
Gbp-Pq: Topic i386
Gbp-Pq: Name unsubmitted-quiet-ldconfig.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-biarch
# DP: Description: Allow ldconfig to work on i386/x86-64 biarch systems
# DP: Related bugs:
# DP: Dpatch author: Daniel Jacobowitz
# DP: Patch author: Daniel Jacobowitz
# DP: Upstream status: Debian-Specific
# DP: Status Details: based on Ubuntu change by Jeff Bailey
# DP: Date: 2005-10-13
# DP: Description: Allow ldconfig to work on i386/x86-64 biarch systems
# DP: Related bugs:
# DP: Dpatch author: Daniel Jacobowitz
# DP: Patch author: Daniel Jacobowitz
# DP: Upstream status: Debian-Specific
# DP: Status Details: based on Ubuntu change by Jeff Bailey
# DP: Date: 2005-10-13
Gbp-Pq: Topic i386
Gbp-Pq: Name local-biarch.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-fix-longjmp
commit
115bcf921a52005b89ff2859ccae4a8fc6d6deed
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sat Jul 18 15:08:03 2020 +0200
hurd: Fix longjmp early in initialization
When e.g. an LD_PRELOAD fails, _dl_signal_exception/error longjmps, but TLS
is not initialized yet, let along signal state. We thus mustn't look at
them within __longjmp.
* sysdeps/mach/hurd/i386/____longjmp_chk.S,__longjmp.S: Check for
initialized value of %gs, and that sigstate is non-NULL.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-fix-longjmp.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-tls-ie-align
The elf/tst-tls-ie* tests try to load modules with 8-byte-aligned TLS data that
will get allocated in the static TLS area, so we need at least 8-byte alignment.
8-byte alignment requirement is not that uncommon on i386 anyway.
And upstream happens to have 32-byte alignment from
0c76fc3c2b34 ('Linux: Perform rseq registration at C startup and thread
creation') which just rounds up max_align to 32 anyway.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-tls-ie-align.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-strtol-test
commit
183083c35972611e7786c7ee0c96d7da571631ed
Author: Carlos O'Donell <carlos@redhat.com>
Date: Wed Apr 29 16:31:29 2020 -0400
support: Set errno before testing it.
In test-conainer we should set errno to 0 before calling strtol,
and check after with TEST_COMPARE.
In tst-support_capture_subprocess we should set errno to 0 before
checking it after the call to strtol.
Tested on x86_64.
Reviewed-by: DJ Delorie <dj@redhat.com>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-strtol-test.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-intr-msg-unwind
commit
337a7b74faed2c8daf8c91cbb3038dc4984f3207
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Jun 7 17:51:21 2020 +0000
hurd: Fix unwinding over interruptible RPC
* sysdeps/mach/hurd/i386/intr-msg.h (INTR_MSG_TRAP): Set CFA register to
%ecx while %esp is altered.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-intr-msg-unwind.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-longjmp-onstack
commit
02937d825a71636c13b3f4229e5d6c9e54e327d5
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sat Jun 6 20:21:22 2020 +0200
hurd: fix clearing SS_ONSTACK when longjmp-ing from sighandler
* sysdeps/i386/htl/Makefile: New file.
* sysdeps/i386/htl/tcb-offsets.sym: New file.
* sysdeps/mach/hurd/i386/Makefile [setjmp] (gen-as-const-headers): Add
signal-defines.sym.
* sysdeps/mach/hurd/i386/____longjmp_chk.S: Include tcb-offsets.h.
(____longjmp_chk): Harmonize with i386's __longjmp. Clear SS_ONSTACK
when jumping off the alternate stack.
* sysdeps/mach/hurd/i386/__longjmp.S: New file.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-longjmp-onstack.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-holes
commit
3f6e4fc4542b5b881906bf2f83eb4b8359b0dcd4
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Thu Jun 4 20:52:19 2020 +0200
support: Fix detecting hole support on >2KB-block filesystems
When detecting hole support, we write at 16MiB, and filesystems will
typically need two levels of data to record that. On filesystems with
8KB block, the two indirection blocks will require a total of 16KB
overhead, thus 32 512-byte sectors.
Spotted on GNU/Hurd with a 4KB blocks filesystem, but also happens on Linux
with 4KB or 8KB blocks filesystems.
* support/support_descriptor_supports_holes.c
(support_descriptor_supports_holes): Set block_headroom to 32.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-holes.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-cond_destroy
commit
faae4b2bdd692d929037c80c3315f716f02f3b00
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Feb 9 19:19:25 2020 +0000
htl: make pthread_cond_destroy return EBUSY on waiters
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-cond_destroy.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-fexecve
commit
6544999083437dabdadcec18185a1b2169b9637a
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Thu May 28 23:28:07 2020 +0000
hurd: Fix fexecve
* sysdeps/mach/hurd/fexecve.c (fexecve): Re-lookup fd with O_EXEC before
calling _hurd_exec_paths.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-fexecve.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-pselect
commit
f9011787497a276f84ef79ae233992692a626dc7
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Wed May 27 23:42:24 2020 +0000
hurd: Fix pselect atomicity
In case the signal arrives before the __mach_msg call, we need to catch
between the sigprocmask call and the __mach_msg call. Let's just reuse
the support for sigsuspend to make the signal send a message that
our __mach_msg call will just receive.
* hurd/hurdselect.c (_hurd_select): Add sigport and ss variables. When
sigmask is not NULL, create a sigport port and register as
ss->suspended. Add it to the portset. When we receive a message on it,
set error to EINTR. Clean up sigport and portset appropriately.
* hurd/hurdsig.c (wake_sigsuspend): Note that pselect also uses it.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-pselect.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-tst-udp
commit
cbfc16122e9c4948b3a17224aeb5f8b70f02417d
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sat May 16 19:29:50 2020 +0200
sunrpc/tst-udp-*: Fix timeout value
Following on
00c3da43a ('sunrpc/tst-udp-timeout: Fix timeout value').
While e.g. 2.5 timeout can be represented exactly with doubles, time stamps
may not be represented that exactly, and thus with coarse-grain clocks (e.g.
10ms) we may end up with 2.499-ish values due to rounding errors.
* sunrpc/tst-udp-timeout.c (test_udp_server): Add more timeout slack.
* sunrpc/tst-udp-nonblocking.c (do_test): Likewise.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-tst-udp.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-ss_init
commit
61416e19218605a54e94edd9740bbe9d2785af6d
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Mon May 11 01:30:29 2020 +0200
hurd: Add missing sigstate members initialization
* hurd/hurdsig.c (_hurd_thread_sigstate): Initialize
critical_section_lock, active_resources, cancel, and cancel_hook fields.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-ss_init.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-trunc-times
Committed for glibc 2.32
commit
e095db0bc6c53a0b7ac3d915c5feb7678049dc33
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Mar 29 19:42:55 2020 +0200
hurd: Make O_TRUNC update mtime/ctime
* hurd/lookup-retry.c (__hurd_file_name_lookup_retry): Call
__file_utimens after __file_set_size.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-trunc-times.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-pthread_self
commit
ca843defbcbd2dc95b9342189e5dc430e9bcb743
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sat Feb 15 14:31:50 2020 +0000
htl: Only check pthread_self coherency when DEBUG is set
htl has been widely tested for a long time now with this coherency
checked successfully.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-pthread_self.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-register-atfork2
commit
05039737d306b4c065ff65d4f90042f3ec8f6ddf
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Jun 7 02:57:04 2020 +0200
htl: fix register-atfork ordering
* htl/register-atfork.c (__register_atfork): Add new hooks at the end of
the list instead of the beginning.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-register-atfork2.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-register-atfork
commit
6db1094f7af6ddd7ff37dbba82ff5074871a90d5
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Feb 9 17:55:37 2020 +0000
htl: Move __register_atfork from forward to own file
Since we need it also in the static linking case.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-register-atfork.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-sem-intr
commit
b2cdf72e5c496153050551f0ce704e9ef08ffeac
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Mon Feb 10 00:52:50 2020 +0000
htl: Make sem_wait/sem_timedwait interruptible
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-sem-intr.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-barrier-1
commit
29bc8736d1fdb80d2416b3920080dad58b32bf44
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Feb 9 23:02:13 2020 +0000
htl: Fix barrier_wait with one thread
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-barrier-1.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-spin_lock
commit
900778283ac3cfbd274abc55840b5cdae9b7745f
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Feb 9 16:54:58 2020 +0000
htl: make pthread_spin_lock really spin
__spin_lock would actually use gsync_wait to block, which is not what
pthread_spin_lock is about.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-spin_lock.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
git-fork-pthread_exit
commit
19a64d9f6eda12cd4b802aac470c645d208a1216
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Sun Feb 9 17:01:06 2020 +0100
htl: Fix calling pthread_exit in the child of a fork
We need to reset the threads counter, otherwise pthread_exit() would not
call exit(0).
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name git-fork-pthread_exit.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-exec_filename
Keep compatibility with experimental implementation
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-exec_filename.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-no_unsupported_ioctls
These ioctls are not actually supported (and will probably not be in the
close future), and are not available on Linux either, so don't expose
them to application at the risk of them complaining that they don't work
(e.g. xterm using TIOCLSET).
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-no_unsupported_ioctls.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] XXX: make libc_rwlock recursive
Without making the rwlocks recursive, running fakeroot-tcp gets this:
#0 0x0106e91c in mach_msg_trap () at /usr/src/glibc-2.24/build-tree/hurd-i386-libc/mach/mach_msg_trap.S:2
#1 0x0106f090 in __mach_msg (msg=0x20034a0, option=3, send_size=64, rcv_size=32, rcv_name=421, timeout=0, notify=0) at msg.c:110
#2 0x0125a241 in __gsync_wait (task=1, addr=
19101080, val1=2, val2=0, msec=0, flags=0)
at /usr/src/glibc-2.24/build-tree/hurd-i386-libc/mach/RPC_gsync_wait.c:175
#3 0x010b0743 in __dcigettext (domainname=0x8050740 <_libc_intl_domainname@@GLIBC_2.2.6> "libc",
msgid1=0x8051d88 "undefined symbol: acl_get_fd", msgid2=0x0, plural=0, n=0, category=5) at dcigettext.c:527
#4 0x010af776 in __dcgettext (domainname=0x8050740 <_libc_intl_domainname@@GLIBC_2.2.6> "libc",
msgid=0x8051d88 "undefined symbol: acl_get_fd", category=5) at dcgettext.c:47
#5 0x0124e427 in __dlerror () at dlerror.c:94
#6 0x01035ae3 in load_library_symbols () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#7 0x01035cc3 in tmp___fxstat64 () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#8 0x01036cd6 in __fxstat64 () from /usr/lib/i386-gnu/libfakeroot/libfakeroot-tcp.so
#9 0x010ad831 in _nl_load_locale_from_archive (category=category@entry=0, namep=namep@entry=0x200399c) at loadarchive.c:211
#10 0x010ac45b in _nl_find_locale (locale_path=0x0, locale_path_len=0, category=category@entry=0, name=0x200399c) at findlocale.c:154
#11 0x010abde7 in setlocale (category=0, locale=0x804c2e4 "") at setlocale.c:417
#12 0x0804947f in main (argc=2, argv=0x2003ad4) at programs/locale.c:191
That's very unfortunate: libfakeroot gets initialized from a section
where __libc_setlocale_lock is already locked, and thus the dlerror()
call hangs inside __dcigettext. It happens that Linux doesn't have
the problem probably because pthread_rwlock_wrlock returns a EDEADLK
error instead of hanging, and then the first unlock unlocks, and the
second unlock probably returns an EINVAL. This is all very unsafe, but
that's fakeroot-tcp's matter (see http://bugs.debian.org/845930 for the
follow-up)...
We only use it when constructing the debian installer for -s -r options
anyway.
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-libc_rwlock_recursive.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
tg-eintr
commit
230b85f414291ac955827aba15cfbd103ab6ebdd
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Date: Thu Jun 9 01:15:10 2016 +0200
Fix pipe() call returning EINTR sometimes
because it uses a critical section
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-eintr.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-mach_print
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-mach_print.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
tg-bootstrap
This dependency is missing, but would pose problem on Darwin
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-bootstrap.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-bind_umask2
2014-08-27 Samuel Thibault <samuel.thibault@ens-lyon.org>
Fix bind when umask is e.g. 0777.
* sysdeps/mach/hurd/bind.c (__bind): Pass mode 0666 to __dir_mkfile
instead of final mode, so that call __ifsock_getsockaddr can always
succeed, before calling __file_chmod to fix the mode according to umask,
before calling __dir_link to show the file.
Part of the original fix was committed, the other hasn't been yet, see Roland's
"Harumph" reply to
https://sourceware.org/ml/libc-alpha/2014-08/msg00408.html
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name submitted-bind_umask2.diff
Richard Braun [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Hurd: make sigstates hold a reference on thread ports
This change is required in order to correctly release per-thread
resources. Directly reusing the threading library reference isn't
possible since the sigstate is also used early in the main thread,
before threading is initialized.
* hurd/hurd/signal.h (_hurd_self_sigstate): Drop thread reference after
calling _hurd_thread_sigstate.
(_hurd_critical_section_lock): Likewise.
* hurd/hurdsig.c (_hurd_thread_sigstate): Add a reference on the thread.
(_hurd_sigstate_delete): Drop thread reference.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sigstate_thread_reference.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
submitted-path_mounted
http://sourceware.org/ml/libc-alpha/2013-08/msg00207.html
To: libc-alpha@sourceware.org
Subject: [PATCH 2/2] Define _PATH_MOUNTED as "/etc/mtab"
Date: Thu, 15 Aug 2013 10:43:35 +0200
Change the definition of _PATH_MOUNTED to "/etc/mtab". This is the
value used on Linux.
The change is motivated by the fact that on Debian /etc/mtab is a
symbolic link to /proc/mounts. This patch adjusts the macro for
non-linux systems such as Hurd. Changing this using
sysdeps/mach/hurd/paths.h causes build problems because
/usr/include/hurd/paths.h is shadowed by this file. This change is
proposed in the hope that aligning the non-linux targets with the
glibc for Linux is perceived as a good thing while fixing this problem
on Debian/Hurd along the way.
* sysdeps/generic/paths.h (_PATH_MOUNTED): Change value to "/etc/mtab".
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name submitted-path_mounted.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
unsubmitted-clock_t_centiseconds
Some applications assume centisecond precision, or at most millisecond precision
(e.g. guile). This is a work-around for them.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name unsubmitted-clock_t_centiseconds.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] t/EGREGIOUS-fr
Fix grammar in french translation for EGREGIOUS
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-EGREGIOUS-fr.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Correction traduction « Computer bought the farm »
* po/fr.po: Fix EIEIO french translation.
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-EIEIO-fr.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Workaround to add IPv6 support to getifaddrs
ifreq only contains sockaddr structures, which are not big enough for
IPv6 addresses. This takes another, ugly, approach, by parsing fsysopts
/servers/socket/2 options...
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-ifaddrs_v6.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
Fix sbrk in PIE binaries
In PIE mode, the program gets loaded at very low address, and thus _end is very
low, just before libraries, and thus initializing the brk to it does not make
sense, since there is no room left there. Hardcode the brk to 0x8000000 for now
as a workaround.
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-pie-sbrk.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-usr
Upstream uses prefix=/ while we use prefix=/usr
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-usr.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] t/hooks
Add link rules to sort hooks, otherwise they are not properly recorded
2012-04-21 Samuel Thibault <samuel.thibault@ens-lyon.org>
* Makerules (shlib.lds): Add hurd hooks sorting rules.
Signed-off-by: Samuel Thibault <samuel.thibault@ens-lyon.org>
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hooks.diff
Jeremie Koenig [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] implement SA_SIGINFO signal handlers.
52baaca Hurd signals: Copy bits/sigaction.h
4232c66 Hurd signals: SA_SIGINFO support
1831cfe Hurd signals: Use POSIX sigcodes
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-hurdsig-SA_SIGINFO.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-madvise_warn
Do not warn about madvise not being implemented. It does not have any real
semantic anyway, and that brings some -Werror FTBFS.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-madvise_warn.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-ED
This is a long funny story, but even if it's standard-compliant, it poses too
many problems.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-ED.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Add -lmachuser -lhurduser to libc.so on GNU/Hurd.
http://lists.gnu.org/archive/html/bug-hurd/2011-03/msg00112.html
2011-03-29 Samuel Thibault <samuel.thibault@ens-lyon.org>
* Makerules ($(inst_libdir)/libc.so): Add -lmachuser -lhurduser to
libc.so on GNU/Hurd.
It's still unclear what we want to aim for.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-mach-hurd-link.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] hurd: SCM_CREDS support
Svante Signell <svante.signell@gmail.com>
Samuel Thibault <samuel.thibault@ens-lyon.org>
* sysdeps/mach/hurd/sendmsg.c (__libc_sendmsg): On SCM_CREDS
control messages, record uids, pass a rendez-vous port in the
control message, and call __auth_user_authenticate_request to
make auth send credentials on that port. Do not wait for a
reply.
* sysdeps/mach/hurd/recvmsg.c (contains_uid, contains_gid,
check_auth): New functions.
(__libc_recvmsg): On SCM_CREDS control messages, call check_auth
to check the passed credentials thanks to the answer from the
auth server.
* hurd/Makefile (user-interfaces): Add auth_request and
auth_reply.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sendmsg-SCM_CREDS.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-disable-ioctls
struct ortentry and struct ifalias req are actually not defined
struct arpreq is defined, but can not be passed to an ioctl on the Hurd.
so let's make packages not believe these are available.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-disable-ioctls.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Allow the kernel to start earlier than VM_MAX_ADDRESS
VM_MAX_ADDRESS shouldn't be hardcoded in libc, the kernel should be able to
decide about it dynamically. This fixes glibc into supporting that. It's however
a bit hackish.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-bigmem.diff
Samuel Thibault [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] The critical section lock _can_ be held in these place.
At least since hurd_thread_cancel can be called by another thread and lock our
critical lock.
http://bugs.debian.org/46859
“
Thomas suggested that there is no need to take the critical section
lock. I believe that taking the critical section lock is necessary to
prevent the target thread from entering a signal handler. Roland will
look into the problem.
”
Taking the critical section lock makes these assertions bogus.
It happens that hurd_thread_cancel is only called from libports and inside
/hurd/term so this is rare in practice.
A reproducer can be found here:
http://lists.gnu.org/archive/html/bug-hurd/2014-05/msg00025.html
2006-08-05 Samuel Thibault <samuel.thibault@ens-lyon.org>
* hurd/thread-cancel.c (hurd_thread_cancel): Do not assert that
`&ss->critical_section_lock' is unlocked.
* sysdeps/mach/hurd/jmp-unwind.c (_longjmp_unwind): Likewise, and take
critical section lock before taking the sigstate lock.
* sysdeps/mach/hurd/spawni.c (__spawni): Likewise.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-thread-cancel.diff
Marcus Brinkmann [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
[PATCH] Implement SysV shared memory for GNU/Hurd.
2005-07-11 Marcus Brinkmann <marcus@gnu.org>
* hurd/Makefile (routines): Add sysvshm.
(distribute): Add sysvshm.h.
* hurd/sysvshm.h: New file.
* hurd/sysvshm.c: New file.
* sysdeps/mach/hurd/bits/stat.h (S_IMMAP0): New macro.
(S_ISPARE): Unset the S_IMMAP0 flag.
* sysdeps/mach/hurd/ftok.c: New file.
* sysdeps/mach/hurd/shmat.c: New file.
* sysdeps/mach/hurd/shmctl.c: New file.
* sysdeps/mach/hurd/shmdt.c: New file.
* sysdeps/mach/hurd/bits/posix_opt.h: Define _XOPEN_SHM to 1.
TODO:
“
> + char filename[sizeof (SHM_DIR) - 1 + SHM_NAMEMAX];
> + struct stat statbuf;
> +
> + sprintf (filename, SHM_DIR SHM_NAMEPRI, id);
> + /* SysV requires read access for IPC_STAT. */
> + fd = __open (filename, O_NORW);
> + if (fd < 0)
> + {
> + if (errno == ENOENT)
> + errno = EINVAL;
> + return -1;
> + }
Since this is repeated in more than one function, put it into an
internal subroutine. Then we have only one place doing the
name-generation logic.
”
“
> + case IPC_RMID:
> + res = __unlink (filename);
> + /* FIXME: Check error (mapping ENOENT to EINVAL). */
Fix it.
”
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name tg-sysvshm.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-enable-ldconfig
# DP: Description: Enable ldconfig and such on hurd-i386
# DP: Author: Jeff Bailey <jbailey@nisa.net>
# DP: Related Bugs: #309489
# DP: Upstream status: Not submitted
# DP: Status Details: Upstream disagrees with this patch, but I'm
# DP: putting it in so that we have expected Debian behaviour on the
# DP: Hurd. We should review this when the ELF standard supports runpath.
# DP: Date: 08 Apr 2003
# DP: Description: Enable ldconfig and such on hurd-i386
# DP: Author: Jeff Bailey <jbailey@nisa.net>
# DP: Related Bugs: #309489
# DP: Upstream status: Not submitted
# DP: Status Details: Upstream disagrees with this patch, but I'm
# DP: putting it in so that we have expected Debian behaviour on the
# DP: Hurd. We should review this when the ELF standard supports runpath.
# DP: Date: 08 Apr 2003
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name local-enable-ldconfig.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
posix_openpt
https://sourceware.org/ml/libc-alpha/2019-12/msg00799.html
to commit after 2.31 is released
Author: Samuel Thibault <samuel.thibault@ens-lyon.org>
Rearrange bsd_getpt vs bsd_openpt and implement posix_openpt on BSD
* sysdeps/unix/bsd/getpt.c (__getpt): Add oflag parameter, pass
it to the _open call and rename to...
(__bsd_openpt): ... new function.
[!HAVE_GETPT] (__getpt): Reimplement on top of __bsd_openpt.
(__posix_openpt): Replace stub with implementation on top of __bsd_openpt.
(posix_openpt): Remove stub warning.
* sysdeps/unix/sysv/linux/getpt.c (__bsd_getpt): Replace prototype with
__bsd_openpt prototype.
(__getpt): Use __bsd_openpt instead of __bsd_getpt (as fallback when
_posix_openpt fails).
(getpt): Add alias
(__getpt): Do not define.
(HAVE_GETPT): Define.
Gbp-Pq: Topic hurd-i386
Gbp-Pq: Name posix_openpt.diff
GNU Libc Maintainers [Wed, 22 Jul 2020 22:26:24 +0000 (23:26 +0100)]
local-inlining
Increase the maximal overall growth of the compilation unit caused
by inlining for dl-reloc.c on hppa. This remove some warnings and
strangely it reduces the size of the final binary.
Gbp-Pq: Topic hppa
Gbp-Pq: Name local-inlining.diff