vapier      15/02/09 15:41:19

  Added:               
                        00_all_00_all_0001-disable-ldconfig-during-install.patch
                        
00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch
                        
00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch
                        
00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch
                        
00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch
                        
00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch
                        
00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch
                        
00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch
                        
00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch
                        00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch
                        
00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch
                        
00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch
                        00_all_00_all_0013-hppa-fix-pthread-spinlock.patch
                        
00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch
                        
00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch
                        README.history
  Log:
  initial 2.21 patchset based on last 2.20 patchset

Revision  Changes    Path
1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0001-disable-ldconfig-during-install.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0001-disable-ldconfig-during-install.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0001-disable-ldconfig-during-install.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0001-disable-ldconfig-during-install.patch
===================================================================
>From 1a8236dcac0e7d5aa5148d96da46b0f204b20140 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <[email protected]>
Date: Sat, 4 May 2013 14:07:11 -0400
Subject: [PATCH] disable ldconfig during install

do not bother running ldconfig on DESTDIR.  it wants to write the temp cache
file outside of the chroot.  doesnt matter anyways as we wont use the cache
results (portage will rebuild cache), so running ldconfig is simply a waste
of time.

http://sourceware.org/ml/libc-alpha/2012-08/msg00118.html
https://bugs.gentoo.org/431038
---
 Makefile | 1 +
 1 file changed, 1 insertion(+)

diff --git a/Makefile b/Makefile
index 17e796f..e25e8be 100644
--- a/Makefile
+++ b/Makefile
@@ -105,6 +105,7 @@ install-symbolic-link: subdir_install
        rm -f $(symbolic-link-list)
 
 install:
+dont-bother-with-destdir:
        -test ! -x $(elf-objpfx)ldconfig || LC_ALL=C \
          $(elf-objpfx)ldconfig $(addprefix -r ,$(install_root)) \
                                $(slibdir) $(libdir)
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch?rev=1.1&content-type=text/plain

Index: 
00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch
===================================================================
>From f438358f77081b62eeb7565b2aed11d149c2e0e5 Mon Sep 17 00:00:00 2001
From: Mike Frysinger <[email protected]>
Date: Sat, 4 May 2013 14:10:41 -0400
Subject: [PATCH] workaround crash when handling signals in static PIEs

work around ... not entirely sure what is going on here.

2011-03-01      squeezy  <[email protected]>

        * sysdeps/unix/sysv/linux/x86_64/sigaction.c fix the __restore_rt symbol

http://bugs.gentoo.org/283470
---
 sysdeps/unix/sysv/linux/x86_64/sigaction.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/sysdeps/unix/sysv/linux/x86_64/sigaction.c 
b/sysdeps/unix/sysv/linux/x86_64/sigaction.c
index efc837f..344ca10 100644
--- a/sysdeps/unix/sysv/linux/x86_64/sigaction.c
+++ b/sysdeps/unix/sysv/linux/x86_64/sigaction.c
@@ -37,7 +37,7 @@
 
 /* Using the hidden attribute here does not change the code but it
    helps to avoid warnings.  */
-extern void restore_rt (void) asm ("__restore_rt") attribute_hidden;
+extern void restore_rt (void) asm ("__restore_rt") 
__attribute__((__visibility__("hidden")));
 
 
 /* If ACT is not NULL, change the action for SIG to *ACT.
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch
===================================================================
>From 49f7d0d663a0d14646778e7b1ea409aa03e1315d Mon Sep 17 00:00:00 2001
From: Mike Frysinger <[email protected]>
Date: Sat, 4 May 2013 14:12:58 -0400
Subject: [PATCH] make fortify logic checks less angry

the fortify/optimization check does not play well with our default gcc specs

http://sourceware.org/ml/libc-alpha/2012-06/msg00068.html
---
 include/features.h | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/include/features.h b/include/features.h
index afaa05c..d252583 100644
--- a/include/features.h
+++ b/include/features.h
@@ -323,10 +323,11 @@
 # define __USE_REENTRANT       1
 #endif
 
+#if !defined __OPTIMIZE__ || __OPTIMIZE__ <= 0
+# undef _FORTIFY_SOURCE
+#endif
 #if defined _FORTIFY_SOURCE && _FORTIFY_SOURCE > 0
-# if !defined __OPTIMIZE__ || __OPTIMIZE__ <= 0
-#  warning _FORTIFY_SOURCE requires compiling with optimization (-O)
-# elif !__GNUC_PREREQ (4, 1)
+# if !__GNUC_PREREQ (4, 1)
 #  warning _FORTIFY_SOURCE requires GCC 4.1 or later
 # elif _FORTIFY_SOURCE > 1
 #  define __USE_FORTIFY_LEVEL 2
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch?rev=1.1&content-type=text/plain

Index: 
00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch
===================================================================
>From a6e2f95341fd7c2564a4f0a84bb7447bd2686cd4 Mon Sep 17 00:00:00 2001
From: Jakub Jelinek <[email protected]>
Date: Fri, 16 Aug 2013 14:52:25 -0400
Subject: [PATCH] Fix localedef segfault when run under exec-shield, PaX or
 similar

http://bugs.debian.org/198099
http://bugs.debian.org/231438
---
 locale/programs/3level.h | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

diff --git a/locale/programs/3level.h b/locale/programs/3level.h
index 5602fd8..72416b2 100644
--- a/locale/programs/3level.h
+++ b/locale/programs/3level.h
@@ -204,6 +204,42 @@ CONCAT(TABLE,_iterate) (struct TABLE *t,
        }
     }
 }
+
+/* GCC ATM seems to do a poor job with pointers to nested functions passed
+   to inlined functions.  Help it a little bit with this hack.  */
+#define wchead_table_iterate(tp, fn) \
+do                                                                           \
+  {                                                                          \
+    struct wchead_table *t = (tp);                                           \
+    uint32_t index1;                                                         \
+    for (index1 = 0; index1 < t->level1_size; index1++)                        
      \
+      {                                                                        
      \
+       uint32_t lookup1 = t->level1[index1];                                 \
+       if (lookup1 != ((uint32_t) ~0))                                       \
+         {                                                                   \
+           uint32_t lookup1_shifted = lookup1 << t->q;                       \
+           uint32_t index2;                                                  \
+           for (index2 = 0; index2 < (1 << t->q); index2++)                  \
+             {                                                               \
+               uint32_t lookup2 = t->level2[index2 + lookup1_shifted];       \
+               if (lookup2 != ((uint32_t) ~0))                               \
+                 {                                                           \
+                   uint32_t lookup2_shifted = lookup2 << t->p;               \
+                   uint32_t index3;                                          \
+                   for (index3 = 0; index3 < (1 << t->p); index3++)          \
+                     {                                                       \
+                       struct element_t *lookup3                             \
+                         = t->level3[index3 + lookup2_shifted];              \
+                       if (lookup3 != NULL)                                  \
+                         fn ((((index1 << t->q) + index2) << t->p) + index3, \
+                             lookup3);                                       \
+                     }                                                       \
+                 }                                                           \
+             }                                                               \
+         }                                                                   \
+      }                                                                        
      \
+  } while (0)
+
 #endif
 
 #ifndef NO_ADD_LOCALE
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch
===================================================================
>From 5ed8677ad1e34b574dab6cc6aa21e551c4bdc268 Mon Sep 17 00:00:00 2001
From: Thorsten Kukuk <[email protected]>
Date: Fri, 16 Aug 2013 14:54:23 -0400
Subject: [PATCH] reload /etc/resolv.conf when it has changed

if /etc/resolv.conf is updated, then make sure applications
already running get the updated information.

ripped from SuSE

http://bugs.gentoo.org/177416
---
 resolv/res_libc.c | 15 +++++++++++++++
 1 file changed, 15 insertions(+)

diff --git a/resolv/res_libc.c b/resolv/res_libc.c
index ee3fa21..f30b3a9 100644
--- a/resolv/res_libc.c
+++ b/resolv/res_libc.c
@@ -22,6 +22,7 @@
 #include <arpa/nameser.h>
 #include <resolv.h>
 #include <bits/libc-lock.h>
+#include <sys/stat.h>
 
 
 /* The following bit is copied from res_data.c (where it is #ifdef'ed
@@ -95,6 +96,20 @@ int
 __res_maybe_init (res_state resp, int preinit)
 {
        if (resp->options & RES_INIT) {
+               static time_t last_mtime, last_check;
+               time_t now;
+               struct stat statbuf;
+
+               time (&now);
+               if (now != last_check) {
+                       last_check = now;
+                       if (stat (_PATH_RESCONF, &statbuf) == 0 && last_mtime 
!= statbuf.st_mtime) {
+                               last_mtime = statbuf.st_mtime;
+                               atomicinclock (lock);
+                               atomicinc (__res_initstamp);
+                               atomicincunlock (lock);
+                       }
+               }
                if (__res_initstamp != resp->_u._ext.initstamp) {
                        if (resp->nscount > 0)
                                __res_iclose (resp, true);
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch
===================================================================
>From c89dcf9c12f730478bc0cf652b27b032bf81e40c Mon Sep 17 00:00:00 2001
From: Carlos O'Donell <[email protected]>
Date: Fri, 16 Aug 2013 14:57:59 -0400
Subject: [PATCH] nptl: support thread stacks that grow up

http://bugs.gentoo.org/301642
---
 nptl/allocatestack.c      | 22 +++++++++++++++-------
 nptl/pthread_create.c     | 19 ++++++++++++++++---
 nptl/pthread_getattr_np.c | 13 +++++++++++--
 3 files changed, 42 insertions(+), 12 deletions(-)

diff --git a/nptl/allocatestack.c b/nptl/allocatestack.c
index 3c8e046..8045b07 100644
--- a/nptl/allocatestack.c
+++ b/nptl/allocatestack.c
@@ -372,6 +372,15 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
   if (__glibc_unlikely (attr->flags & ATTR_FLAG_STACKADDR))
     {
       uintptr_t adj;
+#if _STACK_GROWS_DOWN
+      char * stackaddr = (char *) attr->stackaddr;
+#else
+      /* Assume the same layout as the _STACK_GROWS_DOWN case,
+        with struct pthread at the top of the stack block.
+        Later we adjust the guard location and stack address
+        to match the _STACK_GROWS_UP case.  */
+      char * stackaddr = (char *) attr->stackaddr + attr->stacksize;
+#endif
 
       /* If the user also specified the size of the stack make sure it
         is large enough.  */
@@ -381,11 +390,11 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
 
       /* Adjust stack size for alignment of the TLS block.  */
 #if TLS_TCB_AT_TP
-      adj = ((uintptr_t) attr->stackaddr - TLS_TCB_SIZE)
+      adj = ((uintptr_t) stackaddr - TLS_TCB_SIZE)
            & __static_tls_align_m1;
       assert (size > adj + TLS_TCB_SIZE);
 #elif TLS_DTV_AT_TP
-      adj = ((uintptr_t) attr->stackaddr - __static_tls_size)
+      adj = ((uintptr_t) stackaddr - __static_tls_size)
            & __static_tls_align_m1;
       assert (size > adj);
 #endif
@@ -395,10 +404,10 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
         the stack.  It is the user's responsibility to do this if it
         is wanted.  */
 #if TLS_TCB_AT_TP
-      pd = (struct pthread *) ((uintptr_t) attr->stackaddr
+      pd = (struct pthread *) ((uintptr_t) stackaddr
                               - TLS_TCB_SIZE - adj);
 #elif TLS_DTV_AT_TP
-      pd = (struct pthread *) (((uintptr_t) attr->stackaddr
+      pd = (struct pthread *) (((uintptr_t) stackaddr
                                - __static_tls_size - adj)
                               - TLS_PRE_TCB_SIZE);
 #endif
@@ -410,7 +419,7 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
       pd->specific[0] = pd->specific_1stblock;
 
       /* Remember the stack-related values.  */
-      pd->stackblock = (char *) attr->stackaddr - size;
+      pd->stackblock = (char *) stackaddr - size;
       pd->stackblock_size = size;
 
       /* This is a user-provided stack.  It will not be queued in the
@@ -634,7 +643,7 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
          char *guard = mem + (((size - guardsize) / 2) & ~pagesize_m1);
 #elif _STACK_GROWS_DOWN
          char *guard = mem;
-# elif _STACK_GROWS_UP
+#elif _STACK_GROWS_UP
          char *guard = (char *) (((uintptr_t) pd - guardsize) & ~pagesize_m1);
 #endif
          if (mprotect (guard, guardsize, PROT_NONE) != 0)
@@ -730,7 +739,6 @@ allocate_stack (const struct pthread_attr *attr, struct 
pthread **pdp,
   *stack = stacktop;
 #elif _STACK_GROWS_UP
   *stack = pd->stackblock;
-  assert (*stack > 0);
 #endif
 
   return 0;
diff --git a/nptl/pthread_create.c b/nptl/pthread_create.c
index 71a5619..af6be6f 100644
--- a/nptl/pthread_create.c
+++ b/nptl/pthread_create.c
@@ -426,12 +426,25 @@ START_THREAD_DEFN
 #ifdef _STACK_GROWS_DOWN
   char *sp = CURRENT_STACK_FRAME;
   size_t freesize = (sp - (char *) pd->stackblock) & ~pagesize_m1;
-#else
-# error "to do"
-#endif
   assert (freesize < pd->stackblock_size);
   if (freesize > PTHREAD_STACK_MIN)
     __madvise (pd->stackblock, freesize - PTHREAD_STACK_MIN, MADV_DONTNEED);
+#else
+  /* Page aligned start of memory to free (higher than or equal
+     to current sp plus the minimum stack size).  */
+  void *freeblock = (void*)((size_t)(CURRENT_STACK_FRAME
+                                    + PTHREAD_STACK_MIN
+                                    + pagesize_m1)
+                                   & ~pagesize_m1);
+  char *free_end = (char *) (((uintptr_t) pd - pd->guardsize) & ~pagesize_m1);
+  /* Is there any space to free?  */
+  if (free_end > (char *)freeblock)
+    {
+      size_t freesize = (size_t)(free_end - (char *)freeblock);
+      assert (freesize < pd->stackblock_size);
+      __madvise (freeblock, freesize, MADV_DONTNEED);
+    }
+#endif
 
   /* If the thread is detached free the TCB.  */
   if (IS_DETACHED (pd))
diff --git a/nptl/pthread_getattr_np.c b/nptl/pthread_getattr_np.c
index 52a4602..df76605 100644
--- a/nptl/pthread_getattr_np.c
+++ b/nptl/pthread_getattr_np.c
@@ -60,7 +60,11 @@ pthread_getattr_np (thread_id, attr)
   if (__glibc_likely (thread->stackblock != NULL))
     {
       iattr->stacksize = thread->stackblock_size;
+#ifdef _STACK_GROWS_DOWN
       iattr->stackaddr = (char *) thread->stackblock + iattr->stacksize;
+#else
+      iattr->stackaddr = (char *) thread->stackblock;
+#endif
     }
   else
     {
@@ -129,12 +133,17 @@ pthread_getattr_np (thread_id, attr)
                         stack extension request.  */
                      iattr->stacksize = (iattr->stacksize
                                          & -(intptr_t) GLRO(dl_pagesize));
-
+#if _STACK_GROWS_DOWN
                      /* The limit might be too high.  */
                      if ((size_t) iattr->stacksize
                          > (size_t) iattr->stackaddr - last_to)
                        iattr->stacksize = (size_t) iattr->stackaddr - last_to;
-
+#else
+                     /* The limit might be too high.  */
+                     if ((size_t) iattr->stacksize
+                         > to - (size_t) iattr->stackaddr)
+                       iattr->stacksize = to - (size_t) iattr->stackaddr;
+#endif
                      /* We succeed and no need to look further.  */
                      ret = 0;
                      break;
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch
===================================================================
>From 01f9e0e7ecfa09f176bbc0cececf40a6332e1f95 Mon Sep 17 00:00:00 2001
From: Guy Martin <[email protected]>
Date: Fri, 16 Aug 2013 15:00:05 -0400
Subject: [PATCH] rtld: do not ignore arch-specific CFLAGS

https://bugs.gentoo.org/452184
http://sourceware.org/bugzilla/show_bug.cgi?id=15005
http://sourceware.org/ml/libc-alpha/2013-01/msg00247.html
---
 elf/Makefile | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/elf/Makefile b/elf/Makefile
index e5b142c..4882410 100644
--- a/elf/Makefile
+++ b/elf/Makefile
@@ -440,7 +440,7 @@ CFLAGS-ldconfig.c = $(SYSCONF-FLAGS) -D'LIBDIR="$(libdir)"' 
\
 libof-ldconfig = ldconfig
 CFLAGS-dl-cache.c = $(SYSCONF-FLAGS)
 CFLAGS-cache.c = $(SYSCONF-FLAGS)
-CFLAGS-rtld.c = $(SYSCONF-FLAGS)
+CFLAGS-rtld.c += $(SYSCONF-FLAGS)
 
 cpp-srcs-left := $(all-rtld-routines:=.os)
 lib := rtld
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch
===================================================================
>From df94d8f254e8947a5dc2837c1b0de3478820d1ed Mon Sep 17 00:00:00 2001
From: "Stephanie J. Lockwood-Childs" <[email protected]>
Date: Fri, 16 Aug 2013 15:03:41 -0400
Subject: [PATCH] gentoo: support running tests under sandbox

when glibc runs its tests, it does so by invoking the local library loader.
in Gentoo, we build/run inside of our "sandbox" which itself is linked against
libdl (so that it can load libraries and pull out symbols).  the trouble
is that when you upgrade from an older glibc to the new one, often times
internal symbols change name or abi.  this is normally OK as you cannot use
libc.so from say version 2.3.6 but libpthread.so from say version 2.5, so
we always say "keep all of the glibc libraries from the same build".  but
when glibc runs its tests, it uses dynamic paths to point to its new local
copies of libraries.  if the test doesnt use libdl, then glibc doesnt add
its path, and when sandbox triggers the loading of libdl, glibc does so
from the host system system.  this gets us into the case of all libraries
are from the locally compiled version of glibc except for libdl.so.

http://bugs.gentoo.org/56898
---
 Makeconfig                  | 2 +-
 iconvdata/run-iconv-test.sh | 2 +-
 nptl/tst-tls6.sh            | 2 +-
 3 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/Makeconfig b/Makeconfig
index 751e9ff..0f74abf 100644
--- a/Makeconfig
+++ b/Makeconfig
@@ -616,7 +616,7 @@ comma = ,
 sysdep-library-path = \
 $(subst $(empty) ,:,$(strip $(patsubst -Wl$(comma)-rpath-link=%, %,\
                                       $(filter -Wl$(comma)-rpath-link=%,\
-                                               $(sysdep-LDFLAGS)))))
+                                               $(sysdep-LDFLAGS)))) 
$(common-objpfx)/dlfcn)
 # $(run-via-rtld-prefix) is a command that, when prepended to the name
 # of a program built with the newly built library, produces a command
 # that, executed on the host for which the library is built, runs that
diff --git a/iconvdata/run-iconv-test.sh b/iconvdata/run-iconv-test.sh
index 557db6b..23c2c35 100755
--- a/iconvdata/run-iconv-test.sh
+++ b/iconvdata/run-iconv-test.sh
@@ -31,7 +31,7 @@ temp2=$codir/iconvdata/iconv-test.yyy
 trap "rm -f $temp1 $temp2" 1 2 3 15
 
 # We have to have some directories in the library path.
-LIBPATH=$codir:$codir/iconvdata
+LIBPATH=$codir:$codir/iconvdata:$codir/dlfcn
 
 # How the start the iconv(1) program.
 ICONV='$codir/elf/ld.so --library-path $LIBPATH --inhibit-rpath ${from}.so \
diff --git a/nptl/tst-tls6.sh b/nptl/tst-tls6.sh
index 3533474..e58f3f6 100755
--- a/nptl/tst-tls6.sh
+++ b/nptl/tst-tls6.sh
@@ -26,7 +26,7 @@ run_program_env=$1; shift
 logfile=$common_objpfx/nptl/tst-tls6.out
 
 # We have to find libc and nptl
-library_path=${common_objpfx}:${common_objpfx}nptl
+library_path=${common_objpfx}:${common_objpfx}nptl:${common_objpfx}/dlfcn
 tst_tls5="${test_via_rtld_prefix} ${common_objpfx}/nptl/tst-tls5"
 
 > $logfile
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch
===================================================================
>From 0106d3b598e45ba1332f3198edd20d4119d36d0c Mon Sep 17 00:00:00 2001
From: Mike Frysinger <[email protected]>
Date: Fri, 16 Aug 2013 15:05:26 -0400
Subject: [PATCH] gentoo: disable building in timezone subdir

We've split this out into the package sys-libs/timezone-data
---
 Makeconfig | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Makeconfig b/Makeconfig
index 0f74abf..ba9b1e8 100644
--- a/Makeconfig
+++ b/Makeconfig
@@ -1062,7 +1062,7 @@ all-subdirs = csu assert ctype locale intl catgets math 
setjmp signal         \
              stdlib stdio-common libio malloc string wcsmbs time dirent    \
              grp pwd posix io termios resource misc socket sysvipc gmon    \
              gnulib iconv iconvdata wctype manual shadow gshadow po argp   \
-             crypt localedata timezone rt conform debug                    \
+             crypt localedata rt conform debug             \
              $(add-on-subdirs) dlfcn elf
 
 ifndef avoid-generated
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch
===================================================================
>From 6d234be2fbd744d252c17cc1ee79010f3b3d88dc Mon Sep 17 00:00:00 2001
From: David Lamparter <[email protected]>
Date: Fri, 16 Aug 2013 15:06:34 -0400
Subject: [PATCH] arm: fix PIC vs SHARED typos

the logic in setjmp/__longjmp incorrectly tie to "PIC" to figure out
whether the code is going into a shared library when it should be using
"SHARED".  otherwise, building static PIC code goes wrong.

https://bugs.gentoo.org/336914
http://sourceware.org/ml/libc-ports/2011-09/msg00018.html

2011-09-19  David Lamparter  <[email protected]>

        * sysdeps/arm/setjmp.S: Change PIC to SHARED.
        * sysdeps/arm/__longjmp.S: Likewise
---
 sysdeps/arm/__longjmp.S | 2 +-
 sysdeps/arm/setjmp.S    | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/sysdeps/arm/__longjmp.S b/sysdeps/arm/__longjmp.S
index fc60a5d..1033e13 100644
--- a/sysdeps/arm/__longjmp.S
+++ b/sysdeps/arm/__longjmp.S
@@ -81,7 +81,7 @@ ENTRY (__longjmp)
                    C_SYMBOL_NAME(_rtld_local_ro) \
                    + RTLD_GLOBAL_RO_DL_HWCAP_OFFSET)
 # else
-#  ifdef PIC
+#  ifdef SHARED
        LDR_GLOBAL (a4, a3, C_SYMBOL_NAME(_rtld_global_ro), \
                    RTLD_GLOBAL_RO_DL_HWCAP_OFFSET)
 #  else
diff --git a/sysdeps/arm/setjmp.S b/sysdeps/arm/setjmp.S
index e44beb4..be0a4ec 100644
--- a/sysdeps/arm/setjmp.S
+++ b/sysdeps/arm/setjmp.S
@@ -62,7 +62,7 @@ ENTRY (__sigsetjmp)
                    C_SYMBOL_NAME(_rtld_local_ro) \
                    + RTLD_GLOBAL_RO_DL_HWCAP_OFFSET)
 # else
-#  ifdef PIC
+#  ifdef SHARED
        LDR_GLOBAL (a3, a4, C_SYMBOL_NAME(_rtld_global_ro), \
                    RTLD_GLOBAL_RO_DL_HWCAP_OFFSET)
 #  else
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch
===================================================================
>From 8a8bf85da0c7236c942236aee3714b0fd4b967be Mon Sep 17 00:00:00 2001
From: John David Anglin <[email protected]>
Date: Sun, 10 Aug 2014 09:39:25 -0400
Subject: [PATCH] hppa: fix build problems with atomic code
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Specifically:
../sysdeps/unix/sysv/linux/hppa/bits/atomic.h:68:6: error:
        can’t find a register in class ‘R1_REGS’ while reloading ‘asm’
---
 sysdeps/unix/sysv/linux/hppa/bits/atomic.h | 60 ++++++++++++++++--------------
 1 file changed, 32 insertions(+), 28 deletions(-)

diff --git a/sysdeps/unix/sysv/linux/hppa/bits/atomic.h 
b/sysdeps/unix/sysv/linux/hppa/bits/atomic.h
index abde83e..9a22e05 100644
--- a/sysdeps/unix/sysv/linux/hppa/bits/atomic.h
+++ b/sysdeps/unix/sysv/linux/hppa/bits/atomic.h
@@ -64,35 +64,39 @@ typedef uintmax_t uatomic_max_t;
 
 #if __ASSUME_LWS_CAS
 /* The only basic operation needed is compare and exchange.  */
+static int __attribute__((noinline))
+__atomic_compare_and_exchange_val_acq (int mem, int newval, int oldval)
+{
+  volatile int lws_errno;
+  volatile int lws_ret;
+  asm volatile(
+       "0:                                     \n\t"
+       "copy   %2, %%r26                       \n\t"
+       "copy   %3, %%r25                       \n\t"
+       "copy   %4, %%r24                       \n\t"
+       "ble    " _LWS "(%%sr2, %%r0)           \n\t"
+       "ldi    " _LWS_CAS ", %%r20             \n\t"
+       "ldi    " _ASM_EAGAIN ", %%r24          \n\t"
+       "cmpb,=,n %%r24, %%r21, 0b              \n\t"
+       "nop                                    \n\t"
+       "ldi    " _ASM_EDEADLOCK ", %%r25       \n\t"
+       "cmpb,=,n %%r25, %%r21, 0b              \n\t"
+       "nop                                    \n\t"
+       "stw    %%r28, %0                       \n\t"
+       "stw    %%r21, %1                       \n\t"
+       : "=m" (lws_ret), "=m" (lws_errno)
+       : "r" (mem), "r" (oldval), "r" (newval)
+       : _LWS_CLOBBER
+   );
+
+  if (lws_errno == -EFAULT || lws_errno == -ENOSYS)
+    ABORT_INSTRUCTION;
+
+  return lws_ret;
+}
 # define atomic_compare_and_exchange_val_acq(mem, newval, oldval)      \
-  ({                                                                   \
-     volatile int lws_errno;                                           \
-     __typeof__ (*mem) lws_ret;                                                
\
-     asm volatile(                                                     \
-       "0:                                     \n\t"                   \
-       "copy   %2, %%r26                       \n\t"                   \
-       "copy   %3, %%r25                       \n\t"                   \
-       "copy   %4, %%r24                       \n\t"                   \
-       "ble    " _LWS "(%%sr2, %%r0)           \n\t"                   \
-       "ldi    " _LWS_CAS ", %%r20             \n\t"                   \
-       "ldi    " _ASM_EAGAIN ", %%r24          \n\t"                   \
-       "cmpb,=,n %%r24, %%r21, 0b              \n\t"                   \
-       "nop                                    \n\t"                   \
-       "ldi    " _ASM_EDEADLOCK ", %%r25       \n\t"                   \
-       "cmpb,=,n %%r25, %%r21, 0b              \n\t"                   \
-       "nop                                    \n\t"                   \
-       "stw    %%r28, %0                       \n\t"                   \
-       "stw    %%r21, %1                       \n\t"                   \
-       : "=m" (lws_ret), "=m" (lws_errno)                              \
-        : "r" (mem), "r" (oldval), "r" (newval)                                
\
-       : _LWS_CLOBBER                                                  \
-     );                                                                        
\
-                                                                       \
-     if(lws_errno == -EFAULT || lws_errno == -ENOSYS)                  \
-       ABORT_INSTRUCTION;                                              \
-                                                                       \
-     lws_ret;                                                          \
-   })
+   ((__typeof__(oldval))                                               \
+    __atomic_compare_and_exchange_val_acq ((int)mem, (int)newval, (int)oldval))
 
 # define atomic_compare_and_exchange_bool_acq(mem, newval, oldval)     \
   ({                                                                   \
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch
===================================================================
>From 1c1d3f4f11b4a911a3b6ffab0aac61d5f8e02873 Mon Sep 17 00:00:00 2001
From: John David Anglin <[email protected]>
Date: Sun, 10 Aug 2014 09:41:27 -0400
Subject: [PATCH] hppa: fix bug in floating point exception support

---
 sysdeps/hppa/fpu/feholdexcpt.c | 6 +++---
 sysdeps/hppa/fpu/fesetenv.c    | 4 ++--
 2 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/sysdeps/hppa/fpu/feholdexcpt.c b/sysdeps/hppa/fpu/feholdexcpt.c
index 94eba37..aa5b5d2 100644
--- a/sysdeps/hppa/fpu/feholdexcpt.c
+++ b/sysdeps/hppa/fpu/feholdexcpt.c
@@ -29,8 +29,8 @@ __feholdexcept (fenv_t *envp)
   /* Store the environment.  */
   bufptr = clear.buf;
   __asm__ (
-          "fstd,ma %%fr0,8(%1)\n"
-          : "=m" (clear), "+r" (bufptr) : : "%r0");
+          "fstd %%fr0,0(%1)\n"
+          : "=m" (clear) : "r" (bufptr) : "%r0");
   memcpy (envp, &clear.env, sizeof (fenv_t));
 
   /* Clear exception queues */
@@ -44,7 +44,7 @@ __feholdexcept (fenv_t *envp)
      Thus we start bufptr at the end and work backwards */
   bufptr = (unsigned long long *)((unsigned int)(clear.buf) + sizeof(unsigned 
int)*4);
   __asm__ (
-          "fldd,mb -8(%0),%%fr0\n"
+          "fldd 0(%0),%%fr0\n"
           : : "r" (bufptr), "m" (clear) : "%r0");
 
   return 0;
diff --git a/sysdeps/hppa/fpu/fesetenv.c b/sysdeps/hppa/fpu/fesetenv.c
index 5b33ad6..5de755d 100644
--- a/sysdeps/hppa/fpu/fesetenv.c
+++ b/sysdeps/hppa/fpu/fesetenv.c
@@ -33,7 +33,7 @@ __fesetenv (const fenv_t *envp)
      we want to use from the environment specified by the parameter.  */
   bufptr = temp.buf;
   __asm__ (
-          "fstd,ma %%fr0,8(%1)\n"
+          "fstd %%fr0,0(%1)\n"
           : "=m" (temp) : "r" (bufptr) : "%r0");
 
   temp.env.__status_word &= ~(FE_ALL_EXCEPT
@@ -54,7 +54,7 @@ __fesetenv (const fenv_t *envp)
      we take advantage of that to load in reverse order so fr0
      is loaded last and T-Bit is enabled. */
   __asm__ (
-          "fldd,mb -8(%1),%%fr0\n"
+          "fldd 0(%1),%%fr0\n"
           : : "m" (temp), "r" (bufptr) : "%r0" );
 
   /* Success.  */
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0013-hppa-fix-pthread-spinlock.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0013-hppa-fix-pthread-spinlock.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0013-hppa-fix-pthread-spinlock.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0013-hppa-fix-pthread-spinlock.patch
===================================================================
>From 204f030682dceefc37a29f6915e5175cb45784af Mon Sep 17 00:00:00 2001
From: John David Anglin <[email protected]>
Date: Sun, 10 Aug 2014 09:54:53 -0400
Subject: [PATCH] hppa: fix pthread spinlock

---
 sysdeps/hppa/nptl/pthread_spin_init.c   | 8 ++++----
 sysdeps/hppa/nptl/pthread_spin_unlock.c | 8 ++++----
 2 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/sysdeps/hppa/nptl/pthread_spin_init.c 
b/sysdeps/hppa/nptl/pthread_spin_init.c
index 865ef2b..a49a846 100644
--- a/sysdeps/hppa/nptl/pthread_spin_init.c
+++ b/sysdeps/hppa/nptl/pthread_spin_init.c
@@ -20,9 +20,9 @@
 int
 pthread_spin_init (pthread_spinlock_t *lock, int pshared)
 {
-  int tmp = 0;
-  /* This should be a memory barrier to newer compilers */
-  __asm__ __volatile__ ("stw,ma %1,0(%0)"
-                        : : "r" (lock), "r" (tmp) : "memory");
+  /* The LWS-CAS operation on hppa is a synthetic atomic operation
+     that doesn't provide the type of coherency that we need. Therefore
+     we force that coherency by using LWS-CAS again.  */
+  atomic_exchange_rel (lock, 0);
   return 0;
 }
diff --git a/sysdeps/hppa/nptl/pthread_spin_unlock.c 
b/sysdeps/hppa/nptl/pthread_spin_unlock.c
index a183fed..b576649 100644
--- a/sysdeps/hppa/nptl/pthread_spin_unlock.c
+++ b/sysdeps/hppa/nptl/pthread_spin_unlock.c
@@ -20,9 +20,9 @@
 int
 pthread_spin_unlock (pthread_spinlock_t *lock)
 {
-  int tmp = 0;
-  /* This should be a memory barrier to newer compilers */
-  __asm__ __volatile__ ("stw,ma %1,0(%0)"
-                        : : "r" (lock), "r" (tmp) : "memory");
+  /* The LWS-CAS operation on hppa is a synthetic atomic operation
+     that doesn't provide the type of coherency that we need. Therefore
+     we force that coherency by using LWS-CAS again.  */
+  atomic_exchange_rel (lock, 0);
   return 0;
 }
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch
===================================================================
>From c24bbd6de049a351efdb2a04f57a0000970f17b3 Mon Sep 17 00:00:00 2001
From: John David Anglin <[email protected]>
Date: Sun, 10 Aug 2014 10:00:23 -0400
Subject: [PATCH] hppa: fix __O_SYNC to match the kernel

---
 sysdeps/unix/sysv/linux/hppa/bits/fcntl.h | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/sysdeps/unix/sysv/linux/hppa/bits/fcntl.h 
b/sysdeps/unix/sysv/linux/hppa/bits/fcntl.h
index 9aad095..a800e28 100644
--- a/sysdeps/unix/sysv/linux/hppa/bits/fcntl.h
+++ b/sysdeps/unix/sysv/linux/hppa/bits/fcntl.h
@@ -27,7 +27,7 @@
 #define O_NONBLOCK     00200004 /* HPUX has separate NDELAY & NONBLOCK */
 #define __O_DSYNC      01000000
 #define __O_RSYNC      02000000 /* HPUX only */
-#define __O_SYNC       01000000
+#define __O_SYNC       00100000
 #define O_SYNC         (__O_SYNC|__O_DSYNC)
 
 #define O_BLKSEEK      00000100 /* HPUX only */
-- 
2.2.1




1.1                  
src/patchsets/glibc/2.21/00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch?rev=1.1&content-type=text/plain

Index: 00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch
===================================================================
>From f14f39cfd7b959c806d822a2f6863873151f0a83 Mon Sep 17 00:00:00 2001
From: "Kevin F. Quinn" <[email protected]>
Date: Tue, 9 Sep 2014 17:41:57 -0400
Subject: [PATCH] disable PIE when checking for PIC default

When the compiler builds PIEs by default, the configure PIC check is
confused into thinking PIC code is default.  The end result is that
we end up with only PIC being produced.

Run the configure check with -fno-PIE so that we produce PIC & non-PIC
(PIE) objects like normal.

2014-09-09  Kevin F. Quinn  <[email protected]>

        * configure.ac (libc_cv_pic_default): Pass -fno-PIE.
        * configure: Regenerated.
---
 configure    | 2 +-
 configure.ac | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/configure b/configure
index ce0c6a0..70b4479 100755
--- a/configure
+++ b/configure
@@ -7148,7 +7148,7 @@ cat > conftest.c <<EOF
 # error PIC is default.
 #endif
 EOF
-if eval "${CC-cc} -S conftest.c 2>&5 1>&5"; then
+if eval "${CC-cc} -fno-PIE -S conftest.c 2>&5 1>&5"; then
   libc_cv_pic_default=no
 fi
 rm -f conftest.*
diff --git a/configure.ac b/configure.ac
index d89aaf0..9351483 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2013,7 +2013,7 @@ cat > conftest.c <<EOF
 # error PIC is default.
 #endif
 EOF
-if eval "${CC-cc} -S conftest.c 2>&AS_MESSAGE_LOG_FD 1>&AS_MESSAGE_LOG_FD"; 
then
+if eval "${CC-cc} -fno-PIE -S conftest.c 2>&AS_MESSAGE_LOG_FD 
1>&AS_MESSAGE_LOG_FD"; then
   libc_cv_pic_default=no
 fi
 rm -f conftest.*])
-- 
2.2.1




1.1                  src/patchsets/glibc/2.21/README.history

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/README.history?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo/src/patchsets/glibc/2.21/README.history?rev=1.1&content-type=text/plain

Index: README.history
===================================================================
1               09 Feb 2015
        + 00_all_00_all_0001-disable-ldconfig-during-install.patch
        + 
00_all_00_all_0002-workaround-crash-when-handling-signals-in-static-PIE.patch
        + 00_all_00_all_0003-make-fortify-logic-checks-less-angry.patch
        + 
00_all_00_all_0004-Fix-localedef-segfault-when-run-under-exec-shield-Pa.patch
        + 00_all_00_all_0005-reload-etc-resolv.conf-when-it-has-changed.patch
        + 00_all_00_all_0006-nptl-support-thread-stacks-that-grow-up.patch
        + 00_all_00_all_0007-rtld-do-not-ignore-arch-specific-CFLAGS.patch
        + 00_all_00_all_0008-gentoo-support-running-tests-under-sandbox.patch
        + 00_all_00_all_0009-gentoo-disable-building-in-timezone-subdir.patch
        + 00_all_00_all_0010-arm-fix-PIC-vs-SHARED-typos.patch
        + 00_all_00_all_0011-hppa-fix-build-problems-with-atomic-code.patch
        + 
00_all_00_all_0012-hppa-fix-bug-in-floating-point-exception-support.patch
        + 00_all_00_all_0013-hppa-fix-pthread-spinlock.patch
        + 00_all_00_all_0014-hppa-fix-__O_SYNC-to-match-the-kernel.patch
        + 00_all_00_all_0015-disable-PIE-when-checking-for-PIC-default.patch




Reply via email to