[arch-commits] Commit in lib32-glibc/trunk (2 files)

2014-05-16 Thread Jan Steffens
Date: Friday, May 16, 2014 @ 22:53:14
  Author: heftig
Revision: 111333

2.19-5

Added:
  lib32-glibc/trunk/glibc-2.19-tzselect-default.patch
Modified:
  lib32-glibc/trunk/PKGBUILD

---+
 PKGBUILD  |   27 ++-
 glibc-2.19-tzselect-default.patch |   13 +
 2 files changed, 31 insertions(+), 9 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2014-05-16 17:15:47 UTC (rev 111332)
+++ PKGBUILD2014-05-16 20:53:14 UTC (rev 111333)
@@ -9,26 +9,32 @@
 _pkgbasename=glibc
 pkgname=lib32-$_pkgbasename
 pkgver=2.19
-pkgrel=4
-pkgdesc=GNU C Library for multilib
+pkgrel=5
+pkgdesc=GNU C Library (32-bit)
 arch=('x86_64')
 url=http://www.gnu.org/software/libc;
 license=('GPL' 'LGPL')
-makedepends=('gcc-multilib=4.7')
+groups=()
+depends=()
+makedepends=('gcc-multilib=4.8')
+backup=()
 options=('!strip' '!emptydirs' 'staticlibs')
+install=
 source=(http://ftp.gnu.org/gnu/libc/${_pkgbasename}-${pkgver}.tar.xz{,.sig}
 glibc-2.19-xattr_header.patch
 glibc-2.19-fix-sign-in-bsloww1-input.patch
+glibc-2.19-tzselect-default.patch
 lib32-glibc.conf)
 md5sums=('e26b8cc666b162f999404b03970f14e4'
  'SKIP'
  '39a4876837789e07746f1d84cd8cb46a'
  '755a1a9d7844a5e338eddaa9a5d974cd'
+ 'c772dc99ddd8032ecbf43884ae0cf42e'
  '6e052f1cb693d5d3203f50f9d4e8c33b')
 
 prepare() {
   cd ${srcdir}/${_pkgbasename}-${pkgver}
-   
+
   # fix for {linux,sys}/xattr.h incompatibility - commit fdbe8eae
   patch -p1 -i $srcdir/glibc-2.19-xattr_header.patch
 
@@ -35,6 +41,9 @@
   # fix issues in sin/cos slow path calculation - commit ffe768a9
   patch -p1 -i $srcdir/glibc-2.19-fix-sign-in-bsloww1-input.patch
 
+  # fix tzselect with missing TZDIR - commit 893b4f37/c72399fb
+  patch -p1 -i $srcdir/glibc-2.19-tzselect-default.patch
+
   mkdir ${srcdir}/glibc-build
 }
 
@@ -55,7 +64,7 @@
   export CXX=g++ -m32
 
   # remove hardening options for building libraries
-  CFLAGS=${CFLAGS/-fstack-protector/}
+  CFLAGS=${CFLAGS/-fstack-protector-strong/}
   CPPFLAGS=${CPPFLAGS/-D_FORTIFY_SOURCE=2/}
 
   ${srcdir}/${_pkgbasename}-${pkgver}/configure --prefix=/usr \
@@ -76,8 +85,8 @@
 
   # re-enable hardening for programs
   sed -i /build-programs=/s#no#yes# configparms
-  echo CC += -fstack-protector -D_FORTIFY_SOURCE=2  configparms
-  echo CXX += -fstack-protector -D_FORTIFY_SOURCE=2  configparms
+  echo CC += -fstack-protector-strong -D_FORTIFY_SOURCE=2  configparms
+  echo CXX += -fstack-protector-strong -D_FORTIFY_SOURCE=2  configparms
   make
 
   # remove harding in preparation to run test-suite
@@ -90,8 +99,8 @@
 
   cd ${srcdir}/glibc-build
 
-  # only acceptable testsuite error is some small libm ulp failures on i686 
with gcc-4.9
-  # TODO: fix upstream and provide patch
+  # ULP failures on i686 are all small and can be ignored
+  # tst-cleanupx4.out failure on i686 needs investigating...
   make -k check || true
 }
 

Added: glibc-2.19-tzselect-default.patch
===
--- glibc-2.19-tzselect-default.patch   (rev 0)
+++ glibc-2.19-tzselect-default.patch   2014-05-16 20:53:14 UTC (rev 111333)
@@ -0,0 +1,13 @@
+diff --git a/timezone/Makefile b/timezone/Makefile
+index 998cd14..d5f647c 100644
+--- a/timezone/Makefile
 b/timezone/Makefile
+@@ -118,7 +118,7 @@ $(testdata)/Asia/Tokyo: asia $(zic-deps)
+ 
+ $(objpfx)tzselect: tzselect.ksh $(common-objpfx)config.make
+   sed -e 's|/bin/bash|$(KSH)|g' \
+-  -e '/TZDIR=/s|\$$(pwd)|$(zonedir)|' \
++  -e 's|TZDIR=[^}]*|TZDIR=$(zonedir)|' \
+   -e '/TZVERSION=/s|see_Makefile|$(version)|' \
+   -e '/PKGVERSION=/s|=.*|=$(PKGVERSION)|' \
+   -e '/REPORT_BUGS_TO=/s|=.*|=$(REPORT_BUGS_TO)|' \



[arch-commits] Commit in lib32-glibc/trunk (2 files)

2014-02-28 Thread Jan Steffens
Date: Friday, February 28, 2014 @ 23:58:23
  Author: heftig
Revision: 106353

2.19-3

Added:
  lib32-glibc/trunk/glibc-2.19-fix-sign-in-bsloww1-input.patch
Modified:
  lib32-glibc/trunk/PKGBUILD

+
 PKGBUILD   |7 ++
 glibc-2.19-fix-sign-in-bsloww1-input.patch |   71 +++
 2 files changed, 77 insertions(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2014-02-28 22:32:40 UTC (rev 106352)
+++ PKGBUILD2014-02-28 22:58:23 UTC (rev 106353)
@@ -9,7 +9,7 @@
 _pkgbasename=glibc
 pkgname=lib32-$_pkgbasename
 pkgver=2.19
-pkgrel=1
+pkgrel=3
 pkgdesc=GNU C Library for multilib
 arch=('x86_64')
 url=http://www.gnu.org/software/libc;
@@ -18,10 +18,12 @@
 options=('!strip' '!emptydirs' 'staticlibs')
 source=(http://ftp.gnu.org/gnu/libc/${_pkgbasename}-${pkgver}.tar.xz{,.sig}
 glibc-2.18-xattr-compat-hack.patch
+glibc-2.19-fix-sign-in-bsloww1-input.patch
 lib32-glibc.conf)
 md5sums=('e26b8cc666b162f999404b03970f14e4'
  'SKIP'
  '7ca96c68a37f2a4ab91792bfa0160a24'
+ '755a1a9d7844a5e338eddaa9a5d974cd'
  '6e052f1cb693d5d3203f50f9d4e8c33b')
 
 prepare() {
@@ -30,6 +32,9 @@
   # hack fix for {linux,sys}/xattr.h incompatibility
   patch -p1 -i $srcdir/glibc-2.18-xattr-compat-hack.patch
 
+  # fix issues in sin/cos slow path calculation - commit ffe768a9
+  patch -p1 -i $srcdir/glibc-2.19-fix-sign-in-bsloww1-input.patch
+
   mkdir ${srcdir}/glibc-build
 }
 

Added: glibc-2.19-fix-sign-in-bsloww1-input.patch
===
--- glibc-2.19-fix-sign-in-bsloww1-input.patch  (rev 0)
+++ glibc-2.19-fix-sign-in-bsloww1-input.patch  2014-02-28 22:58:23 UTC (rev 
106353)
@@ -0,0 +1,71 @@
+From ffe768a90912f9bce43b70a82576b3dc99e3121c Mon Sep 17 00:00:00 2001
+From: Siddhesh Poyarekar siddh...@redhat.com
+Date: Thu, 27 Feb 2014 21:29:16 +0530
+Subject: [PATCH] Fix sign of input to bsloww1 (BZ #16623)
+
+In 84ba214c, I removed some redundant sign computations and in the
+process, I incorrectly got rid of a temporary variable, thus passing
+the absolute value of the input to bsloww1.  This caused #16623.
+
+This fix undoes the incorrect change.
+---
+ sysdeps/ieee754/dbl-64/s_sin.c | 16 ++--
+ 3 files changed, 18 insertions(+), 7 deletions(-)
+
+diff --git a/sysdeps/ieee754/dbl-64/s_sin.c b/sysdeps/ieee754/dbl-64/s_sin.c
+index 6105e9f..50109b8 100644
+--- a/sysdeps/ieee754/dbl-64/s_sin.c
 b/sysdeps/ieee754/dbl-64/s_sin.c
+@@ -447,19 +447,21 @@ __sin (double x)
+   }
+ else
+   {
++double t;
+ if (a  0)
+   {
+ m = 1;
++t = a;
+ db = da;
+   }
+ else
+   {
+ m = 0;
+-a = -a;
++t = -a;
+ db = -da;
+   }
+-u.x = big + a;
+-y = a - (u.x - big);
++u.x = big + t;
++y = t - (u.x - big);
+ res = do_sin (u, y, db, cor);
+ cor = (cor  0) ? 1.035 * cor + eps : 1.035 * cor - eps;
+ retval = ((res == res + cor) ? ((m) ? res : -res)
+@@ -671,19 +673,21 @@ __cos (double x)
+   }
+ else
+   {
++double t;
+ if (a  0)
+   {
+ m = 1;
++t = a;
+ db = da;
+   }
+ else
+   {
+ m = 0;
+-a = -a;
++t = -a;
+ db = -da;
+   }
+-u.x = big + a;
+-y = a - (u.x - big);
++u.x = big + t;
++y = t - (u.x - big);
+ res = do_sin (u, y, db, cor);
+ cor = (cor  0) ? 1.035 * cor + eps : 1.035 * cor - eps;
+ retval = ((res == res + cor) ? ((m) ? res : -res)
+-- 
+1.9.0
+



[arch-commits] Commit in lib32-glibc/trunk (2 files)

2014-01-07 Thread Jan Steffens
Date: Tuesday, January 7, 2014 @ 14:27:35
  Author: heftig
Revision: 103537

2.18-12

Added:
  lib32-glibc/trunk/glibc-2.18-xattr-compat-hack.patch
Modified:
  lib32-glibc/trunk/PKGBUILD

+
 PKGBUILD   |   12 +---
 glibc-2.18-xattr-compat-hack.patch |   19 +++
 2 files changed, 28 insertions(+), 3 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2014-01-07 11:49:50 UTC (rev 103536)
+++ PKGBUILD2014-01-07 13:27:35 UTC (rev 103537)
@@ -9,7 +9,7 @@
 _pkgbasename=glibc
 pkgname=lib32-$_pkgbasename
 pkgver=2.18
-pkgrel=11
+pkgrel=12
 pkgdesc=GNU C Library for multilib
 arch=('x86_64')
 url=http://www.gnu.org/software/libc;
@@ -26,6 +26,7 @@
 glibc-2.18-getaddrinfo-assertion.patch
 glibc-2.18-scanf-parse-0e-0.patch
 glibc-2.18-strstr-hackfix.patch
+glibc-2.18-xattr-compat-hack.patch
 lib32-glibc.conf)
 md5sums=('88fbbceafee809e82efd52efa1e3c58f'
  'SKIP'
@@ -38,6 +39,7 @@
  'd4d86add33f22125777e0ecff06bc9bb'
  '01d19fe9b2aea489cf5651530e0369f2'
  '4441f6dfe7d75ced1fa75e54dd21d36e'
+ '7ca96c68a37f2a4ab91792bfa0160a24'
  '6e052f1cb693d5d3203f50f9d4e8c33b')
 
 prepare() {
@@ -69,6 +71,9 @@
 
   # hack fix for strstr issues on x86
   patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
+  
+  # hack fix for {linux,sys}/xattr.h incompatibility
+  patch -p1 -i $srcdir/glibc-2.18-xattr-compat-hack.patch
 
   mkdir ${srcdir}/glibc-build
 }
@@ -148,8 +153,9 @@
   ln -s ../lib/locale $pkgdir/usr/lib32/locale
 
   # remove the static libraries that have a shared counterpart
-  # note: keep libc, libdl, libm, libpthread for binutils testsuite
-  rm $pkgdir/usr/lib32/lib{anl,BrokenLocale,crypt,nsl,resolv,rt,util}.a
+  # libc, libdl, libm and libpthread are required for toolchain testsuites
+  # in addition libcrypt appears widely required
+  rm $pkgdir/usr/lib32/lib{anl,BrokenLocale,nsl,resolv,rt,util}.a
 
   # Do not strip the following files for improved debugging support
   # (improved as in not breaking gdb and valgrind...):

Added: glibc-2.18-xattr-compat-hack.patch
===
--- glibc-2.18-xattr-compat-hack.patch  (rev 0)
+++ glibc-2.18-xattr-compat-hack.patch  2014-01-07 13:27:35 UTC (rev 103537)
@@ -0,0 +1,19 @@
+diff -Naur glibc-2.18-orig/misc/sys/xattr.h glibc-2.18/misc/sys/xattr.h
+--- glibc-2.18-orig/misc/sys/xattr.h   2013-08-11 08:52:55.0 +1000
 glibc-2.18/misc/sys/xattr.h2014-01-07 15:45:50.533969040 +1000
+@@ -26,13 +26,8 @@
+ 
+ /* The following constants should be used for the fifth parameter of
+`*setxattr'.  */
+-enum
+-{
+-  XATTR_CREATE = 1,   /* set value, fail if attr already exists.  */
+-#define XATTR_CREATE  XATTR_CREATE
+-  XATTR_REPLACE = 2   /* set value, fail if attr does not exist.  */
+-#define XATTR_REPLACE XATTR_REPLACE
+-};
++#define XATTR_CREATE  1
++#define XATTR_REPLACE 2
+ 
+ /* Set the attribute NAME of the file pointed to by PATH to VALUE (which
+is SIZE bytes long).  Return 0 on success, -1 for errors.  */



[arch-commits] Commit in lib32-glibc/trunk (2 files)

2013-11-09 Thread Jan Steffens
Date: Saturday, November 9, 2013 @ 16:24:23
  Author: heftig
Revision: 100724

2.18-10

Added:
  lib32-glibc/trunk/glibc-2.18-scanf-parse-0e-0.patch
Modified:
  lib32-glibc/trunk/PKGBUILD

---+
 PKGBUILD  |7 +++
 glibc-2.18-scanf-parse-0e-0.patch |   67 
 2 files changed, 73 insertions(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-11-09 15:11:30 UTC (rev 100723)
+++ PKGBUILD2013-11-09 15:24:23 UTC (rev 100724)
@@ -9,7 +9,7 @@
 _pkgbasename=glibc
 pkgname=lib32-$_pkgbasename
 pkgver=2.18
-pkgrel=9
+pkgrel=10
 pkgdesc=GNU C Library for multilib
 arch=('x86_64')
 url=http://www.gnu.org/software/libc;
@@ -24,6 +24,7 @@
 glibc-2.18-ptr-mangle-CVE-2013-4788.patch
 glibc-2.18-getaddrinfo-CVE-2013-4458.patch
 glibc-2.18-getaddrinfo-assertion.patch
+glibc-2.18-scanf-parse-0e-0.patch
 glibc-2.18-strstr-hackfix.patch
 lib32-glibc.conf)
 md5sums=('88fbbceafee809e82efd52efa1e3c58f'
@@ -35,6 +36,7 @@
  '9749ba386b08a8fe53e7ecede9bf2dfb'
  '71329fccb8eb583fb0d67b55f1e8df68'
  'd4d86add33f22125777e0ecff06bc9bb'
+ '01d19fe9b2aea489cf5651530e0369f2'
  '4441f6dfe7d75ced1fa75e54dd21d36e'
  '6e052f1cb693d5d3203f50f9d4e8c33b')
 
@@ -62,6 +64,9 @@
   # upstream commit 894f3f10
   patch -p1 -i $srcdir/glibc-2.18-getaddrinfo-assertion.patch
 
+  # upstream commit a4966c61
+  patch -p1 -i $srcdir/glibc-2.18-scanf-parse-0e-0.patch
+
   # hack fix for strstr issues on x86
   patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
 

Added: glibc-2.18-scanf-parse-0e-0.patch
===
--- glibc-2.18-scanf-parse-0e-0.patch   (rev 0)
+++ glibc-2.18-scanf-parse-0e-0.patch   2013-11-09 15:24:23 UTC (rev 100724)
@@ -0,0 +1,67 @@
+diff --git a/stdio-common/tst-sscanf.c b/stdio-common/tst-sscanf.c
+index 1edb227..3c34f58 100644
+--- a/stdio-common/tst-sscanf.c
 b/stdio-common/tst-sscanf.c
+@@ -109,6 +109,19 @@ struct test double_tests[] =
+   { L(-inf), L(%g), 1 }
+ };
+ 
++struct test2
++{
++  const CHAR *str;
++  const CHAR *fmt;
++  int retval;
++  char residual;
++} double_tests2[] =
++{
++  { L(0e+0), L(%g%c), 1, 0 },
++  { L(0xe+0), L(%g%c), 2, '+' },
++  { L(0x.e+0), L(%g%c), 2, '+' },
++};
++
+ int
+ main (void)
+ {
+@@ -196,5 +209,26 @@ main (void)
+   }
+ }
+ 
++  for (i = 0; i  sizeof (double_tests2) / sizeof (double_tests2[0]); ++i)
++{
++  double dummy;
++  int ret;
++  char c = 0;
++
++  if ((ret = SSCANF (double_tests2[i].str, double_tests2[i].fmt,
++   dummy, c)) != double_tests2[i].retval)
++  {
++printf (double_tests2[%d] returned %d != %d\n,
++i, ret, double_tests2[i].retval);
++result = 1;
++  }
++  else if (ret == 2  c != double_tests2[i].residual)
++  {
++printf (double_tests2[%d] stopped at '%c' != '%c'\n,
++i, c, double_tests2[i].residual);
++result = 1;
++  }
++}
++
+   return result;
+ }
+diff --git a/stdio-common/vfscanf.c b/stdio-common/vfscanf.c
+index 78dc2fc..e6fa8f3 100644
+--- a/stdio-common/vfscanf.c
 b/stdio-common/vfscanf.c
+@@ -1966,6 +1966,8 @@ _IO_vfscanf_internal (_IO_FILE *s, const char *format, 
_IO_va_list argptr,
+ if (width  0)
+   --width;
+   }
++else
++  got_digit = 1;
+   }
+ 
+ while (1)
+-- 
+1.8.4.2
+



[arch-commits] Commit in lib32-glibc/trunk (2 files)

2013-09-24 Thread Jan Steffens
Date: Tuesday, September 24, 2013 @ 08:48:52
  Author: heftig
Revision: 97548

add CVE patch; 2.18-5

Added:
  lib32-glibc/trunk/glibc-2.18-ptr-mangle-CVE-2013-4788.patch
Modified:
  lib32-glibc/trunk/PKGBUILD

---+
 PKGBUILD  |9 
 glibc-2.18-ptr-mangle-CVE-2013-4788.patch |  485 
 2 files changed, 492 insertions(+), 2 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-09-24 04:06:27 UTC (rev 97547)
+++ PKGBUILD2013-09-24 06:48:52 UTC (rev 97548)
@@ -9,7 +9,7 @@
 _pkgbasename=glibc
 pkgname=lib32-$_pkgbasename
 pkgver=2.18
-pkgrel=4
+pkgrel=5
 pkgdesc=GNU C Library for multilib
 arch=('x86_64')
 url=http://www.gnu.org/software/libc;
@@ -20,6 +20,7 @@
 glibc-2.18-readdir_r-CVE-2013-4237.patch
 glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
 glibc-2.18-strcoll-CVE-2012-4412+4424.patch
+glibc-2.18-ptr-mangle-CVE-2013-4788.patch
 glibc-2.18-strstr-hackfix.patch
 lib32-glibc.conf)
 md5sums=('88fbbceafee809e82efd52efa1e3c58f'
@@ -27,6 +28,7 @@
  '154da6bf5a5248f42a7bf5bf08e01a47'
  'b79561ab9dce900e9bbeaf0d49927c2b'
  'c7264b99d0f7e51922a4d3126182c40a'
+ '9749ba386b08a8fe53e7ecede9bf2dfb'
  '4441f6dfe7d75ced1fa75e54dd21d36e'
  '6e052f1cb693d5d3203f50f9d4e8c33b')
 
@@ -39,11 +41,14 @@
   # upstream commits 1159a193, 55e17aad and b73ed247
   patch -p1 -i $srcdir/glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
 
-  # upstream commit 1326ba1a and two not yet committed patches
+  # upstream commits 1326ba1a, 141f3a77 and 303e567a
   # https://sourceware.org/ml/libc-alpha/2013-08/msg00394.html
   # https://sourceware.org/ml/libc-alpha/2013-08/msg00462.html
   patch -p1 -i $srcdir/glibc-2.18-strcoll-CVE-2012-4412+4424.patch
 
+  # upstream commits c61b4d41 and 0b1f8e35
+  patch -p1 -i $srcdir/glibc-2.18-ptr-mangle-CVE-2013-4788.patch
+
   # hack fix for strstr issues on x86
   patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
 

Added: glibc-2.18-ptr-mangle-CVE-2013-4788.patch
===
--- glibc-2.18-ptr-mangle-CVE-2013-4788.patch   (rev 0)
+++ glibc-2.18-ptr-mangle-CVE-2013-4788.patch   2013-09-24 06:48:52 UTC (rev 
97548)
@@ -0,0 +1,485 @@
+diff --git a/csu/libc-start.c b/csu/libc-start.c
+index e5da3ef..c898d06 100644
+--- a/csu/libc-start.c
 b/csu/libc-start.c
+@@ -37,6 +37,12 @@ extern void __pthread_initialize_minimal (void);
+in thread local area.  */
+ uintptr_t __stack_chk_guard attribute_relro;
+ # endif
++# ifndef  THREAD_SET_POINTER_GUARD
++/* Only exported for architectures that don't store the pointer guard
++   value in thread local area.  */
++uintptr_t __pointer_chk_guard_local
++  attribute_relro attribute_hidden __attribute__ ((nocommon));
++# endif
+ #endif
+ 
+ #ifdef HAVE_PTR_NTHREADS
+@@ -195,6 +201,16 @@ LIBC_START_MAIN (int (*main) (int, char **, char ** 
MAIN_AUXVEC_DECL),
+ # else
+   __stack_chk_guard = stack_chk_guard;
+ # endif
++
++  /* Set up the pointer guard value.  */
++  uintptr_t pointer_chk_guard = _dl_setup_pointer_guard (_dl_random,
++   stack_chk_guard);
++# ifdef THREAD_SET_POINTER_GUARD
++  THREAD_SET_POINTER_GUARD (pointer_chk_guard);
++# else
++  __pointer_chk_guard_local = pointer_chk_guard;
++# endif
++
+ #endif
+ 
+   /* Register the destructor of the dynamic linker if there is any.  */
+diff --git a/elf/Makefile b/elf/Makefile
+index aaa9534..cb8da93 100644
+--- a/elf/Makefile
 b/elf/Makefile
+@@ -121,7 +121,8 @@ endif
+ tests = tst-tls1 tst-tls2 tst-tls9 tst-leaks1 \
+   tst-array1 tst-array2 tst-array3 tst-array4 tst-array5
+ tests-static = tst-tls1-static tst-tls2-static tst-stackguard1-static \
+- tst-leaks1-static tst-array1-static tst-array5-static
++ tst-leaks1-static tst-array1-static tst-array5-static \
++ tst-ptrguard1-static
+ ifeq (yes,$(build-shared))
+ tests-static += tst-tls9-static
+ tst-tls9-static-ENV = \
+@@ -145,7 +146,8 @@ tests += loadtest restest1 preloadtest loadfail multiload 
origtest resolvfail \
+tst-audit1 tst-audit2 tst-audit8 \
+tst-stackguard1 tst-addr1 tst-thrlock \
+tst-unique1 tst-unique2 tst-unique3 tst-unique4 \
+-   tst-initorder tst-initorder2 tst-relsort1 tst-null-argv
++   tst-initorder tst-initorder2 tst-relsort1 tst-null-argv \
++   tst-ptrguard1
+ #  reldep9
+ test-srcs = tst-pathopt
+ selinux-enabled := $(shell cat /selinux/enforce 2 /dev/null)
+@@ -1016,6 +1018,9 @@ LDFLAGS-order2mod2.so = $(no-as-needed)
+ tst-stackguard1-ARGS = --command $(host-test-program-cmd) --child
+ tst-stackguard1-static-ARGS = --command $(objpfx)tst-stackguard1-static 
--child
+ 
++tst-ptrguard1-ARGS = --command $(host-test-program-cmd) --child