Bug#647084: libc6-dev: strcpy and others improperly inlined, turns them into infinite loops

2011-10-30 Thread Tuomas Tynkkynen
Package: libc6-dev
Version: 2.13-21
Severity: important

Compiling the following with gcc -std=c99 -Os -D_FORTIFY_SOURCE=2 results in a
binary that hangs in an infinite loop in strcpy():

#include argp.h
#include string.h

int main (void) {
char buf[1024];
char* str = hello;
strcpy (buf, str);
return 0;
}

The argp.h include then causes the following definition for strcpy:
extern __inline char *
 strcpy (char *__restrict __dest, const char *__restrict __src)
{
   return __builtin___strcpy_chk (__dest, __src, __builtin_object_size (__dest,
   2  1));
}
which is incorrect according to the gcc guys:
--- Comment #1 from Richard Guenther rguenth at gcc dot gnu.org 2011-10-30 
09:12:28 UTC ---
extern __inline char *
 strcpy (char *__restrict __dest, const char *__restrict __src)

 this should be marked with __attribute__((gnu_inline)), otherwise
 it won't work with -std=c99.  GCC fix-includes glibc headers for this,
 so this is a packaging bug on the debian side, please file it there.
(http://gcc.gnu.org/bugzilla/show_bug.cgi?id=50916)

-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (600, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 3.0.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=fi_FI.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libc6-dev depends on:
ii  libc-dev-bin2.13-21
ii  libc6   2.13-21
ii  linux-libc-dev  3.0.0-5

Versions of packages libc6-dev recommends:
ii  gcc [c-compiler]  4:4.6.1-3
ii  gcc-4.4 [c-compiler]  4.4.6-11 
ii  gcc-4.5 [c-compiler]  4.5.3-9  
ii  gcc-4.6 [c-compiler]  4.6.2-2  

Versions of packages libc6-dev suggests:
ii  glibc-doc none  
ii  manpages-dev  3.32-0.2

-- no debconf information



-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20111030101139.7065.38370.reportbug@laptop.dezgeg



Bug#647064: marked as done (tzdata-java: Depends: tzdata (= 2011k-0squeeze1) but 2011m-0squeeze1 is installed)

2011-10-30 Thread Debian Bug Tracking System
Your message dated Sun, 30 Oct 2011 15:41:01 +0100
with message-id 20111030144101.ge31...@hall.aurel32.net
and subject line Re: Bug#647064: Acknowledgement (tzdata-java: Depends: tzdata 
(= 2011k-0squeeze1) but 2011m-0squeeze1 is installed)
has caused the Debian Bug report #647064,
regarding tzdata-java: Depends: tzdata (= 2011k-0squeeze1) but 2011m-0squeeze1 
is installed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
647064: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=647064
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
---BeginMessage---
Package: tzdata-java
Version: 2011k-0squeeze1
Severity: important

tzdata-java has a dependency on tzdata (= 2011k-0squeeze1) and does not
recognize a newer version of tzdata (2011m-0squeeze1) installed on the system.

This is a showstopper and prevents user to install any package that depends on
tzdata-java. For instance:

# aptitude install openoffice.org2-writer

The following packages have unmet dependencies:
  tzdata-java: Depends: tzdata (= 2011k-0squeeze1) but 2011m-0squeeze1 is
installed.



-- System Information:
Debian Release: 6.0.3
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


---End Message---
---BeginMessage---
On Sun, Oct 30, 2011 at 03:14:11AM -0200, Murilo Opsfelder Araujo wrote:
 A quick search brought me this page
 
 http://lists.debian.org/debian-volatile-announce/2011/msg0.html
 
 I've added stable-updates repository and it worked.
 
 Please ignore this bug report. Mea culpa.
 

Closing the bug.

-- 
Aurelien Jarno  GPG: 1024D/F1BCDB73
aurel...@aurel32.net http://www.aurel32.net

---End Message---


r5015 - in glibc-package/trunk/debian: . patches patches/any

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 15:11:57 + (Sun, 30 Oct 2011)
New Revision: 5015

Added:
   glibc-package/trunk/debian/patches/any/cvs-nptl-pthread-race.diff
Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/series
Log:
  * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
sometimes causes a deadlock when calling fork() from a thread.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-28 23:51:54 UTC (rev 
5014)
+++ glibc-package/trunk/debian/changelog2011-10-30 15:11:57 UTC (rev 
5015)
@@ -4,6 +4,8 @@
   * patches/i386/local-cpuid-level2.diff: fix a typo.  Closes: #609389.
   * Don't ship /usr/share/doc/locales/README.  Closes: #643885, #643887.
   * Ignore tst-cancelx17.out error on amd64.  Closes: #643567.
+  * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
+sometimes causes a deadlock when calling fork() from a thread.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Added: glibc-package/trunk/debian/patches/any/cvs-nptl-pthread-race.diff
===
--- glibc-package/trunk/debian/patches/any/cvs-nptl-pthread-race.diff   
(rev 0)
+++ glibc-package/trunk/debian/patches/any/cvs-nptl-pthread-race.diff   
2011-10-30 15:11:57 UTC (rev 5015)
@@ -0,0 +1,167 @@
+2011-09-15  Andreas Schwab  sch...@redhat.com
+
+   * sysdeps/pthread/list.h: Define only list_t if __need_list_t is
+   defined.
+   (list_add): Add atomic_write_barrier.
+   * descr.h: Define __need_list_t before including list.h.
+   * nptl-init.c: Include list.h
+   * allocatestack.c: Likewise.
+
+---
+ nptl/allocatestack.c|1 +
+ nptl/descr.h|1 +
+ nptl/nptl-init.c|1 +
+ nptl/sysdeps/pthread/list.h |   31 +++
+ nptl_db/ChangeLog   |4 
+ nptl_db/thread_dbP.h|3 ++-
+ 6 files changed, 32 insertions(+), 9 deletions(-)
+
+--- a/nptl/allocatestack.c
 b/nptl/allocatestack.c
+@@ -27,6 +27,7 @@
+ #include sys/param.h
+ #include dl-sysdep.h
+ #include tls.h
++#include list.h
+ #include lowlevellock.h
+ #include kernel-features.h
+ 
+--- a/nptl/descr.h
 b/nptl/descr.h
+@@ -26,6 +26,7 @@
+ #include stdbool.h
+ #include sys/types.h
+ #include hp-timing.h
++#define __need_list_t
+ #include list.h
+ #include lowlevellock.h
+ #include pthreaddef.h
+--- a/nptl/nptl-init.c
 b/nptl/nptl-init.c
+@@ -29,6 +29,7 @@
+ #include atomic.h
+ #include ldsodefs.h
+ #include tls.h
++#include list.h
+ #include fork.h
+ #include version.h
+ #include shlib-compat.h
+--- a/nptl/sysdeps/pthread/list.h
 b/nptl/sysdeps/pthread/list.h
+@@ -1,4 +1,4 @@
+-/* Copyright (C) 2002, 2009 Free Software Foundation, Inc.
++/* Copyright (C) 2002, 2009, 2011 Free Software Foundation, Inc.
+This file is part of the GNU C Library.
+Contributed by Ulrich Drepper drep...@redhat.com, 2002.
+ 
+@@ -18,27 +18,39 @@
+02111-1307 USA.  */
+ 
+ #ifndef _LIST_H
+-#define _LIST_H   1
++
++#ifndef __need_list_t
++# define _LIST_H  1
++#endif
+ 
+ /* The definitions of this file are adopted from those which can be
+found in the Linux kernel headers to enable people familiar with
+the latter find their way in these sources as well.  */
+ 
+ 
++#if defined __need_list_t || defined _LIST_H
++# ifndef __list_t_defined
++#  define __list_t_defined
+ /* Basic type for the double-link list.  */
+ typedef struct list_head
+ {
+   struct list_head *next;
+   struct list_head *prev;
+ } list_t;
++# endif
++# undef __need_list_t
++#endif
++
++#ifdef _LIST_H
+ 
++# include atomic.h
+ 
+ /* Define a variable with the head and tail of the list.  */
+-#define LIST_HEAD(name) \
++# define LIST_HEAD(name) \
+   list_t name = { (name), (name) }
+ 
+ /* Initialize a new list head.  */
+-#define INIT_LIST_HEAD(ptr) \
++# define INIT_LIST_HEAD(ptr) \
+   (ptr)-next = (ptr)-prev = (ptr)
+ 
+ 
+@@ -49,6 +61,7 @@
+   newp-next = head-next;
+   newp-prev = head;
+   head-next-prev = newp;
++  atomic_write_barrier ();
+   head-next = newp;
+ }
+ 
+@@ -78,26 +91,28 @@
+ 
+ 
+ /* Get typed element from list at a given position.  */
+-#define list_entry(ptr, type, member) \
++# define list_entry(ptr, type, member) \
+   ((type *) ((char *) (ptr) - (unsigned long) (((type *) 0)-member)))
+ 
+ 
+ 
+ /* Iterate forward over the elements of the list.  */
+-#define list_for_each(pos, head) \
++# define list_for_each(pos, head) \
+   for (pos = (head)-next; pos != (head); pos = pos-next)
+ 
+ 
+ /* Iterate forward over the elements of the list.  */
+-#define list_for_each_prev(pos, head) \
++# define list_for_each_prev(pos, head) \
+   for (pos = (head)-prev; pos != (head); pos = pos-prev)
+ 
+ 
+ /* Iterate backwards over 

r5016 - in glibc-package/branches/glibc-branch-squeeze/debian: . patches patches/any

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 15:14:02 + (Sun, 30 Oct 2011)
New Revision: 5016

Added:
   
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-nptl-pthread-race.diff
Modified:
   glibc-package/branches/glibc-branch-squeeze/debian/changelog
   glibc-package/branches/glibc-branch-squeeze/debian/patches/series
Log:
  * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
sometimes causes a deadlock when calling fork() from a thread.



Modified: glibc-package/branches/glibc-branch-squeeze/debian/changelog
===
--- glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 15:11:57 UTC (rev 5015)
+++ glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 15:14:02 UTC (rev 5016)
@@ -48,6 +48,8 @@
 fix issues with dl_close() when resolving locally-defined symbols.
 Closes: #625250.
   * patches/i386/local-cpuid-level2.diff: fix a typo.  Closes: #609389.
+  * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
+sometimes causes a deadlock when calling fork() from a thread.
 
  -- Aurelien Jarno aure...@debian.org  Sat, 11 Jun 2011 18:12:35 +0200
 

Added: 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-nptl-pthread-race.diff
===
--- 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-nptl-pthread-race.diff
   (rev 0)
+++ 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-nptl-pthread-race.diff
   2011-10-30 15:14:02 UTC (rev 5016)
@@ -0,0 +1,167 @@
+2011-09-15  Andreas Schwab  sch...@redhat.com
+
+   * sysdeps/pthread/list.h: Define only list_t if __need_list_t is
+   defined.
+   (list_add): Add atomic_write_barrier.
+   * descr.h: Define __need_list_t before including list.h.
+   * nptl-init.c: Include list.h
+   * allocatestack.c: Likewise.
+
+---
+ nptl/allocatestack.c|1 +
+ nptl/descr.h|1 +
+ nptl/nptl-init.c|1 +
+ nptl/sysdeps/pthread/list.h |   31 +++
+ nptl_db/ChangeLog   |4 
+ nptl_db/thread_dbP.h|3 ++-
+ 6 files changed, 32 insertions(+), 9 deletions(-)
+
+--- a/nptl/allocatestack.c
 b/nptl/allocatestack.c
+@@ -27,6 +27,7 @@
+ #include sys/param.h
+ #include dl-sysdep.h
+ #include tls.h
++#include list.h
+ #include lowlevellock.h
+ #include kernel-features.h
+ 
+--- a/nptl/descr.h
 b/nptl/descr.h
+@@ -26,6 +26,7 @@
+ #include stdbool.h
+ #include sys/types.h
+ #include hp-timing.h
++#define __need_list_t
+ #include list.h
+ #include lowlevellock.h
+ #include pthreaddef.h
+--- a/nptl/nptl-init.c
 b/nptl/nptl-init.c
+@@ -29,6 +29,7 @@
+ #include atomic.h
+ #include ldsodefs.h
+ #include tls.h
++#include list.h
+ #include fork.h
+ #include version.h
+ #include shlib-compat.h
+--- a/nptl/sysdeps/pthread/list.h
 b/nptl/sysdeps/pthread/list.h
+@@ -1,4 +1,4 @@
+-/* Copyright (C) 2002, 2009 Free Software Foundation, Inc.
++/* Copyright (C) 2002, 2009, 2011 Free Software Foundation, Inc.
+This file is part of the GNU C Library.
+Contributed by Ulrich Drepper drep...@redhat.com, 2002.
+ 
+@@ -18,27 +18,39 @@
+02111-1307 USA.  */
+ 
+ #ifndef _LIST_H
+-#define _LIST_H   1
++
++#ifndef __need_list_t
++# define _LIST_H  1
++#endif
+ 
+ /* The definitions of this file are adopted from those which can be
+found in the Linux kernel headers to enable people familiar with
+the latter find their way in these sources as well.  */
+ 
+ 
++#if defined __need_list_t || defined _LIST_H
++# ifndef __list_t_defined
++#  define __list_t_defined
+ /* Basic type for the double-link list.  */
+ typedef struct list_head
+ {
+   struct list_head *next;
+   struct list_head *prev;
+ } list_t;
++# endif
++# undef __need_list_t
++#endif
++
++#ifdef _LIST_H
+ 
++# include atomic.h
+ 
+ /* Define a variable with the head and tail of the list.  */
+-#define LIST_HEAD(name) \
++# define LIST_HEAD(name) \
+   list_t name = { (name), (name) }
+ 
+ /* Initialize a new list head.  */
+-#define INIT_LIST_HEAD(ptr) \
++# define INIT_LIST_HEAD(ptr) \
+   (ptr)-next = (ptr)-prev = (ptr)
+ 
+ 
+@@ -49,6 +61,7 @@
+   newp-next = head-next;
+   newp-prev = head;
+   head-next-prev = newp;
++  atomic_write_barrier ();
+   head-next = newp;
+ }
+ 
+@@ -78,26 +91,28 @@
+ 
+ 
+ /* Get typed element from list at a given position.  */
+-#define list_entry(ptr, type, member) \
++# define list_entry(ptr, type, member) \
+   ((type *) ((char *) (ptr) - (unsigned long) (((type *) 0)-member)))
+ 
+ 
+ 
+ /* Iterate forward over the elements of the list.  */
+-#define list_for_each(pos, head) \
++# define list_for_each(pos, head) \
+   for (pos = (head)-next; pos != (head); pos = pos-next)
+ 
+ 
+ /* Iterate forward over the elements of the list.  */
+-#define 

Processed: tagging 644990

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 644990 + pending
Bug #644990 [libc6] NEWS.Debian.gz: s/$arch/triplet
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
644990: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644990
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13199895354542.transcr...@bugs.debian.org



r5017 - in glibc-package/trunk/debian: . debhelper.in

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 15:45:27 + (Sun, 30 Oct 2011)
New Revision: 5017

Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/debhelper.in/libc.NEWS
Log:
  * debhelper/libc.NEWS: replace $arch by triplet and explain how to get
it.  Closes: #644990.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 15:14:02 UTC (rev 
5016)
+++ glibc-package/trunk/debian/changelog2011-10-30 15:45:27 UTC (rev 
5017)
@@ -6,6 +6,8 @@
   * Ignore tst-cancelx17.out error on amd64.  Closes: #643567.
   * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
 sometimes causes a deadlock when calling fork() from a thread.
+  * debhelper/libc.NEWS: replace $arch by triplet and explain how to get
+it.  Closes: #644990.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Modified: glibc-package/trunk/debian/debhelper.in/libc.NEWS
===
--- glibc-package/trunk/debian/debhelper.in/libc.NEWS   2011-10-30 15:14:02 UTC 
(rev 5016)
+++ glibc-package/trunk/debian/debhelper.in/libc.NEWS   2011-10-30 15:45:27 UTC 
(rev 5017)
@@ -1,9 +1,11 @@
 eglibc (2.13-17) unstable; urgency=low
 
   Starting with the eglibc package version 2.13-5, the libraries are 
-  shipped in the multiarch directory /lib/$arch instead of the more
-  traditional /lib. Similarly the includes are now shipped in 
-  /usr/include/$arch instead of the more traditional /usr/include.
+  shipped in the multiarch directory /lib/triplet instead of the more
+  traditional /lib, where triplet is the multiarch triplet and can be
+  retrieved with 'dpkg-architecture -qDEB_HOST_MULTIARCH'. Similarly the
+  includes are now shipped in /usr/include/triplet instead of the more
+  traditional /usr/include.
   
   The toolchain in Debian has been updated to cope with that, and most
   build systems should be unaffected. If you are using a non-Debian 
@@ -11,7 +13,7 @@
   multiarch, you might try to pass the following option to your 
   compiler:
 
--B/usr/lib/$arch -I/usr/include/$arch
+-B/usr/lib/triplet -I/usr/include/triplet
 
  -- Aurelien Jarno aure...@debian.org  Tue, 09 Aug 2011 19:58:28 +0200 
 


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rkxzg-0005u6...@vasks.debian.org



Processed: tagging 641868

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 641868 + pending
Bug #641868 [libc6.1] alpha: fallocate() in libc6.1 but no declaration in 
fcntl.h
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
641868: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=641868
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999116313364.transcr...@bugs.debian.org



Bug#644662: Fails to build if GCC does not have libssp support

2011-10-30 Thread Aurelien Jarno
tag 644662 + moreinfo
thanks

On Fri, Oct 07, 2011 at 06:12:48PM -0400, Kyle Moffett wrote:
 Source: eglibc
 Version: 2.13-21
 Severity: normal
 Tags: upstream patch
 
 The attached patch fixes detection of GCC -fstack-protector and libssp.
 
 In order to properly detect whether or not GCC has -fstack-protect
 support built in, you actually need to link something.  Otherwise
 GCC will accept the option and fail during the link due to missing
 libssp.

This looks like a broken GCC. Either -fstack-protector support so that
the option is disabled (or rather returns a warning, but catched by the
configure script), or libssp should be installed properly.


 This occurs in particular when trying to bootstrap a cross-compiler for
 a new Debian port; the stage2 cross-compiler does not have libssp
 support causing undefined reference to `__stack_chk_guard' errors
 when building EGLIBC.
 

If it doesn't have libssp, wouldn't it be possible to disable the stack
protector option?

-- 
Aurelien Jarno  GPG: 1024D/F1BCDB73
aurel...@aurel32.net http://www.aurel32.net



-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111030162120.gf31...@hall.aurel32.net



Processed: Re: Bug#644662: Fails to build if GCC does not have libssp support

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tag 644662 + moreinfo
Bug #644662 [src:eglibc] Fails to build if GCC does not have libssp support
Added tag(s) moreinfo.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
644662: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644662
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999168715635.transcr...@bugs.debian.org



r5018 - in glibc-package/trunk/debian: . patches patches/alpha

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 16:12:35 + (Sun, 30 Oct 2011)
New Revision: 5018

Added:
   glibc-package/trunk/debian/patches/alpha/submitted-fallocated.diff
Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/series
Log:
  * Add patches/alpha/submitted-fallocated.diff to define fallocate() in
fcntl.h on alpha.  Closes: #641868.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 15:45:27 UTC (rev 
5017)
+++ glibc-package/trunk/debian/changelog2011-10-30 16:12:35 UTC (rev 
5018)
@@ -8,6 +8,8 @@
 sometimes causes a deadlock when calling fork() from a thread.
   * debhelper/libc.NEWS: replace $arch by triplet and explain how to get
 it.  Closes: #644990.
+  * Add patches/alpha/submitted-fallocated.diff to define fallocate() in
+fcntl.h on alpha.  Closes: #641868.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Added: glibc-package/trunk/debian/patches/alpha/submitted-fallocated.diff
===
--- glibc-package/trunk/debian/patches/alpha/submitted-fallocated.diff  
(rev 0)
+++ glibc-package/trunk/debian/patches/alpha/submitted-fallocated.diff  
2011-10-30 16:12:35 UTC (rev 5018)
@@ -0,0 +1,40 @@
+From e23765440e54566ed86469e1ba4899160a73cfb1 Mon Sep 17 00:00:00 2001
+From: Michael Cree mc...@orcon.net.nz
+Date: Sat, 17 Sep 2011 17:45:37 +1200
+Subject: [PATCH] Alpha: add fallocate declaration to fcntl.h
+
+---
+ ports/sysdeps/unix/sysv/linux/alpha/bits/fcntl.h |   17 +
+ 1 files changed, 17 insertions(+), 0 deletions(-)
+
+diff --git a/ports/sysdeps/unix/sysv/linux/alpha/bits/fcntl.h 
b/ports/sysdeps/unix/sysv/linux/alpha/bits/fcntl.h
+index e5e726b..7d10249 100644
+--- a/ports/sysdeps/unix/sysv/linux/alpha/bits/fcntl.h
 b/ports/sysdeps/unix/sysv/linux/alpha/bits/fcntl.h
+@@ -252,6 +252,23 @@ extern ssize_t splice (int __fdin, __off64_t *__offin, 
int __fdout,
+ extern ssize_t tee (int __fdin, int __fdout, size_t __len,
+   unsigned int __flags);
+ 
++/* Reserve storage for the data of the file associated with FD. */
++# ifndef __USE_FILE_OFFSET64
++extern int fallocate (int __fd, int __mode, __off_t __offset, __off_t __len);
++# else
++#  ifdef __REDIRECT
++extern int __REDIRECT (fallocate, (int __fd, int __mode, __off64_t __offset,
++   __off64_t __len),
++   fallocate64);
++#  else
++#   define fallocate fallocate64
++#  endif
++# endif
++# ifdef __USE_LARGEFILE64
++extern int fallocate64 (int __fd, int __mode, __off64_t __offset,
++__off64_t __len);
++# endif
++
+ #endif
+ 
+ __END_DECLS
+-- 
+1.7.4.3
+

Modified: glibc-package/trunk/debian/patches/series
===
--- glibc-package/trunk/debian/patches/series   2011-10-30 15:45:27 UTC (rev 
5017)
+++ glibc-package/trunk/debian/patches/series   2011-10-30 16:12:35 UTC (rev 
5018)
@@ -63,6 +63,7 @@
 alpha/local-strncmp.diff
 alpha/submitted-sysconf-cache.diff
 alpha/submitted-statfs64.patch
+alpha/submitted-fallocated.diff
 
 amd64/local-biarch.diff
 amd64/local-clone.diff


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rkxzw-0006gw...@vasks.debian.org



r5019 - glibc-package/trunk/debian

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 16:13:19 + (Sun, 30 Oct 2011)
New Revision: 5019

Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/rules
Log:
  * debian/rules: don't build locales-all when cross-compiling.  Closes:
#644771.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 16:12:35 UTC (rev 
5018)
+++ glibc-package/trunk/debian/changelog2011-10-30 16:13:19 UTC (rev 
5019)
@@ -10,6 +10,8 @@
 it.  Closes: #644990.
   * Add patches/alpha/submitted-fallocated.diff to define fallocate() in
 fcntl.h on alpha.  Closes: #641868.
+  * debian/rules: don't build locales-all when cross-compiling.  Closes:
+#644771.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Modified: glibc-package/trunk/debian/rules
===
--- glibc-package/trunk/debian/rules2011-10-30 16:12:35 UTC (rev 5018)
+++ glibc-package/trunk/debian/rules2011-10-30 16:13:19 UTC (rev 5019)
@@ -127,10 +127,15 @@
 # Which build pass are we on?
 curpass = $(filter-out %_,$(subst _,_ ,$@))
 
-DEB_ARCH_REGULAR_PACKAGES = $(libc) $(libc)-dev $(libc)-dbg $(libc)-prof 
$(libc)-pic libc-bin libc-dev-bin locales-all multiarch-support
+DEB_ARCH_REGULAR_PACKAGES = $(libc) $(libc)-dev $(libc)-dbg $(libc)-prof 
$(libc)-pic libc-bin libc-dev-bin multiarch-support
 DEB_INDEP_REGULAR_PACKAGES = glibc-doc eglibc-source locales
 DEB_UDEB_PACKAGES = $(libc)-udeb libnss-dns-udeb libnss-files-udeb
 
+## Locales can only be pre-generated during native compiles
+ifeq ($(DEB_HOST_ARCH),$(DEB_BUILD_ARCH))
+DEB_ARCH_REGULAR_PACKAGES += locales-all
+endif
+
 # Generic kernel version check
 define kernel_check
 (if [ $(CURRENT_KERNEL_VERSION) -lt $(1) ]; then \


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rky0d-0006l1...@vasks.debian.org



Bug#646918: /usr/include/sys/nlist_aout.h:51: error: redefinition of ���struct nlist’

2011-10-30 Thread Aurelien Jarno
reassign 646918 kfreebsd-kernel-headers
thanks

On Fri, Oct 28, 2011 at 01:40:30PM +0200, Robert Millan wrote:
 Package: libc0.1-dev
 Version: 2.11.2-10
 Severity: normal
 
 The following code compiles on FreeBSD but not on Debian GNU/kFreeBSD:
 
 #include a.out.h
 #include sys/nlist_aout.h
 
 main ()
 {
   struct nlist nl;
   nl.n_un.n_strx = 0;
 }
 
 It appears there are conflicting definitions of struct nlist, one of them in
 libc-dev and the other in kfreebsd-kernel-headers:
 
 $ gcc /tmp/test.c -o /tmp/test
 In file included from /tmp/test.c:2:
 /usr/include/sys/nlist_aout.h:51: error: redefinition of ??struct nlist??
 /tmp/test.c: In function ??main??:
 /tmp/test.c:7: error: ??struct nlist?? has no member named ??n_un??
 

It compiles fine on plain FreeBSD because sys/nlist_aout.h checks if
a.out.h has been included before and defines the structure differently
in that case.

sys/nlist_aout.h has to be modified for GNU/kFreeBSD, that is by 
checking for __A_OUT_GNU_H__ instead of _AOUT_INCLUDE_ and by defining
the first part of the structure the same way as in the GNU libc (that is
by using a transparent union).

I am therefore reassigning the bug to kfreebsd-kernel-headers.

-- 
Aurelien Jarno  GPG: 1024D/F1BCDB73
aurel...@aurel32.net http://www.aurel32.net



-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111030164458.gg31...@hall.aurel32.net



Processed: Re: Bug#646918: /usr/include/sys/nlist_aout.h:51: error: redefinition of ���struct nlist’

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 reassign 646918 kfreebsd-kernel-headers
Bug #646918 [libc0.1-dev] /usr/include/sys/nlist_aout.h:51: error: redefinition 
of ‘struct nlist’
Bug reassigned from package 'libc0.1-dev' to 'kfreebsd-kernel-headers'.
Bug No longer marked as found in versions eglibc/2.11.2-10.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646918: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646918
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999310122624.transcr...@bugs.debian.org



Processed: tagging 646549

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 646549 + pending
Bug #646549 [libc6] libc6: Invalid instruction in _dl_x86_64_save_sse on 
processor that supports AVX
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646549: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646549
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999418928266.transcr...@bugs.debian.org



Processed: tagging 646549

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 646549 + pending
Bug #646549 [libc6] libc6: Invalid instruction in _dl_x86_64_save_sse on 
processor that supports AVX
Ignoring request to alter tags of bug #646549 to the same tags previously set
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646549: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646549
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999434429031.transcr...@bugs.debian.org



r5020 - in glibc-package/trunk/debian: . patches patches/amd64

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 17:03:00 + (Sun, 30 Oct 2011)
New Revision: 5020

Added:
   glibc-package/trunk/debian/patches/amd64/cvs-avx-detection.diff
Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/series
Log:
  * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
is present, but not enabled in the kernel.  Closes: #646549.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 16:13:19 UTC (rev 
5019)
+++ glibc-package/trunk/debian/changelog2011-10-30 17:03:00 UTC (rev 
5020)
@@ -12,6 +12,8 @@
 fcntl.h on alpha.  Closes: #641868.
   * debian/rules: don't build locales-all when cross-compiling.  Closes:
 #644771.
+  * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
+is present, but not enabled in the kernel.  Closes: #646549.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Added: glibc-package/trunk/debian/patches/amd64/cvs-avx-detection.diff
===
--- glibc-package/trunk/debian/patches/amd64/cvs-avx-detection.diff 
(rev 0)
+++ glibc-package/trunk/debian/patches/amd64/cvs-avx-detection.diff 
2011-10-30 17:03:00 UTC (rev 5020)
@@ -0,0 +1,164 @@
+2011-07-23  Ulrich Drepper  drep...@gmail.com
+
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix one more
+   typo.
+   (_dl_x86_64_save_sse): Likewise.
+
+2011-07-22  Ulrich Drepper  drep...@gmail.com
+ 
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix test for
+   OSXSAVE.
+   (_dl_x86_64_save_sse): Likewise.
+
+2011-07-21  Andreas Schwab  sch...@redhat.com
+
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix last
+   change.
+   (_dl_x86_64_save_sse): Use correct AVX check.
+
+2011-07-20  Ulrich Drepper  drep...@gmail.com
+ 
+   [BZ #13007]
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): More complete
+   check for AVX enablement so that we don't crash with old kernels and
+   new hardware.
+   * elf/tst-audit4.c: Add same checks here.
+   * elf/tst-audit6.c: Likewise.
+
+---
+ elf/tst-audit4.c   |   22 ++
+ elf/tst-audit6.c   |   22 ++
+ sysdeps/x86_64/dl-trampoline.S |   36 +++-
+ 3 files changed, 63 insertions(+), 17 deletions(-)
+
+--- a/elf/tst-audit4.c
 b/elf/tst-audit4.c
+@@ -6,16 +6,30 @@
+ #include cpuid.h
+ #include immintrin.h
+ 
++
++static int
++avx_enabled (void)
++{
++  unsigned int eax, ebx, ecx, edx;
++
++  if (__get_cpuid (1, eax, ebx, ecx, edx) == 0
++  || (ecx  (bit_AVX | bit_OSXSAVE)) != (bit_AVX | bit_OSXSAVE))
++return 0;
++
++  /* Check the OS has AVX and SSE saving enabled.  */
++  asm (xgetbv : =a (eax), =d (edx) : c (0));
++
++  return (eax  6) == 6;
++}
++
++
+ extern __m256i audit_test (__m256i, __m256i, __m256i, __m256i,
+  __m256i, __m256i, __m256i, __m256i);
+ int
+ main (void)
+ {
+-  unsigned int eax, ebx, ecx, edx;
+-
+   /* Run AVX test only if AVX is supported.  */
+-  if (__get_cpuid (1, eax, ebx, ecx, edx)
+-   (ecx  bit_AVX))
++  if (avx_enabled ())
+ {
+   __m256i ymm = _mm256_setzero_si256 ();
+   __m256i ret = audit_test (ymm, ymm, ymm, ymm, ymm, ymm, ymm, ymm);
+--- a/elf/tst-audit6.c
 b/elf/tst-audit6.c
+@@ -9,14 +9,28 @@
+ extern __m128i audit_test (__m128i, __m128i, __m128i, __m128i,
+  __m128i, __m128i, __m128i, __m128i);
+ 
+-int
+-main (void)
++
++static int
++avx_enabled (void)
+ {
+   unsigned int eax, ebx, ecx, edx;
+ 
++  if (__get_cpuid (1, eax, ebx, ecx, edx) == 0
++  || (ecx  (bit_AVX | bit_OSXSAVE)) != (bit_AVX | bit_OSXSAVE))
++return 0;
++
++  /* Check the OS has AVX and SSE saving enabled.  */
++  asm (xgetbv : =a (eax), =d (edx) : c (0));
++
++  return (eax  6) == 6;
++}
++
++
++int
++main (void)
++{
+   /* Run AVX test only if AVX is supported.  */
+-  if (__get_cpuid (1, eax, ebx, ecx, edx)
+-   (ecx  bit_AVX))
++  if (avx_enabled ())
+ {
+   __m128i xmm = _mm_setzero_si128 ();
+   __m128i ret = audit_test (xmm, xmm, xmm, xmm, xmm, xmm, xmm, xmm);
+--- a/sysdeps/x86_64/dl-trampoline.S
 b/sysdeps/x86_64/dl-trampoline.S
+@@ -1,5 +1,5 @@
+ /* PLT trampolines.  x86-64 version.
+-   Copyright (C) 2004, 2005, 2007, 2009 Free Software Foundation, Inc.
++   Copyright (C) 2004, 2005, 2007, 2009, 2011 Free Software Foundation, Inc.
+This file is part of the GNU C Library.
+ 
+The GNU C Library is free software; you can redistribute it and/or
+@@ -139,11 +139,20 @@
+   movl$1, %eax
+   cpuid
+   movq%r11,%rbx   # Restore rbx
+-  movl$1, %eax
+-  testl   $(1  

r5021 - in glibc-package/branches/glibc-branch-squeeze/debian: . patches patches/amd64

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 17:05:36 + (Sun, 30 Oct 2011)
New Revision: 5021

Added:
   
glibc-package/branches/glibc-branch-squeeze/debian/patches/amd64/cvs-avx-detection.diff
Modified:
   glibc-package/branches/glibc-branch-squeeze/debian/changelog
   glibc-package/branches/glibc-branch-squeeze/debian/patches/series
Log:
  * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
is present, but not enabled in the kernel.  Closes: #646549.



Modified: glibc-package/branches/glibc-branch-squeeze/debian/changelog
===
--- glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 17:03:00 UTC (rev 5020)
+++ glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 17:05:36 UTC (rev 5021)
@@ -50,6 +50,8 @@
   * patches/i386/local-cpuid-level2.diff: fix a typo.  Closes: #609389.
   * patches/any/cvs-nptl-pthread-race.diff: fix a race in NPTL code that
 sometimes causes a deadlock when calling fork() from a thread.
+  * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
+is present, but not enabled in the kernel.  Closes: #646549.
 
  -- Aurelien Jarno aure...@debian.org  Sat, 11 Jun 2011 18:12:35 +0200
 

Added: 
glibc-package/branches/glibc-branch-squeeze/debian/patches/amd64/cvs-avx-detection.diff
===
--- 
glibc-package/branches/glibc-branch-squeeze/debian/patches/amd64/cvs-avx-detection.diff
 (rev 0)
+++ 
glibc-package/branches/glibc-branch-squeeze/debian/patches/amd64/cvs-avx-detection.diff
 2011-10-30 17:05:36 UTC (rev 5021)
@@ -0,0 +1,164 @@
+2011-07-23  Ulrich Drepper  drep...@gmail.com
+
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix one more
+   typo.
+   (_dl_x86_64_save_sse): Likewise.
+
+2011-07-22  Ulrich Drepper  drep...@gmail.com
+ 
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix test for
+   OSXSAVE.
+   (_dl_x86_64_save_sse): Likewise.
+
+2011-07-21  Andreas Schwab  sch...@redhat.com
+
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): Fix last
+   change.
+   (_dl_x86_64_save_sse): Use correct AVX check.
+
+2011-07-20  Ulrich Drepper  drep...@gmail.com
+ 
+   [BZ #13007]
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_profile): More complete
+   check for AVX enablement so that we don't crash with old kernels and
+   new hardware.
+   * elf/tst-audit4.c: Add same checks here.
+   * elf/tst-audit6.c: Likewise.
+
+---
+ elf/tst-audit4.c   |   22 ++
+ elf/tst-audit6.c   |   22 ++
+ sysdeps/x86_64/dl-trampoline.S |   36 +++-
+ 3 files changed, 63 insertions(+), 17 deletions(-)
+
+--- a/elf/tst-audit4.c
 b/elf/tst-audit4.c
+@@ -6,16 +6,30 @@
+ #include cpuid.h
+ #include immintrin.h
+ 
++
++static int
++avx_enabled (void)
++{
++  unsigned int eax, ebx, ecx, edx;
++
++  if (__get_cpuid (1, eax, ebx, ecx, edx) == 0
++  || (ecx  (bit_AVX | bit_OSXSAVE)) != (bit_AVX | bit_OSXSAVE))
++return 0;
++
++  /* Check the OS has AVX and SSE saving enabled.  */
++  asm (xgetbv : =a (eax), =d (edx) : c (0));
++
++  return (eax  6) == 6;
++}
++
++
+ extern __m256i audit_test (__m256i, __m256i, __m256i, __m256i,
+  __m256i, __m256i, __m256i, __m256i);
+ int
+ main (void)
+ {
+-  unsigned int eax, ebx, ecx, edx;
+-
+   /* Run AVX test only if AVX is supported.  */
+-  if (__get_cpuid (1, eax, ebx, ecx, edx)
+-   (ecx  bit_AVX))
++  if (avx_enabled ())
+ {
+   __m256i ymm = _mm256_setzero_si256 ();
+   __m256i ret = audit_test (ymm, ymm, ymm, ymm, ymm, ymm, ymm, ymm);
+--- a/elf/tst-audit6.c
 b/elf/tst-audit6.c
+@@ -9,14 +9,28 @@
+ extern __m128i audit_test (__m128i, __m128i, __m128i, __m128i,
+  __m128i, __m128i, __m128i, __m128i);
+ 
+-int
+-main (void)
++
++static int
++avx_enabled (void)
+ {
+   unsigned int eax, ebx, ecx, edx;
+ 
++  if (__get_cpuid (1, eax, ebx, ecx, edx) == 0
++  || (ecx  (bit_AVX | bit_OSXSAVE)) != (bit_AVX | bit_OSXSAVE))
++return 0;
++
++  /* Check the OS has AVX and SSE saving enabled.  */
++  asm (xgetbv : =a (eax), =d (edx) : c (0));
++
++  return (eax  6) == 6;
++}
++
++
++int
++main (void)
++{
+   /* Run AVX test only if AVX is supported.  */
+-  if (__get_cpuid (1, eax, ebx, ecx, edx)
+-   (ecx  bit_AVX))
++  if (avx_enabled ())
+ {
+   __m128i xmm = _mm_setzero_si128 ();
+   __m128i ret = audit_test (xmm, xmm, xmm, xmm, xmm, xmm, xmm, xmm);
+--- a/sysdeps/x86_64/dl-trampoline.S
 b/sysdeps/x86_64/dl-trampoline.S
+@@ -1,5 +1,5 @@
+ /* PLT trampolines.  x86-64 version.
+-   Copyright (C) 2004, 2005, 2007, 2009 Free Software Foundation, Inc.
++   Copyright (C) 2004, 2005, 2007, 2009, 2011 Free Software Foundation, Inc.
+

r5022 - in glibc-package/trunk/debian: . patches patches/amd64

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 17:11:54 + (Sun, 30 Oct 2011)
New Revision: 5022

Added:
   glibc-package/trunk/debian/patches/amd64/cvs-dl_trampoline-cfi.diff
Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/series
Log:
  * patches/amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 17:05:36 UTC (rev 
5021)
+++ glibc-package/trunk/debian/changelog2011-10-30 17:11:54 UTC (rev 
5022)
@@ -14,6 +14,7 @@
 #644771.
   * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
 is present, but not enabled in the kernel.  Closes: #646549.
+  * patches/amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Added: glibc-package/trunk/debian/patches/amd64/cvs-dl_trampoline-cfi.diff
===
--- glibc-package/trunk/debian/patches/amd64/cvs-dl_trampoline-cfi.diff 
(rev 0)
+++ glibc-package/trunk/debian/patches/amd64/cvs-dl_trampoline-cfi.diff 
2011-10-30 17:11:54 UTC (rev 5022)
@@ -0,0 +1,129 @@
+2011-08-20  Ulrich Drepper  drep...@gmail.com
+ 
+   * sysdeps/x86_64/dl-trampoline.S (_dl_runtime_resolve): Fix CFI for
+   the very first instruction.
+   * sysdeps/x86_64/dl-trampoline.h: If MORE_CODE is defined, restore
+   the CFI state in the end.
+   * sysdeps/x86_64/dl-trampoline.S: Define MORE_CODE before first
+   inclusion of dl-trampoline.h.
+   Based on a patch by Jiri Olsa jo...@redhat.com.
+ 
+---
+ sysdeps/x86_64/dl-trampoline.S |8 +---
+ sysdeps/x86_64/dl-trampoline.h |   25 -
+ 2 files changed, 21 insertions(+), 12 deletions(-)
+
+--- a/sysdeps/x86_64/dl-trampoline.S
 b/sysdeps/x86_64/dl-trampoline.S
+@@ -27,8 +27,9 @@
+   .align 16
+   cfi_startproc
+ _dl_runtime_resolve:
++  cfi_adjust_cfa_offset(16) # Incorporate PLT
+   subq $56,%rsp
+-  cfi_adjust_cfa_offset(72) # Incorporate PLT
++  cfi_adjust_cfa_offset(56)
+   movq %rax,(%rsp)# Preserve registers otherwise clobbered.
+   movq %rcx, 8(%rsp)
+   movq %rdx, 16(%rsp)
+@@ -158,14 +159,15 @@
+ 1:js  L(no_avx)
+ 
+ #  define RESTORE_AVX
++#  define MORE_CODE
+ #  include dl-trampoline.h
+ 
+   .align 16
+ L(no_avx):
+ # endif
+ 
+-#  undef RESTORE_AVX
+-#  include dl-trampoline.h
++# undef RESTORE_AVX
++# include dl-trampoline.h
+ 
+   cfi_endproc
+   .size _dl_runtime_profile, .-_dl_runtime_profile
+--- a/sysdeps/x86_64/dl-trampoline.h
 b/sysdeps/x86_64/dl-trampoline.h
+@@ -1,6 +1,6 @@
+ /* Partial PLT profile trampoline to save and restore x86-64 vector
+registers.
+-   Copyright (C) 2009 Free Software Foundation, Inc.
++   Copyright (C) 2009, 2011 Free Software Foundation, Inc.
+This file is part of the GNU C Library.
+ 
+The GNU C Library is free software; you can redistribute it and/or
+@@ -195,14 +195,14 @@
+  _dl_call_pltexit.  The La_x86_64_regs is being pointed by rsp now,
+  so we just need to allocate the sizeof(La_x86_64_retval) space on
+  the stack, since the alignment has already been taken care of. */
+-# ifdef RESTORE_AVX
++#ifdef RESTORE_AVX
+   /* sizeof(La_x86_64_retval).  Need extra space for 2 SSE
+  registers to detect if xmm0/xmm1 registers are changed
+  by audit module.  */
+   subq $(LRV_SIZE + XMM_SIZE*2), %rsp
+-# else
++#else
+   subq $LRV_SIZE, %rsp# sizeof(La_x86_64_retval)
+-# endif
++#endif
+   movq %rsp, %rcx # La_x86_64_retval argument to %rcx.
+ 
+   /* Fill in the La_x86_64_retval structure.  */
+@@ -212,7 +212,7 @@
+   movaps %xmm0, LRV_XMM0_OFFSET(%rcx)
+   movaps %xmm1, LRV_XMM1_OFFSET(%rcx)
+ 
+-# ifdef RESTORE_AVX
++#ifdef RESTORE_AVX
+   /* This is to support AVX audit modules.  */
+   vmovdqu %ymm0, LRV_VECTOR0_OFFSET(%rcx)
+   vmovdqu %ymm1, LRV_VECTOR1_OFFSET(%rcx)
+@@ -221,14 +221,14 @@
+  by audit module.  */
+   vmovdqa %xmm0,(LRV_SIZE)(%rcx)
+   vmovdqa %xmm1, (LRV_SIZE + XMM_SIZE)(%rcx)
+-# endif
++#endif
+ 
+   fstpt LRV_ST0_OFFSET(%rcx)
+   fstpt LRV_ST1_OFFSET(%rcx)
+ 
+   movq 24(%rbx), %rdx # La_x86_64_regs argument to %rdx.
+   movq 40(%rbx), %rsi # Copy args pushed by PLT in register.
+-movq 32(%rbx), %rdi   # %rdi: link_map, %rsi: reloc_index
++  movq 32(%rbx), %rdi # %rdi: link_map, %rsi: reloc_index
+   call _dl_call_pltexit
+ 
+   /* Restore return registers.  */
+@@ -238,7 +238,7 @@
+   movaps LRV_XMM0_OFFSET(%rsp), %xmm0
+   movaps LRV_XMM1_OFFSET(%rsp), %xmm1
+ 
+-# ifdef RESTORE_AVX
++#ifdef RESTORE_AVX
+   /* Check if 

Re: [SRM] Uploading new upstream stable version to Squeeze?

2011-10-30 Thread Adam D. Barratt
On Sat, 2011-09-10 at 22:53 +0200, Aurelien Jarno wrote:
 The status is that glibc 2.11.4 will be released when Debian feels it
 is ready, as we are the main testers here. I am planning to do some more
 testing of the current SVN on more machines, and everything seems fine
 around the release of 6.0.3, I'll ask around for the release of 2.11.4. 
 
 I can then upload it to stable just after the release of 6.0.3, which 
 should give us sufficient additional testing before the release of 
 6.0.4.

Did the 2.11.4 release happen?  I'm conscious of the fact that we're now
a little way past 6.0.3; apologies for not following up again sooner.

If you're happy to include the patch for #640922 in the upstream stable
branch then feel free to also include it in a stable upload.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1319996187.26970.18.ca...@hathi.jungle.funky-badger.org



Bug#646610: [libc6-loongson2f] Library not used? (or how do I check?)

2011-10-30 Thread Aurelien Jarno
On Tue, Oct 25, 2011 at 10:42:51PM +0600, Roman Mamedov wrote:
 Package: libc6-loongson2f
 Version: 2.13-21
 Severity: normal
 
 Hello,
 
 This might be a stupid question, but after installing this package and even 
 rebooting my machine, the optimized library doesn't seem to be used.
 

This is indeed a bug, this library should be used automatically provided
you have a 3.0 kernel or later. I have tracked that to a bug in the
patch adding support for loongson2f. It will be fixed in the next
upload, I hope it's the only issue and that it will work (I have no way
to test that).

-- 
Aurelien Jarno  GPG: 1024D/F1BCDB73
aurel...@aurel32.net http://www.aurel32.net



-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111030182021.gh31...@hall.aurel32.net



Processed: tagging 646610

2011-10-30 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

 tags 646610 + pending
Bug #646610 [libc6-loongson2f] [libc6-loongson2f] Library not used? (or how do 
I check?)
Added tag(s) pending.
 thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
646610: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=646610
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.131999882818471.transcr...@bugs.debian.org



Re: [SRM] Uploading new upstream stable version to Squeeze?

2011-10-30 Thread Aurelien Jarno
On Sun, Oct 30, 2011 at 05:36:27PM +, Adam D. Barratt wrote:
 On Sat, 2011-09-10 at 22:53 +0200, Aurelien Jarno wrote:
  The status is that glibc 2.11.4 will be released when Debian feels it
  is ready, as we are the main testers here. I am planning to do some more
  testing of the current SVN on more machines, and everything seems fine
  around the release of 6.0.3, I'll ask around for the release of 2.11.4. 
  
  I can then upload it to stable just after the release of 6.0.3, which 
  should give us sufficient additional testing before the release of 
  6.0.4.
 
 Did the 2.11.4 release happen?  I'm conscious of the fact that we're now
 a little way past 6.0.3; apologies for not following up again sooner.

I have asked for it, but I have no answer so far. That said everything
is already committed in the upstream git/svn, the only difference with
version 2.11.4 will be the version number. Maybe we should just upload
the current version without waiting so that it is widely tested, and
later upload the final 2.11.4 if released in time.

 If you're happy to include the patch for #640922 in the upstream stable
 branch then feel free to also include it in a stable upload.
 

Ok, will include it.

Regards,
Aurelien

-- 
Aurelien Jarno  GPG: 1024D/F1BCDB73
aurel...@aurel32.net http://www.aurel32.net


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111030182755.gb13...@hall.aurel32.net



r5023 - in glibc-package/trunk/debian: . patches/mips

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 18:20:19 + (Sun, 30 Oct 2011)
New Revision: 5023

Modified:
   glibc-package/trunk/debian/changelog
   glibc-package/trunk/debian/patches/mips/submitted-dl-platform.diff
Log:
  * patches/mips/submitted-dl-platform.diff: fix a typo preventing loongson2f
platform directory to be used.  Closes: #646610.



Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 17:11:54 UTC (rev 
5022)
+++ glibc-package/trunk/debian/changelog2011-10-30 18:20:19 UTC (rev 
5023)
@@ -15,6 +15,8 @@
   * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
 is present, but not enabled in the kernel.  Closes: #646549.
   * patches/amd64/cvs-dl_trampoline-cfi.diff: fix CFI in dl_trampoline code.
+  * patches/mips/submitted-dl-platform.diff: fix a typo preventing loongson2f
+platform directory to be used.  Closes: #646610.
 
   [ Samuel Thibault ]
   * patches/hurd-i386/submitted-setresid.diff: New patch to fix -1 passed to

Modified: glibc-package/trunk/debian/patches/mips/submitted-dl-platform.diff
===
--- glibc-package/trunk/debian/patches/mips/submitted-dl-platform.diff  
2011-10-30 17:11:54 UTC (rev 5022)
+++ glibc-package/trunk/debian/patches/mips/submitted-dl-platform.diff  
2011-10-30 18:20:19 UTC (rev 5023)
@@ -121,7 +121,7 @@
 +/* Mask to filter out platforms.  */
 +#define _DL_HWCAP_PLATFORM(-1ULL)
 +
-+#define _DL_PLATFORMS_COUNT   1
++#define _DL_PLATFORMS_COUNT   4
 +
 +static inline const char *
 +__attribute__ ((unused))


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rkzzx-0001bn...@vasks.debian.org



r5025 - in glibc-package/branches/glibc-branch-squeeze/debian: . patches patches/any

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 19:09:46 + (Sun, 30 Oct 2011)
New Revision: 5025

Added:
   
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-statvfs-mount-flags.diff
Modified:
   glibc-package/branches/glibc-branch-squeeze/debian/changelog
   glibc-package/branches/glibc-branch-squeeze/debian/patches/series
Log:
  * patches/any/cvs-statvfs-mount-flags.diff: get the mount flags directly
from the kernel when possible instead of parsing /proc/mounts.  Closes: 
#639897.



Modified: glibc-package/branches/glibc-branch-squeeze/debian/changelog
===
--- glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 18:57:23 UTC (rev 5024)
+++ glibc-package/branches/glibc-branch-squeeze/debian/changelog
2011-10-30 19:09:46 UTC (rev 5025)
@@ -52,6 +52,9 @@
 sometimes causes a deadlock when calling fork() from a thread.
   * patches/amd64/cvs-avx-detection.diff: do not use AVX if hardware support
 is present, but not enabled in the kernel.  Closes: #646549.
+  * patches/any/cvs-statvfs-mount-flags.diff: get the mount flags directly
+from the kernel when possible instead of parsing /proc/mounts.  Closes: 
+#639897.
 
  -- Aurelien Jarno aure...@debian.org  Sat, 11 Jun 2011 18:12:35 +0200
 

Added: 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-statvfs-mount-flags.diff
===
--- 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-statvfs-mount-flags.diff
 (rev 0)
+++ 
glibc-package/branches/glibc-branch-squeeze/debian/patches/any/cvs-statvfs-mount-flags.diff
 2011-10-30 19:09:46 UTC (rev 5025)
@@ -0,0 +1,191 @@
+2011-02-28  Aurelien Jarno  aurel...@aurel32.net
+ 
+   * ports/sysdeps/unix/sysv/linux/alpha/bits/statfs.h (struct statfs,
+   struct statfs64): Add f_flags field.
+
+2010-08-12  Joseph Myers  jos...@codesourcery.com
+ 
+   * ports/sysdeps/unix/sysv/linux/mips/bits/statfs.h (struct statfs,
+   struct statfs64): Add f_flags field.
+
+2010-08-11  Ulrich Drepper  drep...@redhat.com
+ 
+   * sysdeps/unix/sysv/linux/bits/statfs.h (struct statfs): Add f_flags
+   field.
+   (struct statfs64): Likewise.
+   (_STATFS_F_FLAGS): Define.
+   * sysdeps/unix/sysv/linux/s390/bits/statfs.h: Likewise.
+   * sysdeps/unix/sysv/linux/internal_statvfs.c (__statvfs_getflags):
+   Don't define if __ASSUME_STATFS_F_FLAGS is defined.
+   (ST_VALID): Define locally.
+   (INTERNAL_STATVFS): If f_flags has ST_VALID set don't call
+   __statvfs_getflags, use the provided value.
+   * sysdeps/unix/sysv/linux/kernel-features.h: Define
+   __ASSUME_STATFS_F_FLAGS.
+
+---
+ ports/sysdeps/unix/sysv/linux/alpha/bits/statfs.h |6 --
+ ports/sysdeps/unix/sysv/linux/mips/bits/statfs.h  |6 --
+ sysdeps/unix/sysv/linux/bits/statfs.h |7 +--
+ sysdeps/unix/sysv/linux/internal_statvfs.c|   22 
+-
+ sysdeps/unix/sysv/linux/kernel-features.h |5 +
+ sysdeps/unix/sysv/linux/s390/bits/statfs.h|7 +--
+ 6 files changed, 40 insertions(+), 13 deletions(-)
+
+--- a/sysdeps/unix/sysv/linux/bits/statfs.h
 b/sysdeps/unix/sysv/linux/bits/statfs.h
+@@ -42,7 +42,8 @@
+ __fsid_t f_fsid;
+ __SWORD_TYPE f_namelen;
+ __SWORD_TYPE f_frsize;
+-__SWORD_TYPE f_spare[5];
++__SWORD_TYPE f_flags;
++__SWORD_TYPE f_spare[4];
+   };
+ 
+ #ifdef __USE_LARGEFILE64
+@@ -58,10 +59,12 @@
+ __fsid_t f_fsid;
+ __SWORD_TYPE f_namelen;
+ __SWORD_TYPE f_frsize;
+-__SWORD_TYPE f_spare[5];
++__SWORD_TYPE f_flags;
++__SWORD_TYPE f_spare[4];
+   };
+ #endif
+ 
+ /* Tell code we have these members.  */
+ #define _STATFS_F_NAMELEN
+ #define _STATFS_F_FRSIZE
++#define _STATFS_F_FLAGS
+--- a/sysdeps/unix/sysv/linux/internal_statvfs.c
 b/sysdeps/unix/sysv/linux/internal_statvfs.c
+@@ -29,6 +29,11 @@
+ #include sys/statfs.h
+ #include sys/statvfs.h
+ #include linux_fsinfo.h
++#include kernel-features.h
++
++
++/* Special internal-only bit value.  */
++#define ST_VALID 0x0020
+ 
+ 
+ #ifndef STATFS
+@@ -37,6 +42,7 @@
+ # define INTERNAL_STATVFS __internal_statvfs
+ 
+ 
++# ifndef __ASSUME_STATFS_F_FLAGS
+ int
+ __statvfs_getflags (const char *name, int fstype, struct stat64 *st)
+ {
+@@ -193,6 +199,7 @@
+ 
+   return result;
+ }
++# endif
+ #else
+ extern int __statvfs_getflags (const char *name, int fstype,
+  struct stat64 *st);
+@@ -234,9 +241,14 @@
+   /* XXX I have no idea how to compute f_favail.  Any idea???  */
+   buf-f_favail = buf-f_ffree;
+ 
+-  /* Determining the flags is tricky.  We have to read /proc/mounts or
+- the /etc/mtab file and search for the entry which matches the given
+- file.  The way we can test for matching filesystem is using the
+- device number.  */
+-  

r5026 - glibc-package/trunk/debian

2011-10-30 Thread Aurelien Jarno
Author: aurel32
Date: 2011-10-30 22:25:35 + (Sun, 30 Oct 2011)
New Revision: 5026

Modified:
   glibc-package/trunk/debian/changelog
Log:
Fix a typo


Modified: glibc-package/trunk/debian/changelog
===
--- glibc-package/trunk/debian/changelog2011-10-30 19:09:46 UTC (rev 
5025)
+++ glibc-package/trunk/debian/changelog2011-10-30 22:25:35 UTC (rev 
5026)
@@ -38,7 +38,7 @@
 tg-longjmp_chk.diff, tg-elfosabi_gnu.diff, tg-libc_once.diff}.
   * patches/hurd-i386/submitted-libc_once.diff: Move kfreebsd part to
 patches/kfreebsd/submitted-libc_once.diff.
-  * patches/hurd-i386/submitted-ldsodefs.h.diff: Move commited part to
+  * patches/hurd-i386/submitted-ldsodefs.h.diff: Move committed part to
 patches/hurd-i386/cvs-ldsodefs.h.diff
 
   [ Petr Salinger ]


-- 
To UNSUBSCRIBE, email to debian-glibc-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/e1rkdou-00070f...@vasks.debian.org