[arch-commits] Commit in glibc/trunk (3 files)

2019-09-30 Thread Allan McRae via arch-commits
Date: Monday, September 30, 2019 @ 12:09:03
  Author: allan
Revision: 363562

upstream update

Modified:
  glibc/trunk/PKGBUILD
  glibc/trunk/bz20338.patch
Deleted:
  glibc/trunk/0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch

-+
 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch |  194 
--
 PKGBUILD|   10 
 bz20338.patch   |8 
 3 files changed, 8 insertions(+), 204 deletions(-)

Deleted: 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch
===
--- 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-09-30 12:08:09 UTC (rev 363561)
+++ 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-09-30 12:09:03 UTC (rev 363562)
@@ -1,194 +0,0 @@
-From 2cbf10ae2ea9e378ff91b8f5c4d8cb77ed05378e Mon Sep 17 00:00:00 2001
-From: =?UTF-8?q?Bart=C5=82omiej=20Piotrowski?= 
-Date: Fri, 10 Aug 2018-2019 14:12:40 +
-Subject: [PATCH] Revert "elf: Correct absolute (SHN_ABS) symbol run-time
- calculation [BZ #19818]"
-
-This reverts commit e7feec374c635b6a29d65c39ae5e1855528fed39.

- elf/Makefile | 14 ++---
- elf/dl-addr.c|  2 --
- elf/tst-absolute-sym-lib.c   | 25 
- elf/tst-absolute-sym-lib.lds | 19 --
- elf/tst-absolute-sym.c   | 38 
- sysdeps/generic/ldsodefs.h   |  3 +--
- 6 files changed, 3 insertions(+), 98 deletions(-)
- delete mode 100644 elf/tst-absolute-sym-lib.c
- delete mode 100644 elf/tst-absolute-sym-lib.lds
- delete mode 100644 elf/tst-absolute-sym.c
-
-diff --git a/elf/Makefile b/elf/Makefile
-index cd0771307f..5084ba4f6f 100644
 a/elf/Makefile
-+++ b/elf/Makefile
-@@ -186,7 +186,7 @@ tests += restest1 preloadtest loadfail multiload origtest 
resolvfail \
-tst-tlsalign tst-tlsalign-extern tst-nodelete-opened \
-tst-nodelete2 tst-audit11 tst-audit12 tst-dlsym-error tst-noload \
-tst-latepthread tst-tls-manydynamic tst-nodelete-dlclose \
--   tst-debug1 tst-main1 tst-absolute-sym tst-absolute-zero tst-big-note \
-+   tst-debug1 tst-main1 \
-tst-unwind-ctor tst-unwind-main
- #  reldep9
- tests-internal += loadtest unload unload2 circleload1 \
-@@ -272,8 +272,7 @@ modules-names = testobj1 testobj2 testobj3 testobj4 
testobj5 testobj6 \
-   tst-audit12mod1 tst-audit12mod2 tst-audit12mod3 tst-auditmod12 \
-   tst-latepthreadmod $(tst-tls-many-dynamic-modules) \
-   tst-nodelete-dlclose-dso tst-nodelete-dlclose-plugin \
--  tst-main1mod tst-libc_dlvsym-dso tst-absolute-sym-lib \
--  tst-absolute-zero-lib tst-big-note-lib tst-unwind-ctor-lib
-+  tst-main1mod tst-libc_dlvsym-dso tst-unwind-ctor-lib
- # Most modules build with _ISOMAC defined, but those filtered out
- # depend on internal headers.
- modules-names-tests = $(filter-out ifuncmod% tst-libc_dlvsym-dso tst-tlsmod%,\
-@@ -1465,14 +1463,6 @@ tst-main1-no-pie = yes
- LDLIBS-tst-main1 = $(libsupport)
- tst-main1mod.so-no-z-defs = yes
- 
--LDLIBS-tst-absolute-sym-lib.so = tst-absolute-sym-lib.lds
--$(objpfx)tst-absolute-sym-lib.so: $(LDLIBS-tst-absolute-sym-lib.so)
--$(objpfx)tst-absolute-sym: $(objpfx)tst-absolute-sym-lib.so
--
--LDLIBS-tst-absolute-zero-lib.so = tst-absolute-zero-lib.lds
--$(objpfx)tst-absolute-zero-lib.so: $(LDLIBS-tst-absolute-zero-lib.so)
--$(objpfx)tst-absolute-zero: $(objpfx)tst-absolute-zero-lib.so
--
- # Both the main program and the DSO for tst-libc_dlvsym need to link
- # against libdl.
- $(objpfx)tst-libc_dlvsym: $(libdl)
-diff --git a/elf/dl-addr.c b/elf/dl-addr.c
-index e6c7d02094..2250617a73 100644
 a/elf/dl-addr.c
-+++ b/elf/dl-addr.c
-@@ -59,7 +59,6 @@ determine_info (const ElfW(Addr) addr, struct link_map 
*match, Dl_info *info,
-we can omit that test here.  */
- if ((symtab[symndx].st_shndx != SHN_UNDEF
-  || symtab[symndx].st_value != 0)
--&& symtab[symndx].st_shndx != SHN_ABS
- && ELFW(ST_TYPE) (symtab[symndx].st_info) != STT_TLS
- && DL_ADDR_SYM_MATCH (match, &symtab[symndx],
-   matchsym, addr)
-@@ -92,7 +91,6 @@ determine_info (const ElfW(Addr) addr, struct link_map 
*match, Dl_info *info,
-   && ELFW(ST_TYPE) (symtab->st_info) != STT_TLS
-   && (symtab->st_shndx != SHN_UNDEF
-   || symtab->st_value != 0)
--  && symtab->st_shndx != SHN_ABS
-   && DL_ADDR_SYM_MATCH (match, symtab, matchsym, addr)
-   && symtab->st_name < strtabsize)
- matchsym = (ElfW(Sym) *) symtab;
-diff --git a/elf/tst-absolute-sym-lib.c b/elf/tst-absolute-sym-lib.c
-delete

[arch-commits] Commit in glibc/trunk (3 files)

2019-04-17 Thread Bartłomiej Piotrowski via arch-commits
Date: Wednesday, April 17, 2019 @ 10:43:58
  Author: bpiotrowski
Revision: 350831

2.29-1

Modified:
  glibc/trunk/0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch
  glibc/trunk/PKGBUILD
Deleted:
  glibc/trunk/file-truncated-while-reading-soname-after-patchelf.patch

-+
 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch |   27 +--
 PKGBUILD|   24 +-
 file-truncated-while-reading-soname-after-patchelf.patch|   85 
--
 3 files changed, 26 insertions(+), 110 deletions(-)

Modified: 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch
===
--- 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-04-17 10:43:20 UTC (rev 350830)
+++ 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-04-17 10:43:58 UTC (rev 350831)
@@ -1,6 +1,6 @@
 From 2cbf10ae2ea9e378ff91b8f5c4d8cb77ed05378e Mon Sep 17 00:00:00 2001
 From: =?UTF-8?q?Bart=C5=82omiej=20Piotrowski?= 
-Date: Fri, 10 Aug 2018 14:12:40 +
+Date: Fri, 10 Aug 2018-2019 14:12:40 +
 Subject: [PATCH] Revert "elf: Correct absolute (SHN_ABS) symbol run-time
  calculation [BZ #19818]"
 
@@ -25,22 +25,21 @@
 tst-tlsalign tst-tlsalign-extern tst-nodelete-opened \
 tst-nodelete2 tst-audit11 tst-audit12 tst-dlsym-error tst-noload \
 tst-latepthread tst-tls-manydynamic tst-nodelete-dlclose \
--   tst-debug1 tst-main1 tst-absolute-sym tst-absolute-zero tst-big-note
-+   tst-debug1 tst-main1
+-   tst-debug1 tst-main1 tst-absolute-sym tst-absolute-zero tst-big-note \
++   tst-debug1 tst-main1 \
+tst-unwind-ctor tst-unwind-main
  #  reldep9
  tests-internal += loadtest unload unload2 circleload1 \
-neededtest neededtest2 neededtest3 neededtest4 \
-@@ -272,9 +272,7 @@ modules-names = testobj1 testobj2 testobj3 testobj4 
testobj5 testobj6 \
+@@ -272,8 +272,7 @@ modules-names = testobj1 testobj2 testobj3 testobj4 
testobj5 testobj6 \
tst-audit12mod1 tst-audit12mod2 tst-audit12mod3 tst-auditmod12 \
tst-latepthreadmod $(tst-tls-many-dynamic-modules) \
tst-nodelete-dlclose-dso tst-nodelete-dlclose-plugin \
 -  tst-main1mod tst-libc_dlvsym-dso tst-absolute-sym-lib \
--  tst-absolute-zero-lib tst-big-note-lib
--
-+  tst-main1mod tst-libc_dlvsym-dso
- ifeq (yes,$(have-mtls-dialect-gnu2))
- tests += tst-gnu2-tls1
- modules-names += tst-gnu2-tls1mod
+-  tst-absolute-zero-lib tst-big-note-lib tst-unwind-ctor-lib
++  tst-main1mod tst-libc_dlvsym-dso tst-unwind-ctor-lib
+ # Most modules build with _ISOMAC defined, but those filtered out
+ # depend on internal headers.
+ modules-names-tests = $(filter-out ifuncmod% tst-libc_dlvsym-dso tst-tlsmod%,\
 @@ -1465,14 +1463,6 @@ tst-main1-no-pie = yes
  LDLIBS-tst-main1 = $(libsupport)
  tst-main1mod.so-no-z-defs = yes
@@ -83,7 +82,7 @@
 +++ /dev/null
 @@ -1,25 +0,0 @@
 -/* BZ #19818 absolute symbol calculation shared module.
--   Copyright (C) 2018 Free Software Foundation, Inc.
+-   Copyright (C) 2018-2019 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or
@@ -114,7 +113,7 @@
 +++ /dev/null
 @@ -1,19 +0,0 @@
 -/* BZ #19818 absolute symbol calculation linker script.
--   Copyright (C) 2018 Free Software Foundation, Inc.
+-   Copyright (C) 2018-2019 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or
@@ -139,7 +138,7 @@
 +++ /dev/null
 @@ -1,38 +0,0 @@
 -/* BZ #19818 absolute symbol calculation main executable.
--   Copyright (C) 2018 Free Software Foundation, Inc.
+-   Copyright (C) 2018-2019 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or

Modified: PKGBUILD
===
--- PKGBUILD2019-04-17 10:43:20 UTC (rev 350830)
+++ PKGBUILD2019-04-17 10:43:58 UTC (rev 350831)
@@ -2,20 +2,20 @@
 # Contributor: Allan McRae 
 
 # toolchain build order: 
linux-api-headers->glibc->binutils->gcc->binutils->glibc
-# NOTE: valgrind requires rebuild with each major glibc version
+# NOTE: valgrind requires rebuilt with each major glibc version
 
 pkgbase=glibc
 pkgname=(glibc lib32-glibc)
-pkgver=2.28
-pkgrel=6
+pkgver=2.29
+pkgrel=1
 arch=(x86_64)
 url='http://www.gnu.org/software/libc'
 license=(GPL LGPL)
-makedepends=(git gd lib32-gcc-libs)
+makedepends=(git gd lib32-gcc-libs python)
 options=(!strip staticlibs)
-#source=(https://ftp.gnu.org/gnu/glibc/glibc-$pkgver.tar.xz{,.sig}
-_commit=5a74abda201907cafbdabd1debf98890313ff71e
-source=(git+https://sourcewar

[arch-commits] Commit in glibc/trunk (3 files)

2019-04-11 Thread Sven-Hendrik Haase via arch-commits
Date: Thursday, April 11, 2019 @ 11:52:46
  Author: svenstaro
Revision: 350578

upgpkg: glibc 2.28-6

Add patch file-truncated-while-reading-soname-after-patchelf.patch for FS#62282

Added:
  glibc/trunk/file-truncated-while-reading-soname-after-patchelf.patch
Modified:
  glibc/trunk/0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch
  glibc/trunk/PKGBUILD

-+
 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch |   27 +--
 PKGBUILD|   18 +-
 file-truncated-while-reading-soname-after-patchelf.patch|   85 
++
 3 files changed, 109 insertions(+), 21 deletions(-)

Modified: 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch
===
--- 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-04-11 11:21:27 UTC (rev 350577)
+++ 0001-Revert-elf-Correct-absolute-SHN_ABS-symbol-run-time-.patch 
2019-04-11 11:52:46 UTC (rev 350578)
@@ -1,6 +1,6 @@
 From 2cbf10ae2ea9e378ff91b8f5c4d8cb77ed05378e Mon Sep 17 00:00:00 2001
 From: =?UTF-8?q?Bart=C5=82omiej=20Piotrowski?= 
-Date: Fri, 10 Aug 2018-2019 14:12:40 +
+Date: Fri, 10 Aug 2018 14:12:40 +
 Subject: [PATCH] Revert "elf: Correct absolute (SHN_ABS) symbol run-time
  calculation [BZ #19818]"
 
@@ -25,21 +25,22 @@
 tst-tlsalign tst-tlsalign-extern tst-nodelete-opened \
 tst-nodelete2 tst-audit11 tst-audit12 tst-dlsym-error tst-noload \
 tst-latepthread tst-tls-manydynamic tst-nodelete-dlclose \
--   tst-debug1 tst-main1 tst-absolute-sym tst-absolute-zero tst-big-note \
-+   tst-debug1 tst-main1 \
-tst-unwind-ctor tst-unwind-main
+-   tst-debug1 tst-main1 tst-absolute-sym tst-absolute-zero tst-big-note
++   tst-debug1 tst-main1
  #  reldep9
  tests-internal += loadtest unload unload2 circleload1 \
-@@ -272,8 +272,7 @@ modules-names = testobj1 testobj2 testobj3 testobj4 
testobj5 testobj6 \
+neededtest neededtest2 neededtest3 neededtest4 \
+@@ -272,9 +272,7 @@ modules-names = testobj1 testobj2 testobj3 testobj4 
testobj5 testobj6 \
tst-audit12mod1 tst-audit12mod2 tst-audit12mod3 tst-auditmod12 \
tst-latepthreadmod $(tst-tls-many-dynamic-modules) \
tst-nodelete-dlclose-dso tst-nodelete-dlclose-plugin \
 -  tst-main1mod tst-libc_dlvsym-dso tst-absolute-sym-lib \
--  tst-absolute-zero-lib tst-big-note-lib tst-unwind-ctor-lib
-+  tst-main1mod tst-libc_dlvsym-dso tst-unwind-ctor-lib
- # Most modules build with _ISOMAC defined, but those filtered out
- # depend on internal headers.
- modules-names-tests = $(filter-out ifuncmod% tst-libc_dlvsym-dso tst-tlsmod%,\
+-  tst-absolute-zero-lib tst-big-note-lib
+-
++  tst-main1mod tst-libc_dlvsym-dso
+ ifeq (yes,$(have-mtls-dialect-gnu2))
+ tests += tst-gnu2-tls1
+ modules-names += tst-gnu2-tls1mod
 @@ -1465,14 +1463,6 @@ tst-main1-no-pie = yes
  LDLIBS-tst-main1 = $(libsupport)
  tst-main1mod.so-no-z-defs = yes
@@ -82,7 +83,7 @@
 +++ /dev/null
 @@ -1,25 +0,0 @@
 -/* BZ #19818 absolute symbol calculation shared module.
--   Copyright (C) 2018-2019 Free Software Foundation, Inc.
+-   Copyright (C) 2018 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or
@@ -113,7 +114,7 @@
 +++ /dev/null
 @@ -1,19 +0,0 @@
 -/* BZ #19818 absolute symbol calculation linker script.
--   Copyright (C) 2018-2019 Free Software Foundation, Inc.
+-   Copyright (C) 2018 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or
@@ -138,7 +139,7 @@
 +++ /dev/null
 @@ -1,38 +0,0 @@
 -/* BZ #19818 absolute symbol calculation main executable.
--   Copyright (C) 2018-2019 Free Software Foundation, Inc.
+-   Copyright (C) 2018 Free Software Foundation, Inc.
 -   This file is part of the GNU C Library.
 -
 -   The GNU C Library is free software; you can redistribute it and/or

Modified: PKGBUILD
===
--- PKGBUILD2019-04-11 11:21:27 UTC (rev 350577)
+++ PKGBUILD2019-04-11 11:52:46 UTC (rev 350578)
@@ -2,25 +2,26 @@
 # Contributor: Allan McRae 
 
 # toolchain build order: 
linux-api-headers->glibc->binutils->gcc->binutils->glibc
-# NOTE: valgrind requires rebuilt with each major glibc version
+# NOTE: valgrind requires rebuild with each major glibc version
 
 pkgbase=glibc
 pkgname=(glibc lib32-glibc)
-pkgver=2.29
-pkgrel=1
+pkgver=2.28
+pkgrel=6
 arch=(x86_64)
 url='http://www.gnu.org/software/libc'
 license=(GPL LGPL)
-makedepends=(git gd lib32-gcc-libs python)
+makedepends=(git gd lib32-gcc-libs)
 options=(!strip staticlibs)
 #source=(https://ftp.gnu.org/gnu/glibc/glibc-$pkgver.tar.

[arch-commits] Commit in glibc/trunk (3 files)

2014-11-19 Thread Allan McRae
Date: Thursday, November 20, 2014 @ 04:23:15
  Author: allan
Revision: 226746

upgpkg: glibc 2.20-3

use full 2.20 patchset, fixes CVE-2014-7817

Deleted:
  glibc/trunk/glibc-2.19-fix-sign-in-bsloww1-input.patch
  glibc/trunk/glibc-2.19-tzselect-default.patch
  glibc/trunk/glibc-2.19-xattr_header.patch

+
 glibc-2.19-fix-sign-in-bsloww1-input.patch |   71 ---
 glibc-2.19-tzselect-default.patch  |   13 
 glibc-2.19-xattr_header.patch  |   42 ---
 3 files changed, 126 deletions(-)

Deleted: glibc-2.19-fix-sign-in-bsloww1-input.patch
===
--- glibc-2.19-fix-sign-in-bsloww1-input.patch  2014-11-20 03:15:35 UTC (rev 
226745)
+++ glibc-2.19-fix-sign-in-bsloww1-input.patch  2014-11-20 03:23:15 UTC (rev 
226746)
@@ -1,71 +0,0 @@
-From ffe768a90912f9bce43b70a82576b3dc99e3121c Mon Sep 17 00:00:00 2001
-From: Siddhesh Poyarekar 
-Date: Thu, 27 Feb 2014 21:29:16 +0530
-Subject: [PATCH] Fix sign of input to bsloww1 (BZ #16623)
-
-In 84ba214c, I removed some redundant sign computations and in the
-process, I incorrectly got rid of a temporary variable, thus passing
-the absolute value of the input to bsloww1.  This caused #16623.
-
-This fix undoes the incorrect change.

- sysdeps/ieee754/dbl-64/s_sin.c | 16 ++--
- 3 files changed, 18 insertions(+), 7 deletions(-)
-
-diff --git a/sysdeps/ieee754/dbl-64/s_sin.c b/sysdeps/ieee754/dbl-64/s_sin.c
-index 6105e9f..50109b8 100644
 a/sysdeps/ieee754/dbl-64/s_sin.c
-+++ b/sysdeps/ieee754/dbl-64/s_sin.c
-@@ -447,19 +447,21 @@ __sin (double x)
-   }
- else
-   {
-+double t;
- if (a > 0)
-   {
- m = 1;
-+t = a;
- db = da;
-   }
- else
-   {
- m = 0;
--a = -a;
-+t = -a;
- db = -da;
-   }
--u.x = big + a;
--y = a - (u.x - big);
-+u.x = big + t;
-+y = t - (u.x - big);
- res = do_sin (u, y, db, &cor);
- cor = (cor > 0) ? 1.035 * cor + eps : 1.035 * cor - eps;
- retval = ((res == res + cor) ? ((m) ? res : -res)
-@@ -671,19 +673,21 @@ __cos (double x)
-   }
- else
-   {
-+double t;
- if (a > 0)
-   {
- m = 1;
-+t = a;
- db = da;
-   }
- else
-   {
- m = 0;
--a = -a;
-+t = -a;
- db = -da;
-   }
--u.x = big + a;
--y = a - (u.x - big);
-+u.x = big + t;
-+y = t - (u.x - big);
- res = do_sin (u, y, db, &cor);
- cor = (cor > 0) ? 1.035 * cor + eps : 1.035 * cor - eps;
- retval = ((res == res + cor) ? ((m) ? res : -res)
--- 
-1.9.0
-

Deleted: glibc-2.19-tzselect-default.patch
===
--- glibc-2.19-tzselect-default.patch   2014-11-20 03:15:35 UTC (rev 226745)
+++ glibc-2.19-tzselect-default.patch   2014-11-20 03:23:15 UTC (rev 226746)
@@ -1,13 +0,0 @@
-diff --git a/timezone/Makefile b/timezone/Makefile
-index 998cd14..d5f647c 100644
 a/timezone/Makefile
-+++ b/timezone/Makefile
-@@ -118,7 +118,7 @@ $(testdata)/Asia/Tokyo: asia $(zic-deps)
- 
- $(objpfx)tzselect: tzselect.ksh $(common-objpfx)config.make
-   sed -e 's|/bin/bash|$(KSH)|g' \
--  -e '/TZDIR=/s|\$$(pwd)|$(zonedir)|' \
-+  -e 's|TZDIR=[^}]*|TZDIR=$(zonedir)|' \
-   -e '/TZVERSION=/s|see_Makefile|"$(version)"|' \
-   -e '/PKGVERSION=/s|=.*|="$(PKGVERSION)"|' \
-   -e '/REPORT_BUGS_TO=/s|=.*|="$(REPORT_BUGS_TO)"|' \

Deleted: glibc-2.19-xattr_header.patch
===
--- glibc-2.19-xattr_header.patch   2014-11-20 03:15:35 UTC (rev 226745)
+++ glibc-2.19-xattr_header.patch   2014-11-20 03:23:15 UTC (rev 226746)
@@ -1,42 +0,0 @@
-From: Serge Hallyn 
-Date: Tue, 11 Mar 2014 04:17:07 + (-0500)
-Subject: misc/sys/xattr.h: guard against linux uapi header inclusion
-X-Git-Url: 
https://sourceware.org/git/?p=glibc.git;a=commitdiff_plain;h=fdbe8eae;hp=fede7a5ffa188c22c3789135bd5cf82e487dd3d0
-
-misc/sys/xattr.h: guard against linux uapi header inclusion
-
-If the glibc xattr.h header is included after the uapi header,
-compilation fails due to an enum re-using a #define from the
-uapi header.  Protect against this by guarding the define and
-enum inclusions against each other.
-
-(A corresponding kernel patch has been sent here:
-http://lkml.org/lkml/2014/3/7/331 )
-
-(See https://lists.debian.org/debian-glibc/2014/03/msg00029.html
-and https://sourceware.org/glibc/wiki/Synchronizing_Head

[arch-commits] Commit in glibc/trunk (3 files)

2014-04-22 Thread Allan McRae
Date: Wednesday, April 23, 2014 @ 04:17:17
  Author: allan
Revision: 211670

upgpkg: glibc 2.19-4

gcc-4.9 toolchain build, use upstream patch for xattr dual inclusion issue, 
temporarily ignore some minor libm ulp failures on i686

Added:
  glibc/trunk/glibc-2.19-xattr_header.patch
Modified:
  glibc/trunk/PKGBUILD
Deleted:
  glibc/trunk/glibc-2.18-xattr-compat-hack.patch

+
 PKGBUILD   |   15 +++-
 glibc-2.18-xattr-compat-hack.patch |   19 ---
 glibc-2.19-xattr_header.patch  |   42 +++
 3 files changed, 51 insertions(+), 25 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2014-04-23 02:14:53 UTC (rev 211669)
+++ PKGBUILD2014-04-23 02:17:17 UTC (rev 211670)
@@ -8,7 +8,7 @@
 
 pkgname=glibc
 pkgver=2.19
-pkgrel=3
+pkgrel=4
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -22,13 +22,13 @@
 options=('!strip' 'staticlibs')
 install=glibc.install
 source=(http://ftp.gnu.org/gnu/libc/${pkgname}-${pkgver}.tar.xz{,.sig}
-glibc-2.18-xattr-compat-hack.patch
+glibc-2.19-xattr_header.patch
 glibc-2.19-fix-sign-in-bsloww1-input.patch
 locale.gen.txt
 locale-gen)
 md5sums=('e26b8cc666b162f999404b03970f14e4'
  'SKIP'
- '7ca96c68a37f2a4ab91792bfa0160a24'
+ '39a4876837789e07746f1d84cd8cb46a'
  '755a1a9d7844a5e338eddaa9a5d974cd'
  '07ac979b6ab5eeb778d55f041529d623'
  '476e9113489f93b348b21e144b6a8fcf')
@@ -36,8 +36,8 @@
 prepare() {
   cd ${srcdir}/${pkgname}-${pkgver}
   
-  # hack fix for {linux,sys}/xattr.h incompatibility
-  patch -p1 -i $srcdir/glibc-2.18-xattr-compat-hack.patch
+  # fix for {linux,sys}/xattr.h incompatibility - commit fdbe8eae
+  patch -p1 -i $srcdir/glibc-2.19-xattr_header.patch
 
   # fix issues in sin/cos slow path calculation - commit ffe768a9
   patch -p1 -i $srcdir/glibc-2.19-fix-sign-in-bsloww1-input.patch
@@ -93,7 +93,10 @@
   LDFLAGS=${LDFLAGS/--as-needed,/}
 
   cd ${srcdir}/glibc-build
-  make check
+
+  # only acceptable testsuite error is some small libm ulp failures on i686 
with gcc-4.9
+  # TODO: fix upstream and provide patch
+  make -k check || true
 }
 
 package() {

Deleted: glibc-2.18-xattr-compat-hack.patch
===
--- glibc-2.18-xattr-compat-hack.patch  2014-04-23 02:14:53 UTC (rev 211669)
+++ glibc-2.18-xattr-compat-hack.patch  2014-04-23 02:17:17 UTC (rev 211670)
@@ -1,19 +0,0 @@
-diff -Naur glibc-2.18-orig/misc/sys/xattr.h glibc-2.18/misc/sys/xattr.h
 glibc-2.18-orig/misc/sys/xattr.h   2013-08-11 08:52:55.0 +1000
-+++ glibc-2.18/misc/sys/xattr.h2014-01-07 15:45:50.533969040 +1000
-@@ -26,13 +26,8 @@
- 
- /* The following constants should be used for the fifth parameter of
-`*setxattr'.  */
--enum
--{
--  XATTR_CREATE = 1,   /* set value, fail if attr already exists.  */
--#define XATTR_CREATE  XATTR_CREATE
--  XATTR_REPLACE = 2   /* set value, fail if attr does not exist.  */
--#define XATTR_REPLACE XATTR_REPLACE
--};
-+#define XATTR_CREATE  1
-+#define XATTR_REPLACE 2
- 
- /* Set the attribute NAME of the file pointed to by PATH to VALUE (which
-is SIZE bytes long).  Return 0 on success, -1 for errors.  */

Added: glibc-2.19-xattr_header.patch
===
--- glibc-2.19-xattr_header.patch   (rev 0)
+++ glibc-2.19-xattr_header.patch   2014-04-23 02:17:17 UTC (rev 211670)
@@ -0,0 +1,42 @@
+From: Serge Hallyn 
+Date: Tue, 11 Mar 2014 04:17:07 + (-0500)
+Subject: misc/sys/xattr.h: guard against linux uapi header inclusion
+X-Git-Url: 
https://sourceware.org/git/?p=glibc.git;a=commitdiff_plain;h=fdbe8eae;hp=fede7a5ffa188c22c3789135bd5cf82e487dd3d0
+
+misc/sys/xattr.h: guard against linux uapi header inclusion
+
+If the glibc xattr.h header is included after the uapi header,
+compilation fails due to an enum re-using a #define from the
+uapi header.  Protect against this by guarding the define and
+enum inclusions against each other.
+
+(A corresponding kernel patch has been sent here:
+http://lkml.org/lkml/2014/3/7/331 )
+
+(See https://lists.debian.org/debian-glibc/2014/03/msg00029.html
+and https://sourceware.org/glibc/wiki/Synchronizing_Headers
+for more information.)
+
+Signed-off-by: Serge Hallyn 
+---
+
+diff --git a/misc/sys/xattr.h b/misc/sys/xattr.h
+index 929cd87..796df90 100644
+--- a/misc/sys/xattr.h
 b/misc/sys/xattr.h
+@@ -26,6 +26,7 @@ __BEGIN_DECLS
+ 
+ /* The following constants should be used for the fifth parameter of
+`*setxattr'.  */
++#ifndef __USE_KERNEL_XATTR_DEFS
+ enum
+ {
+   XATTR_CREATE = 1,   /* set value, fail if attr already exists.  */
+@@ -33,6 +34,7 @@ enum
+   XATTR_REPLACE = 2   /* set value, fail if attr does not exist.  */
+ #define XATTR_

[arch-commits] Commit in glibc/trunk (3 files)

2013-10-25 Thread Allan McRae
Date: Friday, October 25, 2013 @ 23:17:14
  Author: allan
Revision: 197431

upgpkg: glibc 2.18-9

fix getaddrinfo assertion (FS#34832), CVE-2013-4458

Added:
  glibc/trunk/glibc-2.18-getaddrinfo-CVE-2013-4458.patch
  glibc/trunk/glibc-2.18-getaddrinfo-assertion.patch
Modified:
  glibc/trunk/PKGBUILD

+
 PKGBUILD   |   17 +++
 glibc-2.18-getaddrinfo-CVE-2013-4458.patch |   41 +++
 glibc-2.18-getaddrinfo-assertion.patch |   39 +
 3 files changed, 92 insertions(+), 5 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-10-25 20:13:38 UTC (rev 197430)
+++ PKGBUILD2013-10-25 21:17:14 UTC (rev 197431)
@@ -8,7 +8,7 @@
 
 pkgname=glibc
 pkgver=2.18
-pkgrel=8
+pkgrel=9
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -27,6 +27,8 @@
 glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
 glibc-2.18-strcoll-CVE-2012-4412+4424.patch
 glibc-2.18-ptr-mangle-CVE-2013-4788.patch
+glibc-2.18-getaddrinfo-CVE-2013-4458.patch
+glibc-2.18-getaddrinfo-assertion.patch
 glibc-2.18-strstr-hackfix.patch
 nscd.service
 nscd.tmpfiles
@@ -39,6 +41,8 @@
  'b79561ab9dce900e9bbeaf0d49927c2b'
  'c7264b99d0f7e51922a4d3126182c40a'
  '9749ba386b08a8fe53e7ecede9bf2dfb'
+ '71329fccb8eb583fb0d67b55f1e8df68'
+ 'd4d86add33f22125777e0ecff06bc9bb'
  '4441f6dfe7d75ced1fa75e54dd21d36e'
  'd5fab2cd3abea65aa5ae696ea4a47d6b'
  'da662ca76e7c8d7efbc7986ab7acea2d'
@@ -58,13 +62,17 @@
   patch -p1 -i $srcdir/glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
 
   # upstream commits 1326ba1a, 141f3a77 and 303e567a
-  # https://sourceware.org/ml/libc-alpha/2013-08/msg00394.html
-  # https://sourceware.org/ml/libc-alpha/2013-08/msg00462.html
   patch -p1 -i $srcdir/glibc-2.18-strcoll-CVE-2012-4412+4424.patch
 
   # upstream commits c61b4d41 and 0b1f8e35
   patch -p1 -i $srcdir/glibc-2.18-ptr-mangle-CVE-2013-4788.patch
 
+  # upstream commit 7cbcdb36
+  patch -p1 -i $srcdir/glibc-2.18-getaddrinfo-CVE-2013-4458.patch
+
+  # upstream commit 894f3f10
+  patch -p1 -i $srcdir/glibc-2.18-getaddrinfo-assertion.patch
+
   # hack fix for strstr issues on x86
   patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
 
@@ -148,9 +156,8 @@
 ${srcdir}/glibc-${pkgver}/localedata/SUPPORTED >> ${pkgdir}/etc/locale.gen
 
   # remove the static libraries that have a shared counterpart
-  cd $pkgdir/usr/lib
   # note: keep libc, libdl, libm, libpthread for binutils testsuite
-  rm lib{anl,BrokenLocale,crypt,nsl,resolv,rt,util}.a
+  rm $pkgdir/usr/lib/lib{anl,BrokenLocale,crypt,nsl,resolv,rt,util}.a
 
   # Do not strip the following files for improved debugging support
   # ("improved" as in not breaking gdb and valgrind...):

Added: glibc-2.18-getaddrinfo-CVE-2013-4458.patch
===
--- glibc-2.18-getaddrinfo-CVE-2013-4458.patch  (rev 0)
+++ glibc-2.18-getaddrinfo-CVE-2013-4458.patch  2013-10-25 21:17:14 UTC (rev 
197431)
@@ -0,0 +1,41 @@
+diff --git a/sysdeps/posix/getaddrinfo.c b/sysdeps/posix/getaddrinfo.c
+index e6ce4cf..8ff74b4 100644
+--- a/sysdeps/posix/getaddrinfo.c
 b/sysdeps/posix/getaddrinfo.c
+@@ -197,7 +197,22 @@ gaih_inet_serv (const char *servicename, const struct 
gaih_typeproto *tp,
+   &rc, &herrno, NULL, &localcanon));\
+ if (rc != ERANGE || herrno != NETDB_INTERNAL)   \
+   break;\
+-tmpbuf = extend_alloca (tmpbuf, tmpbuflen, 2 * tmpbuflen);
  \
++if (!malloc_tmpbuf && __libc_use_alloca (alloca_used + 2 * tmpbuflen))
\
++  tmpbuf = extend_alloca_account (tmpbuf, tmpbuflen, 2 * tmpbuflen,   
  \
++alloca_used);   \
++else\
++  {   
  \
++  char *newp = realloc (malloc_tmpbuf ? tmpbuf : NULL,  \
++2 * tmpbuflen); \
++  if (newp == NULL) \
++{   \
++  result = -EAI_MEMORY; \
++  goto free_and_return; \
++}   \
++  tmpbuf = newp;\
++  malloc_tmpbuf = true;

[arch-commits] Commit in glibc/trunk (3 files)

2013-09-15 Thread Allan McRae
Date: Sunday, September 15, 2013 @ 15:03:44
  Author: allan
Revision: 194390

upgpkg: glibc 2.18-4

fix CVEs 2012-4412 (strcoll), 2012-4424 (strcoll) and 2013-4432 (malloc)

Added:
  glibc/trunk/glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
  glibc/trunk/glibc-2.18-strcoll-CVE-2012-4412+4424.patch
Modified:
  glibc/trunk/PKGBUILD

---+
 PKGBUILD  |   17 
 glibc-2.18-malloc-corrupt-CVE-2013-4332.patch |   54 +
 glibc-2.18-strcoll-CVE-2012-4412+4424.patch   | 1004 
 3 files changed, 1072 insertions(+), 3 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-09-15 12:35:01 UTC (rev 194389)
+++ PKGBUILD2013-09-15 13:03:44 UTC (rev 194390)
@@ -6,7 +6,7 @@
 
 pkgname=glibc
 pkgver=2.18
-pkgrel=3
+pkgrel=4
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -21,6 +21,8 @@
 install=glibc.install
 source=(http://ftp.gnu.org/gnu/libc/${pkgname}-${pkgver}.tar.xz{,.sig}
 glibc-2.18-readdir_r-CVE-2013-4237.patch
+   glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
+   glibc-2.18-strcoll-CVE-2012-4412+4424.patch
 glibc-2.18-strstr-hackfix.patch
 nscd.service
 nscd.tmpfiles
@@ -29,6 +31,8 @@
 md5sums=('88fbbceafee809e82efd52efa1e3c58f'
  'SKIP'
  '154da6bf5a5248f42a7bf5bf08e01a47'
+ 'b79561ab9dce900e9bbeaf0d49927c2b'
+ 'c7264b99d0f7e51922a4d3126182c40a'
  '4441f6dfe7d75ced1fa75e54dd21d36e'
  'd5fab2cd3abea65aa5ae696ea4a47d6b'
  'da662ca76e7c8d7efbc7986ab7acea2d'
@@ -35,13 +39,20 @@
  '07ac979b6ab5eeb778d55f041529d623'
  '476e9113489f93b348b21e144b6a8fcf')
 
-
 prepare() {
   cd ${srcdir}/${pkgname}-${pkgver}
   
   # upstream commit 91ce4085
   patch -p1 -i $srcdir/glibc-2.18-readdir_r-CVE-2013-4237.patch
-  
+
+  # upstream commits 1159a193, 55e17aad and b73ed247
+  patch -p1 -i $srcdir/glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
+
+  # upstream commit 1326ba1a and two not yet committed patches
+  # https://sourceware.org/ml/libc-alpha/2013-08/msg00394.html
+  # https://sourceware.org/ml/libc-alpha/2013-08/msg00462.html
+  patch -p1 -i $srcdir/glibc-2.18-strcoll-CVE-2012-4412+4424.patch
+
   # hack fix for strstr issues on x86
   patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
 

Added: glibc-2.18-malloc-corrupt-CVE-2013-4332.patch
===
--- glibc-2.18-malloc-corrupt-CVE-2013-4332.patch   
(rev 0)
+++ glibc-2.18-malloc-corrupt-CVE-2013-4332.patch   2013-09-15 13:03:44 UTC 
(rev 194390)
@@ -0,0 +1,54 @@
+diff --git a/malloc/malloc.c b/malloc/malloc.c
+index dd295f5..7f43ba3 100644
+--- a/malloc/malloc.c
 b/malloc/malloc.c
+@@ -3082,6 +3082,13 @@ __libc_pvalloc(size_t bytes)
+   size_t page_mask = GLRO(dl_pagesize) - 1;
+   size_t rounded_bytes = (bytes + page_mask) & ~(page_mask);
+ 
++  /* Check for overflow.  */
++  if (bytes > SIZE_MAX - 2*pagesz - MINSIZE)
++{
++  __set_errno (ENOMEM);
++  return 0;
++}
++
+   void *(*hook) (size_t, size_t, const void *) =
+ force_reg (__memalign_hook);
+   if (__builtin_expect (hook != NULL, 0))
+diff --git a/malloc/malloc.c b/malloc/malloc.c
+index 7f43ba3..3148c5f 100644
+--- a/malloc/malloc.c
 b/malloc/malloc.c
+@@ -3046,6 +3046,13 @@ __libc_valloc(size_t bytes)
+ 
+   size_t pagesz = GLRO(dl_pagesize);
+ 
++  /* Check for overflow.  */
++  if (bytes > SIZE_MAX - pagesz - MINSIZE)
++{
++  __set_errno (ENOMEM);
++  return 0;
++}
++
+   void *(*hook) (size_t, size_t, const void *) =
+ force_reg (__memalign_hook);
+   if (__builtin_expect (hook != NULL, 0))
+diff --git a/malloc/malloc.c b/malloc/malloc.c
+index 3148c5f..f7718a9 100644
+--- a/malloc/malloc.c
 b/malloc/malloc.c
+@@ -3015,6 +3015,13 @@ __libc_memalign(size_t alignment, size_t bytes)
+   /* Otherwise, ensure that it is at least a minimum chunk size */
+   if (alignment <  MINSIZE) alignment = MINSIZE;
+ 
++  /* Check for overflow.  */
++  if (bytes > SIZE_MAX - alignment - MINSIZE)
++{
++  __set_errno (ENOMEM);
++  return 0;
++}
++
+   arena_get(ar_ptr, bytes + alignment + MINSIZE);
+   if(!ar_ptr)
+ return 0;

Added: glibc-2.18-strcoll-CVE-2012-4412+4424.patch
===
--- glibc-2.18-strcoll-CVE-2012-4412+4424.patch (rev 0)
+++ glibc-2.18-strcoll-CVE-2012-4412+4424.patch 2013-09-15 13:03:44 UTC (rev 
194390)
@@ -0,0 +1,1004 @@
+diff --git a/string/strcoll_l.c b/string/strcoll_l.c
+index ecda08f..bb34a72 100644
+--- a/string/strcoll_l.c
 b/string/strcoll_l.c
+@@ -41,11 +41,434 @@
+ 
+ #include "../locale/localeinfo.h"
+ 
++/* Track status while looking for sequences in a string.  */
++typedef struct
++{
++  int len;/* Len

[arch-commits] Commit in glibc/trunk (3 files)

2013-08-16 Thread Allan McRae
Date: Friday, August 16, 2013 @ 11:30:21
  Author: allan
Revision: 193095

hack fix strstr issues, patch readdir_r CVE

Added:
  glibc/trunk/glibc-2.18-readdir_r-CVE-2013-4237.patch
  glibc/trunk/glibc-2.18-strstr-hackfix.patch
Modified:
  glibc/trunk/PKGBUILD

--+
 PKGBUILD |   22 +-
 glibc-2.18-readdir_r-CVE-2013-4237.patch |  281 +
 glibc-2.18-strstr-hackfix.patch  |   13 +
 3 files changed, 311 insertions(+), 5 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-08-16 07:07:07 UTC (rev 193094)
+++ PKGBUILD2013-08-16 09:30:21 UTC (rev 193095)
@@ -6,7 +6,7 @@
 
 pkgname=glibc
 pkgver=2.18
-pkgrel=1
+pkgrel=2
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -20,25 +20,37 @@
 options=('!strip')
 install=glibc.install
 source=(http://ftp.gnu.org/gnu/libc/${pkgname}-${pkgver}.tar.xz{,.sig}
+glibc-2.18-readdir_r-CVE-2013-4237.patch
+glibc-2.18-strstr-hackfix.patch
 nscd.service
 nscd.tmpfiles
 locale.gen.txt
 locale-gen)
 md5sums=('88fbbceafee809e82efd52efa1e3c58f'
  'SKIP'
+ '154da6bf5a5248f42a7bf5bf08e01a47'
+ '4441f6dfe7d75ced1fa75e54dd21d36e'
  'd5fab2cd3abea65aa5ae696ea4a47d6b'
  'da662ca76e7c8d7efbc7986ab7acea2d'
  '07ac979b6ab5eeb778d55f041529d623'
  '476e9113489f93b348b21e144b6a8fcf')
 
 
-build() {
+prepare() {
   cd ${srcdir}/${pkgname}-${pkgver}
+  
+  # upstream commit 91ce4085
+  patch -p1 -i $srcdir/glibc-2.18-readdir_r-CVE-2013-4237.patch
+  
+  # hack fix for strstr issues on x86
+  patch -p1 -i $srcdir/glibc-2.18-strstr-hackfix.patch
 
-  cd ${srcdir}
-  mkdir glibc-build
-  cd glibc-build
+  mkdir ${srcdir}/glibc-build
+}
 
+build() {
+  cd ${srcdir}/glibc-build
+
   if [[ ${CARCH} = "i686" ]]; then
 # Hack to fix NPTL issues with Xen, only required on 32bit platforms
 # TODO: make separate glibc-xen package for i686

Added: glibc-2.18-readdir_r-CVE-2013-4237.patch
===
--- glibc-2.18-readdir_r-CVE-2013-4237.patch(rev 0)
+++ glibc-2.18-readdir_r-CVE-2013-4237.patch2013-08-16 09:30:21 UTC (rev 
193095)
@@ -0,0 +1,281 @@
+diff --git a/manual/conf.texi b/manual/conf.texi
+index 7eb8b36..c720063 100644
+--- a/manual/conf.texi
 b/manual/conf.texi
+@@ -1149,6 +1149,9 @@ typed ahead as input.  @xref{I/O Queues}.
+ @deftypevr Macro int NAME_MAX
+ The uniform system limit (if any) for the length of a file name component, not
+ including the terminating null character.
++
++@strong{Portability Note:} On some systems, @theglibc{} defines
++@code{NAME_MAX}, but does not actually enforce this limit.
+ @end deftypevr
+ 
+ @comment limits.h
+@@ -1157,6 +1160,9 @@ including the terminating null character.
+ The uniform system limit (if any) for the length of an entire file name (that
+ is, the argument given to system calls such as @code{open}), including the
+ terminating null character.
++
++@strong{Portability Note:} @Theglibc{} does not enforce this limit
++even if @code{PATH_MAX} is defined.
+ @end deftypevr
+ 
+ @cindex limits, pipe buffer size
+@@ -1476,6 +1482,9 @@ Inquire about the value of 
@code{POSIX_REC_MIN_XFER_SIZE}.
+ Inquire about the value of @code{POSIX_REC_XFER_ALIGN}.
+ @end table
+ 
++@strong{Portability Note:} On some systems, @theglibc{} does not
++enforce @code{_PC_NAME_MAX} or @code{_PC_PATH_MAX} limits.
++
+ @node Utility Limits
+ @section Utility Program Capacity Limits
+ 
+diff --git a/manual/filesys.texi b/manual/filesys.texi
+index 1df9cf2..814c210 100644
+--- a/manual/filesys.texi
 b/manual/filesys.texi
+@@ -444,9 +444,9 @@ symbols are declared in the header file @file{dirent.h}.
+ @comment POSIX.1
+ @deftypefun {struct dirent *} readdir (DIR *@var{dirstream})
+ This function reads the next entry from the directory.  It normally
+-returns a pointer to a structure containing information about the file.
+-This structure is statically allocated and can be rewritten by a
+-subsequent call.
++returns a pointer to a structure containing information about the
++file.  This structure is associated with the @var{dirstream} handle
++and can be rewritten by a subsequent call.
+ 
+ @strong{Portability Note:} On some systems @code{readdir} may not
+ return entries for @file{.} and @file{..}, even though these are always
+@@ -461,19 +461,61 @@ conditions are defined for this function:
+ The @var{dirstream} argument is not valid.
+ @end table
+ 
+-@code{readdir} is not thread safe.  Multiple threads using
+-@code{readdir} on the same @var{dirstream} may overwrite the return
+-value.  Use @code{readdir_r} when this is critical.
++To distinguish between an end-of-directory condition or an error, you
++must set @code{errno} to zero before calling @code{read

[arch-commits] Commit in glibc/trunk (3 files)

2013-04-08 Thread Allan McRae
Date: Tuesday, April 9, 2013 @ 00:01:51
  Author: allan
Revision: 182357

upgpkg: glibc 2.17-5

CVE-2013-0242 CVE-2013-1914

Added:
  glibc/trunk/glibc-2.17-getaddrinfo-stack-overflow.patch
  glibc/trunk/glibc-2.17-regexp-matcher-overrun.patch
Modified:
  glibc/trunk/PKGBUILD

-+
 PKGBUILD|   18 ++-
 glibc-2.17-getaddrinfo-stack-overflow.patch |   47 
 glibc-2.17-regexp-matcher-overrun.patch |  137 ++
 3 files changed, 198 insertions(+), 4 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2013-04-08 21:42:10 UTC (rev 182356)
+++ PKGBUILD2013-04-08 22:01:51 UTC (rev 182357)
@@ -6,7 +6,7 @@
 
 pkgname=glibc
 pkgver=2.17
-pkgrel=4
+pkgrel=5
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -21,13 +21,17 @@
 install=glibc.install
 source=(http://ftp.gnu.org/gnu/libc/${pkgname}-${pkgver}.tar.xz{,.sig}
 glibc-2.17-sync-with-linux37.patch
+glibc-2.17-getaddrinfo-stack-overflow.patch
+glibc-2.17-regexp-matcher-overrun.patch
 nscd.service
 nscd.tmpfiles
 locale.gen.txt
 locale-gen)
 md5sums=('87bf675c8ee523ebda4803e8e1cec638'
- '6db4d1661cf34282755dc90330465f6d'
+ 'SKIP'
  'fb99380d94598cc76d793deebf630022'
+ '56d5f2c09503a348281a20ae404b7de3'
+ '200acc05961b084ee00dde919e64f82d'
  'c1e07c0bec0fe89791bfd9d13fc85edf'
  'bccbe5619e75cf1d97312ec3681c605c'
  '07ac979b6ab5eeb778d55f041529d623'
@@ -40,6 +44,12 @@
   # combination of upstream commits 318cd0b, b540704 and fc1abbe
   patch -p1 -i ${srcdir}/glibc-2.17-sync-with-linux37.patch
 
+  # CVE-2013-1914 - upstream commit 1cef1b19
+  patch -p1 -i ${srcdir}/glibc-2.17-getaddrinfo-stack-overflow.patch
+
+  # CVE-2013-0242 - upstream commit a445af0b
+  patch -p1 -i ${srcdir}/glibc-2.17-regexp-matcher-overrun.patch
+
   cd ${srcdir}
   mkdir glibc-build
   cd glibc-build
@@ -52,9 +62,9 @@
 
   echo "slibdir=/usr/lib" >> configparms
 
-  # remove hardening options from CFLAGS for building libraries
+  # remove hardening options for building libraries
   CFLAGS=${CFLAGS/-fstack-protector/}
-  CFLAGS=${CFLAGS/-D_FORTIFY_SOURCE=2/}
+  CPPFLAGS=${CPPFLAGS/-D_FORTIFY_SOURCE=2/}
 
   ${srcdir}/${pkgname}-${pkgver}/configure --prefix=/usr \
   --libdir=/usr/lib --libexecdir=/usr/lib \

Added: glibc-2.17-getaddrinfo-stack-overflow.patch
===
--- glibc-2.17-getaddrinfo-stack-overflow.patch (rev 0)
+++ glibc-2.17-getaddrinfo-stack-overflow.patch 2013-04-08 22:01:51 UTC (rev 
182357)
@@ -0,0 +1,47 @@
+diff --git a/sysdeps/posix/getaddrinfo.c b/sysdeps/posix/getaddrinfo.c
+index d95c2d1..2309281 100644
+--- a/sysdeps/posix/getaddrinfo.c
 b/sysdeps/posix/getaddrinfo.c
+@@ -2489,11 +2489,27 @@ getaddrinfo (const char *name, const char *service,
+   __typeof (once) old_once = once;
+   __libc_once (once, gaiconf_init);
+   /* Sort results according to RFC 3484.  */
+-  struct sort_result results[nresults];
+-  size_t order[nresults];
++  struct sort_result *results;
++  size_t *order;
+   struct addrinfo *q;
+   struct addrinfo *last = NULL;
+   char *canonname = NULL;
++  bool malloc_results;
++
++  malloc_results
++  = !__libc_use_alloca (nresults * (sizeof (*results) + sizeof (size_t)));
++  if (malloc_results)
++  {
++results = malloc (nresults * (sizeof (*results) + sizeof (size_t)));
++if (results == NULL)
++  {
++__free_in6ai (in6ai);
++return EAI_MEMORY;
++  }
++  }
++  else
++  results = alloca (nresults * (sizeof (*results) + sizeof (size_t)));
++  order = (size_t *) (results + nresults);
+ 
+   /* Now we definitely need the interface information.  */
+   if (! check_pf_called)
+@@ -2664,6 +2680,9 @@ getaddrinfo (const char *name, const char *service,
+ 
+   /* Fill in the canonical name into the new first entry.  */
+   p->ai_canonname = canonname;
++
++  if (malloc_results)
++  free (results);
+ }
+ 
+   __free_in6ai (in6ai);
+-- 
+1.7.1
+

Added: glibc-2.17-regexp-matcher-overrun.patch
===
--- glibc-2.17-regexp-matcher-overrun.patch (rev 0)
+++ glibc-2.17-regexp-matcher-overrun.patch 2013-04-08 22:01:51 UTC (rev 
182357)
@@ -0,0 +1,137 @@
+diff --git a/posix/Makefile b/posix/Makefile
+index 88d409f..2cacd21 100644
+--- a/posix/Makefile
 b/posix/Makefile
+@@ -86,7 +86,7 @@ tests:= tstgetopt testfnm runtests runptests 
 \
+  tst-rfc3484-3 \
+  tst-getaddrinfo3 tst-fnmatch2 tst-cpucount tst-cpuset \
+  bug-getopt1 

[arch-commits] Commit in glibc/trunk (3 files)

2012-08-29 Thread Allan McRae
Date: Wednesday, August 29, 2012 @ 07:53:35
  Author: allan
Revision: 165745

upgpkg: glibc 2.16.0-4

fix buffer/integer overflow in strtod and segfault in strncasecmp

Added:
  glibc/trunk/glibc-2.16-strncasecmp-segfault.patch
  glibc/trunk/glibc-2.16-strtod-overflow.patch
Modified:
  glibc/trunk/PKGBUILD

---+
 PKGBUILD  |   14 +
 glibc-2.16-strncasecmp-segfault.patch |   65 +
 glibc-2.16-strtod-overflow.patch  |  389 
 3 files changed, 467 insertions(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2012-08-29 11:46:05 UTC (rev 165744)
+++ PKGBUILD2012-08-29 11:53:35 UTC (rev 165745)
@@ -6,7 +6,7 @@
 
 pkgname=glibc
 pkgver=2.16.0
-pkgrel=3
+pkgrel=4
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
@@ -23,6 +23,8 @@
 glibc-2.15-fix-res_query-assert.patch
 glibc-2.15-revert-c5a0802a.patch
 glibc-2.16-rpcgen-cpp-path.patch
+glibc-2.16-strncasecmp-segfault.patch
+glibc-2.16-strtod-overflow.patch
 nscd.rcd
 nscd.service
 nscd.tmpfiles
@@ -33,6 +35,8 @@
  '31f415b41197d85d3bbee3d1eecd06a3'
  '0a0383d50d63f1c02919fe9943b82014'
  'ea6a43915474e8276e9361eed6a01280'
+ 'f042d37cc8ca3459023431809039bc88'
+ '61d322f7681a85d3293ada5c3ccc2c7e'
  '589d79041aa767a5179eaa4e2737dd3f'
  'ad8a9af15ab7eeaa23dc7ee85024af9f'
  'bccbe5619e75cf1d97312ec3681c605c'
@@ -54,6 +58,14 @@
   # http://sourceware.org/git/?p=glibc.git;a=commit;h=bf9b740a
   patch -p1 -i ${srcdir}/glibc-2.16-rpcgen-cpp-path.patch
 
+  # strncasecmp segfault on i686
+  # http://sourceware.org/git/?p=glibc.git;a=commit;h=6db8f737
+  patch -p1 -i ${srcdir}/glibc-2.16-strncasecmp-segfault.patch
+
+  # strtod integer/buffer overflow
+  # http://sourceware.org/git/?p=glibc.git;a=commit;h=da1f4319
+  patch -p1 -i ${srcdir}/glibc-2.16-strtod-overflow.patch
+
   # ldconfig does not need to look in /usr/lib64 or /usr/libx32 on Arch Linux
   sed -i "s#add_system_dir#do_not_add_system_dir#" 
sysdeps/unix/sysv/linux/x86_64/dl-cache.h
 

Added: glibc-2.16-strncasecmp-segfault.patch
===
--- glibc-2.16-strncasecmp-segfault.patch   (rev 0)
+++ glibc-2.16-strncasecmp-segfault.patch   2012-08-29 11:53:35 UTC (rev 
165745)
@@ -0,0 +1,65 @@
+diff --git a/string/test-strncasecmp.c b/string/test-strncasecmp.c
+index 6c17530..acfe668 100644
+--- a/string/test-strncasecmp.c
 b/string/test-strncasecmp.c
+@@ -1,5 +1,5 @@
+ /* Test and measure strncasecmp functions.
+-   Copyright (C) 1999, 2002, 2003, 2005, 2010 Free Software Foundation, Inc.
++   Copyright (C) 1999-2012 Free Software Foundation, Inc.
+This file is part of the GNU C Library.
+Written by Jakub Jelinek , 1999.
+ 
+@@ -251,9 +251,9 @@ do_random_tests (void)
+ }
+ }
+ 
+-
++/* Regression test for BZ #12205 */
+ static void
+-check1 (void)
++bz12205 (void)
+ {
+   static char cp [4096+16] __attribute__ ((aligned(4096)));
+   static char gotrel[4096] __attribute__ ((aligned(4096)));
+@@ -270,6 +270,15 @@ check1 (void)
+ check_result (impl, s1, s2, n, exp_result);
+ }
+ 
++/* Regression test for BZ #14195 */
++static void
++bz14195 (void)
++{
++  const char *empty_string  = "";
++  FOR_EACH_IMPL (impl, 0)
++check_result (impl, empty_string, "", 5, 0);
++}
++
+ int
+ test_main (void)
+ {
+@@ -277,7 +286,8 @@ test_main (void)
+ 
+   test_init ();
+ 
+-  check1 ();
++  bz12205 ();
++  bz14195 ();
+ 
+   printf ("%23s", "");
+   FOR_EACH_IMPL (impl, 0)
+diff --git a/sysdeps/i386/i686/multiarch/strcmp-ssse3.S 
b/sysdeps/i386/i686/multiarch/strcmp-ssse3.S
+index 5e6321e..9735ad0 100644
+--- a/sysdeps/i386/i686/multiarch/strcmp-ssse3.S
 b/sysdeps/i386/i686/multiarch/strcmp-ssse3.S
+@@ -2445,7 +2445,7 @@ L(less16bytes_sncmp):
+ # endif
+   jne L(neq_sncmp)
+   test%cl, %cl
+-  je  L(eq)
++  je  L(eq_sncmp)
+ 
+   cmp $1, REM
+   je  L(eq_sncmp)
+-- 
+1.7.3.4
+

Added: glibc-2.16-strtod-overflow.patch
===
--- glibc-2.16-strtod-overflow.patch(rev 0)
+++ glibc-2.16-strtod-overflow.patch2012-08-29 11:53:35 UTC (rev 165745)
@@ -0,0 +1,389 @@
+diff --git a/stdlib/Makefile b/stdlib/Makefile
+index f7811c5..79c9acb 100644
+--- a/stdlib/Makefile
 b/stdlib/Makefile
+@@ -68,7 +68,8 @@ tests:= tst-strtol tst-strtod testmb 
testrand testsort testdiv   \
+  tst-atof1 tst-atof2 tst-strtod2 tst-strtod3 tst-rand48-2 \
+  tst-makecontext tst-strtod4 tst-strtod5 tst-qsort2   \
+  tst-makecontext2 tst-strtod6 tst-unsetenv1   \
+- tst-makecont

[arch-commits] Commit in glibc/trunk (3 files)

2011-12-28 Thread Allan McRae
Date: Wednesday, December 28, 2011 @ 03:02:40
  Author: allan
Revision: 145697

upgpkg: glibc 2.15-2

fix random freezes (FS#27737) and nvidia libgl crashes

Added:
  glibc/trunk/glibc-2.15-lddebug-scopes.patch
  glibc/trunk/glibc-2.15-revert-c5a0802a.patch
Modified:
  glibc/trunk/PKGBUILD

--+
 PKGBUILD |   14 ++
 glibc-2.15-lddebug-scopes.patch  |   27 
 glibc-2.15-revert-c5a0802a.patch |  229 +
 3 files changed, 269 insertions(+), 1 deletion(-)

Modified: PKGBUILD
===
--- PKGBUILD2011-12-28 00:18:26 UTC (rev 145696)
+++ PKGBUILD2011-12-28 08:02:40 UTC (rev 145697)
@@ -6,7 +6,7 @@
 
 pkgname=glibc
 pkgver=2.15
-pkgrel=1
+pkgrel=2
 _glibcdate=20111227
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
@@ -29,6 +29,8 @@
 glibc-2.14-revert-4768ae77.patch
 glibc-2.14-reexport-rpc-interface.patch
 glibc-2.14-reinstall-nis-rpc-headers.patch
+glibc-2.15-lddebug-scopes.patch
+glibc-2.15-revert-c5a0802a.patch
 nscd
 locale.gen.txt
 locale-gen)
@@ -41,6 +43,8 @@
  '7da8c554a3b591c7401d7023b1928afc'
  'c5de2a946215d647c8af5432ec4b0da0'
  '55febbb72139ac7b65757df085024b83'
+ '3c219ddfb619b6df903cac4cc42c611d'
+ '7ae3e426251ae33e73dbad71f9c91378'
  'b587ee3a70c9b3713099295609afde49'
  '07ac979b6ab5eeb778d55f041529d623'
  '476e9113489f93b348b21e144b6a8fcf')
@@ -88,6 +92,14 @@
   # http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=bdd816a3 (only 
fedora branch...)
   patch -Np1 -i ${srcdir}/glibc-2.14-reinstall-nis-rpc-headers.patch
 
+  # propriety nvidia crash - 
https://bugzilla.redhat.com/show_bug.cgi?id=737223 
+  # http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=0c95ab64  (only 
fedora branch...)
+  patch -Np1 -i ${srcdir}/glibc-2.15-lddebug-scopes.patch
+
+  # revert commit c5a0802a - causes various hangs
+  # https://bugzilla.redhat.com/show_bug.cgi?id=769421
+  patch -Np1 -i ${srcdir}/glibc-2.15-revert-c5a0802a.patch
+
   install -dm755 ${pkgdir}/etc
   touch ${pkgdir}/etc/ld.so.conf
 

Added: glibc-2.15-lddebug-scopes.patch
===
--- glibc-2.15-lddebug-scopes.patch (rev 0)
+++ glibc-2.15-lddebug-scopes.patch 2011-12-28 08:02:40 UTC (rev 145697)
@@ -0,0 +1,27 @@
+From 0c95ab64cb4ec0d22bb222647d9d20c7b4903e38 Mon Sep 17 00:00:00 2001
+From: Andreas Schwab 
+Date: Fri, 7 Oct 2011 09:31:27 +0200
+Subject: [PATCH] Horrible workaround for horribly broken software
+
+---
+ elf/rtld.c |4 +++-
+ 1 files changed, 3 insertions(+), 1 deletions(-)
+
+diff --git a/elf/rtld.c b/elf/rtld.c
+index 978c609..8422b9f 100644
+--- a/elf/rtld.c
 b/elf/rtld.c
+@@ -1393,7 +1393,9 @@ of this helper program; chances are you did not intend 
to run this program.\n\
+ char *copy = malloc (len);
+ if (copy == NULL)
+   _dl_fatal_printf ("out of memory\n");
+-l->l_libname->name = l->l_name = memcpy (copy, dsoname, len);
++l->l_libname->name = memcpy (copy, dsoname, len);
++if (GLRO(dl_debug_mask))
++  l->l_name = copy;
+   }
+ 
+ /* Add the vDSO to the object list.  */
+-- 
+1.7.3.4
+

Added: glibc-2.15-revert-c5a0802a.patch
===
--- glibc-2.15-revert-c5a0802a.patch(rev 0)
+++ glibc-2.15-revert-c5a0802a.patch2011-12-28 08:02:40 UTC (rev 145697)
@@ -0,0 +1,229 @@
+diff -rup a/nptl/sysdeps/unix/sysv/linux/i386/i486/pthread_cond_wait.S 
b/nptl/sysdeps/unix/sysv/linux/i386/i486/pthread_cond_wait.S
+--- a/nptl/sysdeps/unix/sysv/linux/i386/i486/pthread_cond_wait.S   
2011-12-22 18:04:12.937212834 +
 b/nptl/sysdeps/unix/sysv/linux/i386/i486/pthread_cond_wait.S   
2011-12-22 18:04:42.10478 +
+@@ -137,7 +137,6 @@ __pthread_cond_wait:
+   cmpl$PI_BIT, %eax
+   jne 18f
+ 
+-90:
+   movl$(FUTEX_WAIT_REQUEUE_PI|FUTEX_PRIVATE_FLAG), %ecx
+   movl%ebp, %edx
+   xorl%esi, %esi
+@@ -151,9 +150,6 @@ __pthread_cond_wait:
+   sete16(%esp)
+   je  19f
+ 
+-  cmpl$-EAGAIN, %eax
+-  je  91f
+-
+   /* Normal and PI futexes dont mix. Use normal futex functions only
+  if the kernel does not support the PI futex functions.  */
+   cmpl$-ENOSYS, %eax
+@@ -398,78 +394,6 @@ __pthread_cond_wait:
+ #endif
+   call__lll_unlock_wake
+   jmp 11b
+-
+-91:
+-.LcleanupSTART2:
+-  /* FUTEX_WAIT_REQUEUE_PI returned EAGAIN.  We need to
+- call it again.  */
+-
+-  /* Get internal lock.  */
+-  movl$1, %edx
+-  xorl%eax, %eax
+-  LOCK
+-#if cond_lock == 0
+-  cmpxchgl %edx, (%ebx)
+-#else
+-  cmpxchgl %edx, cond_lo

[arch-commits] Commit in glibc/trunk (3 files)

2011-06-07 Thread Allan McRae
Date: Tuesday, June 7, 2011 @ 05:42:56
  Author: allan
Revision: 126779

upgpkg: glibc 2.14-1
upstream update, add patch to fix libdl crash

Added:
  glibc/trunk/glibc-2.14-libdl-crash.patch
Modified:
  glibc/trunk/PKGBUILD
Deleted:
  glibc/trunk/glibc-2.13-prelink.patch

--+
 PKGBUILD |   30 +
 glibc-2.13-prelink.patch |   26 
 glibc-2.14-libdl-crash.patch |  132 +
 3 files changed, 149 insertions(+), 39 deletions(-)

Modified: PKGBUILD
===
--- PKGBUILD2011-06-07 08:02:02 UTC (rev 126778)
+++ PKGBUILD2011-06-07 09:42:56 UTC (rev 126779)
@@ -5,15 +5,15 @@
 # NOTE: valgrind requires rebuilt with each new glibc version
 
 pkgname=glibc
-pkgver=2.13
-pkgrel=5
-_glibcdate=20110117
+pkgver=2.14
+pkgrel=1
+_glibcdate=20110605
 pkgdesc="GNU C Library"
 arch=('i686' 'x86_64')
 url="http://www.gnu.org/software/libc";
 license=('GPL' 'LGPL')
 groups=('base')
-depends=('linux-api-headers>=2.6.37' 'tzdata')
+depends=('linux-api-headers>=2.6.39' 'tzdata')
 makedepends=('gcc>=4.4')
 backup=(etc/locale.gen
 etc/nscd.conf)
@@ -25,19 +25,19 @@
 glibc-__i686.patch
 glibc-2.12.1-static-shared-getpagesize.patch
 glibc-2.12.2-ignore-origin-of-privileged-program.patch
-glibc-2.13-prelink.patch
 glibc-2.13-futex.patch
+glibc-2.14-libdl-crash.patch
 nscd
 locale.gen.txt
 locale-gen)
-md5sums=('b7b17d9c6b5b71b5e5322e04ca63c190'
+md5sums=('a96742599fc8a99e52b9e344f39a1000'
  '4dadb9203b69a3210d53514bb46f41c3'
  '0c5540efc51c0b93996c51b57a8540ae'
  '40cd342e21f71f5e49e32622b25acc52'
  'a3ac6f318d680347bb6e2805d42b73b2'
  'b042647ea7d6f22ad319e12e796bd13e'
- '24dfab6fd244f3773523412588ecc52c'
  '7d0154b7e17ea218c9fa953599d24cc4'
+ 'cea62cc6b903d222c5f26e05a3c0e0e6'
  'b587ee3a70c9b3713099295609afde49'
  '07ac979b6ab5eeb778d55f041529d623'
  '476e9113489f93b348b21e144b6a8fcf')
@@ -45,7 +45,8 @@
 mksource() {
   git clone git://sourceware.org/git/glibc.git
   pushd glibc
-  git checkout -b glibc-2.13-arch origin/release/2.13/master
+  git checkout -b glibc-2.14-arch origin/master
+  # git checkout -b glibc-2.14-arch origin/release/2.14/master
   popd
   tar -cvJf glibc-${pkgver}_${_glibcdate}.tar.xz glibc/*
 }
@@ -71,13 +72,13 @@
   # http://sourceware.org/git/?p=glibc.git;a=patch;h=d14e6b09 (only fedora 
branch...)
   patch -Np1 -i 
${srcdir}/glibc-2.12.2-ignore-origin-of-privileged-program.patch
 
-  # http://sourceware.org/bugzilla/show_bug.cgi?id=12489
-  # http://sourceware.org/git/?p=glibc.git;a=commit;h=25b3aada (only fedora 
branch...)
-  patch -Np1 -i ${srcdir}/glibc-2.13-prelink.patch
-
   # http://sourceware.org/bugzilla/show_bug.cgi?id=12403
   patch -Np1 -i ${srcdir}/glibc-2.13-futex.patch
 
+  # http://sourceware.org/git/?p=glibc.git;a=commitdiff;h=675155e9 (only 
fedora branch...)
+  # http://sourceware.org/ml/libc-alpha/2011-06/msg6.html
+  patch -Np1 -i ${srcdir}/glibc-2.14-fix-memory-leak.patch
+
   install -dm755 ${pkgdir}/etc
   touch ${pkgdir}/etc/ld.so.conf
 
@@ -154,7 +155,7 @@
 usr/bin/{gencat,getconf,getent,iconv,locale} \
 usr/bin/{localedef,pcprofiledump,rpcgen,sprof} \
 usr/lib/getconf/* \
-usr/sbin/{iconvconfig,nscd,rpcinfo}
+usr/sbin/{iconvconfig,nscd}
   [[ $CARCH = "i686" ]] && strip $STRIP_BINARIES usr/bin/lddlibc4
 
   strip $STRIP_STATIC usr/lib/*.a \
@@ -165,4 +166,7 @@
   
lib/{libdl,libm,libnsl,libresolv,librt,libutil}-${pkgver}.so \
   lib/{libmemusage,libpcprofile,libSegFault}.so \
   usr/lib/{pt_chown,gconv/*.so}
+
+# add usr/lib/audit/sotruss-lib.so, usr/bin/sotruss
+
 }

Deleted: glibc-2.13-prelink.patch
===
--- glibc-2.13-prelink.patch2011-06-07 08:02:02 UTC (rev 126778)
+++ glibc-2.13-prelink.patch2011-06-07 09:42:56 UTC (rev 126779)
@@ -1,26 +0,0 @@
-diff --git a/elf/rtld.c b/elf/rtld.c
-index 9a560b3..201c9cf 100644
 a/elf/rtld.c
-+++ b/elf/rtld.c
-@@ -2168,6 +2168,10 @@ ERROR: ld.so: object '%s' cannot be loaded as audit 
interface: %s; ignored.\n",
-  we need it in the memory handling later.  */
-   GLRO(dl_initial_searchlist) = *GL(dl_ns)[LM_ID_BASE]._ns_main_searchlist;
- 
-+  /* Remember the last search directory added at startup, now that
-+ malloc will no longer be the one from dl-minimal.c.  */
-+  GLRO(dl_init_all_dirs) = GL(dl_all_dirs);
-+
-   if (prelinked)
- {
-   if (main_map->l_info [ADDRIDX (DT_GNU_CONFLICT)] != NULL)
-@@ -2288,10 +2292,6 @@ ERROR: ld.so: object '%s' cannot be loaded as audit 
interface: %s; ignored.\n",
- lossage);
-