[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: af0496ea43cc04ac68b011bf903daf3cc3dd556b Author: Sergei Trofimovich gentoo org> AuthorDate: Mon Jul 5 20:40:38 2021 + Commit: Sergei Trofimovich gentoo org> CommitDate: Mon Jul 5 20:45:12 2021 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=af0496ea 6.5.0: cut 6 patchset Two new changes: + 29_all_plugin-objdump.patch: use host-prefixed objdump + 30_all_remove-cyclades.patch: fix build failure against linux-headers-5.13 Bug: https://gcc.gnu.org/PR95648 Bug: https://gcc.gnu.org/PR100379 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/README.history | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 4b5d007..de5a2db 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,4 +1,4 @@ -6 TODO +6 05 July 2021 + 29_all_plugin-objdump.patch + 30_all_remove-cyclades.patch
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 18578570bd719b32adef63c43ea97043ce8c6059 Author: Sergei Trofimovich gentoo org> AuthorDate: Mon Jul 5 20:29:56 2021 + Commit: Sergei Trofimovich gentoo org> CommitDate: Mon Jul 5 20:29:56 2021 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=18578570 6.5.0: backport linux/cyclades.h include removal Upstream sanitizer commit commit: https://reviews.llvm.org/D102059 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/30_all_remove-cyclades.patch | 108 ++ 6.5.0/gentoo/README.history | 1 + 2 files changed, 109 insertions(+) diff --git a/6.5.0/gentoo/30_all_remove-cyclades.patch b/6.5.0/gentoo/30_all_remove-cyclades.patch new file mode 100644 index 000..f386c52 --- /dev/null +++ b/6.5.0/gentoo/30_all_remove-cyclades.patch @@ -0,0 +1,108 @@ +From 68d5235cb58f988c71b403334cd9482d663841ab Mon Sep 17 00:00:00 2001 +From: Tamar Christina +Date: Thu, 20 May 2021 18:55:11 +0100 +Subject: [PATCH] libsanitizer: Remove cyclades inclusion in sanitizer + +The Linux kernel has removed the interface to cyclades from +the latest kernel headers[1] due to them being orphaned for the +past 13 years. + +libsanitizer uses this header when compiling against glibc, but +glibcs itself doesn't seem to have any references to cyclades. + +Further more it seems that the driver is broken in the kernel and +the firmware doesn't seem to be available anymore. + +As such since this is breaking the build of libsanitizer (and so the +GCC bootstrap[2]) I propose to remove this. + +[1] https://lkml.org/lkml/2021/3/2/153 +[2] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100379 + +Reviewed By: eugenis + +Differential Revision: https://reviews.llvm.org/D102059 +--- + .../sanitizer_common_interceptors_ioctl.inc | 9 - + .../sanitizer_platform_limits_posix.cpp | 11 --- + .../sanitizer_platform_limits_posix.h | 10 -- + 3 files changed, 30 deletions(-) + +--- a/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc b/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc +@@ -358,15 +358,6 @@ static void ioctl_table_fill() { + + #if SANITIZER_LINUX && !SANITIZER_ANDROID + // _(SIOCDEVPLIP, WRITE, struct_ifreq_sz); // the same as EQL_ENSLAVE +- _(CYGETDEFTHRESH, WRITE, sizeof(int)); +- _(CYGETDEFTIMEOUT, WRITE, sizeof(int)); +- _(CYGETMON, WRITE, struct_cyclades_monitor_sz); +- _(CYGETTHRESH, WRITE, sizeof(int)); +- _(CYGETTIMEOUT, WRITE, sizeof(int)); +- _(CYSETDEFTHRESH, NONE, 0); +- _(CYSETDEFTIMEOUT, NONE, 0); +- _(CYSETTHRESH, NONE, 0); +- _(CYSETTIMEOUT, NONE, 0); + _(EQL_EMANCIPATE, WRITE, struct_ifreq_sz); + _(EQL_ENSLAVE, WRITE, struct_ifreq_sz); + _(EQL_GETMASTRCFG, WRITE, struct_ifreq_sz); +--- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc +@@ -150,7 +150,6 @@ typedef struct user_fpregs elf_fpregset_t; + # include + #endif + #include +-#include + #include + #include + #include +@@ -445,7 +444,6 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr); + + #if SANITIZER_LINUX && !SANITIZER_ANDROID + unsigned struct_ax25_parms_struct_sz = sizeof(struct ax25_parms_struct); +- unsigned struct_cyclades_monitor_sz = sizeof(struct cyclades_monitor); + #if EV_VERSION > (0x01) + unsigned struct_input_keymap_entry_sz = sizeof(struct input_keymap_entry); + #else +@@ -812,15 +810,6 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr); + #endif // SANITIZER_LINUX || SANITIZER_FREEBSD + + #if SANITIZER_LINUX && !SANITIZER_ANDROID +- unsigned IOCTL_CYGETDEFTHRESH = CYGETDEFTHRESH; +- unsigned IOCTL_CYGETDEFTIMEOUT = CYGETDEFTIMEOUT; +- unsigned IOCTL_CYGETMON = CYGETMON; +- unsigned IOCTL_CYGETTHRESH = CYGETTHRESH; +- unsigned IOCTL_CYGETTIMEOUT = CYGETTIMEOUT; +- unsigned IOCTL_CYSETDEFTHRESH = CYSETDEFTHRESH; +- unsigned IOCTL_CYSETDEFTIMEOUT = CYSETDEFTIMEOUT; +- unsigned IOCTL_CYSETTHRESH = CYSETTHRESH; +- unsigned IOCTL_CYSETTIMEOUT = CYSETTIMEOUT; + unsigned IOCTL_EQL_EMANCIPATE = EQL_EMANCIPATE; + unsigned IOCTL_EQL_ENSLAVE = EQL_ENSLAVE; + unsigned IOCTL_EQL_GETMASTRCFG = EQL_GETMASTRCFG; +--- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h +@@ -956,7 +956,6 @@ struct __sanitizer_cookie_io_functions_t { + + #if SANITIZER_LINUX && !SANITIZER_ANDROID + extern unsigned struct_ax25_parms_struct_sz; +- extern unsigned struct_cyclades_monitor_sz; + extern unsigned struct_input_keymap_entry_sz; + extern unsigned struct_ipx_config_data_sz; + extern unsigned struct_kbdiacrs_sz; +@@ -1301,15 +1300,6 @@ struct __sanitizer_cookie_io_functions_t { + #endif // SANITIZER_LINUX || SANITIZER_FREEBSD + + #if SANITIZER_LINUX && !SANITIZER_ANDROID +- extern unsigned IOCTL_CYGETDEFTHRESH; +- extern unsigned IOCTL_CYGETD
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 9ab4da60a1985cd5893909d8391c41d7748a8333 Author: Sergei Trofimovich gentoo org> AuthorDate: Fri Aug 28 19:02:07 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Fri Aug 28 19:02:07 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=9ab4da60 6.5.0: backport 'objdump' lookup for plugins Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/29_all_plugin-objdump.patch | 34 6.5.0/gentoo/README.history | 3 +++ 2 files changed, 37 insertions(+) diff --git a/6.5.0/gentoo/29_all_plugin-objdump.patch b/6.5.0/gentoo/29_all_plugin-objdump.patch new file mode 100644 index 000..a9c33fd --- /dev/null +++ b/6.5.0/gentoo/29_all_plugin-objdump.patch @@ -0,0 +1,34 @@ +https://gcc.gnu.org/PR95648 +--- a/config/gcc-plugin.m4 b/config/gcc-plugin.m4 +@@ -45,7 +45,7 @@ AC_DEFUN([GCC_ENABLE_PLUGINS], + ;; + *) +if test x$build = x$host; then +- export_sym_check="objdump${exeext} -T" ++ export_sym_check="$ac_cv_prog_OBJDUMP -T" +elif test x$host = x$target; then +export_sym_check="$gcc_cv_objdump -T" +else +--- a/gcc/configure b/gcc/configure +@@ -30386,7 +30386,7 @@ fi + ;; + *) +if test x$build = x$host; then +- export_sym_check="objdump${exeext} -T" ++ export_sym_check="$ac_cv_prog_OBJDUMP -T" +elif test x$host = x$target; then +export_sym_check="$gcc_cv_objdump -T" +else +--- a/libcc1/configure b/libcc1/configure +@@ -14819,7 +14819,7 @@ fi + ;; + *) +if test x$build = x$host; then +- export_sym_check="objdump${exeext} -T" ++ export_sym_check="$ac_cv_prog_OBJDUMP -T" +elif test x$host = x$target; then +export_sym_check="$gcc_cv_objdump -T" +else diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 6a5a3b6..ad18659 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,3 +1,6 @@ +6 TODO + + 29_all_plugin-objdump.patch + 5 15 July 2020 + 28_all_libjava-multilib.patch
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 50ac938516d2f714572c1c0c9cc05453f22fe0c4 Author: Sergei Trofimovich gentoo org> AuthorDate: Wed Jul 15 07:02:32 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Wed Jul 15 07:02:32 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=50ac9385 6.5.0: cut 5 patchset Single new patch to handle libjava's multilib. Reported-by: Georgi Georgiev Bug: https://bugs.gentoo.org/504812 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/README.history | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 7abc3b1..6a5a3b6 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,4 +1,4 @@ -5 TODO +5 15 July 2020 + 28_all_libjava-multilib.patch 4 29 May 2020
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 7b3aef40645e579e28c5ad34d566097aa44f4416 Author: Sergei Trofimovich gentoo org> AuthorDate: Tue Jul 14 23:22:56 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Tue Jul 14 23:22:56 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=7b3aef40 6.5.0: install libgcj.spec into multilib directory Reported-by: Georgi Georgiev Bug: https://bugs.gentoo.org/504812 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/28_all_libjava-multilib.patch | 129 + 6.5.0/gentoo/README.history| 3 + 2 files changed, 132 insertions(+) diff --git a/6.5.0/gentoo/28_all_libjava-multilib.patch b/6.5.0/gentoo/28_all_libjava-multilib.patch new file mode 100644 index 000..977a428 --- /dev/null +++ b/6.5.0/gentoo/28_all_libjava-multilib.patch @@ -0,0 +1,129 @@ +Install libgcj.spec into multilib directory, not just main $(libdir). + +https://bugs.gentoo.org/504812 +--- a/libjava/Makefile.am b/libjava/Makefile.am +@@ -44,7 +44,7 @@ libexecsubdir = $(libexecdir)/gcc/$(target_noncanonical)/$(gcc_version) + ## + + toolexeclib_LTLIBRARIES = libgcj.la libgij.la libgcj-tools.la +-toolexecmainlib_DATA = libgcj.spec ++toolexeclib_DATA = libgcj.spec + + ## + ## These files form a closed dependency group at the lower +--- a/libjava/Makefile.in b/libjava/Makefile.in +@@ -178,7 +178,7 @@ am__installdirs = "$(DESTDIR)$(dbexecdir)" \ + "$(DESTDIR)$(toolexeclibdir)" "$(DESTDIR)$(bindir)" \ + "$(DESTDIR)$(libexecsubdir)" "$(DESTDIR)$(bindir)" \ + "$(DESTDIR)$(dbexecdir)" "$(DESTDIR)$(jardir)" \ +- "$(DESTDIR)$(toolexecmainlibdir)" ++ "$(DESTDIR)$(toolexeclibdir)" + LTLIBRARIES = $(dbexec_LTLIBRARIES) $(noinst_LTLIBRARIES) \ + $(toolexeclib_LTLIBRARIES) + install_libgcj_bc_la_LIBADD = +@@ -540,7 +540,7 @@ am__can_run_installinfo = \ + n|no|NO) false;; \ + *) (install-info --version) >/dev/null 2>&1;; \ + esac +-DATA = $(dbexec_DATA) $(jar_DATA) $(toolexecmainlib_DATA) ++DATA = $(dbexec_DATA) $(jar_DATA) $(toolexeclib_DATA) + RECURSIVE_CLEAN_TARGETS = mostlyclean-recursive clean-recursive \ + distclean-recursive maintainer-clean-recursive + AM_RECURSIVE_TARGETS = $(RECURSIVE_TARGETS:-recursive=) \ +@@ -828,7 +828,7 @@ libsubdir = $(libdir)/gcc/$(target_noncanonical)/$(gcc_version) + libexecsubdir = $(libexecdir)/gcc/$(target_noncanonical)/$(gcc_version) + toolexeclib_LTLIBRARIES = libgcj.la libgij.la libgcj-tools.la \ + $(am__append_2) $(am__append_3) $(am__append_4) +-toolexecmainlib_DATA = libgcj.spec ++toolexeclib_DATA = libgcj.spec + LOWER_PACKAGE_FILES_LO = \ + $(propertyo_files) \ + gnu-CORBA.lo \ +@@ -10249,27 +10249,27 @@ uninstall-jarDATA: + @list='$(jar_DATA)'; test -n "$(jardir)" || list=; \ + files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \ + dir='$(DESTDIR)$(jardir)'; $(am__uninstall_files_from_dir) +-install-toolexecmainlibDATA: $(toolexecmainlib_DATA) ++install-toolexeclibDATA: $(toolexeclib_DATA) + @$(NORMAL_INSTALL) +- @list='$(toolexecmainlib_DATA)'; test -n "$(toolexecmainlibdir)" || list=; \ ++ @list='$(toolexeclib_DATA)'; test -n "$(toolexeclibdir)" || list=; \ + if test -n "$$list"; then \ +-echo " $(MKDIR_P) '$(DESTDIR)$(toolexecmainlibdir)'"; \ +-$(MKDIR_P) "$(DESTDIR)$(toolexecmainlibdir)" || exit 1; \ ++echo " $(MKDIR_P) '$(DESTDIR)$(toolexeclibdir)'"; \ ++$(MKDIR_P) "$(DESTDIR)$(toolexeclibdir)" || exit 1; \ + fi; \ + for p in $$list; do \ + if test -f "$$p"; then d=; else d="$(srcdir)/"; fi; \ + echo "$$d$$p"; \ + done | $(am__base_list) | \ + while read files; do \ +-echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(toolexecmainlibdir)'"; \ +-$(INSTALL_DATA) $$files "$(DESTDIR)$(toolexecmainlibdir)" || exit $$?; \ ++echo " $(INSTALL_DATA) $$files '$(DESTDIR)$(toolexeclibdir)'"; \ ++$(INSTALL_DATA) $$files "$(DESTDIR)$(toolexeclibdir)" || exit $$?; \ + done + +-uninstall-toolexecmainlibDATA: ++uninstall-toolexeclibDATA: + @$(NORMAL_UNINSTALL) +- @list='$(toolexecmainlib_DATA)'; test -n "$(toolexecmainlibdir)" || list=; \ ++ @list='$(toolexeclib_DATA)'; test -n "$(toolexeclibdir)" || list=; \ + files=`for p in $$list; do echo $$p; done | sed -e 's|^.*/||'`; \ +- dir='$(DESTDIR)$(toolexecmainlibdir)'; $(am__uninstall_files_from_dir) ++ dir='$(DESTDIR)$(toolexeclibdir)'; $(am__uninstall_files_from_dir) + + # This directory's subdirectories are mostly independent; you can cd + # into them and run `make' without going through this Makefile. +@@ -10411,7 +10411,7 @@ all-am: Makefile $(LTLIBRARIES) $(PROGRAMS) $(SCRIPTS) all-multi \ + $(DATA) + installdirs: installdirs-recursive + installdirs-am: +- for dir in "$(DESTDIR)$(dbexecdir)" "$(DESTDIR)$(toolexeclibdir)" "$(DESTDIR)$(bindir)" "$(DESTDIR)$(libexecsubdi
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: ee123ef6de6bdce12afbd801604342349765371e Author: Sergei Trofimovich gentoo org> AuthorDate: Fri May 29 21:16:19 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Fri May 29 21:16:19 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=ee123ef6 6.5.0: cut 4 patchset Two new patches: + 26_all_libcpp-ar.patch: respect user's AR + 27_all_alignof-failure-PR90736.patch: avoid gcc ICE in templates Reported-by: Agostino Sarubbo Bug: https://bugs.gentoo.org/718004 Bug: https://gcc.gnu.org/PR94657 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/README.history | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 8b342e7..fa27b2a 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,4 +1,4 @@ -4 TODO +4 29 May 2020 + 26_all_libcpp-ar.patch + 27_all_whitespace-pa.patch
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 9076212373bfaed5b0603a6670dd92b6b7deb861 Author: Sergei Trofimovich gentoo org> AuthorDate: Fri May 29 18:17:18 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Fri May 29 18:17:18 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=90762123 6.5.0: fix libcpp ar detection, backport whitespace change Reported-by: Agostino Sarubbo Bug: https://bugs.gentoo.org/718004 Bug: https://gcc.gnu.org/PR94657 Reported-by: Jeroen Roovers Bug: https://bugs.gentoo.org/725676 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/26_all_libcpp-ar.patch | 143 6.5.0/gentoo/27_all_whitespace-pa.patch | 28 +++ 6.5.0/gentoo/README.history | 4 + 3 files changed, 175 insertions(+) diff --git a/6.5.0/gentoo/26_all_libcpp-ar.patch b/6.5.0/gentoo/26_all_libcpp-ar.patch new file mode 100644 index 000..55f2944 --- /dev/null +++ b/6.5.0/gentoo/26_all_libcpp-ar.patch @@ -0,0 +1,143 @@ +https://bugs.gentoo.org/718004 +https://gcc.gnu.org/PR94657 + +Make sue we use ${CHOST}-ar and not 'ar'. + +--- a/libcpp/configure.ac b/libcpp/configure.ac +@@ -12,6 +12,7 @@ AC_PROG_INSTALL + AC_PROG_CC + AC_PROG_CXX + AC_PROG_RANLIB ++AC_CHECK_TOOL(AR, ar) + + AC_USE_SYSTEM_EXTENSIONS + AC_SYS_LARGEFILE +--- a/libcpp/Makefile.in b/libcpp/Makefile.in +@@ -25,7 +25,7 @@ srcdir = @srcdir@ + top_builddir = . + VPATH = @srcdir@ + INSTALL = @INSTALL@ +-AR = ar ++AR = @AR@ + ARFLAGS = cru + ACLOCAL = @ACLOCAL@ + AUTOCONF = @AUTOCONF@ +--- a/libcpp/configure b/libcpp/configure +@@ -657,6 +657,7 @@ ACLOCAL + EGREP + GREP + CPP ++AR + RANLIB + ac_ct_CXX + CXXFLAGS +@@ -1038,6 +1039,7 @@ do + | -silent | --silent | --silen | --sile | --sil) + silent=yes ;; + ++ + -sbindir | --sbindir | --sbindi | --sbind | --sbin | --sbi | --sb) + ac_prev=sbindir ;; + -sbindir=* | --sbindir=* | --sbindi=* | --sbind=* | --sbin=* \ +@@ -4006,6 +4008,98 @@ else + RANLIB="$ac_cv_prog_RANLIB" + fi + ++if test -n "$ac_tool_prefix"; then ++ # Extract the first word of "${ac_tool_prefix}ar", so it can be a program name with args. ++set dummy ${ac_tool_prefix}ar; ac_word=$2 ++{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 ++$as_echo_n "checking for $ac_word... " >&6; } ++if ${ac_cv_prog_AR+:} false; then : ++ $as_echo_n "(cached) " >&6 ++else ++ if test -n "$AR"; then ++ ac_cv_prog_AR="$AR" # Let the user override the test. ++else ++as_save_IFS=$IFS; IFS=$PATH_SEPARATOR ++for as_dir in $PATH ++do ++ IFS=$as_save_IFS ++ test -z "$as_dir" && as_dir=. ++for ac_exec_ext in '' $ac_executable_extensions; do ++ if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then ++ac_cv_prog_AR="${ac_tool_prefix}ar" ++$as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 ++break 2 ++ fi ++done ++ done ++IFS=$as_save_IFS ++ ++fi ++fi ++AR=$ac_cv_prog_AR ++if test -n "$AR"; then ++ { $as_echo "$as_me:${as_lineno-$LINENO}: result: $AR" >&5 ++$as_echo "$AR" >&6; } ++else ++ { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 ++$as_echo "no" >&6; } ++fi ++ ++ ++fi ++if test -z "$ac_cv_prog_AR"; then ++ ac_ct_AR=$AR ++ # Extract the first word of "ar", so it can be a program name with args. ++set dummy ar; ac_word=$2 ++{ $as_echo "$as_me:${as_lineno-$LINENO}: checking for $ac_word" >&5 ++$as_echo_n "checking for $ac_word... " >&6; } ++if ${ac_cv_prog_ac_ct_AR+:} false; then : ++ $as_echo_n "(cached) " >&6 ++else ++ if test -n "$ac_ct_AR"; then ++ ac_cv_prog_ac_ct_AR="$ac_ct_AR" # Let the user override the test. ++else ++as_save_IFS=$IFS; IFS=$PATH_SEPARATOR ++for as_dir in $PATH ++do ++ IFS=$as_save_IFS ++ test -z "$as_dir" && as_dir=. ++for ac_exec_ext in '' $ac_executable_extensions; do ++ if as_fn_executable_p "$as_dir/$ac_word$ac_exec_ext"; then ++ac_cv_prog_ac_ct_AR="ar" ++$as_echo "$as_me:${as_lineno-$LINENO}: found $as_dir/$ac_word$ac_exec_ext" >&5 ++break 2 ++ fi ++done ++ done ++IFS=$as_save_IFS ++ ++fi ++fi ++ac_ct_AR=$ac_cv_prog_ac_ct_AR ++if test -n "$ac_ct_AR"; then ++ { $as_echo "$as_me:${as_lineno-$LINENO}: result: $ac_ct_AR" >&5 ++$as_echo "$ac_ct_AR" >&6; } ++else ++ { $as_echo "$as_me:${as_lineno-$LINENO}: result: no" >&5 ++$as_echo "no" >&6; } ++fi ++ ++ if test "x$ac_ct_AR" = x; then ++AR="" ++ else ++case $cross_compiling:$ac_tool_warned in ++yes:) ++{ $as_echo "$as_me:${as_lineno-$LINENO}: WARNING: using cross tools not prefixed with host triplet" >&5 ++$as_echo "$as_me: WARNING: using cross tools not prefixed with host triplet" >&2;} ++ac_tool_warned=yes ;; ++esac ++AR=$ac_ct_AR ++ fi ++else ++ AR="$ac_cv_prog_AR" ++fi ++ + + + ac_ext=c diff --git a/6.5.0/gentoo/27_all_whitespace-pa.patch b/6.5.0/gentoo/27_all_whitespace-pa.patch new file mode 100644 index 000..9c65b29 --- /dev/null +++ b/6.5.0/gentoo/27_all_whitespace-pa.patch @@ -0,0 +1,28 @@ +From bd7a5c5dc082707dd62083514bbb88c6f78e
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: d11d0f05b715fd80d07e50cbeb66ee7aca8271b8 Author: Sergei Trofimovich gentoo org> AuthorDate: Tue Mar 24 00:21:58 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Tue Mar 24 00:21:58 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=d11d0f05 6.5.0: cut 3 patchset Two new patches to add sanitizer compatibility with glibc-2.31: + 24_all_libsanitizer-p1.patch + 25_all_libsanitizer-p2.patch Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/README.history | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 28a78e6..bc183eb 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,4 +1,4 @@ -3 TODO +3 24 Mar 2020 + 24_all_libsanitizer-p1.patch + 25_all_libsanitizer-p2.patch
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 5bc00b95169b79afd35918186196900b5ac7e9b8 Author: Sergei Trofimovich gentoo org> AuthorDate: Sat Mar 21 13:52:09 2020 + Commit: Sergei Trofimovich gentoo org> CommitDate: Sat Mar 21 13:52:09 2020 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=5bc00b95 6.5.0: backport glibc-2.31 libsanitizer fixes Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/24_all_libsanitizer-p1.patch | 33 6.5.0/gentoo/25_all_libsanitizer-p2.patch | 63 +++ 6.5.0/gentoo/README.history | 4 ++ 3 files changed, 100 insertions(+) diff --git a/6.5.0/gentoo/24_all_libsanitizer-p1.patch b/6.5.0/gentoo/24_all_libsanitizer-p1.patch new file mode 100644 index 000..9bc5426 --- /dev/null +++ b/6.5.0/gentoo/24_all_libsanitizer-p1.patch @@ -0,0 +1,33 @@ +From 54d87ffe4b34052f159ac5b72b250129ce813b2a Mon Sep 17 00:00:00 2001 +From: Jakub Jelinek +Date: Fri, 14 Feb 2020 12:33:27 +0100 +Subject: [PATCH] backport: re PR sanitizer/92154 (new glibc breaks arm + bootstrap due to libsanitizer) + + Backported from mainline + 2019-10-22 Tamar Christina + + PR sanitizer/92154 + * sanitizer_common/sanitizer_platform_limits_posix.cc: + Cherry-pick compiler-rt revision r375220. +--- +--- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc +@@ -1128,12 +1128,16 @@ CHECK_SIZE_AND_OFFSET(ipc_perm, gid); + CHECK_SIZE_AND_OFFSET(ipc_perm, cuid); + CHECK_SIZE_AND_OFFSET(ipc_perm, cgid); + #ifndef __GLIBC_PREREQ + #define __GLIBC_PREREQ(x, y) 0 + #endif +-#if !defined(__aarch64__) || !SANITIZER_LINUX || __GLIBC_PREREQ (2, 21) ++#if (!defined(__aarch64__) || !SANITIZER_LINUX || __GLIBC_PREREQ (2, 21)) && \ ++!defined(__arm__) + /* On aarch64 glibc 2.20 and earlier provided incorrect mode field. */ ++/* On Arm glibc 2.31 and later provide a different mode field, this field is ++ never used by libsanitizer so we can simply ignore this assert for all glibc ++ versions. */ + CHECK_SIZE_AND_OFFSET(ipc_perm, mode); + #endif + + CHECK_TYPE_SIZE(shmid_ds); + CHECK_SIZE_AND_OFFSET(shmid_ds, shm_perm); diff --git a/6.5.0/gentoo/25_all_libsanitizer-p2.patch b/6.5.0/gentoo/25_all_libsanitizer-p2.patch new file mode 100644 index 000..dea9073 --- /dev/null +++ b/6.5.0/gentoo/25_all_libsanitizer-p2.patch @@ -0,0 +1,63 @@ +From dbdf86838aaaef76620c00c53096cfe157d5af6e Mon Sep 17 00:00:00 2001 +From: Jakub Jelinek +Date: Fri, 14 Feb 2020 12:38:30 +0100 +Subject: [PATCH] backport: re PR sanitizer/92154 (new glibc breaks arm + bootstrap due to libsanitizer) + + Backported from mainline + 2019-11-26 Jakub Jelinek + + PR sanitizer/92154 + * sanitizer_common/sanitizer_platform_limits_posix.h: Cherry-pick + llvm-project revision 947f9692440836dcb8d88b74b69dd379d85974ce. + * sanitizer_common/sanitizer_platform_limits_posix.cc: Likewise. +--- +--- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cc +@@ -1128,16 +1128,13 @@ CHECK_SIZE_AND_OFFSET(ipc_perm, gid); + CHECK_SIZE_AND_OFFSET(ipc_perm, cuid); + CHECK_SIZE_AND_OFFSET(ipc_perm, cgid); + #ifndef __GLIBC_PREREQ + #define __GLIBC_PREREQ(x, y) 0 + #endif +-#if (!defined(__aarch64__) || !SANITIZER_LINUX || __GLIBC_PREREQ (2, 21)) && \ +-!defined(__arm__) +-/* On aarch64 glibc 2.20 and earlier provided incorrect mode field. */ +-/* On Arm glibc 2.31 and later provide a different mode field, this field is +- never used by libsanitizer so we can simply ignore this assert for all glibc +- versions. */ ++#if !SANITIZER_LINUX || __GLIBC_PREREQ (2, 31) ++/* glibc 2.30 and earlier provided 16-bit mode field instead of 32-bit ++ on many architectures. */ + CHECK_SIZE_AND_OFFSET(ipc_perm, mode); + #endif + + CHECK_TYPE_SIZE(shmid_ds); + CHECK_SIZE_AND_OFFSET(shmid_ds, shm_perm); +--- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h +@@ -210,20 +210,13 @@ namespace __sanitizer { + unsigned long __unused1; + unsigned long __unused2; + #elif defined(__sparc__) +-# if defined(__arch64__) + unsigned mode; +-unsigned short __pad1; +-# else +-unsigned short __pad1; +-unsigned short mode; + unsigned short __pad2; +-# endif + unsigned short __seq; + unsigned long long __unused1; + unsigned long long __unused2; + #else +-unsigned short mode; +-unsigned short __pad1; ++unsigned int mode; + unsigned short __seq; + unsigned short __pad2; + #if defined(__x86_64__) && !defined(_LP64) +-- +2.25.2 + diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 1b13a25..28a78e6 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,3 +1,7 @@ +3 TODO + +
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 4426190672df81f20322d5fd68dcc32c6833a7d7 Author: Sergei Trofimovich gentoo org> AuthorDate: Sat Jun 1 08:15:53 2019 + Commit: Sergei Trofimovich gentoo org> CommitDate: Sat Jun 1 08:15:53 2019 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=44261906 6.5.0: cut 2 patchset Single new patch: fix std::pair ABI deviation in 6.5 branch. This change will once again break ABI for existing 6.5 users but longer-term it should be more compatible with rest of gcc branches. Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/README.history | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index c3c504f..1b13a25 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,4 +1,4 @@ -2 TODO +2 1 Jun 2019 + 23_all_std_pair_ABI.patch 1 27 Oct 2018
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: 552e864ab334ae8d6546dd2e49bff11c56f302a9 Author: Sergei Trofimovich gentoo org> AuthorDate: Fri May 24 06:40:03 2019 + Commit: Sergei Trofimovich gentoo org> CommitDate: Fri May 24 06:40:03 2019 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=552e864a 6.5.0: fix std::pair ABI breakage It will cause immediate pain for existing bianries for 6.5.0 users but longer-term should be more compatible with other gcc versions. Bug: https://gcc.gnu.org/PR87822 Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/23_all_std_pair_ABI.patch | 47 ++ 6.5.0/gentoo/README.history| 3 +++ 2 files changed, 50 insertions(+) diff --git a/6.5.0/gentoo/23_all_std_pair_ABI.patch b/6.5.0/gentoo/23_all_std_pair_ABI.patch new file mode 100644 index 000..3f79be0 --- /dev/null +++ b/6.5.0/gentoo/23_all_std_pair_ABI.patch @@ -0,0 +1,47 @@ +https://gcc.gnu.org/PR87822 + +From 581b5447f18f4758a55b1fda4f8bf597e9466d40 Mon Sep 17 00:00:00 2001 +From: redi +Date: Wed, 31 Oct 2018 12:29:02 + +Subject: [PATCH] PR libstdc++/87822 fix layout change for nested std::pair + +The introduction of the empty __pair_base base class for PR 86751 +changed the layout of std::pair, ...>. The outer pair and +its first member both have a base class of the same type, which cannot +exist at the same address. This causes the first member to be at a +non-zero offset. + +The solution is to make the base class depend on the template +parameters, so that each pair type has a different base class type, +which allows the base classes of the outer pair and its first member to +have the same address. + + PR libstdc++/87822 + * include/bits/stl_pair.h (__pair_base): Change to class template. + (pair): Make base class type depend on template parameters. + * testsuite/20_util/pair/87822.cc: New test. + +git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@265678 138bc75d-0d04-0410-961f-82ee72b054a4 +--- + libstdc++-v3/include/bits/stl_pair.h | 4 +- + +--- a/libstdc++-v3/include/bits/stl_pair.h b/libstdc++-v3/include/bits/stl_pair.h +@@ -187,7 +187,7 @@ _GLIBCXX_BEGIN_NAMESPACE_VERSION + }; + #endif // C++11 + +- class __pair_base ++ template class __pair_base + { + #if __cplusplus >= 201103L + template friend struct pair; +@@ -206,7 +206,7 @@ _GLIBCXX_BEGIN_NAMESPACE_VERSION +*/ + template + struct pair +-: private __pair_base ++: private __pair_base<_T1, _T2> + { + typedef _T1 first_type;/// @c first_type is the first bound type + typedef _T2 second_type; /// @c second_type is the second bound type diff --git a/6.5.0/gentoo/README.history b/6.5.0/gentoo/README.history index 52b438b..c3c504f 100644 --- a/6.5.0/gentoo/README.history +++ b/6.5.0/gentoo/README.history @@ -1,3 +1,6 @@ +2 TODO + + 23_all_std_pair_ABI.patch + 1 27 Oct 2018 + 01_all_default-fortify-source.patch + 02_all_default-warn-format-security.patch
[gentoo-commits] proj/gcc-patches:master commit in: 6.5.0/gentoo/
commit: e2c9eba5f076cfd8e064fdad01b0fa7da030c008 Author: Sergei Trofimovich gentoo org> AuthorDate: Sat Oct 27 10:06:16 2018 + Commit: Sergei Trofimovich gentoo org> CommitDate: Sat Oct 27 10:06:16 2018 + URL:https://gitweb.gentoo.org/proj/gcc-patches.git/commit/?id=e2c9eba5 6.5.0: cut 1.0 patchset, a copy of 6.4.0-1.8 patchset The only different from 6.4.0-1.8 patchset is dropped patches that are already upstream. 22 patches: + 01_all_default-fortify-source.patch + 02_all_default-warn-format-security.patch + 03_all_default-warn-trampolines.patch + 04_all_default-ssp-fix.patch + 05_all_alpha-mieee-default.patch + 06_all_arm_armv4t-default.patch + 07_all_ia64_note.GNU-stack.patch + 08_all_superh_default-multilib.patch + 09_all_libiberty-asprintf.patch + 10_all_libiberty-pic.patch + 11_all_nopie-all-flags.patch + 12_all_extra-options.patch + 13_all_pr55930-dependency-tracking.patch + 14_all_asan-signal_h.patch + 15_all_respect-build-cxxflags.patch + 16_all_libgfortran-Werror.patch + 17_all_libgomp-Werror.patch + 18_all_libitm-Werror.patch + 19_all_libatomic-Werror.patch + 20_all_libbacktrace-Werror.patch + 21_all_libsanitizer-libbacktrace-Werror.patch + 22_all_libstdcxx-no-vtv.patch Signed-off-by: Sergei Trofimovich gentoo.org> 6.5.0/gentoo/01_all_default-fortify-source.patch | 15 .../02_all_default-warn-format-security.patch | 22 ++ 6.5.0/gentoo/03_all_default-warn-trampolines.patch | 13 +++ 6.5.0/gentoo/04_all_default-ssp-fix.patch | 38 + 6.5.0/gentoo/05_all_alpha-mieee-default.patch | 38 + 6.5.0/gentoo/06_all_arm_armv4t-default.patch | 16 6.5.0/gentoo/07_all_ia64_note.GNU-stack.patch | 92 ++ 6.5.0/gentoo/08_all_superh_default-multilib.patch | 24 ++ 6.5.0/gentoo/09_all_libiberty-asprintf.patch | 18 + 6.5.0/gentoo/10_all_libiberty-pic.patch| 10 +++ 6.5.0/gentoo/11_all_nopie-all-flags.patch | 18 + 6.5.0/gentoo/12_all_extra-options.patch| 87 .../13_all_pr55930-dependency-tracking.patch | 18 + 6.5.0/gentoo/14_all_asan-signal_h.patch| 15 6.5.0/gentoo/15_all_respect-build-cxxflags.patch | 39 + 6.5.0/gentoo/16_all_libgfortran-Werror.patch | 20 + 6.5.0/gentoo/17_all_libgomp-Werror.patch | 20 + 6.5.0/gentoo/18_all_libitm-Werror.patch| 19 + 6.5.0/gentoo/19_all_libatomic-Werror.patch | 19 + 6.5.0/gentoo/20_all_libbacktrace-Werror.patch | 17 .../21_all_libsanitizer-libbacktrace-Werror.patch | 17 6.5.0/gentoo/22_all_libstdcxx-no-vtv.patch | 61 ++ 6.5.0/gentoo/README.history| 23 ++ 23 files changed, 659 insertions(+) diff --git a/6.5.0/gentoo/01_all_default-fortify-source.patch b/6.5.0/gentoo/01_all_default-fortify-source.patch new file mode 100644 index 000..36c5762 --- /dev/null +++ b/6.5.0/gentoo/01_all_default-fortify-source.patch @@ -0,0 +1,15 @@ +Enable -D_FORTIFY_SOURCE=2 by default. + + +--- a/gcc/c-family/c-cppbuiltin.c b/gcc/c-family/c-cppbuiltin.c +@@ -951,6 +951,9 @@ c_cpp_builtins (cpp_reader *pfile) + builtin_define_with_value ("__REGISTER_PREFIX__", REGISTER_PREFIX, 0); + builtin_define_with_value ("__USER_LABEL_PREFIX__", user_label_prefix, 0); + ++ /* Fortify Source enabled by default w/optimization. */ ++ cpp_define (pfile, "_FORTIFY_SOURCE=((defined __OPTIMIZE__ && __OPTIMIZE__ > 0) ? 2 : 0)"); ++ + /* Misc. */ + if (flag_gnu89_inline) + cpp_define (pfile, "__GNUC_GNU_INLINE__"); diff --git a/6.5.0/gentoo/02_all_default-warn-format-security.patch b/6.5.0/gentoo/02_all_default-warn-format-security.patch new file mode 100644 index 000..8994654 --- /dev/null +++ b/6.5.0/gentoo/02_all_default-warn-format-security.patch @@ -0,0 +1,22 @@ +Enable -Wformat and -Wformat-security by default. + +--- a/gcc/c-family/c.opt 2016-03-23 18:51:56.0 +0100 b/gcc/c-family/c.opt 2016-04-28 23:45:54.063351272 +0200 +@@ -459,7 +459,7 @@ C ObjC C++ ObjC++ Var(warn_format_nonlit + Warn about format strings that are not literals. + + Wformat-security +-C ObjC C++ ObjC++ Var(warn_format_security) Warning LangEnabledBy(C ObjC C++ ObjC++,Wformat=, warn_format >= 2, 0) ++C ObjC C++ ObjC++ Var(warn_format_security) Init(1) Warning LangEnabledBy(C ObjC C++ ObjC++,Wformat=, warn_format >= 2, 0) + Warn about possible security problems with format functions. + + Wformat-signedness +@@ -475,7 +475,7 @@ C ObjC C++ ObjC++ Var(warn_format_zero_l + Warn about zero-length formats. + + Wformat= +-C ObjC C++ ObjC++ Joined RejectNegative UInteger Var(warn_format) Warning LangEnabledBy(C ObjC C++ ObjC++,Wall, 1, 0) ++C ObjC C++ ObjC++ Joined RejectNegative UInteger Var(warn_format) Init(1) Warning LangEnabledBy(C ObjC C++ ObjC++,Wall, 1, 0) + Warn about printf/scanf/strftime/strfmon format string anomalies. + + Wigno