diff --git a/common/shlibs b/common/shlibs index 95f5918baf9991..acf54040e2e014 100644 --- a/common/shlibs +++ b/common/shlibs @@ -16,7 +16,7 @@ # PLEASE NOTE: when multiple packages provide the same SONAME, the first # one (order top->bottom) is preferred over the next ones. # -libc.so musl-1.1.24_7 +libc.so musl-1.2.5_1 libc.so.6 glibc-2.39_1 libm.so.6 glibc-2.39_1 libpthread.so.0 glibc-2.39_1 diff --git a/srcpkgs/musl/patches/00-reallocarray.patch b/srcpkgs/musl/patches/00-reallocarray.patch deleted file mode 100644 index cfaab330e89adc..00000000000000 --- a/srcpkgs/musl/patches/00-reallocarray.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 821083ac7b54eaa040d5a8ddc67c6206a175e0ca Mon Sep 17 00:00:00 2001 -From: Ariadne Conill -Date: Sat, 1 Aug 2020 08:26:35 -0600 -Subject: [PATCH] implement reallocarray - -reallocarray is an extension introduced by OpenBSD, which introduces -calloc overflow checking to realloc. - -glibc 2.28 introduced support for this function behind _GNU_SOURCE, -while glibc 2.29 allows its usage in _DEFAULT_SOURCE. - -diff --git a/include/stdlib.h b/include/stdlib.h -index 194c2033..b54a051f 100644 ---- a/include/stdlib.h -+++ b/include/stdlib.h -@@ -145,6 +145,7 @@ int getloadavg(double *, int); - int clearenv(void); - #define WCOREDUMP(s) ((s) & 0x80) - #define WIFCONTINUED(s) ((s) == 0xffff) -+void *reallocarray (void *, size_t, size_t); - #endif - - #ifdef _GNU_SOURCE -diff --git a/src/malloc/reallocarray.c b/src/malloc/reallocarray.c -new file mode 100644 -index 00000000..4a6ebe46 ---- /dev/null -+++ b/src/malloc/reallocarray.c -@@ -0,0 +1,13 @@ -+#define _BSD_SOURCE -+#include -+#include -+ -+void *reallocarray(void *ptr, size_t m, size_t n) -+{ -+ if (n && m > -1 / n) { -+ errno = ENOMEM; -+ return 0; -+ } -+ -+ return realloc(ptr, m * n); -+} diff --git a/srcpkgs/musl/patches/0001-remove-O_LARGEFILE.patch b/srcpkgs/musl/patches/0001-remove-O_LARGEFILE.patch new file mode 100644 index 00000000000000..1ca36263691c7a --- /dev/null +++ b/srcpkgs/musl/patches/0001-remove-O_LARGEFILE.patch @@ -0,0 +1,26 @@ +From 7d554d0c786f5431ad3035a328815890a95a2979 Mon Sep 17 00:00:00 2001 +From: =?UTF-8?q?=C3=89rico=20Nogueira?= +Date: Wed, 12 May 2021 17:39:20 -0300 +Subject: [PATCH] remove O_LARGEFILE + +useful hack to build 1.2.2 musl for x86_64 and not have to rebuild +firefox. +--- + arch/generic/bits/fcntl.h | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/arch/generic/bits/fcntl.h b/arch/generic/bits/fcntl.h +index 730a98cf..c2fd1760 100644 +--- a/arch/generic/bits/fcntl.h ++++ b/arch/generic/bits/fcntl.h +@@ -13,7 +13,7 @@ + + #define O_ASYNC 020000 + #define O_DIRECT 040000 +-#define O_LARGEFILE 0100000 ++#define O_LARGEFILE 0 + #define O_NOATIME 01000000 + #define O_PATH 010000000 + #define O_TMPFILE 020200000 +-- +2.31.1 diff --git a/srcpkgs/musl/patches/0001_reorder_thread_list_unlink_in_pthread_exit_after_all.patch b/srcpkgs/musl/patches/0001_reorder_thread_list_unlink_in_pthread_exit_after_all.patch deleted file mode 100644 index 7c1a55bc85e307..00000000000000 --- a/srcpkgs/musl/patches/0001_reorder_thread_list_unlink_in_pthread_exit_after_all.patch +++ /dev/null @@ -1,56 +0,0 @@ ->From 4d5aa20a94a2d3fae3e69289dc23ecafbd0c16c4 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Fri, 22 May 2020 17:35:14 -0400 -Subject: [PATCH 1/4] reorder thread list unlink in pthread_exit after all - locks - -since the backend for LOCK() skips locking if single-threaded, it's -unsafe to make the process appear single-threaded before the last use -of lock. - -this fixes potential unsynchronized access to a linked list via -__dl_thread_cleanup. ---- - src/thread/pthread_create.c | 19 +++++++++++-------- - 1 file changed, 11 insertions(+), 8 deletions(-) - -diff --git a/src/thread/pthread_create.c b/src/thread/pthread_create.c -index 5f491092..6a3b0c21 100644 ---- a/src/thread/pthread_create.c -+++ b/src/thread/pthread_create.c -@@ -90,14 +90,7 @@ _Noreturn void __pthread_exit(void *result) - exit(0); - } - -- /* At this point we are committed to thread termination. Unlink -- * the thread from the list. This change will not be visible -- * until the lock is released, which only happens after SYS_exit -- * has been called, via the exit futex address pointing at the lock. */ -- libc.threads_minus_1--; -- self->next->prev = self->prev; -- self->prev->next = self->next; -- self->prev = self->next = self; -+ /* At this point we are committed to thread termination. */ - - /* Process robust list in userspace to handle non-pshared mutexes - * and the detached thread case where the robust list head will -@@ -121,6 +114,16 @@ _Noreturn void __pthread_exit(void *result) - __do_orphaned_stdio_locks(); - __dl_thread_cleanup(); - -+ /* Last, unlink thread from the list. This change will not be visible -+ * until the lock is released, which only happens after SYS_exit -+ * has been called, via the exit futex address pointing at the lock. -+ * This needs to happen after any possible calls to LOCK() that might -+ * skip locking if libc.threads_minus_1 is zero. */ -+ libc.threads_minus_1--; -+ self->next->prev = self->prev; -+ self->prev->next = self->next; -+ self->prev = self->next = self; -+ - /* This atomic potentially competes with a concurrent pthread_detach - * call; the loser is responsible for freeing thread resources. */ - int state = a_cas(&self->detach_state, DT_JOINABLE, DT_EXITING); --- -2.21.0 - diff --git a/srcpkgs/musl/patches/0002_don_t_use_libc_threads_minus_1_as_relaxed_atomic_for.patch b/srcpkgs/musl/patches/0002_don_t_use_libc_threads_minus_1_as_relaxed_atomic_for.patch deleted file mode 100644 index e060762e99a620..00000000000000 --- a/srcpkgs/musl/patches/0002_don_t_use_libc_threads_minus_1_as_relaxed_atomic_for.patch +++ /dev/null @@ -1,78 +0,0 @@ ->From e01b5939b38aea5ecbe41670643199825874b26c Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Thu, 21 May 2020 23:32:45 -0400 -Subject: [PATCH 2/4] don't use libc.threads_minus_1 as relaxed atomic for - skipping locks - -after all but the last thread exits, the next thread to observe -libc.threads_minus_1==0 and conclude that it can skip locking fails to -synchronize with any changes to memory that were made by the -last-exiting thread. this can produce data races. - -on some archs, at least x86, memory synchronization is unlikely to be -a problem; however, with the inline locks in malloc, skipping the lock -also eliminated the compiler barrier, and caused code that needed to -re-check chunk in-use bits after obtaining the lock to reuse a stale -value, possibly from before the process became single-threaded. this -in turn produced corruption of the heap state. - -some uses of libc.threads_minus_1 remain, especially for allocation of -new TLS in the dynamic linker; otherwise, it could be removed -entirely. it's made non-volatile to reflect that the remaining -accesses are only made under lock on the thread list. - -instead of libc.threads_minus_1, libc.threaded is now used for -skipping locks. the difference is that libc.threaded is permanently -true once an additional thread has been created. this will produce -some performance regression in processes that are mostly -single-threaded but occasionally creating threads. in the future it -may be possible to bring back the full lock-skipping, but more care -needs to be taken to produce a safe design. ---- - src/internal/libc.h | 2 +- - src/malloc/malloc.c | 2 +- - src/thread/__lock.c | 2 +- - 3 files changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/internal/libc.h b/src/internal/libc.h -index ac97dc7e..c0614852 100644 ---- a/src/internal/libc.h -+++ b/src/internal/libc.h -@@ -21,7 +21,7 @@ struct __libc { - int can_do_threads; - int threaded; - int secure; -- volatile int threads_minus_1; -+ int threads_minus_1; - size_t *auxv; - struct tls_module *tls_head; - size_t tls_size, tls_align, tls_cnt; -diff --git a/src/malloc/malloc.c b/src/malloc/malloc.c -index 96982596..2553a62e 100644 ---- a/src/malloc/malloc.c -+++ b/src/malloc/malloc.c -@@ -26,7 +26,7 @@ int __malloc_replaced; - - static inline void lock(volatile int *lk) - { -- if (libc.threads_minus_1) -+ if (libc.threaded) - while(a_swap(lk, 1)) __wait(lk, lk+1, 1, 1); - } - -diff --git a/src/thread/__lock.c b/src/thread/__lock.c -index 45557c88..5b9b144e 100644 ---- a/src/thread/__lock.c -+++ b/src/thread/__lock.c -@@ -18,7 +18,7 @@ - - void __lock(volatile int *l) - { -- if (!libc.threads_minus_1) return; -+ if (!libc.threaded) return; - /* fast path: INT_MIN for the lock, +1 for the congestion */ - int current = a_cas(l, 0, INT_MIN + 1); - if (!current) return; --- -2.21.0 - diff --git a/srcpkgs/musl/patches/0003_cut_down_size_of_some_libc_struct_members.patch b/srcpkgs/musl/patches/0003_cut_down_size_of_some_libc_struct_members.patch deleted file mode 100644 index 540c5d95019572..00000000000000 --- a/srcpkgs/musl/patches/0003_cut_down_size_of_some_libc_struct_members.patch +++ /dev/null @@ -1,30 +0,0 @@ ->From f12888e9eb9eed60cc266b899dcafecb4752964a Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Fri, 22 May 2020 17:25:38 -0400 -Subject: [PATCH 3/4] cut down size of some libc struct members - -these are all flags that can be single-byte values. ---- - src/internal/libc.h | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/internal/libc.h b/src/internal/libc.h -index c0614852..d47f58e0 100644 ---- a/src/internal/libc.h -+++ b/src/internal/libc.h -@@ -18,9 +18,9 @@ struct tls_module { - }; - - struct __libc { -- int can_do_threads; -- int threaded; -- int secure; -+ char can_do_threads; -+ char threaded; -+ char secure; - int threads_minus_1; - size_t *auxv; - struct tls_module *tls_head; --- -2.21.0 - diff --git a/srcpkgs/musl/patches/0004_restore_lock_skipping_for_processes_that_return_to_s.patch b/srcpkgs/musl/patches/0004_restore_lock_skipping_for_processes_that_return_to_s.patch deleted file mode 100644 index e703c1f403c59d..00000000000000 --- a/srcpkgs/musl/patches/0004_restore_lock_skipping_for_processes_that_return_to_s.patch +++ /dev/null @@ -1,102 +0,0 @@ ->From 8d81ba8c0bc6fe31136cb15c9c82ef4c24965040 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Fri, 22 May 2020 17:45:47 -0400 -Subject: [PATCH 4/4] restore lock-skipping for processes that return to - single-threaded state - -the design used here relies on the barrier provided by the first lock -operation after the process returns to single-threaded state to -synchronize with actions by the last thread that exited. by storing -the intent to change modes in the same object used to detect whether -locking is needed, it's possible to avoid an extra (possibly costly) -memory load after the lock is taken. ---- - src/internal/libc.h | 1 + - src/malloc/malloc.c | 5 ++++- - src/thread/__lock.c | 4 +++- - src/thread/pthread_create.c | 8 ++++---- - 4 files changed, 12 insertions(+), 6 deletions(-) - -diff --git a/src/internal/libc.h b/src/internal/libc.h -index d47f58e0..619bba86 100644 ---- a/src/internal/libc.h -+++ b/src/internal/libc.h -@@ -21,6 +21,7 @@ struct __libc { - char can_do_threads; - char threaded; - char secure; -+ volatile signed char need_locks; - int threads_minus_1; - size_t *auxv; - struct tls_module *tls_head; -diff --git a/src/malloc/malloc.c b/src/malloc/malloc.c -index 2553a62e..a803d4c9 100644 ---- a/src/malloc/malloc.c -+++ b/src/malloc/malloc.c -@@ -26,8 +26,11 @@ int __malloc_replaced; - - static inline void lock(volatile int *lk) - { -- if (libc.threaded) -+ int need_locks = libc.need_locks; -+ if (need_locks) { - while(a_swap(lk, 1)) __wait(lk, lk+1, 1, 1); -+ if (need_locks < 0) libc.need_locks = 0; -+ } - } - - static inline void unlock(volatile int *lk) -diff --git a/src/thread/__lock.c b/src/thread/__lock.c -index 5b9b144e..60eece49 100644 ---- a/src/thread/__lock.c -+++ b/src/thread/__lock.c -@@ -18,9 +18,11 @@ - - void __lock(volatile int *l) - { -- if (!libc.threaded) return; -+ int need_locks = libc.need_locks; -+ if (!need_locks) return; - /* fast path: INT_MIN for the lock, +1 for the congestion */ - int current = a_cas(l, 0, INT_MIN + 1); -+ if (need_locks < 0) libc.need_locks = 0; - if (!current) return; - /* A first spin loop, for medium congestion. */ - for (unsigned i = 0; i < 10; ++i) { -diff --git a/src/thread/pthread_create.c b/src/thread/pthread_create.c -index 6a3b0c21..6bdfb44f 100644 ---- a/src/thread/pthread_create.c -+++ b/src/thread/pthread_create.c -@@ -118,8 +118,8 @@ _Noreturn void __pthread_exit(void *result) - * until the lock is released, which only happens after SYS_exit - * has been called, via the exit futex address pointing at the lock. - * This needs to happen after any possible calls to LOCK() that might -- * skip locking if libc.threads_minus_1 is zero. */ -- libc.threads_minus_1--; -+ * skip locking if process appears single-threaded. */ -+ if (!--libc.threads_minus_1) libc.need_locks = -1; - self->next->prev = self->prev; - self->prev->next = self->next; - self->prev = self->next = self; -@@ -339,7 +339,7 @@ int __pthread_create(pthread_t *restrict res, const pthread_attr_t *restrict att - ~(1UL<<((SIGCANCEL-1)%(8*sizeof(long)))); - - __tl_lock(); -- libc.threads_minus_1++; -+ if (!libc.threads_minus_1++) libc.need_locks = 1; - ret = __clone((c11 ? start_c11 : start), stack, flags, args, &new->tid, TP_ADJ(new), &__thread_list_lock); - - /* All clone failures translate to EAGAIN. If explicit scheduling -@@ -363,7 +363,7 @@ int __pthread_create(pthread_t *restrict res, const pthread_attr_t *restrict att - new->next->prev = new; - new->prev->next = new; - } else { -- libc.threads_minus_1--; -+ if (!--libc.threads_minus_1) libc.need_locks = 0; - } - __tl_unlock(); - __restore_sigs(&set); --- -2.21.0 - - diff --git a/srcpkgs/musl/patches/98e688a9da5e7b2925dda17a2d6820dddf1fb287.patch b/srcpkgs/musl/patches/98e688a9da5e7b2925dda17a2d6820dddf1fb287.patch deleted file mode 100644 index a8bfa66d6c47d0..00000000000000 --- a/srcpkgs/musl/patches/98e688a9da5e7b2925dda17a2d6820dddf1fb287.patch +++ /dev/null @@ -1,139 +0,0 @@ -From 98e688a9da5e7b2925dda17a2d6820dddf1fb287 Mon Sep 17 00:00:00 2001 -From: Ismael Luceno -Date: Sun, 15 Aug 2021 17:51:57 +0200 -Subject: [PATCH] define NULL as nullptr when used in C++11 or later - -This should be safer for casting and more compatible with existing code -bases that wrongly assume it must be defined as a pointer. ---- - include/locale.h | 4 +++- - include/stddef.h | 4 +++- - include/stdio.h | 4 +++- - include/stdlib.h | 4 +++- - include/string.h | 4 +++- - include/time.h | 4 +++- - include/unistd.h | 4 +++- - include/wchar.h | 4 +++- - 8 files changed, 24 insertions(+), 8 deletions(-) - -diff --git a/include/locale.h b/include/locale.h -index ce384381c..11106fea8 100644 ---- a/include/locale.h -+++ b/include/locale.h -@@ -7,7 +7,9 @@ extern "C" { - - #include - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/stddef.h b/include/stddef.h -index bd7538535..f25b86396 100644 ---- a/include/stddef.h -+++ b/include/stddef.h -@@ -1,7 +1,9 @@ - #ifndef _STDDEF_H - #define _STDDEF_H - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/stdio.h b/include/stdio.h -index 3604198c3..d1ed01f03 100644 ---- a/include/stdio.h -+++ b/include/stdio.h -@@ -25,7 +25,9 @@ extern "C" { - - #include - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/stdlib.h b/include/stdlib.h -index 7af86e3bc..b507ca33b 100644 ---- a/include/stdlib.h -+++ b/include/stdlib.h -@@ -7,7 +7,9 @@ extern "C" { - - #include - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/string.h b/include/string.h -index 795a2abcd..43ad0942e 100644 ---- a/include/string.h -+++ b/include/string.h -@@ -7,7 +7,9 @@ extern "C" { - - #include - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/time.h b/include/time.h -index 5494df183..3d9483720 100644 ---- a/include/time.h -+++ b/include/time.h -@@ -7,7 +7,9 @@ extern "C" { - - #include - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/unistd.h b/include/unistd.h -index 130640260..ee2dbe8af 100644 ---- a/include/unistd.h -+++ b/include/unistd.h -@@ -15,7 +15,9 @@ extern "C" { - #define SEEK_CUR 1 - #define SEEK_END 2 - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) -diff --git a/include/wchar.h b/include/wchar.h -index 88eb55b18..ed5d774df 100644 ---- a/include/wchar.h -+++ b/include/wchar.h -@@ -38,7 +38,9 @@ extern "C" { - #define WCHAR_MIN (-1-0x7fffffff+L'\0') - #endif - --#ifdef __cplusplus -+#if __cplusplus >= 201103L -+#define NULL nullptr -+#elif defined(__cplusplus) - #define NULL 0L - #else - #define NULL ((void*)0) - diff --git a/srcpkgs/musl/patches/99d5098a885feae3ae8c32b407350d8ca85dd178.patch b/srcpkgs/musl/patches/99d5098a885feae3ae8c32b407350d8ca85dd178.patch deleted file mode 100644 index 4e03ad1607ce98..00000000000000 --- a/srcpkgs/musl/patches/99d5098a885feae3ae8c32b407350d8ca85dd178.patch +++ /dev/null @@ -1,113 +0,0 @@ -From 99d5098a885feae3ae8c32b407350d8ca85dd178 Mon Sep 17 00:00:00 2001 -From: Julien Ramseier -Date: Sun, 18 Oct 2020 12:15:06 -0400 -Subject: update crypt_blowfish to support $2b$ prefix - -Merge changes from Solar Designer's crypt_blowfish v1.3. This makes -crypt_blowfish fully compatible with OpenBSD's bcrypt by adding -support for the $2b$ prefix (which behaves the same as -crypt_blowfish's $2y$). ---- - src/crypt/crypt_blowfish.c | 38 +++++++++++++++++++++++--------------- - 1 file changed, 23 insertions(+), 15 deletions(-) - -(limited to 'src/crypt/crypt_blowfish.c') - -diff --git a/src/crypt/crypt_blowfish.c b/src/crypt/crypt_blowfish.c -index d3f79851..d722607b 100644 ---- a/src/crypt/crypt_blowfish.c -+++ b/src/crypt/crypt_blowfish.c -@@ -15,7 +15,7 @@ - * No copyright is claimed, and the software is hereby placed in the public - * domain. In case this attempt to disclaim copyright and place the software - * in the public domain is deemed null and void, then the software is -- * Copyright (c) 1998-2012 Solar Designer and it is hereby released to the -+ * Copyright (c) 1998-2014 Solar Designer and it is hereby released to the - * general public under the following terms: - * - * Redistribution and use in source and binary forms, with or without -@@ -31,12 +31,12 @@ - * you place this code and any modifications you make under a license - * of your choice. - * -- * This implementation is mostly compatible with OpenBSD's bcrypt.c (prefix -- * "$2a$") by Niels Provos , and uses some of his -- * ideas. The password hashing algorithm was designed by David Mazieres -- * . For more information on the level of compatibility, -- * please refer to the comments in BF_set_key() below and to the included -- * crypt(3) man page. -+ * This implementation is fully compatible with OpenBSD's bcrypt.c for prefix -+ * "$2b$", originally by Niels Provos , and it uses -+ * some of his ideas. The password hashing algorithm was designed by David -+ * Mazieres . For information on the level of -+ * compatibility for bcrypt hash prefixes other than "$2b$", please refer to -+ * the comments in BF_set_key() below and to the included crypt(3) man page. - * - * There's a paper on the algorithm that explains its design decisions: - * -@@ -533,6 +533,7 @@ static void BF_set_key(const char *key, BF_key expanded, BF_key initial, - * Valid combinations of settings are: - * - * Prefix "$2a$": bug = 0, safety = 0x10000 -+ * Prefix "$2b$": bug = 0, safety = 0 - * Prefix "$2x$": bug = 1, safety = 0 - * Prefix "$2y$": bug = 0, safety = 0 - */ -@@ -596,12 +597,14 @@ static void BF_set_key(const char *key, BF_key expanded, BF_key initial, - initial[0] ^= sign; - } - -+static const unsigned char flags_by_subtype[26] = { -+ 2, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -+ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 4, 0 -+}; -+ - static char *BF_crypt(const char *key, const char *setting, - char *output, BF_word min) - { -- static const unsigned char flags_by_subtype[26] = -- {2, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -- 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 4, 0}; - struct { - BF_ctx ctx; - BF_key expanded_key; -@@ -746,9 +749,11 @@ char *__crypt_blowfish(const char *key, const char *setting, char *output) - { - const char *test_key = "8b \xd0\xc1\xd2\xcf\xcc\xd8"; - const char *test_setting = "$2a$00$abcdefghijklmnopqrstuu"; -- static const char test_hash[2][34] = -- {"VUrPmXD6q/nVSSp7pNDhCR9071IfIRe\0\x55", /* $2x$ */ -- "i1D709vfamulimlGcq0qq3UvuUasvEa\0\x55"}; /* $2a$, $2y$ */ -+ static const char test_hashes[2][34] = { -+ "i1D709vfamulimlGcq0qq3UvuUasvEa\0\x55", /* 'a', 'b', 'y' */ -+ "VUrPmXD6q/nVSSp7pNDhCR9071IfIRe\0\x55", /* 'x' */ -+ }; -+ const char *test_hash = test_hashes[0]; - char *retval; - const char *p; - int ok; -@@ -768,8 +773,11 @@ char *__crypt_blowfish(const char *key, const char *setting, char *output) - * detected by the self-test. - */ - memcpy(buf.s, test_setting, sizeof(buf.s)); -- if (retval) -+ if (retval) { -+ unsigned int flags = flags_by_subtype[setting[2] - 'a']; -+ test_hash = test_hashes[flags & 1]; - buf.s[2] = setting[2]; -+ } - memset(buf.o, 0x55, sizeof(buf.o)); - buf.o[sizeof(buf.o) - 1] = 0; - p = BF_crypt(test_key, buf.s, buf.o, 1); -@@ -777,7 +785,7 @@ char *__crypt_blowfish(const char *key, const char *setting, char *output) - ok = (p == buf.o && - !memcmp(p, buf.s, 7 + 22) && - !memcmp(p + (7 + 22), -- test_hash[buf.s[2] & 1], -+ test_hash, - 31 + 1 + 1 + 1)); - - { --- -cgit v1.2.1 - diff --git a/srcpkgs/musl/patches/CVE-2020-28928.patch b/srcpkgs/musl/patches/CVE-2020-28928.patch deleted file mode 100644 index b3ff3b4ee08f04..00000000000000 --- a/srcpkgs/musl/patches/CVE-2020-28928.patch +++ /dev/null @@ -1,64 +0,0 @@ ---- a/src/multibyte/wcsnrtombs.c -+++ b/src/multibyte/wcsnrtombs.c -@@ -1,41 +1,33 @@ - #include -+#include -+#include - - size_t wcsnrtombs(char *restrict dst, const wchar_t **restrict wcs, size_t wn, size_t n, mbstate_t *restrict st) - { -- size_t l, cnt=0, n2; -- char *s, buf[256]; - const wchar_t *ws = *wcs; -- const wchar_t *tmp_ws; -- -- if (!dst) s = buf, n = sizeof buf; -- else s = dst; -- -- while ( ws && n && ( (n2=wn)>=n || n2>32 ) ) { -- if (n2>=n) n2=n; -- tmp_ws = ws; -- l = wcsrtombs(s, &ws, n2, 0); -- if (!(l+1)) { -- cnt = l; -- n = 0; -+ size_t cnt = 0; -+ if (!dst) n=0; -+ while (ws && wn) { -+ char tmp[MB_LEN_MAX]; -+ size_t l = wcrtomb(nn) break; -+ memcpy(dst, tmp, l); -+ } -+ dst += l; - n -= l; - } -- wn = ws ? wn - (ws - tmp_ws) : 0; -- cnt += l; -- } -- if (ws) while (n && wn) { -- l = wcrtomb(s, *ws, 0); -- if ((l+1)<=1) { -- if (!l) ws = 0; -- else cnt = l; -+ if (!*ws) { -+ ws = 0; - break; - } -- ws++; wn--; -- /* safe - this loop runs fewer than sizeof(buf) times */ -- s+=l; n-=l; -+ ws++; -+ wn--; - cnt += l; - } - if (dst) *wcs = ws; - diff --git a/srcpkgs/musl/patches/aarch64-fregs.patch b/srcpkgs/musl/patches/aarch64-fregs.patch deleted file mode 100644 index 024eed11a8e537..00000000000000 --- a/srcpkgs/musl/patches/aarch64-fregs.patch +++ /dev/null @@ -1,37 +0,0 @@ -Use types compatible with glibc/kernel headers. - -diff --git a/arch/aarch64/bits/signal.h b/arch/aarch64/bits/signal.h -index b71261f5..5098c734 100644 ---- a/arch/aarch64/bits/signal.h -+++ b/arch/aarch64/bits/signal.h -@@ -11,7 +11,7 @@ typedef unsigned long greg_t; - typedef unsigned long gregset_t[34]; - - typedef struct { -- long double vregs[32]; -+ __uint128_t vregs[32]; - unsigned int fpsr; - unsigned int fpcr; - } fpregset_t; -@@ -34,7 +34,7 @@ struct fpsimd_context { - struct _aarch64_ctx head; - unsigned int fpsr; - unsigned int fpcr; -- long double vregs[32]; -+ __uint128_t vregs[32]; - }; - struct esr_context { - struct _aarch64_ctx head; -diff --git a/arch/aarch64/bits/user.h b/arch/aarch64/bits/user.h -index d12cdf7f..8a1002aa 100644 ---- a/arch/aarch64/bits/user.h -+++ b/arch/aarch64/bits/user.h -@@ -6,7 +6,7 @@ struct user_regs_struct { - }; - - struct user_fpsimd_struct { -- long double vregs[32]; -+ __uint128_t vregs[32]; - unsigned int fpsr; - unsigned int fpcr; - }; diff --git a/srcpkgs/musl/patches/add-qsort_r.patch b/srcpkgs/musl/patches/add-qsort_r.patch deleted file mode 100644 index 3d85496afb69fb..00000000000000 --- a/srcpkgs/musl/patches/add-qsort_r.patch +++ /dev/null @@ -1,201 +0,0 @@ -From b76f37fd5625d038141b52184956fb4b7838e9a5 Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?=C3=89rico=20Nogueira?= -Date: Tue, 9 Mar 2021 18:02:13 -0300 -Subject: [PATCH] add qsort_r and make qsort a wrapper around it - -we make qsort a wrapper by providing a wrapper_cmp function that uses -the extra argument as a function pointer. should be optimized to a tail -call on most architectures, as long as it's built with --fomit-frame-pointer, so the performance impact should be minimal. - -to keep the git history clean, for now qsort_r is implemented in qsort.c -and qsort is implemented in qsort_nr.c. qsort.c also received a few -trivial cleanups, including replacing (*cmp)() calls with cmp(). -qsort_nr.c contains only wrapper_cmp and qsort as a qsort_r wrapper -itself. ---- - include/stdlib.h | 1 + - src/include/stdlib.h | 1 + - src/stdlib/qsort.c | 37 ++++++++++++++++++++----------------- - src/stdlib/qsort_nr.c | 14 ++++++++++++++ - 4 files changed, 36 insertions(+), 17 deletions(-) - create mode 100644 src/stdlib/qsort_nr.c - -diff --git a/include/stdlib.h b/include/stdlib.h -index b54a051fe..7af86e3bc 100644 ---- a/include/stdlib.h -+++ b/include/stdlib.h -@@ -146,6 +146,7 @@ int clearenv(void); - #define WCOREDUMP(s) ((s) & 0x80) - #define WIFCONTINUED(s) ((s) == 0xffff) - void *reallocarray (void *, size_t, size_t); -+void qsort_r (void *, size_t, size_t, int (*)(const void *, const void *, void *), void *); - #endif - - #ifdef _GNU_SOURCE -diff --git a/src/include/stdlib.h b/src/include/stdlib.h -index e9da20158..812b04de2 100644 ---- a/src/include/stdlib.h -+++ b/src/include/stdlib.h -@@ -8,6 +8,7 @@ hidden void __env_rm_add(char *, char *); - hidden int __mkostemps(char *, int, int); - hidden int __ptsname_r(int, char *, size_t); - hidden char *__randname(char *); -+hidden void __qsort_r (void *, size_t, size_t, int (*)(const void *, const void *, void *), void *); - - hidden void *__libc_malloc(size_t); - hidden void *__libc_malloc_impl(size_t); -diff --git a/src/stdlib/qsort.c b/src/stdlib/qsort.c -index da58fd317..314ddc29d 100644 ---- a/src/stdlib/qsort.c -+++ b/src/stdlib/qsort.c -@@ -24,6 +24,7 @@ - /* Smoothsort, an adaptive variant of Heapsort. Memory usage: O(1). - Run time: Worst case O(n log n), close to O(n) in the mostly-sorted case. */ - -+#define _BSD_SOURCE - #include - #include - #include -@@ -31,7 +32,7 @@ - #include "atomic.h" - #define ntz(x) a_ctz_l((x)) - --typedef int (*cmpfun)(const void *, const void *); -+typedef int (*cmpfun)(const void *, const void *, void *); - - static inline int pntz(size_t p[2]) { - int r = ntz(p[0] - 1); -@@ -88,7 +89,7 @@ static inline void shr(size_t p[2], int n) - p[1] >>= n; - } - --static void sift(unsigned char *head, size_t width, cmpfun cmp, int pshift, size_t lp[]) -+static void sift(unsigned char *head, size_t width, cmpfun cmp, void *arg, int pshift, size_t lp[]) - { - unsigned char *rt, *lf; - unsigned char *ar[14 * sizeof(size_t) + 1]; -@@ -99,10 +100,10 @@ static void sift(unsigned char *head, size_t width, cmpfun cmp, int pshift, size - rt = head - width; - lf = head - width - lp[pshift - 2]; - -- if((*cmp)(ar[0], lf) >= 0 && (*cmp)(ar[0], rt) >= 0) { -+ if(cmp(ar[0], lf, arg) >= 0 && cmp(ar[0], rt, arg) >= 0) { - break; - } -- if((*cmp)(lf, rt) >= 0) { -+ if(cmp(lf, rt, arg) >= 0) { - ar[i++] = lf; - head = lf; - pshift -= 1; -@@ -115,7 +116,7 @@ static void sift(unsigned char *head, size_t width, cmpfun cmp, int pshift, size - cycle(width, ar, i); - } - --static void trinkle(unsigned char *head, size_t width, cmpfun cmp, size_t pp[2], int pshift, int trusty, size_t lp[]) -+static void trinkle(unsigned char *head, size_t width, cmpfun cmp, void *arg, size_t pp[2], int pshift, int trusty, size_t lp[]) - { - unsigned char *stepson, - *rt, *lf; -@@ -130,13 +131,13 @@ static void trinkle(unsigned char *head, size_t width, cmpfun cmp, size_t pp[2], - ar[0] = head; - while(p[0] != 1 || p[1] != 0) { - stepson = head - lp[pshift]; -- if((*cmp)(stepson, ar[0]) <= 0) { -+ if(cmp(stepson, ar[0], arg) <= 0) { - break; - } - if(!trusty && pshift > 1) { - rt = head - width; - lf = head - width - lp[pshift - 2]; -- if((*cmp)(rt, stepson) >= 0 || (*cmp)(lf, stepson) >= 0) { -+ if(cmp(rt, stepson, arg) >= 0 || cmp(lf, stepson, arg) >= 0) { - break; - } - } -@@ -150,11 +151,11 @@ static void trinkle(unsigned char *head, size_t width, cmpfun cmp, size_t pp[2], - } - if(!trusty) { - cycle(width, ar, i); -- sift(head, width, cmp, pshift, lp); -+ sift(head, width, cmp, arg, pshift, lp); - } - } - --void qsort(void *base, size_t nel, size_t width, cmpfun cmp) -+void __qsort_r(void *base, size_t nel, size_t width, cmpfun cmp, void *arg) - { - size_t lp[12*sizeof(size_t)]; - size_t i, size = width * nel; -@@ -173,16 +174,16 @@ void qsort(void *base, size_t nel, size_t width, cmpfun cmp) - - while(head < high) { - if((p[0] & 3) == 3) { -- sift(head, width, cmp, pshift, lp); -+ sift(head, width, cmp, arg, pshift, lp); - shr(p, 2); - pshift += 2; - } else { - if(lp[pshift - 1] >= high - head) { -- trinkle(head, width, cmp, p, pshift, 0, lp); -+ trinkle(head, width, cmp, arg, p, pshift, 0, lp); - } else { -- sift(head, width, cmp, pshift, lp); -+ sift(head, width, cmp, arg, pshift, lp); - } -- -+ - if(pshift == 1) { - shl(p, 1); - pshift = 0; -@@ -191,12 +192,12 @@ void qsort(void *base, size_t nel, size_t width, cmpfun cmp) - pshift = 1; - } - } -- -+ - p[0] |= 1; - head += width; - } - -- trinkle(head, width, cmp, p, pshift, 0, lp); -+ trinkle(head, width, cmp, arg, p, pshift, 0, lp); - - while(pshift != 1 || p[0] != 1 || p[1] != 0) { - if(pshift <= 1) { -@@ -208,11 +209,13 @@ void qsort(void *base, size_t nel, size_t width, cmpfun cmp) - pshift -= 2; - p[0] ^= 7; - shr(p, 1); -- trinkle(head - lp[pshift] - width, width, cmp, p, pshift + 1, 1, lp); -+ trinkle(head - lp[pshift] - width, width, cmp, arg, p, pshift + 1, 1, lp); - shl(p, 1); - p[0] |= 1; -- trinkle(head - width, width, cmp, p, pshift, 1, lp); -+ trinkle(head - width, width, cmp, arg, p, pshift, 1, lp); - } - head -= width; - } - } -+ -+weak_alias(__qsort_r, qsort_r); -diff --git a/src/stdlib/qsort_nr.c b/src/stdlib/qsort_nr.c -new file mode 100644 -index 000000000..efe7ccecd ---- /dev/null -+++ b/src/stdlib/qsort_nr.c -@@ -0,0 +1,14 @@ -+#define _BSD_SOURCE -+#include -+ -+typedef int (*cmpfun)(const void *, const void *); -+ -+static int wrapper_cmp(const void *v1, const void *v2, void *cmp) -+{ -+ return ((cmpfun)cmp)(v1, v2); -+} -+ -+void qsort(void *base, size_t nel, size_t width, cmpfun cmp) -+{ -+ __qsort_r(base, nel, width, wrapper_cmp, cmp); -+} diff --git a/srcpkgs/musl/patches/add-rlimit-rttime.patch b/srcpkgs/musl/patches/add-rlimit-rttime.patch deleted file mode 100644 index 56afa6b66521a0..00000000000000 --- a/srcpkgs/musl/patches/add-rlimit-rttime.patch +++ /dev/null @@ -1,24 +0,0 @@ -From 2507e7f5312e79620f6337935d0a6c9045ccba09 Mon Sep 17 00:00:00 2001 -From: Leah Neukirchen -Date: Sat, 11 Jan 2020 20:16:59 +0100 -Subject: [PATCH] define RLIMIT_RTTIME, bump RLIMIT_NLIMITS - -This macro exists since Linux 2.6.25 and is defined in glibc since 2011. ---- - include/sys/resource.h | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - -diff --git a/include/sys/resource.h b/include/sys/resource.h -index e0c86ae33..3068328d0 100644 ---- a/include/sys/resource.h -+++ b/include/sys/resource.h -@@ -90,7 +90,8 @@ int prlimit(pid_t, int, const struct rlimit *, struct rlimit *); - #define RLIMIT_MSGQUEUE 12 - #define RLIMIT_NICE 13 - #define RLIMIT_RTPRIO 14 --#define RLIMIT_NLIMITS 15 -+#define RLIMIT_RTTIME 15 -+#define RLIMIT_NLIMITS 16 - - #define RLIM_NLIMITS RLIMIT_NLIMITS - diff --git a/srcpkgs/musl/patches/add-support-for-SIGEV_THREAD_ID-timers.patch b/srcpkgs/musl/patches/add-support-for-SIGEV_THREAD_ID-timers.patch deleted file mode 100644 index e20dff5ba0d456..00000000000000 --- a/srcpkgs/musl/patches/add-support-for-SIGEV_THREAD_ID-timers.patch +++ /dev/null @@ -1,74 +0,0 @@ -From 7c71792e87691451f2a6b76348e83ad1889f1dcb Mon Sep 17 00:00:00 2001 -From: James Y Knight -Date: Sun, 30 Jun 2019 21:55:20 -0400 -Subject: [PATCH] add support for SIGEV_THREAD_ID timers - -This is like SIGEV_SIGNAL, but targeted to a particular thread's -tid, rather than the process. ---- - include/signal.h | 16 +++++++++++++--- - src/time/timer_create.c | 8 ++++++-- - 2 files changed, 19 insertions(+), 5 deletions(-) - -diff --git a/include/signal.h b/include/signal.h -index fbdf667b2..9ed929e4f 100644 ---- a/include/signal.h -+++ b/include/signal.h -@@ -180,14 +180,24 @@ struct sigevent { - union sigval sigev_value; - int sigev_signo; - int sigev_notify; -- void (*sigev_notify_function)(union sigval); -- pthread_attr_t *sigev_notify_attributes; -- char __pad[56-3*sizeof(long)]; -+ union { -+ char __pad[64 - 2*sizeof(int) - sizeof(union sigval)]; -+ pid_t sigev_notify_thread_id; -+ struct { -+ void (*sigev_notify_function)(union sigval); -+ pthread_attr_t *sigev_notify_attributes; -+ } __sev_thread; -+ } __sev_fields; - }; - -+#define sigev_notify_thread_id __sev_fields.sigev_notify_thread_id -+#define sigev_notify_function __sev_fields.__sev_thread.sigev_notify_function -+#define sigev_notify_attributes __sev_fields.__sev_thread.sigev_notify_attributes -+ - #define SIGEV_SIGNAL 0 - #define SIGEV_NONE 1 - #define SIGEV_THREAD 2 -+#define SIGEV_THREAD_ID 4 - - int __libc_current_sigrtmin(void); - int __libc_current_sigrtmax(void); -diff --git a/src/time/timer_create.c b/src/time/timer_create.c -index 5ddfda278..4bef23905 100644 ---- a/src/time/timer_create.c -+++ b/src/time/timer_create.c -@@ -71,11 +71,15 @@ int timer_create(clockid_t clk, struct sigevent *restrict evp, timer_t *restrict - switch (evp ? evp->sigev_notify : SIGEV_SIGNAL) { - case SIGEV_NONE: - case SIGEV_SIGNAL: -+ case SIGEV_THREAD_ID: - if (evp) { - ksev.sigev_value = evp->sigev_value; - ksev.sigev_signo = evp->sigev_signo; - ksev.sigev_notify = evp->sigev_notify; -- ksev.sigev_tid = 0; -+ if (evp->sigev_notify == SIGEV_THREAD_ID) -+ ksev.sigev_tid = evp->sigev_notify_thread_id; -+ else -+ ksev.sigev_tid = 0; - ksevp = &ksev; - } - if (syscall(SYS_timer_create, clk, ksevp, &timerid) < 0) -@@ -107,7 +111,7 @@ int timer_create(clockid_t clk, struct sigevent *restrict evp, timer_t *restrict - - ksev.sigev_value.sival_ptr = 0; - ksev.sigev_signo = SIGTIMER; -- ksev.sigev_notify = 4; /* SIGEV_THREAD_ID */ -+ ksev.sigev_notify = SIGEV_THREAD_ID; - ksev.sigev_tid = td->tid; - if (syscall(SYS_timer_create, clk, &ksev, &timerid) < 0) - timerid = -1; diff --git a/srcpkgs/musl/patches/avoid-set-id-setrlimit-misbehavior-and-hang-in-vfork.patch b/srcpkgs/musl/patches/avoid-set-id-setrlimit-misbehavior-and-hang-in-vfork.patch deleted file mode 100644 index 21f236b3a6cd19..00000000000000 --- a/srcpkgs/musl/patches/avoid-set-id-setrlimit-misbehavior-and-hang-in-vfork.patch +++ /dev/null @@ -1,49 +0,0 @@ -From a5aff1972c9e3981566414b09a28e331ccd2be5d Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Thu, 17 Sep 2020 15:09:46 -0400 -Subject: [PATCH 237/513] avoid set*id/setrlimit misbehavior and hang in - vforked/cloned child - -taking the deprecated/dropped vfork spec strictly, doing pretty much -anything but execve in the child is wrong and undefined. however, -these are commonly needed operations to setup the child state before -exec, and historical implementations tolerated them. - -for single-threaded parents, these operations already worked as -expected in the vforked child. however, due to the need for __synccall -to synchronize id/resource limit changes among all threads, calling -these functions in the vforked child of a multithreaded parent caused -a misdirected broadcast signaling of all threads in the parent. these -signals could kill the parent entirely if the synccall signal handler -had never been installed in the parent, or could be ignored if it had, -or could signal/kill one or more utterly wrong processes if the parent -already terminated (due to vfork semantics, only possible via fatal -signal) and the parent tids were recycled. in any case, the expected -number of semaphore posts would never happen, so the child would -permanently hang (with all signals blocked) waiting for them. - -to mitigate this, and also make the normal usage case work as -intended, treat the condition where the caller's actual tid does not -match the tid in its thread structure as single-threaded, and bypass -the entire synccall broadcast operation. ---- - src/thread/synccall.c | 3 ++- - 1 file changed, 2 insertions(+), 1 deletion(-) - -diff --git a/src/thread/synccall.c b/src/thread/synccall.c -index 648a6ad4..d58c851f 100644 ---- a/src/thread/synccall.c -+++ b/src/thread/synccall.c -@@ -63,7 +63,8 @@ void __synccall(void (*func)(void *), void *ctx) - sem_init(&target_sem, 0, 0); - sem_init(&caller_sem, 0, 0); - -- if (!libc.threads_minus_1) goto single_threaded; -+ if (!libc.threads_minus_1 || __syscall(SYS_gettid) != self->tid) -+ goto single_threaded; - - callback = func; - context = ctx; --- -2.41.0 - diff --git a/srcpkgs/musl/patches/c23-basename.patch b/srcpkgs/musl/patches/c23-basename.patch deleted file mode 100644 index 8f95a27d0ef562..00000000000000 --- a/srcpkgs/musl/patches/c23-basename.patch +++ /dev/null @@ -1,44 +0,0 @@ -From 725e17ed6dff4d0cd22487bb64470881e86a92e7 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Mon, 6 Nov 2023 08:26:19 -0500 -Subject: [PATCH] remove non-prototype declaration of basename from string.h - -commit 37bb3cce4598c19288628e675eaf1cda6e96958f suppressed the -declaration for C++, where it is wrongly interpreted as declaring the -function as taking no arguments. with C23 removing non-prototype -declarations, that problem is now also relevant to C. - -the non-prototype declaration for basename originates with commit -06aec8d7152dfb8360cb7ed9b3d7215ca0b0b500, where it was designed to -avoid conflicts with programs which declare basename with the GNU -signature taking const char *. that change was probably misguided, as -it represents not only misaligned expectations with the caller, but -also undefined behavior (calling a function that's been declared with -the wrong type). - -we could opt to fix the declaration, but since glibc, with the -gratuitously incompatible GNU-basename function, seems to be the only -implementation that declares it in string.h, it seems better to just -remove the declaration. this provides some warning if applications are -being built expecting the GNU behavior but not getting it. if we -declared it here, it would only produce a warning if the caller also -declares it themselves (rare) or if the caller attempts to pass a -const-qualified pointer. ---- - include/string.h | 3 --- - 1 file changed, 3 deletions(-) - -diff --git a/include/string.h b/include/string.h -index db73d2a9..83e2b946 100644 ---- a/include/string.h -+++ b/include/string.h -@@ -95,9 +95,6 @@ char *strchrnul(const char *, int); - char *strcasestr(const char *, const char *); - void *memrchr(const void *, int, size_t); - void *mempcpy(void *, const void *, size_t); --#ifndef __cplusplus --char *basename(); --#endif - #endif - - #ifdef __cplusplus diff --git a/srcpkgs/musl/patches/epoll_cp.patch b/srcpkgs/musl/patches/epoll_cp.patch deleted file mode 100644 index 92f47551ad8eb6..00000000000000 --- a/srcpkgs/musl/patches/epoll_cp.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 2c00f95c1ac7dd50f53d9e361847ebd2513c8da0 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Sat, 3 Apr 2021 21:16:41 -0400 -Subject: [PATCH] make epoll_[p]wait a cancellation point - -this is a Linux-specific function and not covered by POSIX's -requirements for which interfaces are cancellation points, but glibc -makes it one and existing software relies on it being one. - -at some point a review for similar functions that should be made -cancellation points should be done. - -diff --git src/linux/epoll.c src/linux/epoll.c -index deff5b10..93baa814 100644 ---- a/src/linux/epoll.c -+++ b/src/linux/epoll.c -@@ -24,9 +24,9 @@ int epoll_ctl(int fd, int op, int fd2, struct epoll_event *ev) - - int epoll_pwait(int fd, struct epoll_event *ev, int cnt, int to, const sigset_t *sigs) - { -- int r = __syscall(SYS_epoll_pwait, fd, ev, cnt, to, sigs, _NSIG/8); -+ int r = __syscall_cp(SYS_epoll_pwait, fd, ev, cnt, to, sigs, _NSIG/8); - #ifdef SYS_epoll_wait -- if (r==-ENOSYS && !sigs) r = __syscall(SYS_epoll_wait, fd, ev, cnt, to); -+ if (r==-ENOSYS && !sigs) r = __syscall_cp(SYS_epoll_wait, fd, ev, cnt, to); - #endif - return __syscall_ret(r); - } diff --git a/srcpkgs/musl/patches/fgetws.patch b/srcpkgs/musl/patches/fgetws.patch deleted file mode 100644 index c85c874279eabd..00000000000000 --- a/srcpkgs/musl/patches/fgetws.patch +++ /dev/null @@ -1,61 +0,0 @@ -From f8bdc3048216f41eaaf655524fa286cfb1184a70 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Sun, 20 Feb 2022 20:11:14 -0500 -Subject: [PATCH] fix spurious failures by fgetws when buffer ends with partial - character - -commit a90d9da1d1b14d81c4f93e1a6d1a686c3312e4ba made fgetws look for -changes to errno by fgetwc to detect encoding errors, since ISO C did -not allow the implementation to set the stream's error flag in this -case, and the fgetwc interface did not admit any other way to detect -the error. however, the possibility of fgetwc setting errno to EILSEQ -in the success path was overlooked, and in fact this can happen if the -buffer ends with a partial character, causing mbtowc to be called with -only part of the character available. - -since that change was made, the C standard was amended to specify that -fgetwc set the stream error flag on encoding errors, and commit -511d70738bce11a67219d0132ce725c323d00e4e made it do so. thus, there is -no longer any need for fgetws to poke at errno to handle encoding -errors. - -this commit reverts commit a90d9da1d1b14d81c4f93e1a6d1a686c3312e4ba -and thereby fixes the problem. ---- - src/stdio/fgetws.c | 7 +------ - 1 file changed, 1 insertion(+), 6 deletions(-) - -diff --git a/src/stdio/fgetws.c b/src/stdio/fgetws.c -index b08b3049..195cb435 100644 ---- a/src/stdio/fgetws.c -+++ b/src/stdio/fgetws.c -@@ -1,6 +1,5 @@ - #include "stdio_impl.h" - #include --#include - - wint_t __fgetwc_unlocked(FILE *); - -@@ -12,10 +11,6 @@ wchar_t *fgetws(wchar_t *restrict s, int n, FILE *restrict f) - - FLOCK(f); - -- /* Setup a dummy errno so we can detect EILSEQ. This is -- * the only way to catch encoding errors in the form of a -- * partial character just before EOF. */ -- errno = EAGAIN; - for (; n; n--) { - wint_t c = __fgetwc_unlocked(f); - if (c == WEOF) break; -@@ -23,7 +18,7 @@ wchar_t *fgetws(wchar_t *restrict s, int n, FILE *restrict f) - if (c == '\n') break; - } - *p = 0; -- if (ferror(f) || errno==EILSEQ) p = s; -+ if (ferror(f)) p = s; - - FUNLOCK(f); - --- -2.41.0 - diff --git a/srcpkgs/musl/patches/fix-oob-read-processing-time-zone-data.patch b/srcpkgs/musl/patches/fix-oob-read-processing-time-zone-data.patch deleted file mode 100644 index 557cbd7446d9bb..00000000000000 --- a/srcpkgs/musl/patches/fix-oob-read-processing-time-zone-data.patch +++ /dev/null @@ -1,80 +0,0 @@ -From 3b7b4155570b4b9054465785be2992c92cb7d7b1 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Wed, 9 Feb 2022 17:48:43 -0500 -Subject: fix out-of-bound read processing time zone data with distant-past - dates - -this bug goes back to commit 1cc81f5cb0df2b66a795ff0c26d7bbc4d16e13c6 -where zoneinfo file support was first added. in scan_trans, which -searches for the appropriate local time/dst rule in effect at a given -time, times prior to the second transition time caused the -1 slot of -the index to be read to determine the previous rule in effect. this -memory was always valid (part of another zoneinfo table in the mapped -file) but the byte value read was then used to index another table, -possibly going outside the bounds of the mmap. most of the time, the -result was limited to misinterpretation of the rule in effect at that -time (pre-1900s), but it could produce a crash if adjacent memory was -not readable. - -the root cause of the problem, however, was that the logic for this -code path was all wrong. as documented in the comment, times before -the first transition should be treated as using the lowest-numbered -non-dst rule, or rule 0 if no non-dst rules exist. if the argument is -in units of local time, however, the rule prior to the first -transition is needed to determine if it falls before or after it, and -that's where the -1 index was wrongly used. - -instead, use the documented logic to find out what rule would be in -effect before the first transition, and apply it as the offset if the -argument was given in local time. - -the new code has not been heavily tested, but no longer performs -potentially out-of-bounds accesses, and successfully handles the 1883 -transition from local mean time to central standard time in the test -case the error was reported for. ---- - src/time/__tz.c | 26 ++++++++++++-------------- - 1 file changed, 12 insertions(+), 14 deletions(-) - -diff --git a/src/time/__tz.c b/src/time/__tz.c -index 3e2fcdcb..c34b3eb7 100644 ---- a/src/time/__tz.c -+++ b/src/time/__tz.c -@@ -293,22 +293,20 @@ static size_t scan_trans(long long t, int local, size_t *alt) - n = (index-trans)>>scale; - if (a == n-1) return -1; - if (a == 0) { -- x = zi_read32(trans + (a< -Date: Mon, 26 Oct 2020 15:56:25 -0400 -Subject: fix pthread_cond_wait paired with with priority-inheritance mutex - -pthread_cond_wait arranged for requeued waiters to wake when the mutex -is unlocked by temporarily adjusting the mutex's waiter count. commit -54ca677983d47529bab8752315ac1a2b49888870 broke this when introducing -PI mutexes by repurposing the waiter count field of the mutex -structure. since then, for PI mutexes, the waiter count adjustment was -misinterpreted by the mutex locking code as indicating that the mutex -is non a non-recoverable state. - -it would be possible to special-case PI mutexes here, but instead just -drop all adjustment of the waiters count, and instead use the lock -word waiters bit for all mutex types. since the mutex is either held -by the caller or in unrecoverable state at the time the bit is set, it -will necessarily still be set at the time of any subsequent valid -unlock operation, and this will produce the desired effect of waking -the next waiter. - -if waiter counts are entirely dropped at some point in the future this -code should still work without modification. ---- - src/thread/pthread_cond_timedwait.c | 11 +++++------ - 1 file changed, 5 insertions(+), 6 deletions(-) - -(limited to 'src/thread/pthread_cond_timedwait.c') - -diff --git a/src/thread/pthread_cond_timedwait.c b/src/thread/pthread_cond_timedwait.c -index d1501240..f5f37af1 100644 ---- a/src/thread/pthread_cond_timedwait.c -+++ b/src/thread/pthread_cond_timedwait.c -@@ -146,14 +146,13 @@ relock: - - if (oldstate == WAITING) goto done; - -- if (!node.next) a_inc(&m->_m_waiters); -- - /* Unlock the barrier that's holding back the next waiter, and - * either wake it or requeue it to the mutex. */ -- if (node.prev) -- unlock_requeue(&node.prev->barrier, &m->_m_lock, m->_m_type & 128); -- else -- a_dec(&m->_m_waiters); -+ if (node.prev) { -+ int val = m->_m_lock; -+ if (val>0) a_cas(&m->_m_lock, val, val|0x80000000); -+ unlock_requeue(&node.prev->barrier, &m->_m_lock, m->_m_type & (8|128)); -+ } - - /* Since a signal was consumed, cancellation is not permitted. */ - if (e == ECANCELED) e = 0; --- -cgit v1.2.1 - diff --git a/srcpkgs/musl/patches/fix-pi-mutex-cond-2.patch b/srcpkgs/musl/patches/fix-pi-mutex-cond-2.patch deleted file mode 100644 index b356e38b61f83d..00000000000000 --- a/srcpkgs/musl/patches/fix-pi-mutex-cond-2.patch +++ /dev/null @@ -1,48 +0,0 @@ -From 27b2fc9d6db956359727a66c262f1e69995660aa Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Fri, 30 Oct 2020 11:21:06 -0400 -Subject: fix missing-wake regression in pthread_cond_wait - -the reasoning in commit 2d0bbe6c788938d1332609c014eeebc1dff966ac was -not entirely correct. while it's true that setting the waiters flag -ensures that the next unlock will perform a wake, it's possible that -the wake is consumed by a mutex waiter that has no relationship with -the condvar wait queue being processed, which then takes the mutex. -when that thread subsequently unlocks, it sees no waiters, and leaves -the rest of the condvar queue stuck. - -bring back the waiter count adjustment, but skip it for PI mutexes, -for which a successful lock-after-waiting always sets the waiters bit. -if future changes are made to bring this same waiters-bit contract to -all lock types, this can be reverted. ---- - src/thread/pthread_cond_timedwait.c | 5 +++++ - 1 file changed, 5 insertions(+) - -(limited to 'src/thread/pthread_cond_timedwait.c') - -diff --git a/src/thread/pthread_cond_timedwait.c b/src/thread/pthread_cond_timedwait.c -index f5f37af1..a0cd4904 100644 ---- a/src/thread/pthread_cond_timedwait.c -+++ b/src/thread/pthread_cond_timedwait.c -@@ -146,12 +146,17 @@ relock: - - if (oldstate == WAITING) goto done; - -+ if (!node.next && !(m->_m_type & 8)) -+ a_inc(&m->_m_waiters); -+ - /* Unlock the barrier that's holding back the next waiter, and - * either wake it or requeue it to the mutex. */ - if (node.prev) { - int val = m->_m_lock; - if (val>0) a_cas(&m->_m_lock, val, val|0x80000000); - unlock_requeue(&node.prev->barrier, &m->_m_lock, m->_m_type & (8|128)); -+ } else if (!!(m->_m_type & 8)) { -+ a_dec(&m->_m_waiters); - } - - /* Since a signal was consumed, cancellation is not permitted. */ --- -cgit v1.2.1 - diff --git a/srcpkgs/musl/patches/fix-pi-mutex-cond-3.patch b/srcpkgs/musl/patches/fix-pi-mutex-cond-3.patch deleted file mode 100644 index 2cc943f26f6a62..00000000000000 --- a/srcpkgs/musl/patches/fix-pi-mutex-cond-3.patch +++ /dev/null @@ -1,28 +0,0 @@ -From d91a6cf6e369a79587c5665fce9635e5634ca201 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Fri, 30 Oct 2020 16:50:08 -0400 -Subject: fix erroneous pthread_cond_wait mutex waiter count logic due to typo - -introduced in commit 27b2fc9d6db956359727a66c262f1e69995660aa. ---- - src/thread/pthread_cond_timedwait.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -(limited to 'src/thread/pthread_cond_timedwait.c') - -diff --git a/src/thread/pthread_cond_timedwait.c b/src/thread/pthread_cond_timedwait.c -index a0cd4904..6b761455 100644 ---- a/src/thread/pthread_cond_timedwait.c -+++ b/src/thread/pthread_cond_timedwait.c -@@ -155,7 +155,7 @@ relock: - int val = m->_m_lock; - if (val>0) a_cas(&m->_m_lock, val, val|0x80000000); - unlock_requeue(&node.prev->barrier, &m->_m_lock, m->_m_type & (8|128)); -- } else if (!!(m->_m_type & 8)) { -+ } else if (!(m->_m_type & 8)) { - a_dec(&m->_m_waiters); - } - --- -cgit v1.2.1 - diff --git a/srcpkgs/musl/patches/fix-strverscmp-comparison-of-digit-sequence-with-non.patch.patch b/srcpkgs/musl/patches/fix-strverscmp-comparison-of-digit-sequence-with-non.patch.patch deleted file mode 100644 index e0f0b8bffffc9a..00000000000000 --- a/srcpkgs/musl/patches/fix-strverscmp-comparison-of-digit-sequence-with-non.patch.patch +++ /dev/null @@ -1,38 +0,0 @@ -From b50eb8c36c20f967bd0ed70c0b0db38a450886ba Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Mon, 7 Nov 2022 22:17:55 -0500 -Subject: [PATCH] fix strverscmp comparison of digit sequence with non-digits - -the rule that longest digit sequence not beginning with a zero is -greater only applies when both sequences being compared are -non-degenerate. this is spelled out explicitly in the man page, which -may be deemed authoritative for this nonstandard function: "If one or -both of these is empty, then return what strcmp(3) would have -returned..." - -we were wrongly treating any sequence of digits not beginning with a -zero as greater than a non-digit in the other string. ---- - src/string/strverscmp.c | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/string/strverscmp.c b/src/string/strverscmp.c -index 4daf276d..16c1da22 100644 ---- a/src/string/strverscmp.c -+++ b/src/string/strverscmp.c -@@ -18,9 +18,9 @@ int strverscmp(const char *l0, const char *r0) - else if (c!='0') z=0; - } - -- if (l[dp]!='0' && r[dp]!='0') { -- /* If we're not looking at a digit sequence that began -- * with a zero, longest digit string is greater. */ -+ if (l[dp]-'1'<9U && r[dp]-'1'<9U) { -+ /* If we're looking at non-degenerate digit sequences starting -+ * with nonzero digits, longest digit string is greater. */ - for (j=i; isdigit(l[j]); j++) - if (!isdigit(r[j])) return 1; - if (isdigit(r[j])) return -1; --- -2.41.0 - diff --git a/srcpkgs/musl/patches/gettid.patch b/srcpkgs/musl/patches/gettid.patch deleted file mode 100644 index bb8bf5905b8801..00000000000000 --- a/srcpkgs/musl/patches/gettid.patch +++ /dev/null @@ -1,49 +0,0 @@ -From d49cf07541bb54a5ac7aec1feec8514db33db8ea Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Mon, 17 Aug 2020 20:12:53 -0400 -Subject: [PATCH] add gettid function - -this is a prerequisite for addition of other interfaces that use -kernel tids, including futex and SIGEV_THREAD_ID. - -there is some ambiguity as to whether the semantic return type should -be int or pid_t. either way, futex API imposes a contract that the -values fit in int (excluding some upper reserved bits). glibc used -pid_t, so in the interest of not having gratuitous mismatch (the -underlying types are the same anyway), pid_t is used here as well. - -while conceptually this is a syscall, the copy stored in the thread -structure is always valid in all contexts where it's valid to call -libc functions, so it's used to avoid the syscall. ---- - include/unistd.h | 1 + - src/linux/gettid.c | 8 ++++++++ - 2 files changed, 9 insertions(+) - create mode 100644 src/linux/gettid.c - -diff --git a/include/unistd.h b/include/unistd.h -index 7bcbff943..07584a23e 100644 ---- a/include/unistd.h -+++ b/include/unistd.h -@@ -190,6 +190,7 @@ int syncfs(int); - int euidaccess(const char *, int); - int eaccess(const char *, int); - ssize_t copy_file_range(int, off_t *, int, off_t *, size_t, unsigned); -+pid_t gettid(void); - #endif - - #if defined(_LARGEFILE64_SOURCE) || defined(_GNU_SOURCE) -diff --git a/src/linux/gettid.c b/src/linux/gettid.c -new file mode 100644 -index 000000000..70767137e ---- /dev/null -+++ b/src/linux/gettid.c -@@ -0,0 +1,8 @@ -+#define _GNU_SOURCE -+#include -+#include "pthread_impl.h" -+ -+pid_t gettid(void) -+{ -+ return __pthread_self()->tid; -+} diff --git a/srcpkgs/musl/patches/implement_realpath_directly_instead_of_using_procfs_readlink.patch b/srcpkgs/musl/patches/implement_realpath_directly_instead_of_using_procfs_readlink.patch deleted file mode 100644 index 569a1f52c7cd98..00000000000000 --- a/srcpkgs/musl/patches/implement_realpath_directly_instead_of_using_procfs_readlink.patch +++ /dev/null @@ -1,219 +0,0 @@ -From 29ff7599a448232f2527841c2362643d246cee36 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Mon, 30 Nov 2020 12:14:47 -0500 -Subject: [PATCH] implement realpath directly instead of using procfs readlink - -inability to use realpath in chroot/container without procfs access -and at early boot prior to mount of /proc has been an ongoing issue, -and it turns out realpath was one of the last remaining interfaces -that needed procfs for its core functionality. during investigation -while reimplementing, it was determined that there were also serious -problems with the procfs-based implementation. most seriously it was -unsafe on pre-O_PATH kernels, and unlike other places where O_PATH was -used, the unsafety was hard or impossible to fix because O_NOFOLLOW -can't be used (since the whole purpose was to follow symlinks). - -the new implementation is a direct one, performing readlink on each -path component to resolve it. an explicit stack, as opposed to -recursion, is used to represent the remaining components to be -processed. the stack starts out holding just the input string, and -reading a link pushes the link contents onto the stack. - -unlike many other implementations, this one does not call getcwd -initially for relative pathnames. instead it accumulates initial .. -components to be applied to the working directory if the result is -still a relative path. this avoids calling getcwd (which may fail) at -all when symlink traversal will eventually yield an absolute path. it -also doesn't use any form of stat operation; instead it arranges for -readlink to tell it when a non-directory is used in a context where a -directory is needed. this minimizes the number of syscalls needed, -avoids accessing inodes when the directory table suffices, and reduces -the amount of code pulled in for static linking. ---- - src/misc/realpath.c | 159 +++++++++++++++++++++++++++++++++++++------- - 1 file changed, 136 insertions(+), 23 deletions(-) - -diff --git a/src/misc/realpath.c b/src/misc/realpath.c -index d2708e59d..db8b74dc8 100644 ---- a/src/misc/realpath.c -+++ b/src/misc/realpath.c -@@ -1,43 +1,156 @@ - #include - #include --#include --#include - #include - #include - #include --#include "syscall.h" -+ -+static size_t slash_len(const char *s) -+{ -+ const char *s0 = s; -+ while (*s == '/') s++; -+ return s-s0; -+} - - char *realpath(const char *restrict filename, char *restrict resolved) - { -- int fd; -- ssize_t r; -- struct stat st1, st2; -- char buf[15+3*sizeof(int)]; -- char tmp[PATH_MAX]; -+ char stack[PATH_MAX+1]; -+ char output[PATH_MAX]; -+ size_t p, q, l, l0, cnt=0, nup=0; -+ int check_dir=0; - - if (!filename) { - errno = EINVAL; - return 0; - } -+ l = strnlen(filename, sizeof stack); -+ if (!l) { -+ errno = ENOENT; -+ return 0; -+ } -+ if (l >= PATH_MAX) goto toolong; -+ p = sizeof stack - l - 1; -+ q = 0; -+ memcpy(stack+p, filename, l+1); -+ -+ /* Main loop. Each iteration pops the next part from stack of -+ * remaining path components and consumes any slashes that follow. -+ * If not a link, it's moved to output; if a link, contents are -+ * pushed to the stack. */ -+restart: -+ for (; ; p+=slash_len(stack+p)) { -+ /* If stack starts with /, the whole component is / or // -+ * and the output state must be reset. */ -+ if (stack[p] == '/') { -+ check_dir=0; -+ nup=0; -+ q=0; -+ output[q++] = '/'; -+ p++; -+ /* Initial // is special. */ -+ if (stack[p] == '/' && stack[p+1] != '/') -+ output[q++] = '/'; -+ continue; -+ } -+ -+ char *z = __strchrnul(stack+p, '/'); -+ l0 = l = z-(stack+p); - -- fd = sys_open(filename, O_PATH|O_NONBLOCK|O_CLOEXEC); -- if (fd < 0) return 0; -- __procfdname(buf, fd); -+ if (!l && !check_dir) break; - -- r = readlink(buf, tmp, sizeof tmp - 1); -- if (r < 0) goto err; -- tmp[r] = 0; -+ /* Skip any . component but preserve check_dir status. */ -+ if (l==1 && stack[p]=='.') { -+ p += l; -+ continue; -+ } - -- fstat(fd, &st1); -- r = stat(tmp, &st2); -- if (r<0 || st1.st_dev != st2.st_dev || st1.st_ino != st2.st_ino) { -- if (!r) errno = ELOOP; -- goto err; -+ /* Copy next component onto output at least temporarily, to -+ * call readlink, but wait to advance output position until -+ * determining it's not a link. */ -+ if (q && output[q-1] != '/') { -+ if (!p) goto toolong; -+ stack[--p] = '/'; -+ l++; -+ } -+ if (q+l >= PATH_MAX) goto toolong; -+ memcpy(output+q, stack+p, l); -+ output[q+l] = 0; -+ p += l; -+ -+ int up = 0; -+ if (l0==2 && stack[p-2]=='.' && stack[p-1]=='.') { -+ up = 1; -+ /* Any non-.. path components we could cancel start -+ * after nup repetitions of the 3-byte string "../"; -+ * if there are none, accumulate .. components to -+ * later apply to cwd, if needed. */ -+ if (q <= 3*nup) { -+ nup++; -+ q += l; -+ continue; -+ } -+ /* When previous components are already known to be -+ * directories, processing .. can skip readlink. */ -+ if (!check_dir) goto skip_readlink; -+ } -+ ssize_t k = readlink(output, stack, p); -+ if (k==p) goto toolong; -+ if (!k) { -+ errno = ENOENT; -+ return 0; -+ } -+ if (k<0) { -+ if (errno != EINVAL) return 0; -+skip_readlink: -+ check_dir = 0; -+ if (up) { -+ while(q && output[q-1]!='/') q--; -+ if (q>1 && (q>2 || output[0]!='/')) q--; -+ continue; -+ } -+ if (l0) q += l; -+ check_dir = stack[p]; -+ continue; -+ } -+ if (++cnt == SYMLOOP_MAX) { -+ errno = ELOOP; -+ return 0; -+ } -+ -+ /* If link contents end in /, strip any slashes already on -+ * stack to avoid /->// or //->/// or spurious toolong. */ -+ if (stack[k-1]=='/') while (stack[p]=='/') p++; -+ p -= k; -+ memmove(stack+p, stack, k); -+ -+ /* Skip the stack advancement in case we have a new -+ * absolute base path. */ -+ goto restart; - } - -- __syscall(SYS_close, fd); -- return resolved ? strcpy(resolved, tmp) : strdup(tmp); --err: -- __syscall(SYS_close, fd); -+ output[q] = 0; -+ -+ if (output[0] != '/') { -+ if (!getcwd(stack, sizeof stack)) return 0; -+ l = strlen(stack); -+ /* Cancel any initial .. components. */ -+ p = 0; -+ while (nup--) { -+ while(l>1 && stack[l-1]!='/') l--; -+ if (l>1) l--; -+ p += 2; -+ if (p= PATH_MAX) goto toolong; -+ memmove(output + l, output + p, q - p + 1); -+ memcpy(output, stack, l); -+ q = l + q-p; -+ } -+ -+ if (resolved) return memcpy(resolved, output, q+1); -+ else return strdup(output); -+ -+toolong: -+ errno = ENAMETOOLONG; - return 0; - } diff --git a/srcpkgs/musl/patches/isascii.patch b/srcpkgs/musl/patches/isascii.patch deleted file mode 100644 index 6719d2ee188fa4..00000000000000 --- a/srcpkgs/musl/patches/isascii.patch +++ /dev/null @@ -1,21 +0,0 @@ -From e48e99c112246fb580596404074445cb25d7858d Mon Sep 17 00:00:00 2001 -From: =?UTF-8?q?=C3=89rico=20Rolim?= -Date: Mon, 4 Jan 2021 22:48:34 -0300 -Subject: [PATCH] suppress isascii() macro for C++ - -analogous to commit a60457c84a4b59ab564d7f4abb660a70283ba98d. - -diff --git include/ctype.h include/ctype.h -index 7936536f..32bcef4d 100644 ---- a/include/ctype.h -+++ b/include/ctype.h -@@ -64,7 +64,9 @@ int isascii(int); - int toascii(int); - #define _tolower(a) ((a)|0x20) - #define _toupper(a) ((a)&0x5f) -+#ifndef __cplusplus - #define isascii(a) (0 ? isascii(a) : (unsigned)(a) < 128) -+#endif - - #endif - diff --git a/srcpkgs/musl/patches/mo_lookup.patch b/srcpkgs/musl/patches/mo_lookup.patch deleted file mode 100644 index ae86e33c9c700e..00000000000000 --- a/srcpkgs/musl/patches/mo_lookup.patch +++ /dev/null @@ -1,19 +0,0 @@ -Do not crash with a NULL pointer dereference when dcngettext() -is called with NULL msgid[12] arguments. - -Fix for https://github.com/void-linux/void-packages/issues/12042 -and probably others. - - --xtraeme - ---- a/src/locale/__mo_lookup.c.orig 2019-06-26 09:55:36.843012674 +0200 -+++ b/src/locale/__mo_lookup.c 2019-06-26 09:56:11.529443955 +0200 -@@ -13,7 +13,7 @@ const char *__mo_lookup(const void *p, s - uint32_t b = 0, n = swapc(mo[2], sw); - uint32_t o = swapc(mo[3], sw); - uint32_t t = swapc(mo[4], sw); -- if (n>=size/4 || o>=size-4*n || t>=size-4*n || ((o|t)%4)) -+ if (!s || n>=size/4 || o>=size-4*n || t>=size-4*n || ((o|t)%4)) - return 0; - o/=4; - t/=4; diff --git a/srcpkgs/musl/patches/ppc-pt_regs.patch b/srcpkgs/musl/patches/ppc-pt_regs.patch deleted file mode 100644 index 45815321bf0f1f..00000000000000 --- a/srcpkgs/musl/patches/ppc-pt_regs.patch +++ /dev/null @@ -1,38 +0,0 @@ -commit c2518a8efb6507f1b41c3b12e03b06f8f2317a1f -Author: Rich Felker -Date: Sat Oct 19 15:53:43 2019 -0400 - - use struct pt_regs * rather than void * for powerpc[64] sigcontext regs - - this is to match the kernel and glibc interfaces. here, struct pt_regs - is an incomplete type, but that's harmless, and if it's completed by - inclusion of another header then members of the struct pointed to by - the regs member can be accessed directly without going through a cast - or intermediate pointer object. - -diff --git a/arch/powerpc/bits/signal.h b/arch/powerpc/bits/signal.h -index 06efb11c..c1bf3caf 100644 ---- a/arch/powerpc/bits/signal.h -+++ b/arch/powerpc/bits/signal.h -@@ -28,7 +28,7 @@ struct sigcontext { - int signal; - unsigned long handler; - unsigned long oldmask; -- void *regs; -+ struct pt_regs *regs; - }; - - typedef struct { -diff --git a/arch/powerpc64/bits/signal.h b/arch/powerpc64/bits/signal.h -index 4dec22a5..d5493b18 100644 ---- a/arch/powerpc64/bits/signal.h -+++ b/arch/powerpc64/bits/signal.h -@@ -32,7 +32,7 @@ typedef struct sigcontext { - int _pad0; - unsigned long handler; - unsigned long oldmask; -- void *regs; -+ struct pt_regs *regs; - gregset_t gp_regs; - fpregset_t fp_regs; - vrregset_t *v_regs; diff --git a/srcpkgs/musl/patches/ppc64-fpregset_t.patch b/srcpkgs/musl/patches/ppc64-fpregset_t.patch deleted file mode 100644 index 12617ba0ef7d59..00000000000000 --- a/srcpkgs/musl/patches/ppc64-fpregset_t.patch +++ /dev/null @@ -1,31 +0,0 @@ -commit c9f48cde0a22641ce3daf54596a9ecebdab91435 -Author: Rich Felker -Date: Sat Oct 19 15:39:45 2019 -0400 - - fix fpregset_t type on powerpc64 - - the userspace ucontext API has this as an array rather than a - structure. - - commit 3c59a868956636bc8adafb1b168d090897692532 fixed the - corresponding mistake for vrregset_t, namely that the original - powerpc64 port used a mix of types from 32-bit powerpc and powerpc64 - rather than matching the 64-bit types. - -diff --git a/arch/powerpc64/bits/signal.h b/arch/powerpc64/bits/signal.h -index 2cc0604c..4dec22a5 100644 ---- a/arch/powerpc64/bits/signal.h -+++ b/arch/powerpc64/bits/signal.h -@@ -9,11 +9,7 @@ - #if defined(_GNU_SOURCE) || defined(_BSD_SOURCE) - - typedef unsigned long greg_t, gregset_t[48]; -- --typedef struct { -- double fpregs[32]; -- double fpscr; --} fpregset_t; -+typedef double fpregset_t[33]; - - typedef struct { - #ifdef __GNUC__ diff --git a/srcpkgs/musl/patches/ppcle.patch b/srcpkgs/musl/patches/ppcle.patch deleted file mode 100644 index 7d49338a5a0f19..00000000000000 --- a/srcpkgs/musl/patches/ppcle.patch +++ /dev/null @@ -1,24 +0,0 @@ -From 20dfc2002482a21b955b710af119a01aecee784b Mon Sep 17 00:00:00 2001 -From: Daniel Kolesa -Date: Tue, 15 Dec 2020 20:42:17 +0100 -Subject: [PATCH] add ppc32 le subarch - ---- - configure | 1 + - 1 file changed, 1 insertion(+) - -diff --git configure configure -index 8680128..f1ca58e 100755 ---- a/configure -+++ b/configure -@@ -645,6 +645,7 @@ fi - if test "$ARCH" = "powerpc" ; then - trycppif "__NO_FPRS__ && !_SOFT_FLOAT" "$t" && fail \ - "$0: error: compiler's floating point configuration is unsupported" -+trycppif __LITTLE_ENDIAN__ "$t" && SUBARCH=${SUBARCH}le - trycppif _SOFT_FLOAT "$t" && SUBARCH=${SUBARCH}-sf - fi - --- -2.29.2 - diff --git a/srcpkgs/musl/patches/riscv64-ucontext.patch b/srcpkgs/musl/patches/riscv64-ucontext.patch deleted file mode 100644 index 5afac82b6d21d1..00000000000000 --- a/srcpkgs/musl/patches/riscv64-ucontext.patch +++ /dev/null @@ -1,29 +0,0 @@ -From 56f0631d9553dc06530ff661527cf1fcd595a0d1 Mon Sep 17 00:00:00 2001 -From: Drew DeVault -Date: Sat, 5 Dec 2020 18:10:06 +0000 -Subject: [PATCH] riscv64: fix inconsistent ucontext_t struct tag - -ucontext.h depends on the internal struct tag name for namespacing -reasons, and the intent was always for it to be consistent across -archs anyway. ---- - arch/riscv64/bits/signal.h | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/arch/riscv64/bits/signal.h b/arch/riscv64/bits/signal.h -index b006334f7..287367db7 100644 ---- a/arch/riscv64/bits/signal.h -+++ b/arch/riscv64/bits/signal.h -@@ -60,10 +60,10 @@ struct sigaltstack { - size_t ss_size; - }; - --typedef struct ucontext_t -+typedef struct __ucontext - { - unsigned long uc_flags; -- struct ucontext_t *uc_link; -+ struct __ucontext *uc_link; - stack_t uc_stack; - sigset_t uc_sigmask; - mcontext_t uc_mcontext; diff --git a/srcpkgs/musl/patches/work_around_linux_bug_in_readlink_syscall_with_zero_buffer.patch b/srcpkgs/musl/patches/work_around_linux_bug_in_readlink_syscall_with_zero_buffer.patch deleted file mode 100644 index 3286432ebea23e..00000000000000 --- a/srcpkgs/musl/patches/work_around_linux_bug_in_readlink_syscall_with_zero_buffer.patch +++ /dev/null @@ -1,59 +0,0 @@ -From e2fa720be7024cce4fc489f3877476d35da48ee2 Mon Sep 17 00:00:00 2001 -From: Rich Felker -Date: Mon, 23 Nov 2020 19:44:19 -0500 -Subject: [PATCH] work around linux bug in readlink syscall with zero buffer - size - -linux fails with EINVAL when a zero buffer size is passed to the -syscall. this is non-conforming because POSIX already defines EINVAL -with a significantly different meaning: the target is not a symlink. - -since the request is semantically valid, patch it up by using a dummy -buffer of length one, and truncating the return value to zero if it -succeeds. ---- - src/unistd/readlink.c | 11 +++++++++-- - src/unistd/readlinkat.c | 9 ++++++++- - 2 files changed, 17 insertions(+), 3 deletions(-) - -diff --git a/src/unistd/readlink.c b/src/unistd/readlink.c -index a152d5249..32f4537f9 100644 ---- a/src/unistd/readlink.c -+++ b/src/unistd/readlink.c -@@ -4,9 +4,16 @@ - - ssize_t readlink(const char *restrict path, char *restrict buf, size_t bufsize) - { -+ char dummy[1]; -+ if (!bufsize) { -+ buf = dummy; -+ bufsize = 1; -+ } - #ifdef SYS_readlink -- return syscall(SYS_readlink, path, buf, bufsize); -+ int r = __syscall(SYS_readlink, path, buf, bufsize); - #else -- return syscall(SYS_readlinkat, AT_FDCWD, path, buf, bufsize); -+ int r = __syscall(SYS_readlinkat, AT_FDCWD, path, buf, bufsize); - #endif -+ if (buf == dummy && r > 0) r = 0; -+ return __syscall_ret(r); - } -diff --git a/src/unistd/readlinkat.c b/src/unistd/readlinkat.c -index 9af45cd5a..f79d3d142 100644 ---- a/src/unistd/readlinkat.c -+++ b/src/unistd/readlinkat.c -@@ -3,5 +3,12 @@ - - ssize_t readlinkat(int fd, const char *restrict path, char *restrict buf, size_t bufsize) - { -- return syscall(SYS_readlinkat, fd, path, buf, bufsize); -+ char dummy[1]; -+ if (!bufsize) { -+ buf = dummy; -+ bufsize = 1; -+ } -+ int r = __syscall(SYS_readlinkat, fd, path, buf, bufsize); -+ if (buf == dummy && r > 0) r = 0; -+ return __syscall_ret(r); - } diff --git a/srcpkgs/musl/template b/srcpkgs/musl/template index 02a1f4e02a501f..4cbd948ed31dcf 100644 --- a/srcpkgs/musl/template +++ b/srcpkgs/musl/template @@ -1,8 +1,7 @@ # Template file for 'musl' pkgname=musl -reverts="1.2.0_1" -version=1.1.24 -revision=21 +version=1.2.5 +revision=1 archs="*-musl" bootstrap=yes build_style=gnu-configure @@ -12,7 +11,7 @@ maintainer="Enno Boland " license="MIT" homepage="https://musl.libc.org/" distfiles="https://musl.libc.org/releases/musl-${version}.tar.gz" -checksum=1370c9a812b2cf2a7d92802510cca0058cc37e66a7bedd70051f0a34015022a3 +checksum=a9a118bbe84d8764da0ea0d28b3ab3fae8477fc7e4085d90102b8596fc7c75e4 nostrip_files="libc.so" shlib_provides="libc.so"