r4041 - in glibc-package/trunk/debian: . patches patches/any
Author: aurel32
Date: 2010-01-02 11:51:58 +0000 (Sat, 02 Jan 2010)
New Revision: 4041
Removed:
glibc-package/trunk/debian/patches/any/cvs-malloc-check.diff
Modified:
glibc-package/trunk/debian/changelog
glibc-package/trunk/debian/patches/series
glibc-package/trunk/debian/patches/svn-updates.diff
Log:
* Update from the latest SVN, branch eglibc-2_11:
- Remove any/cvs-malloc-check.diff (merged upstream).
Modified: glibc-package/trunk/debian/changelog
===================================================================
--- glibc-package/trunk/debian/changelog 2009-12-29 02:45:15 UTC (rev 4040)
+++ glibc-package/trunk/debian/changelog 2010-01-02 11:51:58 UTC (rev 4041)
@@ -1,6 +1,8 @@
eglibc (2.10.2-3) UNRELEASED; urgency=low
[ Aurelien Jarno ]
+ * Update from the latest SVN, branch eglibc-2_11:
+ - Remove any/cvs-malloc-check.diff (merged upstream).
* debhelper.in/libc.postinst: also restart incron on upgrade. Closes:
#557801.
* debhelper.in/libc.postinst: restart the services instead of stopping
@@ -31,7 +33,7 @@
[ Petr Salinger]
* kfreebsd/local-sysdeps.diff: update to revision 2904 (from glibc-bsd).
- -- Aurelien Jarno <aurel32@debian.org> Sun, 27 Dec 2009 00:47:25 +0100
+ -- Aurelien Jarno <aurel32@debian.org> Sat, 02 Jan 2010 12:50:53 +0100
eglibc (2.10.2-2) unstable; urgency=low
Deleted: glibc-package/trunk/debian/patches/any/cvs-malloc-check.diff
===================================================================
--- glibc-package/trunk/debian/patches/any/cvs-malloc-check.diff 2009-12-29 02:45:15 UTC (rev 4040)
+++ glibc-package/trunk/debian/patches/any/cvs-malloc-check.diff 2010-01-02 11:51:58 UTC (rev 4041)
@@ -1,113 +0,0 @@
-2009-11-01 Ulrich Drepper <drepper@redhat.com>
-
- * malloc/hooks.c (free_check): Restore locking and call _int_free
- appropriately.
-
-diff --git a/malloc/hooks.c b/malloc/hooks.c
-index 622a815..28845ee 100644
---- a/malloc/hooks.c
-+++ b/malloc/hooks.c
-@@ -162,8 +162,8 @@ mem2chunk_check(mem, magic_p) Void_t* mem; unsigned char **magic_p;
- ((char*)p + sz)>=(mp_.sbrk_base+main_arena.system_mem) )) ||
- sz<MINSIZE || sz&MALLOC_ALIGN_MASK || !inuse(p) ||
- ( !prev_inuse(p) && (p->prev_size&MALLOC_ALIGN_MASK ||
-- (contig && (char*)prev_chunk(p)<mp_.sbrk_base) ||
-- next_chunk(prev_chunk(p))!=p) ))
-+ (contig && (char*)prev_chunk(p)<mp_.sbrk_base) ||
-+ next_chunk(prev_chunk(p))!=p) ))
- return NULL;
- magic = MAGICBYTE(p);
- for(sz += SIZE_SZ-1; (c = ((unsigned char*)p)[sz]) != magic; sz -= c) {
-@@ -177,9 +177,9 @@ mem2chunk_check(mem, magic_p) Void_t* mem; unsigned char **magic_p;
- first. */
- offset = (unsigned long)mem & page_mask;
- if((offset!=MALLOC_ALIGNMENT && offset!=0 && offset!=0x10 &&
-- offset!=0x20 && offset!=0x40 && offset!=0x80 && offset!=0x100 &&
-- offset!=0x200 && offset!=0x400 && offset!=0x800 && offset!=0x1000 &&
-- offset<0x2000) ||
-+ offset!=0x20 && offset!=0x40 && offset!=0x80 && offset!=0x100 &&
-+ offset!=0x200 && offset!=0x400 && offset!=0x800 && offset!=0x1000 &&
-+ offset<0x2000) ||
- !chunk_is_mmapped(p) || (p->size & PREV_INUSE) ||
- ( (((unsigned long)p - p->prev_size) & page_mask) != 0 ) ||
- ( (sz = chunksize(p)), ((p->prev_size + sz) & page_mask) != 0 ) )
-@@ -276,13 +276,17 @@ free_check(mem, caller) Void_t* mem; const Void_t *caller;
- mchunkptr p;
-
- if(!mem) return;
-+ (void)mutex_lock(&main_arena.mutex);
- p = mem2chunk_check(mem, NULL);
- if(!p) {
-+ (void)mutex_unlock(&main_arena.mutex);
-+
- malloc_printerr(check_action, "free(): invalid pointer", mem);
- return;
- }
- #if HAVE_MMAP
- if (chunk_is_mmapped(p)) {
-+ (void)mutex_unlock(&main_arena.mutex);
- munmap_chunk(p);
- return;
- }
-@@ -291,12 +295,11 @@ free_check(mem, caller) Void_t* mem; const Void_t *caller;
- memset(mem, 0, chunksize(p) - (SIZE_SZ+1));
- #endif
- #ifdef ATOMIC_FASTBINS
-- _int_free(&main_arena, p, 0);
-+ _int_free(&main_arena, p, 1);
- #else
-- (void)mutex_lock(&main_arena.mutex);
- _int_free(&main_arena, p);
-- (void)mutex_unlock(&main_arena.mutex);
- #endif
-+ (void)mutex_unlock(&main_arena.mutex);
- }
-
- static Void_t*
-@@ -345,13 +348,13 @@ realloc_check(oldmem, bytes, caller)
- if(oldsize - SIZE_SZ >= nb)
- newmem = oldmem; /* do nothing */
- else {
-- /* Must alloc, copy, free. */
-- if (top_check() >= 0)
-+ /* Must alloc, copy, free. */
-+ if (top_check() >= 0)
- newmem = _int_malloc(&main_arena, bytes+1);
-- if (newmem) {
-- MALLOC_COPY(BOUNDED_N(newmem, bytes+1), oldmem, oldsize - 2*SIZE_SZ);
-- munmap_chunk(oldp);
-- }
-+ if (newmem) {
-+ MALLOC_COPY(BOUNDED_N(newmem, bytes+1), oldmem, oldsize - 2*SIZE_SZ);
-+ munmap_chunk(oldp);
-+ }
- }
- }
- } else {
-@@ -367,7 +370,7 @@ realloc_check(oldmem, bytes, caller)
- nb = chunksize(newp);
- if(oldp<newp || oldp>=chunk_at_offset(newp, nb)) {
- memset((char*)oldmem + 2*sizeof(mbinptr), 0,
-- oldsize - (2*sizeof(mbinptr)+2*SIZE_SZ+1));
-+ oldsize - (2*sizeof(mbinptr)+2*SIZE_SZ+1));
- } else if(nb > oldsize+SIZE_SZ) {
- memset((char*)BOUNDED_N(chunk2mem(newp), bytes) + oldsize,
- 0, nb - (oldsize+SIZE_SZ));
-@@ -626,7 +629,7 @@ public_sET_STATe(Void_t* msptr)
- mark_bin(&main_arena, i);
- } else {
- /* Oops, index computation from chunksize must have changed.
-- Link the whole list into unsorted_chunks. */
-+ Link the whole list into unsorted_chunks. */
- first(b) = last(b) = b;
- b = unsorted_chunks(&main_arena);
- ms->av[2*i+2]->bk = b;
-@@ -667,7 +670,7 @@ public_sET_STATe(Void_t* msptr)
- /* Check whether it is safe to enable malloc checking, or whether
- it is necessary to disable it. */
- if (ms->using_malloc_checking && !using_malloc_checking &&
-- !disallow_malloc_check)
-+ !disallow_malloc_check)
- __malloc_check_init ();
- else if (!ms->using_malloc_checking && using_malloc_checking) {
- __malloc_hook = NULL;
Modified: glibc-package/trunk/debian/patches/series
===================================================================
--- glibc-package/trunk/debian/patches/series 2009-12-29 02:45:15 UTC (rev 4040)
+++ glibc-package/trunk/debian/patches/series 2010-01-02 11:51:58 UTC (rev 4041)
@@ -1,4 +1,4 @@
-# svn-updates.diff
+svn-updates.diff
locale/check-unknown-symbols.diff
locale/fix-LC_COLLATE-rules.diff
@@ -211,7 +211,6 @@
any/submitted-localedef-mmap.diff
any/submitted-confname.h.diff
any/cvs-getutmpx-compat.diff
-any/cvs-malloc-check.diff
any/cvs-ksm.diff
any/submitted-bits-fcntl_h-at.diff
any/cvs-sched_h.diff
Modified: glibc-package/trunk/debian/patches/svn-updates.diff
===================================================================
--- glibc-package/trunk/debian/patches/svn-updates.diff 2009-12-29 02:45:15 UTC (rev 4040)
+++ glibc-package/trunk/debian/patches/svn-updates.diff 2010-01-02 11:51:58 UTC (rev 4041)
@@ -0,0 +1,191 @@
+SVN update of svn://svn.eglibc.org/branches/eglibc-2_10 from revision 9295
+
+--- a/ChangeLog (révision 9295)
++++ b/ChangeLog (révision 9588)
+@@ -1,3 +1,8 @@
++2009-11-01 Ulrich Drepper <drepper@redhat.com>
++
++ * malloc/hooks.c (free_check): Restore locking and call _int_free
++ appropriately.
++
+ 2009-10-28 Roland McGrath <roland@redhat.com>
+
+ * Makefile (dist-prepare): New target.
+--- a/malloc/hooks.c (révision 9295)
++++ b/malloc/hooks.c (révision 9588)
+@@ -162,8 +162,8 @@
+ ((char*)p + sz)>=(mp_.sbrk_base+main_arena.system_mem) )) ||
+ sz<MINSIZE || sz&MALLOC_ALIGN_MASK || !inuse(p) ||
+ ( !prev_inuse(p) && (p->prev_size&MALLOC_ALIGN_MASK ||
+- (contig && (char*)prev_chunk(p)<mp_.sbrk_base) ||
+- next_chunk(prev_chunk(p))!=p) ))
++ (contig && (char*)prev_chunk(p)<mp_.sbrk_base) ||
++ next_chunk(prev_chunk(p))!=p) ))
+ return NULL;
+ magic = MAGICBYTE(p);
+ for(sz += SIZE_SZ-1; (c = ((unsigned char*)p)[sz]) != magic; sz -= c) {
+@@ -177,9 +177,9 @@
+ first. */
+ offset = (unsigned long)mem & page_mask;
+ if((offset!=MALLOC_ALIGNMENT && offset!=0 && offset!=0x10 &&
+- offset!=0x20 && offset!=0x40 && offset!=0x80 && offset!=0x100 &&
+- offset!=0x200 && offset!=0x400 && offset!=0x800 && offset!=0x1000 &&
+- offset<0x2000) ||
++ offset!=0x20 && offset!=0x40 && offset!=0x80 && offset!=0x100 &&
++ offset!=0x200 && offset!=0x400 && offset!=0x800 && offset!=0x1000 &&
++ offset<0x2000) ||
+ !chunk_is_mmapped(p) || (p->size & PREV_INUSE) ||
+ ( (((unsigned long)p - p->prev_size) & page_mask) != 0 ) ||
+ ( (sz = chunksize(p)), ((p->prev_size + sz) & page_mask) != 0 ) )
+@@ -276,13 +276,17 @@
+ mchunkptr p;
+
+ if(!mem) return;
++ (void)mutex_lock(&main_arena.mutex);
+ p = mem2chunk_check(mem, NULL);
+ if(!p) {
++ (void)mutex_unlock(&main_arena.mutex);
++
+ malloc_printerr(check_action, "free(): invalid pointer", mem);
+ return;
+ }
+ #if HAVE_MMAP
+ if (chunk_is_mmapped(p)) {
++ (void)mutex_unlock(&main_arena.mutex);
+ munmap_chunk(p);
+ return;
+ }
+@@ -291,12 +295,11 @@
+ memset(mem, 0, chunksize(p) - (SIZE_SZ+1));
+ #endif
+ #ifdef ATOMIC_FASTBINS
+- _int_free(&main_arena, p, 0);
++ _int_free(&main_arena, p, 1);
+ #else
+- (void)mutex_lock(&main_arena.mutex);
+ _int_free(&main_arena, p);
++#endif
+ (void)mutex_unlock(&main_arena.mutex);
+-#endif
+ }
+
+ static Void_t*
+@@ -345,13 +348,13 @@
+ if(oldsize - SIZE_SZ >= nb)
+ newmem = oldmem; /* do nothing */
+ else {
+- /* Must alloc, copy, free. */
+- if (top_check() >= 0)
++ /* Must alloc, copy, free. */
++ if (top_check() >= 0)
+ newmem = _int_malloc(&main_arena, bytes+1);
+- if (newmem) {
+- MALLOC_COPY(BOUNDED_N(newmem, bytes+1), oldmem, oldsize - 2*SIZE_SZ);
+- munmap_chunk(oldp);
+- }
++ if (newmem) {
++ MALLOC_COPY(BOUNDED_N(newmem, bytes+1), oldmem, oldsize - 2*SIZE_SZ);
++ munmap_chunk(oldp);
++ }
+ }
+ }
+ } else {
+@@ -367,7 +370,7 @@
+ nb = chunksize(newp);
+ if(oldp<newp || oldp>=chunk_at_offset(newp, nb)) {
+ memset((char*)oldmem + 2*sizeof(mbinptr), 0,
+- oldsize - (2*sizeof(mbinptr)+2*SIZE_SZ+1));
++ oldsize - (2*sizeof(mbinptr)+2*SIZE_SZ+1));
+ } else if(nb > oldsize+SIZE_SZ) {
+ memset((char*)BOUNDED_N(chunk2mem(newp), bytes) + oldsize,
+ 0, nb - (oldsize+SIZE_SZ));
+@@ -626,7 +629,7 @@
+ mark_bin(&main_arena, i);
+ } else {
+ /* Oops, index computation from chunksize must have changed.
+- Link the whole list into unsorted_chunks. */
++ Link the whole list into unsorted_chunks. */
+ first(b) = last(b) = b;
+ b = unsorted_chunks(&main_arena);
+ ms->av[2*i+2]->bk = b;
+@@ -667,7 +670,7 @@
+ /* Check whether it is safe to enable malloc checking, or whether
+ it is necessary to disable it. */
+ if (ms->using_malloc_checking && !using_malloc_checking &&
+- !disallow_malloc_check)
++ !disallow_malloc_check)
+ __malloc_check_init ();
+ else if (!ms->using_malloc_checking && using_malloc_checking) {
+ __malloc_hook = NULL;
+--- a/ports/sysdeps/unix/sysv/linux/mips/mips64/n32/posix_fadvise.c (révision 0)
++++ b/ports/sysdeps/unix/sysv/linux/mips/mips64/n32/posix_fadvise.c (révision 9588)
+@@ -0,0 +1,38 @@
++/* Copyright (C) 2003, 2004, 2009 Free Software Foundation, Inc.
++ This file is part of the GNU C Library.
++
++ The GNU C Library is free software; you can redistribute it and/or
++ modify it under the terms of the GNU Lesser General Public
++ License as published by the Free Software Foundation; either
++ version 2.1 of the License, or (at your option) any later version.
++
++ The GNU C Library is distributed in the hope that it will be useful,
++ but WITHOUT ANY WARRANTY; without even the implied warranty of
++ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
++ Lesser General Public License for more details.
++
++ You should have received a copy of the GNU Lesser General Public
++ License along with the GNU C Library; if not, write to the Free
++ Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
++ 02111-1307 USA. */
++
++#include <errno.h>
++#include <fcntl.h>
++#include <sysdep.h>
++
++/* Advice the system about the expected behaviour of the application with
++ respect to the file associated with FD. */
++
++int
++posix_fadvise (int fd, off_t offset, off_t len, int advise)
++{
++#ifdef __NR_fadvise64
++ INTERNAL_SYSCALL_DECL (err);
++ int ret = INTERNAL_SYSCALL (fadvise64, err, 4, fd, offset, len, advise);
++ if (INTERNAL_SYSCALL_ERROR_P (ret, err))
++ return INTERNAL_SYSCALL_ERRNO (ret, err);
++ return 0;
++#else
++ return ENOSYS;
++#endif
++}
+--- a/ports/sysdeps/unix/sysv/linux/mips/mips64/n32/syscalls.list (révision 9295)
++++ b/ports/sysdeps/unix/sysv/linux/mips/mips64/n32/syscalls.list (révision 9588)
+@@ -2,6 +2,5 @@
+
+ readahead - readahead i:iii __readahead readahead
+ sync_file_range - sync_file_range i:iiii sync_file_range
+-posix_fadvise - fadvise64 i:iiii posix_fadvise
+ ftruncate - ftruncate i:ii __ftruncate ftruncate ftruncate64 __ftruncate64
+ truncate - truncate i:si truncate truncate64
+--- a/ports/sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise.c (révision 0)
++++ b/ports/sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise.c (révision 9588)
+@@ -0,0 +1 @@
++#include <sysdeps/unix/sysv/linux/wordsize-64/posix_fadvise.c>
+--- a/ports/sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise64.c (révision 0)
++++ b/ports/sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise64.c (révision 9588)
+@@ -0,0 +1 @@
++/* posix_fadvise64 is in posix_fadvise.c */
+--- a/ports/ChangeLog.mips (révision 9295)
++++ b/ports/ChangeLog.mips (révision 9588)
+@@ -1,3 +1,11 @@
++2009-12-01 Joseph Myers <joseph@codesourcery.com>
++
++ * sysdeps/unix/sysv/linux/mips/mips64/n32/syscalls.list
++ (posix_fadvise): Remove.
++ * sysdeps/unix/sysv/linux/mips/mips64/n32/posix_fadvise.c,
++ sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise.c,
++ sysdeps/unix/sysv/linux/mips/mips64/n64/posix_fadvise64.c: New.
++
+ 2009-11-06 Joseph Myers <joseph@codesourcery.com>
+
+ * sysdeps/unix/sysv/linux/mips/bits/fcntl.h (fallocate): Fix types
Reply to: