* [PATCH 0/4] llvm 6.0 update and Misc fixes
@ 2018-04-01 7:19 Khem Raj
2018-04-01 7:19 ` [PATCH 1/4] x264: Use updated gnu-config artifacts Khem Raj
` (4 more replies)
0 siblings, 5 replies; 7+ messages in thread
From: Khem Raj @ 2018-04-01 7:19 UTC (permalink / raw)
To: openembedded-core
Most of these fixes are inspired by gcc8 they are mostly harmless
llvm 6.0 is something we should get into sumo as well and its a leaf recipe
The following changes since commit 4cedddb83623c79980b354642dfeaf78218ca4b7:
libpcre-ptest: skip locale test (2018-03-30 09:40:34 +0100)
are available in the Git repository at:
git://git.openembedded.org/openembedded-core-contrib kraj/pu
http://cgit.openembedded.org/openembedded-core-contrib/log/?h=kraj/pu
Khem Raj (4):
x264: Use updated gnu-config artifacts
nasm: Fix pure function warnings
systemtap: Backport a fix for build with gcc8
llvm: Upgrade to 6.0 release
...LibraryInfo-Undefine-libc-functions-if-th.patch | 20 +-
.../0002-llvm-allow-env-override-of-exe-path.patch | 4 +-
meta/recipes-devtools/llvm/llvm_git.bb | 11 +-
...rop-pure-function-attribute-from-seg_init.patch | 27 +++
meta/recipes-devtools/nasm/nasm_2.13.03.bb | 4 +-
.../systemtap/systemtap/0001-Fixes-for-gcc-8.patch | 215 +++++++++++++++++++++
meta/recipes-kernel/systemtap/systemtap_git.inc | 1 +
meta/recipes-multimedia/x264/x264_git.bb | 2 +
8 files changed, 266 insertions(+), 18 deletions(-)
create mode 100644 meta/recipes-devtools/nasm/nasm/0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch
create mode 100644 meta/recipes-kernel/systemtap/systemtap/0001-Fixes-for-gcc-8.patch
--
2.16.3
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH 1/4] x264: Use updated gnu-config artifacts
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
@ 2018-04-01 7:19 ` Khem Raj
2018-04-01 7:19 ` [PATCH 2/4] nasm: Fix pure function warnings Khem Raj
` (3 subsequent siblings)
4 siblings, 0 replies; 7+ messages in thread
From: Khem Raj @ 2018-04-01 7:19 UTC (permalink / raw)
To: openembedded-core
It is not using autoconf completely, therefore there
is no autoreconf happening, so when we depend on latest
gnu-config changes e.g. new architectures like riscv
the build does not see them and fails.
Installing these files from native sysroot helps
Signed-off-by: Khem Raj <raj.khem@gmail.com>
---
meta/recipes-multimedia/x264/x264_git.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-multimedia/x264/x264_git.bb b/meta/recipes-multimedia/x264/x264_git.bb
index a669295044..c445d15e69 100644
--- a/meta/recipes-multimedia/x264/x264_git.bb
+++ b/meta/recipes-multimedia/x264/x264_git.bb
@@ -43,6 +43,8 @@ EXTRA_OECONF = '--prefix=${prefix} \
'
do_configure() {
+ install -m 0755 ${STAGING_DATADIR_NATIVE}/gnu-config/config.guess ${S}
+ install -m 0755 ${STAGING_DATADIR_NATIVE}/gnu-config/config.sub ${S}
./configure ${EXTRA_OECONF}
}
--
2.16.3
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 2/4] nasm: Fix pure function warnings
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
2018-04-01 7:19 ` [PATCH 1/4] x264: Use updated gnu-config artifacts Khem Raj
@ 2018-04-01 7:19 ` Khem Raj
2018-04-01 7:19 ` [PATCH 3/4] systemtap: Backport a fix for build with gcc8 Khem Raj
` (2 subsequent siblings)
4 siblings, 0 replies; 7+ messages in thread
From: Khem Raj @ 2018-04-01 7:19 UTC (permalink / raw)
To: openembedded-core
Signed-off-by: Khem Raj <raj.khem@gmail.com>
---
...rop-pure-function-attribute-from-seg_init.patch | 27 ++++++++++++++++++++++
meta/recipes-devtools/nasm/nasm_2.13.03.bb | 4 +++-
2 files changed, 30 insertions(+), 1 deletion(-)
create mode 100644 meta/recipes-devtools/nasm/nasm/0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch
diff --git a/meta/recipes-devtools/nasm/nasm/0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch b/meta/recipes-devtools/nasm/nasm/0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch
new file mode 100644
index 0000000000..12ae3a94df
--- /dev/null
+++ b/meta/recipes-devtools/nasm/nasm/0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch
@@ -0,0 +1,27 @@
+From 77c3a77210d8ca8b94e999c711156e984a8dc737 Mon Sep 17 00:00:00 2001
+From: Khem Raj <raj.khem@gmail.com>
+Date: Sat, 31 Mar 2018 11:05:33 -0700
+Subject: [PATCH] asmlib: Drop pure function attribute from seg_init
+
+seg_init returns void, so it is impure function
+
+Signed-off-by: Khem Raj <raj.khem@gmail.com>
+---
+Upstream-Status: Submitted
+
+ include/nasmlib.h | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/include/nasmlib.h b/include/nasmlib.h
+index 79e866b..b80b7e2 100644
+--- a/include/nasmlib.h
++++ b/include/nasmlib.h
+@@ -191,7 +191,7 @@ int64_t readstrnum(char *str, int length, bool *warn);
+ * seg_init: Initialise the segment-number allocator.
+ * seg_alloc: allocate a hitherto unused segment number.
+ */
+-void pure_func seg_init(void);
++void seg_init(void);
+ int32_t pure_func seg_alloc(void);
+
+ /*
diff --git a/meta/recipes-devtools/nasm/nasm_2.13.03.bb b/meta/recipes-devtools/nasm/nasm_2.13.03.bb
index 3a47fc9c88..236d7e5e36 100644
--- a/meta/recipes-devtools/nasm/nasm_2.13.03.bb
+++ b/meta/recipes-devtools/nasm/nasm_2.13.03.bb
@@ -3,7 +3,9 @@ SECTION = "devel"
LICENSE = "BSD-2-Clause"
LIC_FILES_CHKSUM = "file://LICENSE;md5=90904486f8fbf1861cf42752e1a39efe"
-SRC_URI = "http://www.nasm.us/pub/nasm/releasebuilds/${PV}/nasm-${PV}.tar.bz2 "
+SRC_URI = "http://www.nasm.us/pub/nasm/releasebuilds/${PV}/nasm-${PV}.tar.bz2 \
+ file://0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch \
+ "
SRC_URI[md5sum] = "0c581d482f39d5111879ca9601938f74"
SRC_URI[sha256sum] = "63ec86477ad3f0f6292325fd89e1d93aea2e2fd490070863f17d48f7cd387011"
--
2.16.3
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 3/4] systemtap: Backport a fix for build with gcc8
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
2018-04-01 7:19 ` [PATCH 1/4] x264: Use updated gnu-config artifacts Khem Raj
2018-04-01 7:19 ` [PATCH 2/4] nasm: Fix pure function warnings Khem Raj
@ 2018-04-01 7:19 ` Khem Raj
2018-04-01 7:19 ` [PATCH 4/4] llvm: Upgrade to 6.0 release Khem Raj
2018-04-01 7:32 ` ✗ patchtest: failure for llvm 6.0 update and Misc fixes Patchwork
4 siblings, 0 replies; 7+ messages in thread
From: Khem Raj @ 2018-04-01 7:19 UTC (permalink / raw)
To: openembedded-core
Signed-off-by: Khem Raj <raj.khem@gmail.com>
---
.../systemtap/systemtap/0001-Fixes-for-gcc-8.patch | 215 +++++++++++++++++++++
meta/recipes-kernel/systemtap/systemtap_git.inc | 1 +
2 files changed, 216 insertions(+)
create mode 100644 meta/recipes-kernel/systemtap/systemtap/0001-Fixes-for-gcc-8.patch
diff --git a/meta/recipes-kernel/systemtap/systemtap/0001-Fixes-for-gcc-8.patch b/meta/recipes-kernel/systemtap/systemtap/0001-Fixes-for-gcc-8.patch
new file mode 100644
index 0000000000..a1b0bff02a
--- /dev/null
+++ b/meta/recipes-kernel/systemtap/systemtap/0001-Fixes-for-gcc-8.patch
@@ -0,0 +1,215 @@
+From 4ffe00f1d9eac332d928f7dc01fe250dc32b1bb8 Mon Sep 17 00:00:00 2001
+From: Stan Cox <scox@redhat.com>
+Date: Tue, 13 Feb 2018 22:38:03 -0500
+Subject: [PATCH] Fixes for gcc 8
+
+* includes/sys/sdt.h (__SDT_COND_SIGNED): Add CT, cast type argument
+
+Author: Will Cohen <wcohen.redhat.com>
+
+* stap-serverd.cxx (generate_mok, handleRequest, handle_connection):
+ Catch format overflow
+
+* translate.cxx (translate_pass): Use ref in catch.
+---
+Upstream-Status: Backport
+Signed-off-by: Khem Raj <raj.khem@gmail.com>
+
+ includes/sys/sdt.h | 20 ++++++++--------
+ stap-serverd.cxx | 67 +++++++++++++++++++++++++++++++++++++++++++++++-------
+ translate.cxx | 2 +-
+ 3 files changed, 70 insertions(+), 19 deletions(-)
+
+diff --git a/includes/sys/sdt.h b/includes/sys/sdt.h
+index 940f74483..c0c5a492c 100644
+--- a/includes/sys/sdt.h
++++ b/includes/sys/sdt.h
+@@ -119,8 +119,8 @@ struct __sdt_type
+
+ #define __SDT_ALWAYS_SIGNED(T) \
+ template<> struct __sdt_type<T> { static const bool __sdt_signed = true; };
+-#define __SDT_COND_SIGNED(T) \
+-template<> struct __sdt_type<T> { static const bool __sdt_signed = ((T)(-1) < 1); };
++#define __SDT_COND_SIGNED(T,CT) \
++template<> struct __sdt_type<T> { static const bool __sdt_signed = ((CT)(-1) < 1); };
+ __SDT_ALWAYS_SIGNED(signed char)
+ __SDT_ALWAYS_SIGNED(short)
+ __SDT_ALWAYS_SIGNED(int)
+@@ -141,14 +141,14 @@ __SDT_ALWAYS_SIGNED(const volatile short)
+ __SDT_ALWAYS_SIGNED(const volatile int)
+ __SDT_ALWAYS_SIGNED(const volatile long)
+ __SDT_ALWAYS_SIGNED(const volatile long long)
+-__SDT_COND_SIGNED(char)
+-__SDT_COND_SIGNED(wchar_t)
+-__SDT_COND_SIGNED(volatile char)
+-__SDT_COND_SIGNED(volatile wchar_t)
+-__SDT_COND_SIGNED(const char)
+-__SDT_COND_SIGNED(const wchar_t)
+-__SDT_COND_SIGNED(const volatile char)
+-__SDT_COND_SIGNED(const volatile wchar_t)
++__SDT_COND_SIGNED(char, char)
++__SDT_COND_SIGNED(wchar_t, wchar_t)
++__SDT_COND_SIGNED(volatile char, char)
++__SDT_COND_SIGNED(volatile wchar_t, wchar_t)
++__SDT_COND_SIGNED(const char, char)
++__SDT_COND_SIGNED(const wchar_t, wchar_t)
++__SDT_COND_SIGNED(const volatile char, char)
++__SDT_COND_SIGNED(const volatile wchar_t, wchar_t)
+ #if defined (__GNUC__) && (__GNUC__ > 4 || (__GNUC__ == 4 && __GNUC_MINOR__ >= 4))
+ /* __SDT_COND_SIGNED(char16_t) */
+ /* __SDT_COND_SIGNED(char32_t) */
+diff --git a/stap-serverd.cxx b/stap-serverd.cxx
+index 7cf76c617..41f77ee9e 100644
+--- a/stap-serverd.cxx
++++ b/stap-serverd.cxx
+@@ -1607,6 +1607,7 @@ generate_mok(string &mok_fingerprint)
+ char tmpdir[PATH_MAX] = { '\0' };
+ string public_cert_path, private_cert_path, destdir;
+ mode_t old_umask;
++ int retlen;
+
+ mok_fingerprint.clear ();
+
+@@ -1631,7 +1632,14 @@ generate_mok(string &mok_fingerprint)
+ }
+
+ // Make a temporary directory to store results in.
+- snprintf (tmpdir, PATH_MAX, "%s/stap-server.XXXXXX", mok_path.c_str ());
++ retlen = snprintf (tmpdir, PATH_MAX, "%s/stap-server.XXXXXX", mok_path.c_str ());
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Could not create %s name", "temporary directory"));
++ tmpdir[0] = '\0';
++ goto cleanup;
++ }
++
+ if (mkdtemp (tmpdir) == NULL)
+ {
+ server_error (_F("Could not create temporary directory %s: %s", tmpdir,
+@@ -1704,6 +1712,7 @@ handleRequest (const string &requestDirName, const string &responseDirName, stri
+ unsigned u;
+ unsigned i;
+ FILE* f;
++ int retlen;
+
+ // Save the server version. Do this early, so the client knows what version of the server
+ // it is dealing with, even if the request is not fully completed.
+@@ -1782,7 +1791,12 @@ handleRequest (const string &requestDirName, const string &responseDirName, stri
+ struct stat st;
+ char *arg;
+
+- snprintf (stapargfile, PATH_MAX, "%s/argv%d", requestDirName.c_str (), i);
++ retlen = snprintf (stapargfile, PATH_MAX, "%s/argv%d", requestDirName.c_str (), i);
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "path"));
++ return;
++ }
+
+ rc = stat(stapargfile, & st);
+ if (rc) break;
+@@ -1888,7 +1902,15 @@ handleRequest (const string &requestDirName, const string &responseDirName, stri
+ {
+ glob_t globber;
+ char pattern[PATH_MAX];
+- snprintf (pattern, PATH_MAX, "%s/*.ko", new_staptmpdir.c_str());
++ int retlen;
++
++ retlen = snprintf (pattern, PATH_MAX, "%s/*.ko", new_staptmpdir.c_str());
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "pattern"));
++ return;
++ }
++
+ rc = glob (pattern, GLOB_ERR, NULL, &globber);
+ if (rc)
+ server_error (_F("Unable to find a module in %s", new_staptmpdir.c_str()));
+@@ -2164,6 +2186,7 @@ handle_connection (void *arg)
+ copy for each connection.*/
+ vector<string> argv;
+ PRInt32 bytesRead;
++ int retlen;
+
+ /* Detatch to avoid a memory leak */
+ if(max_threads > 0)
+@@ -2213,7 +2236,13 @@ handle_connection (void *arg)
+ #endif
+
+ secStatus = SECFailure;
+- snprintf(tmpdir, PATH_MAX, "%s/stap-server.XXXXXX", getenv("TMPDIR") ?: "/tmp");
++ retlen = snprintf(tmpdir, PATH_MAX, "%s/stap-server.XXXXXX", getenv("TMPDIR") ?: "/tmp");
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "temporary directory"));
++ tmpdir[0]=0; /* prevent /bin/rm */
++ goto cleanup;
++ }
+ rc1 = mkdtemp(tmpdir);
+ if (! rc1)
+ {
+@@ -2223,9 +2252,20 @@ handle_connection (void *arg)
+ }
+
+ /* Create a temporary files names and directories. */
+- snprintf (requestFileName, PATH_MAX, "%s/request.zip", tmpdir);
++ retlen = snprintf (requestFileName, PATH_MAX, "%s/request.zip", tmpdir);
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "request.zip path"));
++ goto cleanup;
++ }
++
++ retlen = snprintf (requestDirName, PATH_MAX, "%s/request", tmpdir);
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "request directory path"));
++ goto cleanup;
++ }
+
+- snprintf (requestDirName, PATH_MAX, "%s/request", tmpdir);
+ rc = mkdir(requestDirName, 0700);
+ if (rc)
+ {
+@@ -2233,7 +2273,13 @@ handle_connection (void *arg)
+ goto cleanup;
+ }
+
+- snprintf (responseDirName, PATH_MAX, "%s/response", tmpdir);
++ retlen = snprintf (responseDirName, PATH_MAX, "%s/response", tmpdir);
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "response directory path"));
++ goto cleanup;
++ }
++
+ rc = mkdir(responseDirName, 0700);
+ if (rc)
+ {
+@@ -2243,7 +2289,12 @@ handle_connection (void *arg)
+ // Set this early, since it gets used for errors to be returned to the client.
+ stapstderr = string(responseDirName) + "/stderr";
+
+- snprintf (responseFileName, PATH_MAX, "%s/response.zip", tmpdir);
++ retlen = snprintf (responseFileName, PATH_MAX, "%s/response.zip", tmpdir);
++ if (retlen < 0 || retlen >= PATH_MAX)
++ {
++ server_error (_F("Error creating %s name", "response.zip path"));
++ goto cleanup;
++ }
+
+ /* Read data from the socket.
+ * If the user is requesting/requiring authentication, authenticate
+diff --git a/translate.cxx b/translate.cxx
+index 1240a80ec..4ade06fdd 100644
+--- a/translate.cxx
++++ b/translate.cxx
+@@ -7860,7 +7860,7 @@ translate_pass (systemtap_session& s)
+ if (versions.size() >= 3 && s.verbose > 1)
+ clog << _F("ignoring extra parts of compat version: %s", s.compatible.c_str()) << endl;
+ }
+- catch (const runtime_error)
++ catch (const runtime_error&)
+ {
+ throw SEMANTIC_ERROR(_F("parse error in compatibility version: %s", s.compatible.c_str()));
+ }
diff --git a/meta/recipes-kernel/systemtap/systemtap_git.inc b/meta/recipes-kernel/systemtap/systemtap_git.inc
index f51bd28fd8..4d887ed4d2 100644
--- a/meta/recipes-kernel/systemtap/systemtap_git.inc
+++ b/meta/recipes-kernel/systemtap/systemtap_git.inc
@@ -14,6 +14,7 @@ SRC_URI = "git://sourceware.org/git/systemtap.git \
file://0001-buildrun-remove-quotes-around-I-include-line.patch \
file://0001-staprun-stapbpf-don-t-support-installing-a-non-root.patch \
file://0001-Fix-PR22551-by-updating-the-use-of-timers-for-the-4..patch \
+ file://0001-Fixes-for-gcc-8.patch \
"
COMPATIBLE_HOST = '(x86_64|i.86|powerpc|arm|aarch64|microblazeel|mips).*-linux'
--
2.16.3
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH 4/4] llvm: Upgrade to 6.0 release
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
` (2 preceding siblings ...)
2018-04-01 7:19 ` [PATCH 3/4] systemtap: Backport a fix for build with gcc8 Khem Raj
@ 2018-04-01 7:19 ` Khem Raj
2018-04-03 19:05 ` Martin Jansa
2018-04-01 7:32 ` ✗ patchtest: failure for llvm 6.0 update and Misc fixes Patchwork
4 siblings, 1 reply; 7+ messages in thread
From: Khem Raj @ 2018-04-01 7:19 UTC (permalink / raw)
To: openembedded-core
Signed-off-by: Khem Raj <raj.khem@gmail.com>
---
...etLibraryInfo-Undefine-libc-functions-if-th.patch | 20 ++++++++++----------
.../0002-llvm-allow-env-override-of-exe-path.patch | 4 ++--
meta/recipes-devtools/llvm/llvm_git.bb | 11 ++++++-----
3 files changed, 18 insertions(+), 17 deletions(-)
diff --git a/meta/recipes-devtools/llvm/llvm/0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch b/meta/recipes-devtools/llvm/llvm/0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch
index e251799259..209764c8ba 100644
--- a/meta/recipes-devtools/llvm/llvm/0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch
+++ b/meta/recipes-devtools/llvm/llvm/0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch
@@ -1,4 +1,4 @@
-From 28293e48cf1a52004c6a78de448718441f9e05f9 Mon Sep 17 00:00:00 2001
+From 96558c4f25d5132936014f6f2d6252cfdfdf478a Mon Sep 17 00:00:00 2001
From: Khem Raj <raj.khem@gmail.com>
Date: Sat, 21 May 2016 00:33:20 +0000
Subject: [PATCH 1/2] llvm: TargetLibraryInfo: Undefine libc functions if they
@@ -15,10 +15,10 @@ Upstream-Status: Pending
1 file changed, 21 insertions(+)
diff --git a/include/llvm/Analysis/TargetLibraryInfo.def b/include/llvm/Analysis/TargetLibraryInfo.def
-index 9cbe917c146..aff8419cf54 100644
+index a461ed813b9..f9fd9faeee0 100644
--- a/include/llvm/Analysis/TargetLibraryInfo.def
+++ b/include/llvm/Analysis/TargetLibraryInfo.def
-@@ -656,6 +656,9 @@ TLI_DEFINE_STRING_INTERNAL("fmodl")
+@@ -665,6 +665,9 @@ TLI_DEFINE_STRING_INTERNAL("fmodl")
TLI_DEFINE_ENUM_INTERNAL(fopen)
TLI_DEFINE_STRING_INTERNAL("fopen")
/// FILE *fopen64(const char *filename, const char *opentype)
@@ -28,7 +28,7 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_ENUM_INTERNAL(fopen64)
TLI_DEFINE_STRING_INTERNAL("fopen64")
/// int fprintf(FILE *stream, const char *format, ...);
-@@ -691,6 +694,9 @@ TLI_DEFINE_STRING_INTERNAL("fseek")
+@@ -700,6 +703,9 @@ TLI_DEFINE_STRING_INTERNAL("fseek")
/// int fseeko(FILE *stream, off_t offset, int whence);
TLI_DEFINE_ENUM_INTERNAL(fseeko)
TLI_DEFINE_STRING_INTERNAL("fseeko")
@@ -38,7 +38,7 @@ index 9cbe917c146..aff8419cf54 100644
/// int fseeko64(FILE *stream, off64_t offset, int whence)
TLI_DEFINE_ENUM_INTERNAL(fseeko64)
TLI_DEFINE_STRING_INTERNAL("fseeko64")
-@@ -701,6 +707,9 @@ TLI_DEFINE_STRING_INTERNAL("fsetpos")
+@@ -710,6 +716,9 @@ TLI_DEFINE_STRING_INTERNAL("fsetpos")
TLI_DEFINE_ENUM_INTERNAL(fstat)
TLI_DEFINE_STRING_INTERNAL("fstat")
/// int fstat64(int filedes, struct stat64 *buf)
@@ -48,7 +48,7 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_ENUM_INTERNAL(fstat64)
TLI_DEFINE_STRING_INTERNAL("fstat64")
/// int fstatvfs(int fildes, struct statvfs *buf);
-@@ -716,6 +725,9 @@ TLI_DEFINE_STRING_INTERNAL("ftell")
+@@ -725,6 +734,9 @@ TLI_DEFINE_STRING_INTERNAL("ftell")
TLI_DEFINE_ENUM_INTERNAL(ftello)
TLI_DEFINE_STRING_INTERNAL("ftello")
/// off64_t ftello64(FILE *stream)
@@ -58,7 +58,7 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_ENUM_INTERNAL(ftello64)
TLI_DEFINE_STRING_INTERNAL("ftello64")
/// int ftrylockfile(FILE *file);
-@@ -836,6 +848,9 @@ TLI_DEFINE_STRING_INTERNAL("logl")
+@@ -845,6 +857,9 @@ TLI_DEFINE_STRING_INTERNAL("logl")
TLI_DEFINE_ENUM_INTERNAL(lstat)
TLI_DEFINE_STRING_INTERNAL("lstat")
/// int lstat64(const char *path, struct stat64 *buf);
@@ -68,7 +68,7 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_ENUM_INTERNAL(lstat64)
TLI_DEFINE_STRING_INTERNAL("lstat64")
/// void *malloc(size_t size);
-@@ -1055,6 +1070,9 @@ TLI_DEFINE_STRING_INTERNAL("sscanf")
+@@ -1064,6 +1079,9 @@ TLI_DEFINE_STRING_INTERNAL("sscanf")
TLI_DEFINE_ENUM_INTERNAL(stat)
TLI_DEFINE_STRING_INTERNAL("stat")
/// int stat64(const char *path, struct stat64 *buf);
@@ -78,7 +78,7 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_ENUM_INTERNAL(stat64)
TLI_DEFINE_STRING_INTERNAL("stat64")
/// int statvfs(const char *path, struct statvfs *buf);
-@@ -1184,6 +1202,9 @@ TLI_DEFINE_STRING_INTERNAL("times")
+@@ -1193,6 +1211,9 @@ TLI_DEFINE_STRING_INTERNAL("times")
TLI_DEFINE_ENUM_INTERNAL(tmpfile)
TLI_DEFINE_STRING_INTERNAL("tmpfile")
/// FILE *tmpfile64(void)
@@ -89,5 +89,5 @@ index 9cbe917c146..aff8419cf54 100644
TLI_DEFINE_STRING_INTERNAL("tmpfile64")
/// int toascii(int c);
--
-2.13.1
+2.16.1
diff --git a/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-override-of-exe-path.patch b/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-override-of-exe-path.patch
index 832bd729ef..21d2f81b58 100644
--- a/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-override-of-exe-path.patch
+++ b/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-override-of-exe-path.patch
@@ -1,4 +1,4 @@
-From d776487bac17650704614248d19d1e6b35775001 Mon Sep 17 00:00:00 2001
+From 2f8ea767afdaa440c6368040630e1b3ea6a0977a Mon Sep 17 00:00:00 2001
From: Martin Kelly <mkelly@xevo.com>
Date: Fri, 19 May 2017 00:22:57 -0700
Subject: [PATCH 2/2] llvm: allow env override of exe path
@@ -35,5 +35,5 @@ index 08b096afb05..d8d7742744e 100644
// allow taking the address of ::main however.
void *P = (void *)(intptr_t)GetExecutablePath;
--
-2.13.1
+2.16.1
diff --git a/meta/recipes-devtools/llvm/llvm_git.bb b/meta/recipes-devtools/llvm/llvm_git.bb
index de06e12ae4..77c095d9a3 100644
--- a/meta/recipes-devtools/llvm/llvm_git.bb
+++ b/meta/recipes-devtools/llvm/llvm_git.bb
@@ -8,7 +8,7 @@ SECTION = "devel"
LIC_FILES_CHKSUM = "file://LICENSE.TXT;md5=e825e017edc35cfd58e26116e5251771"
-DEPENDS = "libffi libxml2-native zlib ninja-native llvm-native"
+DEPENDS = "libffi libxml2 zlib ninja-native llvm-native"
RDEPENDS_${PN}_append_class-target = " ncurses-terminfo"
@@ -19,10 +19,11 @@ PROVIDES += "llvm${PV}"
LLVM_RELEASE = "${PV}"
LLVM_DIR = "llvm${LLVM_RELEASE}"
-SRCREV = "81029f142231bde8e119becda112a2173f1459c9"
-PV = "5.0"
-PATCH_VERSION = "1"
-SRC_URI = "git://github.com/llvm-mirror/llvm.git;branch=release_50;protocol=http \
+SRCREV = "089d4c0c490687db6c75f1d074e99c4d42936a50"
+PV = "6.0"
+BRANCH = "release_60"
+PATCH_VERSION = "0"
+SRC_URI = "git://github.com/llvm-mirror/llvm.git;branch=${BRANCH};protocol=http \
file://0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch \
file://0002-llvm-allow-env-override-of-exe-path.patch \
"
--
2.16.3
^ permalink raw reply related [flat|nested] 7+ messages in thread
* ✗ patchtest: failure for llvm 6.0 update and Misc fixes
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
` (3 preceding siblings ...)
2018-04-01 7:19 ` [PATCH 4/4] llvm: Upgrade to 6.0 release Khem Raj
@ 2018-04-01 7:32 ` Patchwork
4 siblings, 0 replies; 7+ messages in thread
From: Patchwork @ 2018-04-01 7:32 UTC (permalink / raw)
To: Khem Raj; +Cc: openembedded-core
== Series Details ==
Series: llvm 6.0 update and Misc fixes
Revision: 1
URL : https://patchwork.openembedded.org/series/11636/
State : failure
== Summary ==
Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:
* Issue Upstream-Status is Submitted, but it is not mentioned where [test_upstream_status_presence_format]
Suggested fix Include where 0001-asmlib-Drop-pure-function-attribute-from-seg_init.patch was submitted
Current Upstream-Status: Submitted
Standard format Upstream-Status: Submitted [where]
If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core@lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).
---
Guidelines: https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH 4/4] llvm: Upgrade to 6.0 release
2018-04-01 7:19 ` [PATCH 4/4] llvm: Upgrade to 6.0 release Khem Raj
@ 2018-04-03 19:05 ` Martin Jansa
0 siblings, 0 replies; 7+ messages in thread
From: Martin Jansa @ 2018-04-03 19:05 UTC (permalink / raw)
To: Khem Raj; +Cc: Patches and discussions about the oe-core layer
[-- Attachment #1: Type: text/plain, Size: 7266 bytes --]
Please update mesa.inc to require the new version. Now it depends on
removed 5.0:
meta/recipes-graphics/mesa/mesa.inc:MESA_LLVM_RELEASE ?= "5.0"
On Sun, Apr 1, 2018 at 9:19 AM, Khem Raj <raj.khem@gmail.com> wrote:
> Signed-off-by: Khem Raj <raj.khem@gmail.com>
> ---
> ...etLibraryInfo-Undefine-libc-functions-if-th.patch | 20
> ++++++++++----------
> .../0002-llvm-allow-env-override-of-exe-path.patch | 4 ++--
> meta/recipes-devtools/llvm/llvm_git.bb | 11 ++++++-----
> 3 files changed, 18 insertions(+), 17 deletions(-)
>
> diff --git a/meta/recipes-devtools/llvm/llvm/0001-llvm-
> TargetLibraryInfo-Undefine-libc-functions-if-th.patch
> b/meta/recipes-devtools/llvm/llvm/0001-llvm-TargetLibraryInfo-Undefine-
> libc-functions-if-th.patch
> index e251799259..209764c8ba 100644
> --- a/meta/recipes-devtools/llvm/llvm/0001-llvm-
> TargetLibraryInfo-Undefine-libc-functions-if-th.patch
> +++ b/meta/recipes-devtools/llvm/llvm/0001-llvm-
> TargetLibraryInfo-Undefine-libc-functions-if-th.patch
> @@ -1,4 +1,4 @@
> -From 28293e48cf1a52004c6a78de448718441f9e05f9 Mon Sep 17 00:00:00 2001
> +From 96558c4f25d5132936014f6f2d6252cfdfdf478a Mon Sep 17 00:00:00 2001
> From: Khem Raj <raj.khem@gmail.com>
> Date: Sat, 21 May 2016 00:33:20 +0000
> Subject: [PATCH 1/2] llvm: TargetLibraryInfo: Undefine libc functions if
> they
> @@ -15,10 +15,10 @@ Upstream-Status: Pending
> 1 file changed, 21 insertions(+)
>
> diff --git a/include/llvm/Analysis/TargetLibraryInfo.def
> b/include/llvm/Analysis/TargetLibraryInfo.def
> -index 9cbe917c146..aff8419cf54 100644
> +index a461ed813b9..f9fd9faeee0 100644
> --- a/include/llvm/Analysis/TargetLibraryInfo.def
> +++ b/include/llvm/Analysis/TargetLibraryInfo.def
> -@@ -656,6 +656,9 @@ TLI_DEFINE_STRING_INTERNAL("fmodl")
> +@@ -665,6 +665,9 @@ TLI_DEFINE_STRING_INTERNAL("fmodl")
> TLI_DEFINE_ENUM_INTERNAL(fopen)
> TLI_DEFINE_STRING_INTERNAL("fopen")
> /// FILE *fopen64(const char *filename, const char *opentype)
> @@ -28,7 +28,7 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_ENUM_INTERNAL(fopen64)
> TLI_DEFINE_STRING_INTERNAL("fopen64")
> /// int fprintf(FILE *stream, const char *format, ...);
> -@@ -691,6 +694,9 @@ TLI_DEFINE_STRING_INTERNAL("fseek")
> +@@ -700,6 +703,9 @@ TLI_DEFINE_STRING_INTERNAL("fseek")
> /// int fseeko(FILE *stream, off_t offset, int whence);
> TLI_DEFINE_ENUM_INTERNAL(fseeko)
> TLI_DEFINE_STRING_INTERNAL("fseeko")
> @@ -38,7 +38,7 @@ index 9cbe917c146..aff8419cf54 100644
> /// int fseeko64(FILE *stream, off64_t offset, int whence)
> TLI_DEFINE_ENUM_INTERNAL(fseeko64)
> TLI_DEFINE_STRING_INTERNAL("fseeko64")
> -@@ -701,6 +707,9 @@ TLI_DEFINE_STRING_INTERNAL("fsetpos")
> +@@ -710,6 +716,9 @@ TLI_DEFINE_STRING_INTERNAL("fsetpos")
> TLI_DEFINE_ENUM_INTERNAL(fstat)
> TLI_DEFINE_STRING_INTERNAL("fstat")
> /// int fstat64(int filedes, struct stat64 *buf)
> @@ -48,7 +48,7 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_ENUM_INTERNAL(fstat64)
> TLI_DEFINE_STRING_INTERNAL("fstat64")
> /// int fstatvfs(int fildes, struct statvfs *buf);
> -@@ -716,6 +725,9 @@ TLI_DEFINE_STRING_INTERNAL("ftell")
> +@@ -725,6 +734,9 @@ TLI_DEFINE_STRING_INTERNAL("ftell")
> TLI_DEFINE_ENUM_INTERNAL(ftello)
> TLI_DEFINE_STRING_INTERNAL("ftello")
> /// off64_t ftello64(FILE *stream)
> @@ -58,7 +58,7 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_ENUM_INTERNAL(ftello64)
> TLI_DEFINE_STRING_INTERNAL("ftello64")
> /// int ftrylockfile(FILE *file);
> -@@ -836,6 +848,9 @@ TLI_DEFINE_STRING_INTERNAL("logl")
> +@@ -845,6 +857,9 @@ TLI_DEFINE_STRING_INTERNAL("logl")
> TLI_DEFINE_ENUM_INTERNAL(lstat)
> TLI_DEFINE_STRING_INTERNAL("lstat")
> /// int lstat64(const char *path, struct stat64 *buf);
> @@ -68,7 +68,7 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_ENUM_INTERNAL(lstat64)
> TLI_DEFINE_STRING_INTERNAL("lstat64")
> /// void *malloc(size_t size);
> -@@ -1055,6 +1070,9 @@ TLI_DEFINE_STRING_INTERNAL("sscanf")
> +@@ -1064,6 +1079,9 @@ TLI_DEFINE_STRING_INTERNAL("sscanf")
> TLI_DEFINE_ENUM_INTERNAL(stat)
> TLI_DEFINE_STRING_INTERNAL("stat")
> /// int stat64(const char *path, struct stat64 *buf);
> @@ -78,7 +78,7 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_ENUM_INTERNAL(stat64)
> TLI_DEFINE_STRING_INTERNAL("stat64")
> /// int statvfs(const char *path, struct statvfs *buf);
> -@@ -1184,6 +1202,9 @@ TLI_DEFINE_STRING_INTERNAL("times")
> +@@ -1193,6 +1211,9 @@ TLI_DEFINE_STRING_INTERNAL("times")
> TLI_DEFINE_ENUM_INTERNAL(tmpfile)
> TLI_DEFINE_STRING_INTERNAL("tmpfile")
> /// FILE *tmpfile64(void)
> @@ -89,5 +89,5 @@ index 9cbe917c146..aff8419cf54 100644
> TLI_DEFINE_STRING_INTERNAL("tmpfile64")
> /// int toascii(int c);
> --
> -2.13.1
> +2.16.1
>
> diff --git a/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-override-of-exe-path.patch
> b/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-
> override-of-exe-path.patch
> index 832bd729ef..21d2f81b58 100644
> --- a/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-
> override-of-exe-path.patch
> +++ b/meta/recipes-devtools/llvm/llvm/0002-llvm-allow-env-
> override-of-exe-path.patch
> @@ -1,4 +1,4 @@
> -From d776487bac17650704614248d19d1e6b35775001 Mon Sep 17 00:00:00 2001
> +From 2f8ea767afdaa440c6368040630e1b3ea6a0977a Mon Sep 17 00:00:00 2001
> From: Martin Kelly <mkelly@xevo.com>
> Date: Fri, 19 May 2017 00:22:57 -0700
> Subject: [PATCH 2/2] llvm: allow env override of exe path
> @@ -35,5 +35,5 @@ index 08b096afb05..d8d7742744e 100644
> // allow taking the address of ::main however.
> void *P = (void *)(intptr_t)GetExecutablePath;
> --
> -2.13.1
> +2.16.1
>
> diff --git a/meta/recipes-devtools/llvm/llvm_git.bb
> b/meta/recipes-devtools/llvm/llvm_git.bb
> index de06e12ae4..77c095d9a3 100644
> --- a/meta/recipes-devtools/llvm/llvm_git.bb
> +++ b/meta/recipes-devtools/llvm/llvm_git.bb
> @@ -8,7 +8,7 @@ SECTION = "devel"
>
> LIC_FILES_CHKSUM = "file://LICENSE.TXT;md5=e825e017edc35cfd58e26116e52517
> 71"
>
> -DEPENDS = "libffi libxml2-native zlib ninja-native llvm-native"
> +DEPENDS = "libffi libxml2 zlib ninja-native llvm-native"
>
> RDEPENDS_${PN}_append_class-target = " ncurses-terminfo"
>
> @@ -19,10 +19,11 @@ PROVIDES += "llvm${PV}"
> LLVM_RELEASE = "${PV}"
> LLVM_DIR = "llvm${LLVM_RELEASE}"
>
> -SRCREV = "81029f142231bde8e119becda112a2173f1459c9"
> -PV = "5.0"
> -PATCH_VERSION = "1"
> -SRC_URI = "git://github.com/llvm-mirror/llvm.git;branch=release_50;
> protocol=http \
> +SRCREV = "089d4c0c490687db6c75f1d074e99c4d42936a50"
> +PV = "6.0"
> +BRANCH = "release_60"
> +PATCH_VERSION = "0"
> +SRC_URI = "git://github.com/llvm-mirror/llvm.git;branch=${BRANCH};
> protocol=http \
> file://0001-llvm-TargetLibraryInfo-Undefine-libc-functions-if-th.patch
> \
> file://0002-llvm-allow-env-override-of-exe-path.patch \
> "
> --
> 2.16.3
>
> --
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core@lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core
>
[-- Attachment #2: Type: text/html, Size: 9761 bytes --]
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2018-04-03 19:05 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-04-01 7:19 [PATCH 0/4] llvm 6.0 update and Misc fixes Khem Raj
2018-04-01 7:19 ` [PATCH 1/4] x264: Use updated gnu-config artifacts Khem Raj
2018-04-01 7:19 ` [PATCH 2/4] nasm: Fix pure function warnings Khem Raj
2018-04-01 7:19 ` [PATCH 3/4] systemtap: Backport a fix for build with gcc8 Khem Raj
2018-04-01 7:19 ` [PATCH 4/4] llvm: Upgrade to 6.0 release Khem Raj
2018-04-03 19:05 ` Martin Jansa
2018-04-01 7:32 ` ✗ patchtest: failure for llvm 6.0 update and Misc fixes Patchwork
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox