aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2020-08-07Update syscall lists for Linux 5.8.Joseph Myers25-2/+27
Linux 5.8 has one new syscall, faccessat2. Update syscall-names.list and regenerate the arch-syscall.h headers with build-many-glibcs.py update-syscalls. Tested with build-many-glibcs.py.
2020-08-07Use Linux 5.8 in build-many-glibcs.py.Joseph Myers1-1/+1
This patch makes build-many-glibcs.py use Linux 5.8. Tested with build-many-glibcs.py (host-libraries, compilers and glibcs builds).
2020-08-06htl: Enable tst-cancelx?[45]Samuel Thibault8-16/+17
* nptl/{tst-cancel4-common.c, tst-cancel4-common.h, tst-cancel4.c, tst-cancel5.c, tst-cancelx4.c, tst-cancelx5.c}: Move to sysdeps/pthread/ * nptl/Makefile: Move corresponding rules to... * sysdeps/pthread/Makefile: ... here.
2020-08-07tst-cancel4: Make blocking on write more portableSamuel Thibault1-4/+4
* nptl/tst-cancel4.c (tf_send, tf_sendto): Set socket buffer size after connecting.
2020-08-06hurd: Add missing hidden defSamuel Thibault1-0/+1
* sysdeps/mach/hurd/sched_gets.c (__sched_getscheduler): Add hidden def.
2020-08-05hurd: Rework sbrkSamuel Thibault4-12/+32
Making the brk start exactly at the end of the main application binary was requiring to get it through the _end symbol, which does not work any more with recent toolchains, and actually produces in libc.so a confusing external _end symbol that produces odd results, see https://sourceware.org/bugzilla/show_bug.cgi?id=23499 Trying to do so is quite outdated anyway with the tendency for address randomization. Using _end was also allowing to include the main binary data within the RLIMIT_DATA, but this also seems outdated with dynamic library loading, and nowadays' memory consumption via malloc and mmap rather than statically-allocated data. This adds a BRK_START macro in <vm_param.h> that just tells where we want to start the brk, and thus removes the _end symbol. * sysdeps/mach/hurd/i386/vm_param.h: New file. * sysdeps/mach/hurd/brk.c: Use BRK_START as brk start instead of _end. Also ignore __data_start. * hurd/Versions: Remove _end symbol. * sysdeps/mach/hurd/i386/libc.abilist: Remove _end symbol.
2020-08-05hurd: Implement basic sched_get/setschedulerSamuel Thibault2-0/+75
* sysdeps/mach/hurd/sched_gets.c: New file. * sysdeps/mach/hurd/sched_sets.c: New file.
2020-08-05x86: Rename Intel CPU feature namesH.J. Lu2-15/+15
Intel64 and IA-32 Architectures Software Developer’s Manual has changed the following CPU feature names: 1. The CPU feature of Enhanced Intel SpeedStep Technology is renamed from EST to EIST. 2. The CPU feature which supports Platform Quality of Service Monitoring (PQM) capability is changed to Intel Resource Director Technology (Intel RDT) Monitoring capability, i.e. PQM is renamed to RDT_M. 3. The CPU feature which supports Platform Quality of Service Enforcement (PQE) capability is changed to Intel Resource Director Technology (Intel RDT) Allocation capability, i.e. PQE is renamed to RDT_A.
2020-08-05manual: Fix some @code/@var formatting glitches chapter Date And TimeFlorian Weimer1-10/+10
2020-08-04Copy regex_internal.h from GnulibPaul Eggert1-2/+1
Sync this file from Gnulib, thus incorporating the following fix for a bug with regexps with 16 or more subexpressions: * posix/regex_internal.h (struct re_backref_cache_entry): Use bitset_word_t as the type of eps_reachable_subexps_map, instead of unsigned short int. This fixes a bug I introduced to glibc in 2005-09-28T17:33:18Z!drepper@redhat.com (glibc commit 2c05d33f90861d074dc12808dafbde30f487b1a0, BZ #1302). Remove unused member 'unused'.
2020-08-04Copy regex BITSET_WORD_BITS porting from GnulibPaul Eggert2-30/+22
* posix/regex.c (__STDC_WANT_IEC_60559_BFP_EXT__): Define, for ULONG_WIDTH. This syncs regex.c from Gnujlib. * posix/regex_internal.h (ULONG_WIDTH): Use a more-portable fallback, from Gnulib. (BITSET_WORD_BITS): Now defined in terms of ULONG_WIDTH.
2020-08-04Sync regex.h from GnulibPaul Eggert1-2/+0
* posix/regex.h: Remove an ‘#ifndef _CRAY’ that hasn’t been needed for years in Gnulib (and was needed only because of Gnulib).
2020-08-04Sync mktime.c from GnulibPaul Eggert1-3/+3
* time/mktime.c: Sync from Gnulib. This micro-optimizes three division-related computations.
2020-08-04Sync intprops.h from GnulibPaul Eggert1-6/+11
* include/intprops.h: Sync from Gnulib. This improves performance of INT_MULTIPLY_WRAPV on recent GCC, which affects glibc only in the support library.
2020-08-04Open master branch for glibc 2.33 development.glibc-2.32.9000Carlos O'Donell2-2/+26
Happy hacking!
2020-08-04Prepare for glibc 2.32 release.glibc-2.32Carlos O'Donell3-3/+15380
Update version.h, features.h, and ChangeLog.old/ChangeLog.21.
2020-08-04Regenerate configure scripts.Carlos O'Donell2-1/+2
2020-08-04Update NEWS with bugs.Carlos O'Donell1-2/+110
2020-08-04Update translations.Carlos O'Donell35-25496/+17951
Incorporate updates from translationproject.org.
2020-08-04Don't mix linker error messages into edited scriptsAlan Modra1-2/+2
* Makerules (shlib.lds): Discard linker warning output. (format.lds): Likewise. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-08-04benchtests/README update.Paul Zimmermann1-6/+14
Improve documentation of the 'name' directive and the 'workload' mechanism. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-08-04RISC-V: Update lp64d libm-test-ulps according to HiFive UnleashedMaciej W. Rozycki1-15/+18
Produced with HiFive Unleashed hardware using Linux 5.8-rc5 exactly and GCC 10.0.1 20200426. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-08-03aarch64: update NEWS about branch protectionSzabolcs Nagy1-1/+3
After some discussions it seems the original news was not clear and that it is valid to manually pass the branch protection flags iff GCC target libs are built with them too. The main difference between manually passing the flags and using the configure option is that the latter also makes branch protection the default in GCC which may not be desirable in some cases. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-08-03Add NEWS entry for CVE-2016-10228 (bug 19519)Aurelien Jarno1-0/+4
2020-08-03powerpc: Fix incorrect cache line size load in memset (bug 26332)Florian Weimer1-2/+2
__GLRO loaded the word after the requested variable on big-endian PowerPC, where LOWORD is 4. This can cause the memset implement go wrong because the masking with the cache line size produces wrong results, particularly if the loaded value happens to be 1. The __GLRO macro is not used in any place where loading the lower 32-bit word of a 64-bit value is desired, so the +4 offset is always wrong. Fixes commit 18363b4f010da9ba459b13310b113ac0647c2fcc ("powerpc: Move cache line size to rtld_global_ro") and bug 26332. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-08-03Update Nios II libm-test-ulps file.Chung-Lin Tang1-11/+11
2020-07-31Move NEWS entry for CVE-2020-1751 to the 2.31 sectionFlorian Weimer1-3/+3
It was fixed in commit d93769405996dfc11d216ddbe415946617b5a494 ("Fix array overflow in backtrace on PowerPC (bug 25423)"), which went into glibc 2.31. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-31NEWS: Deprecate weak libpthread symbols for single-threaded checksFlorian Weimer1-0/+8
Recommend the new __libc_single_thread variable instead. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-31NEWS: Deprecate nss_hesiodFlorian Weimer1-0/+5
Storing user databases in DNS, without client-side DNSSEC validation, is problematic from a security point of view. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-27nptl: Zero-extend arguments to SETXID syscalls [BZ #26248]H.J. Lu3-2/+87
nptl has /* Opcodes and data types for communication with the signal handler to change user/group IDs. */ struct xid_command { int syscall_no; long int id[3]; volatile int cntr; volatile int error; }; /* This must be last, otherwise the current thread might not have permissions to send SIGSETXID syscall to the other threads. */ result = INTERNAL_SYSCALL_NCS (cmdp->syscall_no, 3, cmdp->id[0], cmdp->id[1], cmdp->id[2]); But the second argument of setgroups syscal is a pointer: int setgroups (size_t size, const gid_t *list); But on x32, pointers passed to syscall must have pointer type so that they will be zero-extended. The kernel XID arguments are unsigned and do not require sign extension. Change xid_command to struct xid_command { int syscall_no; unsigned long int id[3]; volatile int cntr; volatile int error; }; so that all arguments are zero-extended. A testcase is added for x32 and setgroups returned with EFAULT when running as root without the fix.
2020-07-27Use binutils 2.35 branch in build-many-glibcs.py.Joseph Myers1-1/+1
This patch makes build-many-glibcs.py use binutils 2.35 branch. Tested with build-many-glibcs.py (compilers and glibcs builds).
2020-07-27aarch64: Use future HWCAP2_MTE in ifunc resolverSzabolcs Nagy1-2/+8
Make glibc MTE-safe on systems where MTE is available. This allows using heap tagging with an LD_PRELOADed malloc implementation that enables MTE. We don't document this as guaranteed contract yet, so glibc may not be MTE safe when HWCAP2_MTE is set (older glibcs certainly aren't). This is mainly for testing and debugging. The HWCAP flag is not exposed in public headers until Linux adds it to its uapi. The HWCAP value reservation will be in Linux 5.9.
2020-07-25Update x86-64 libm-test-ulpsAndreas K. Hüttel1-2/+2
x86_64 Intel(R) Core(TM) i5-8265U gcc (Gentoo 10.1.0-r2 p3) 10.1.0 Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-24aarch64: Respect p_flags when protecting code with PROT_BTISzabolcs Nagy1-1/+8
Use PROT_READ and PROT_WRITE according to the load segment p_flags when adding PROT_BTI. This is before processing relocations which may drop PROT_BTI in case of textrels. Executable stacks are not protected via PROT_BTI either. PROT_BTI is hardening in case memory corruption happened, it's value is reduced if there is writable and executable memory available so missing it on such memory is fine, but we should respect the p_flags and should not drop PROT_WRITE.
2020-07-23Disable warnings due to deprecated libselinux symbols used by nss and nscdArjun Shankar2-0/+24
The SELinux API deprecated several symbols in its 3.1 release, including security_context_t, matchpathcon, avc_init, and sidput, which are used in makedb and nscd. While the usage of these should eventually be replaced by newer interfaces, this commit disables GCC warnings due to the use of the above symbols. Reviewed-by: Carlos O'Donell <carlos@redhat.com> Tested-by: Carlos O'Donell <carlos@redhat.com>
2020-07-22Regenerate INSTALL for ARC port updates.Carlos O'Donell1-0/+5
2020-07-22Update libc.pot for 2.32 release.Carlos O'Donell1-918/+647
2020-07-21powerpc: Fix POWER10 selectionTulio Magno Quites Machado Filho1-0/+1
Add a line that was missing from a previous commit. Without increasing str, the null-byte is not validated, and _dl_string_platform returns -1. Fixes: d2ba3677da7a ("powerpc: Add support for POWER10") Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21powerpc64le: guarantee a .gnu.attributes section [BZ #26220]Paul E. Murphy1-0/+8
Upstream GCC 11 development is now building the ibm128 runtime support (in libgcc) without a .gnu.attributes section on ppc64le. Ensure we have one to replace by building one ibm128 file in libc and libm with attributes. Reviewed-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Tulio Magno Quites Machado Filho <tuliom@linux.ibm.com>
2020-07-21libio: Remove __libc_readline_unlockedFlorian Weimer5-423/+2
__nss_readline supersedes it. This reverts part of commit 3f5e3f5d066dcffb80af48ae2cf35a01a85a8f10 ("libio: Implement internal function __libc_readline_unlocked"). The internal aliases __fseeko64 and __ftello64 are preserved because they are needed by __nss_readline as well. Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21shadow: Implement fgetspent_r using __nss_fgetent_rFlorian Weimer2-37/+7
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21pwd: Implement fgetpwent_r using __nss_fgetent_rFlorian Weimer1-37/+6
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21gshadow: Implement fgetsgent_r using __nss_fgetent_r (bug 20338)Florian Weimer3-36/+198
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21grp: Implement fgetgrent_r using __nss_fgetent_rFlorian Weimer1-48/+6
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21nss: Add __nss_fgetent_rFlorian Weimer7-54/+260
And helper functions __nss_readline, __nss_readline_seek, __nss_parse_line_result. This consolidates common code for handling overlong lines and parse files. Use the new functionality in internal_getent in nss/nss_files/files-XXX.c. Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21libio: Add fseterr_unlocked for internal useFlorian Weimer1-0/+7
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21nss_files: Use generic result pointer in parse_lineFlorian Weimer2-38/+15
As a result, all parse_line functions have the same prototype, except for that producing struct hostent. This change is ABI-compatible, so it does not alter the internal GLIBC_PRIVATE ABI (otherwise we should probably have renamed the exported functions). A future change will use this to implement a generict fget*ent_r function. Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21nss_files: Consolidate line parse declarations in <nss_files.h>Florian Weimer9-49/+52
These functions should eventually have the same type, so it makes sense to declare them together. Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21nss_compat: Do not use mmap to read database files (bug 26258)Florian Weimer4-16/+8
This avoids crashes in case the files are truncated for some reason. For typically file sizes, it is also going to be slightly faster. Using __nss_files_fopen instead mirrors what nss_files does. Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>
2020-07-21nss_files: Consolidate file opening in __nss_files_fopenFlorian Weimer8-11/+86
Tested-by: Carlos O'Donell <carlos@redhat.com> Reviewed-by: Carlos O'Donell <carlos@redhat.com>