diff options
author | Koen Vandeputte <koen.vandeputte@ncentric.com> | 2019-04-12 16:25:49 +0200 |
---|---|---|
committer | Koen Vandeputte <koen.vandeputte@ncentric.com> | 2019-04-23 13:29:04 +0200 |
commit | 82625374eea0613027d8dbe2bcfdce7beadaa883 (patch) | |
tree | 3936fe5a18a40f1677bf064f237f4ee34b491ab0 /toolchain/musl | |
parent | e40050d1049ddf8ca0eb49666eafcb69b4a1d374 (diff) | |
download | openwrt-82625374eea0613027d8dbe2bcfdce7beadaa883.tar.gz openwrt-82625374eea0613027d8dbe2bcfdce7beadaa883.tar.bz2 openwrt-82625374eea0613027d8dbe2bcfdce7beadaa883.zip |
toolchain/musl: update to version 1.1.22
new features:
- priority-inheritance mutexes
- membarrier syscall, pre-registration to use it, fallback emulation
- header-level support for new linux features in 4.19, 4.20, 5.0
major internal changes:
- complete, async-safe view of all existent threads as global list
- robust __synccall based on new thread list
- new dynamic TLS is installed synchronously at dlopen
- TLSDESC resolver functions no longer make bad ABI assumptions to call C
- resolved shared library dependencies are now recorded
compatibility & conformance:
- dependency-order shared library constructor execution
- sigaltstack no longer rejects SS_AUTODISARM, future flags
- FILE is now a complete (dummy) type in pre-C11 feature profiles
- setvbuf reports failure on invalid arguments
- TSVTX is exposed unconditionally in tar.h
- multithreaded set*id() no longer depends on /proc
- key slot reuse after pthread_key_delete no longer depends on /proc
bugs fixed:
- failures in multithreaded set*id() with concurrent thread creation/exit
- interposed free was called from invalid/inconsistent contexts
- freeaddrinfo performed invalid free of some partial results lists
- dlsym dependency order search had false negatives and false positives
- dn_skipname gave wrong results for labels with 8-bit content
- dcngettext clobbered errno, often breaking printing of error messages
- sscanf read past end of buffer under certain conditions (1.1.21 regression)
- pthread_key_create spuriously failed under race condition (1.1.21 regression)
- fdopendir wrongly succeeded with O_PATH file descriptors
- gets behaved incorrectly in presence of null bytes
- namespace violations in c11 tsd and mutex function dependencies
- incorrect prototype for makecontext (unimplemented)
arch-specfic bugs fixed:
- s390x had wrong values for POSIX_FADV_DONTNEED/_NOREUSE
Extensively tested on dozens of devices, covering most popular architectures.
Signed-off-by: Koen Vandeputte <koen.vandeputte@ncentric.com>
Signed-off-by: Dainis Jonitis <dainis.jonitis@ubnt.com>
Signed-off-by: Roman Yeryomin <roman@advem.lv>
Diffstat (limited to 'toolchain/musl')
-rw-r--r-- | toolchain/musl/common.mk | 6 | ||||
-rw-r--r-- | toolchain/musl/patches/400-Add-format-attribute-to-some-function-declarations.patch | 10 |
2 files changed, 8 insertions, 8 deletions
diff --git a/toolchain/musl/common.mk b/toolchain/musl/common.mk index b52263c43b..ae7758e8b5 100644 --- a/toolchain/musl/common.mk +++ b/toolchain/musl/common.mk @@ -8,13 +8,13 @@ include $(TOPDIR)/rules.mk include $(INCLUDE_DIR)/target.mk PKG_NAME:=musl -PKG_VERSION:=1.1.21 +PKG_VERSION:=1.1.22 PKG_RELEASE:=1 PKG_SOURCE_PROTO:=git PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION) -PKG_SOURCE_VERSION:=1691b23955590d1eb66a11158fdd91c86337e886 -PKG_MIRROR_HASH:=4fa312d0ca020d31603ced84a7103fb328c6ae9508239491a228be17e7807147 +PKG_SOURCE_VERSION:=e97681d6f2c44bf5fa9ecdd30607cb63c780062e +PKG_MIRROR_HASH:=a6655418698735e19fe1c2deffb7335bbda634385c636206dd3cd5c8194a3ce0 PKG_SOURCE_URL:=git://git.musl-libc.org/musl PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-$(PKG_SOURCE_VERSION).tar.xz diff --git a/toolchain/musl/patches/400-Add-format-attribute-to-some-function-declarations.patch b/toolchain/musl/patches/400-Add-format-attribute-to-some-function-declarations.patch index f7eff9141f..06aeb34ced 100644 --- a/toolchain/musl/patches/400-Add-format-attribute-to-some-function-declarations.patch +++ b/toolchain/musl/patches/400-Add-format-attribute-to-some-function-declarations.patch @@ -87,7 +87,7 @@ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> } --- a/include/stdio.h +++ b/include/stdio.h -@@ -21,6 +21,14 @@ extern "C" { +@@ -25,6 +25,14 @@ extern "C" { #include <bits/alltypes.h> @@ -102,7 +102,7 @@ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> #ifdef __cplusplus #define NULL 0L #else -@@ -103,19 +111,19 @@ int puts(const char *); +@@ -107,19 +115,19 @@ int puts(const char *); int printf(const char *__restrict, ...); int fprintf(FILE *__restrict, const char *__restrict, ...); int sprintf(char *__restrict, const char *__restrict, ...); @@ -127,7 +127,7 @@ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> void perror(const char *); -@@ -136,8 +144,8 @@ int pclose(FILE *); +@@ -140,8 +148,8 @@ int pclose(FILE *); int fileno(FILE *); int fseeko(FILE *, off_t, int); off_t ftello(FILE *); @@ -138,7 +138,7 @@ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> void flockfile(FILE *); int ftrylockfile(FILE *); void funlockfile(FILE *); -@@ -176,8 +184,8 @@ int fileno_unlocked(FILE *); +@@ -180,8 +188,8 @@ int fileno_unlocked(FILE *); int getw(FILE *); int putw(int, FILE *); char *fgetln(FILE *, size_t *); @@ -149,7 +149,7 @@ Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> #endif #ifdef _GNU_SOURCE -@@ -199,6 +207,9 @@ typedef struct _IO_cookie_io_functions_t +@@ -203,6 +211,9 @@ typedef struct _IO_cookie_io_functions_t FILE *fopencookie(void *, const char *, cookie_io_functions_t); #endif |