diff --git a/.gitignore b/.gitignore index 5d0e442..950da76 100644 --- a/.gitignore +++ b/.gitignore @@ -7,3 +7,5 @@ /compiler-rt-4.0.0.src.tar.xz /compiler-rt-4.0.1.src.tar.xz /Fuzzer.tar.xz +/Fuzzer-5.0.0.tar.xz +/compiler-rt-5.0.0.src.tar.xz diff --git a/0001-Build-fixes-for-newer-glibc.patch b/0001-Build-fixes-for-newer-glibc.patch deleted file mode 100644 index 0101d5d..0000000 --- a/0001-Build-fixes-for-newer-glibc.patch +++ /dev/null @@ -1,63 +0,0 @@ -From 8fbed3e5332537dea784f3b59b4bc6e678bfdae9 Mon Sep 17 00:00:00 2001 -From: Tom Stellard -Date: Fri, 23 Jun 2017 13:52:53 +0000 -Subject: [PATCH] Build fixes for newer glibc - ---- - lib/esan/esan_sideline_linux.cpp | 4 ++-- - lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc | 4 ++-- - lib/tsan/rtl/tsan_platform_linux.cc | 2 +- - 3 files changed, 5 insertions(+), 5 deletions(-) - -diff --git a/lib/esan/esan_sideline_linux.cpp b/lib/esan/esan_sideline_linux.cpp -index d04f5909d..095f2c29b 100644 ---- a/lib/esan/esan_sideline_linux.cpp -+++ b/lib/esan/esan_sideline_linux.cpp -@@ -70,11 +70,11 @@ int SidelineThread::runSideline(void *Arg) { - - // Set up a signal handler on an alternate stack for safety. - InternalScopedBuffer StackMap(SigAltStackSize); -- struct sigaltstack SigAltStack; -+ stack_t SigAltStack; - SigAltStack.ss_sp = StackMap.data(); - SigAltStack.ss_size = SigAltStackSize; - SigAltStack.ss_flags = 0; -- internal_sigaltstack(&SigAltStack, nullptr); -+ internal_sigaltstack((struct sigaltstack *)&SigAltStack, nullptr); - - // We inherit the signal mask from the app thread. In case - // we weren't created at init time, we ensure the mask is empty. -diff --git a/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc b/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc -index 03f73ae88..8ac0fe5a1 100644 ---- a/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc -+++ b/lib/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc -@@ -287,11 +287,11 @@ static int TracerThread(void* argument) { - - // Alternate stack for signal handling. - InternalScopedBuffer handler_stack_memory(kHandlerStackSize); -- struct sigaltstack handler_stack; -+ stack_t handler_stack; - internal_memset(&handler_stack, 0, sizeof(handler_stack)); - handler_stack.ss_sp = handler_stack_memory.data(); - handler_stack.ss_size = kHandlerStackSize; -- internal_sigaltstack(&handler_stack, nullptr); -+ internal_sigaltstack((struct sigaltstack *)&handler_stack, nullptr); - - // Install our handler for synchronous signals. Other signals should be - // blocked by the mask we inherited from the parent thread. -diff --git a/lib/tsan/rtl/tsan_platform_linux.cc b/lib/tsan/rtl/tsan_platform_linux.cc -index d05c0e701..b01648b39 100644 ---- a/lib/tsan/rtl/tsan_platform_linux.cc -+++ b/lib/tsan/rtl/tsan_platform_linux.cc -@@ -289,7 +289,7 @@ void InitializePlatform() { - int ExtractResolvFDs(void *state, int *fds, int nfd) { - #if SANITIZER_LINUX && !SANITIZER_ANDROID - int cnt = 0; -- __res_state *statp = (__res_state*)state; -+ struct __res_state *statp = (struct __res_state*)state; - for (int i = 0; i < MAXNS && cnt < nfd; i++) { - if (statp->_u._ext.nsaddrs[i] && statp->_u._ext.nssocks[i] != -1) - fds[cnt++] = statp->_u._ext.nssocks[i]; --- -2.13.1 - diff --git a/compiler-rt.spec b/compiler-rt.spec index 8881c57..f96ffec 100644 --- a/compiler-rt.spec +++ b/compiler-rt.spec @@ -4,8 +4,8 @@ %endif Name: compiler-rt -Version: 4.0.1 -Release: 6%{?dist} +Version: 5.0.0 +Release: 1%{?dist} Summary: LLVM "compiler-rt" runtime libraries License: NCSA or MIT @@ -15,12 +15,11 @@ Source0: http://llvm.org/releases/%{version}/%{name}-%{version}.src.tar.xz # of compiler-rt, because upstream moved the code into the compiler-rt project # for LLVM 6.0.0, and we also don't want to add clang as a build dependency for # llvm. -# wget http://llvm.org/releases/4.0.1/llvm-4.0.1.src.tar.xz -# tar -xJf llvm-4.0.1.src.tar.xz -# cd llvm-4.0.1.src/lib/Fuzzer/ -# tar -cJf Fuzzer.tar.xz Fuzzer/ +# wget http://llvm.org/releases/5.0.0/llvm-5.0.0.src.tar.xz +# tar -xJf llvm-5.0.0.src.tar.xz +# cd llvm-5.0.0.src/lib/ +# tar -cJf Fuzzer-5.0.0.tar.xz Fuzzer/ Source1: Fuzzer.tar.xz -Patch0: 0001-Build-fixes-for-newer-glibc.patch Patch1: 0001-Fix-AArch64-build-with-glibc-2.26.patch BuildRequires: cmake @@ -94,6 +93,9 @@ cd _build %{_libdir}/clang/%{version} %changelog +* Fri Oct 13 2017 Tom Stellard - 5.0.0-1 +- 5.0.0 Release + * Mon Sep 25 2017 Tom Stellard - 4.0.1-6 - Fix AArch64 build with glibc 2.26 diff --git a/sources b/sources index d9395c8..d3a568e 100644 --- a/sources +++ b/sources @@ -1,3 +1,2 @@ -SHA512 (compiler-rt-4.0.0.src.tar.xz) = ed52436a2399ca82c1af46a523e89e88c23367f74cd110f0267af49a72aa4912ae8f48c6093e6b01c9ea68c48354a12201d26baf721d254fb017ddb98af2e3dd -SHA512 (compiler-rt-4.0.1.src.tar.xz) = cfeb625884b273f7c0e6767b81a8d3e5f24e0b96a510d5764d9d47a0e215fc841b4cb9d1843c8fb428cd21def720cfbfe8d3593ff5bb390548ebc8c32a902649 -SHA512 (Fuzzer.tar.xz) = 74a3df67ac71a1049a97a03f1465162bdee536504b193829842c54c27d879b01a4496f0c276e9626b5d06c1b42190e275de02c8fa05f36d9c2650602b3aa13dd +SHA512 (Fuzzer-5.0.0.tar.xz) = 54f42b6768e0bef592812b297c06a1e647435ba0220ae03fed56229402bb3a5dfdbead288d27444f2e7855fd5484f31bc8ec02be724053f12443b2df2310e7c6 +SHA512 (compiler-rt-5.0.0.src.tar.xz) = 5f3fd49736fba35232b0baa19a5f03c4ab3bf85ec16f23355eb3c516fe6d861c14272c224ca2f2092a80636df4307e49a3df1b60a3791949b3f1ba4a0c8c81fb