summaryrefslogtreecommitdiff
path: root/open_issues/glibc
diff options
context:
space:
mode:
Diffstat (limited to 'open_issues/glibc')
-rw-r--r--open_issues/glibc/0.4.mdwn32
-rw-r--r--open_issues/glibc/debian/experimental.mdwn156
-rw-r--r--open_issues/glibc/t/tls-threadvar.mdwn37
-rw-r--r--open_issues/glibc/t/tls.mdwn9
4 files changed, 201 insertions, 33 deletions
diff --git a/open_issues/glibc/0.4.mdwn b/open_issues/glibc/0.4.mdwn
deleted file mode 100644
index f864469d..00000000
--- a/open_issues/glibc/0.4.mdwn
+++ /dev/null
@@ -1,32 +0,0 @@
-[[!meta copyright="Copyright © 2012, 2013 Free Software Foundation, Inc."]]
-
-[[!meta license="""[[!toggle id="license" text="GFDL 1.2+"]][[!toggleable
-id="license" text="Permission is granted to copy, distribute and/or modify this
-document under the terms of the GNU Free Documentation License, Version 1.2 or
-any later version published by the Free Software Foundation; with no Invariant
-Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license
-is included in the section entitled [[GNU Free Documentation
-License|/fdl]]."]]"""]]
-
-[[!tag open_issue_glibc open_issue_libpthread]]
-
-Things to consider doing when bumping the glibc SONAME.
-
-
-# IRC, freenode, #hurd, 2012-12-14
-
-In context of [[packaging_libpthread]]/[[libpthread]].
-
- <pinotree> once libc is switched internally from cthreads to pthreads (thus
- breaking its BC), may be worth cleanup the hurd-specific exported symbols
- <tschwinge> pinotree: Yes. If you already have ideas about what to clean
- up, feel free to add a new page or a section on open_issues/glibc.
- <pochu> we're gonna break backwards compatibility in glibc on hurd? that
- could be the perfect moment to fix the /dev/fd/N problem without adding
- new RPCs, though we'd probably have to break backwards-compatibility in
- the exec server IIRC...
- <tschwinge> pochu: Oh, I have to re-read that discussion, but thanks for
- reminding!
-
-[[!GNU_Savannah_bug 28934]], [[user/pochu]], [[!message-id
-"4BFA500A.7030502@gmail.com"]].
diff --git a/open_issues/glibc/debian/experimental.mdwn b/open_issues/glibc/debian/experimental.mdwn
index 5168479d..273f02fd 100644
--- a/open_issues/glibc/debian/experimental.mdwn
+++ b/open_issues/glibc/debian/experimental.mdwn
@@ -1,4 +1,4 @@
-[[!meta copyright="Copyright © 2013 Free Software Foundation, Inc."]]
+[[!meta copyright="Copyright © 2013, 2014 Free Software Foundation, Inc."]]
[[!meta license="""[[!toggle id="license" text="GFDL 1.2+"]][[!toggleable
id="license" text="Permission is granted to copy, distribute and/or modify this
@@ -130,6 +130,101 @@ Now in unstable.
<pinotree> btw i saw too the segmentation fault when generating locales
+## IRC, freenode, #hurd, 2014-02-04
+
+ <bu^> hello
+ <bu^> I just updated
+ <bu^> Setting up locales (2.17-98~0) ...
+ <bu^> Generating locales (this might take a while)...
+ <bu^> en_US.UTF-8...Segmentation fault
+ <bu^> done
+ <gnu_srs> bu^: That's known, it still seems to work, though. If you have
+ the time please debug. I've tried but not found the solution yet:-(
+ <bu^> ok, just wanted to notify
+
+
+## IRC, freenode, #hurd, 2014-02-19
+
+ <braunr> for info, the localedef segfault has been fixed upstream
+ <braunr> or rather, upstream has been written in a way that won't trigger
+ the segfault
+ <braunr> it is caused by the locale archive code that maps the locale
+ archive file in the address space, enlarging the mapping as needed, but
+ unmaps the complete reserved size of 512M on close
+ <braunr> munmap is implemented through vm_deallocate, but it looks like the
+ latter doesn't allow deallocating unmapped regions of the address space
+ <braunr> (to be confirmed)
+ <braunr> upstream code tracks the mapping size so vm_deallocate won't whine
+ <braunr> i expect we'll have that in eglibc 2.18
+ <braunr> hm actually, posix says munmap must refer to memory obtained with
+ mmap :)
+ <braunr> (or actually, that the behaviour is undefined, which most unix
+ systems allow anyway, but not us)
+
+ <braunr> also, before i leave, i have partially traced the localedef
+ segfault
+ <youpi> ah, cool
+ <braunr> localedef maps the locale archive, and enlarges the mapping as
+ needed
+ <braunr> but munmaps the complete 512m reserved area
+ <braunr> and i strongly suspect it unmaps something it shouldn't on the
+ hurd
+ <braunr> since linux mmap has different boundaries depending on the mapping
+ use
+ <braunr> while our glibc will happily maps stacks below text
+ <braunr> the good news is that it looks fixed upstream
+ <youpi> ah :)
+ <braunr>
+ https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=17db6e8d6b12f55e312fcab46faf5d332c806fb6
+ <braunr> see the change about close_archive
+ <braunr> i haven't tested it though
+
+
+## IRC, freenode, #hurd, 2014-02-21
+
+ <gg0> just upgraded to 2.18, locales still segfaults
+ <braunr> ok
+
+
+## IRC, freenode, #hurd, 2014-02-23
+
+ <braunr> ok, as expected, the localdef bug is because of some mmap issue
+
+[[glibc/mmap]].
+
+ <braunr> looks like our mmap doesn't like mapping files with PROT_NONE
+ <braunr> shouldn't be too hard to fix
+ <braunr> gg0: i should have a fix ready soon for localedef
+
+ <braunr> youpi: i have a patch for glibc about the localedef segfault
+ <youpi> is that the backport we talked about, or something else?
+ <braunr> something else
+ <braunr> in short
+ <braunr> mmap() PROT_NONE on files return 0
+ <youpi> ok
+ <youpi> seems like fixable indeed
+ <braunr> nothing is mapped, and the localdef code doesn't consider this an
+ error
+ <braunr> my current fix is to handle PROT_NONE like PROT_READ
+ <youpi> doesn't vm_protect allow to map something without giving read
+ right?
+ <braunr> it probably does
+ <braunr> the problem is in glibc
+ <youpi> ok
+ <braunr> when i say like PROT_READ, i mean a memory object gets a reference
+ <braunr> on the read port returned by io_map
+ <braunr> since it's not accessible anyway, it shouldn't make a difference
+ <braunr> but i preferred to have the memory object referenced anyway to
+ match what i expect is done by other systems
+
+
+## IRC, freenode, #hurd, 2014-02-24
+
+ <youpi> braunr: ah ok
+
+ <braunr> ok that mmap fix looks fine, i'll add comments and commit it soon
+
+
# IRC, OFTC, #debian-hurd, 2013-06-20
<youpi> damn
@@ -173,3 +268,62 @@ Now in unstable.
<youpi> I'd warmly welcome a way to detect whether being the / translator
process btw
<youpi> it seems far from trivial
+
+
+# glibc 2.18 vs. GCC 4.8
+
+## IRC, freenode, #hurd, 2013-11-25
+
+ <youpi> grmbl, installing a glibc 2.18 rebuilt with gcc-4.8 brings an
+ unbootable system
+
+
+## IRC, freenode, #hurd, 2013-11-29
+
+ <teythoon> so, what do I do? rebuild the glibc 2.18 package with gcc4.8 and
+ see what breaks ?
+ <teythoon> when I boot a system with that libc that is ?
+ <teythoon> I wish youpi would have been more specific, I've never built the
+ libc before...
+ <braunr> debian/rules build in the debian package
+ <braunr> ctrl-c when you see gcc invocations
+ <braunr> cd buildir; make lib others
+ <braunr> although hm
+ <braunr> what breaks is at boot time right ?
+ <teythoon> yes
+ <braunr> heh ..
+ <braunr> then dpkg-buildpackage
+ <braunr> DEB_BUILD_OPTIONS=nocheck speeds things up
+ <braunr> just answer on the mailing list and ask him
+ <braunr> he usually answers quickly
+
+
+## IRC, freenode, #hurd, 2013-12-18
+
+ <gnu_srs> teythoon: k!, any luck with eglibc-2.18?
+ <teythoon> tbh i didn't look into this after two unsuccessful attempts at
+ building the libc package
+ <teythoon> there was a post over at the libc-alpha list that sounded
+ familiar
+ <teythoon> http://www.cygwin.com/ml/libc-alpha/2013-12/msg00281.html
+ <braunr> wow
+ <teythoon> ?
+ <braunr> this looks tricky
+ <braunr> and why ia64 only
+ <teythoon> indeed
+ <braunr> it's rare to see aurel32 ask such questions
+
+
+## IRC, freenode, #hurd, 2014-01-22
+
+ <youpi> btw, did anybody investigate the glibc-built-with-gcc-4.8 issue?
+ <youpi> oddly enough, a subhurd boots completely fine with it
+ <braunr> i didn't
+ <teythoon> no, sorry
+ <youpi> I was wondering whether the bogus deallocation at boot might have
+ something to do
+ <braunr> which one ?
+ <braunr> ah
+ <braunr> yes
+ <braunr> maybe
+ <youpi> quoted earlier here
diff --git a/open_issues/glibc/t/tls-threadvar.mdwn b/open_issues/glibc/t/tls-threadvar.mdwn
index 7ce36f41..40d1463e 100644
--- a/open_issues/glibc/t/tls-threadvar.mdwn
+++ b/open_issues/glibc/t/tls-threadvar.mdwn
@@ -116,3 +116,40 @@ dropped altogether, and `__thread` directly be used in glibc.
## IRC, OFTC, #debian-hurd, 2013-09-23
<youpi> yay, errno threadvar conversion success
+
+
+## IRC, OFTC, #debian-hurd, 2013-10-05
+
+ <gg0_> youpi: any ETA for tls?
+ <youpi> gg0_: one can't have an ETA for bugfixing
+ <gg0_> i don't call them bugs if there's something missing to implement btw
+ <youpi> no, here it's bugs
+ <youpi> the implementation is already in the glibc branches in our
+ repository
+ <youpi> it just makes some important regressions
+
+
+## IRC, OFTC, #debian-hurd, 2013-10-07
+
+ <youpi> about tls, I've made some "progress": now I'm wondering how raise()
+ has ever been working before :)
+
+
+## IRC, OFTC, #debian-hurd, 2013-10-15
+
+ <youpi> good, reply_port tls is now ok
+ <youpi> last but not least, sigstate
+
+
+## IRC, OFTC, #debian-hurd, 2013-10-21
+
+ <youpi> started testsuite with threadvars dropped completely
+ <youpi> so far so good
+
+
+## IRC, OFTC, #debian-hurd, 2013-10-24
+
+ <youpi> ok, hurd boots with full-tls libc, no threadvars at all any more
+ <gg0> \o/
+ <gg0> good bye threadvars bugs, welcome tls ones ;)
+ <youpi> now I need to check that threads can really use another stack :)
diff --git a/open_issues/glibc/t/tls.mdwn b/open_issues/glibc/t/tls.mdwn
index a92a21fb..b10703fd 100644
--- a/open_issues/glibc/t/tls.mdwn
+++ b/open_issues/glibc/t/tls.mdwn
@@ -70,3 +70,12 @@ After commit a9538892adfbb9f092e0bb14ff3a1703973968af, it's
much better.
<youpi> have you had a look at the tls.pdf from Uli ?
<youpi> all the gory details are there :)
+
+Commit c61b4d41c9647a54a329aa021341c0eb032b793e, [[!sourceware_PR 15754]], adds
+`sysdeps/i386/stackguard-macros.h:POINTER_CHK_GUARD`, which is not correct for
+us (at the moment), but it also shouldn't cause any harm, as this file is only
+used in `elf/tst-ptrguard1.c` and `elf/tst-stackguard1.c`, which now will fail
+to build for us, as we don't have a `pointer_guard` member in
+`sysdeps/mach/hurd/tls.h:tcbhead_t`.
+
+We don't define `THREAD_SET_POINTER_GUARD`.