summaryrefslogtreecommitdiff
path: root/packages/glibc/2.12.2
diff options
context:
space:
mode:
authorChris Packham <judge.packham@gmail.com>2021-09-21 07:56:07 (GMT)
committerChris Packham <judge.packham@gmail.com>2021-09-21 09:24:31 (GMT)
commit3d2b48fb7a7b958575714d1d3ca180c53aeb8604 (patch)
tree6b0a8cd4a87d4912e4fc0d8dc7286ec7dc820a9b /packages/glibc/2.12.2
parent793b2503458b874e58c9d7fafc68686ecb9fd071 (diff)
glibc: Remove obsolete versions
The following versions were marked obsolete in crosstool-ng-1.24.0, remove them. - glibc-linaro-2.20-2014.11 - glibc-2.12.2 - glibc-2.13 - glibc-2.14.1 - glibc-2.15 - glibc-2.16.0 - glibc-2.18 - glibc-2.20 - glibc-2.21 - glibc-2.22 Signed-off-by: Chris Packham <judge.packham@gmail.com>
Diffstat (limited to 'packages/glibc/2.12.2')
-rw-r--r--packages/glibc/2.12.2/0000-Fix-combreloc-test-BSD-grep.patch41
-rw-r--r--packages/glibc/2.12.2/0001-macos-cross-rpcgen.patch34
-rw-r--r--packages/glibc/2.12.2/0002-march-i686.patch37
-rw-r--r--packages/glibc/2.12.2/0003-typedef-caddr.patch31
-rw-r--r--packages/glibc/2.12.2/0004-fix-rpc_parse-format.patch62
-rw-r--r--packages/glibc/2.12.2/0005-nis-bogus-conditional.patch64
-rw-r--r--packages/glibc/2.12.2/0006-obstack-common.patch32
-rw-r--r--packages/glibc/2.12.2/0007-new-tools.patch72
-rw-r--r--packages/glibc/2.12.2/0008-strftime-multiple-stmts.patch73
-rw-r--r--packages/glibc/2.12.2/0009-if_nametoindex-size-check.patch29
-rw-r--r--packages/glibc/2.12.2/0010-utmp-nonstring.patch80
-rw-r--r--packages/glibc/2.12.2/0011-getlogin_r-use-strnlen.patch47
-rw-r--r--packages/glibc/2.12.2/0012-zic.c-use-memcpy.patch25
-rw-r--r--packages/glibc/2.12.2/chksum12
-rw-r--r--packages/glibc/2.12.2/version.desc1
15 files changed, 0 insertions, 640 deletions
diff --git a/packages/glibc/2.12.2/0000-Fix-combreloc-test-BSD-grep.patch b/packages/glibc/2.12.2/0000-Fix-combreloc-test-BSD-grep.patch
deleted file mode 100644
index 0f85a50..0000000
--- a/packages/glibc/2.12.2/0000-Fix-combreloc-test-BSD-grep.patch
+++ /dev/null
@@ -1,41 +0,0 @@
-From 61d5f9c09b3157db76bd1a393e248c262a8d9dd4 Mon Sep 17 00:00:00 2001
-From: Alexey Neyman <stilor@att.net>
-Date: Wed, 8 Mar 2017 14:31:10 -0800
-Subject: [PATCH] Fix combreloc test with BSD grep
-
-The test for "-z combreloc" fails when cross-compiling on a machine
-that uses BSD grep (e.g. on macos). grep complains about empty
-subexpression and exits with non-zero status, which is interpreted
-by configure as "not found". As a result, support for "-z combreloc"
-(HAVE_Z_COMBRELOC) is not detected, leading to link failure on SPARC.
-
- * configure.ac: Avoid empty subexpression in grep.
-
-Signed-off-by: Alexey Neyman <stilor@att.net>
----
- configure | 2 +-
- configure.in | 2 +-
- 2 files changed, 2 insertions(+), 2 deletions(-)
-
---- a/configure
-+++ b/configure
-@@ -6710,7 +6710,7 @@
- $as_echo "$as_me:$LINENO: \$? = $ac_status" >&5
- (exit $ac_status); }; }
- then
-- if readelf -S conftest.so | grep '\.rel\(a\|\)\.dyn' > /dev/null; then
-+ if readelf -S conftest.so | grep '\.\(rel\|rela\)\.dyn' > /dev/null; then
- libc_cv_z_combreloc=yes
- else
- libc_cv_z_combreloc=no
---- a/configure.in
-+++ b/configure.in
-@@ -1671,7 +1671,7 @@
- dnl introducing new options this is not easily doable. Instead use a tool
- dnl which always is cross-platform: readelf. To detect whether -z combreloc
- dnl look for a section named .rel.dyn.
-- if readelf -S conftest.so | grep '\.rel\(a\|\)\.dyn' > /dev/null; then
-+ if readelf -S conftest.so | grep '\.\(rel\|rela\)\.dyn' > /dev/null; then
- libc_cv_z_combreloc=yes
- else
- libc_cv_z_combreloc=no
diff --git a/packages/glibc/2.12.2/0001-macos-cross-rpcgen.patch b/packages/glibc/2.12.2/0001-macos-cross-rpcgen.patch
deleted file mode 100644
index 155b4f5..0000000
--- a/packages/glibc/2.12.2/0001-macos-cross-rpcgen.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-commit ae7080d30c68cfa0c81ce3422dca948f64a94f50
-Author: Jia Liu <proljc@gmail.com>
-Date: Sat Sep 7 00:01:08 2013 +0800
-
- sunrpc/rpc/types.h: fix OS X and FreeBSD build problems
-
- When I build arm-linux-gcc on OS X, I find glibc will get a build error
- in sunrpc/rpc/types.h, so I add __APPLE_CC__ to make OS X build OK.
- For FreeBSD, Add __FreeBSD__ to make it build OK, too.
-
- URL: http://sourceware.org/ml/libc-alpha/2013-09/msg00155.html
- URL: http://sourceware.org/ml/libc-alpha/2013-09/msg00217.html
- URL: http://sourceware.org/ml/libc-alpha/2013-09/msg00240.html
- Signed-off-by: Jia Liu <proljc@gmail.com>
- Signed-off-by: Mike Frysinger <vapier@gentoo.org>
-
----
- sunrpc/rpc/types.h | 5 +++++
- 1 file changed, 5 insertions(+)
-
---- a/sunrpc/rpc/types.h
-+++ b/sunrpc/rpc/types.h
-@@ -68,6 +68,11 @@
- #include <sys/types.h>
- #endif
-
-+#if defined __APPLE_CC__ || defined __FreeBSD__
-+# define __u_char_defined
-+# define __daddr_t_defined
-+#endif
-+
- #ifndef __u_char_defined
- typedef __u_char u_char;
- typedef __u_short u_short;
diff --git a/packages/glibc/2.12.2/0002-march-i686.patch b/packages/glibc/2.12.2/0002-march-i686.patch
deleted file mode 100644
index e5ad2e0..0000000
--- a/packages/glibc/2.12.2/0002-march-i686.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-2007-02-15 Khem Raj <kraj@xxxxxxxxxx>
-
- * sysdeps/unix/sysv/linux/i386/sysdep.h: Re-define __i686.
- * nptl/sysdeps/pthread/pt-initfini.c: Ditto.
-
----
- nptl/sysdeps/pthread/pt-initfini.c | 5 +++++
- sysdeps/unix/sysv/linux/i386/sysdep.h | 4 ++++
- 2 files changed, 9 insertions(+)
-
---- a/nptl/sysdeps/pthread/pt-initfini.c
-+++ b/nptl/sysdeps/pthread/pt-initfini.c
-@@ -45,6 +45,11 @@
- /* Embed an #include to pull in the alignment and .end directives. */
- asm ("\n#include \"defs.h\"");
-
-+asm ("\n#if defined __i686 && defined __ASSEMBLER__");
-+asm ("\n#undef __i686");
-+asm ("\n#define __i686 __i686");
-+asm ("\n#endif");
-+
- /* The initial common code ends here. */
- asm ("\n/*@HEADER_ENDS*/");
-
---- a/sysdeps/unix/sysv/linux/i386/sysdep.h
-+++ b/sysdeps/unix/sysv/linux/i386/sysdep.h
-@@ -29,6 +29,10 @@
- #include <dl-sysdep.h>
- #include <tls.h>
-
-+#if defined __i686 && defined __ASSEMBLER__
-+#undef __i686
-+#define __i686 __i686
-+#endif
-
- /* For Linux we can use the system call table in the header file
- /usr/include/asm/unistd.h
diff --git a/packages/glibc/2.12.2/0003-typedef-caddr.patch b/packages/glibc/2.12.2/0003-typedef-caddr.patch
deleted file mode 100644
index 5139bbd..0000000
--- a/packages/glibc/2.12.2/0003-typedef-caddr.patch
+++ /dev/null
@@ -1,31 +0,0 @@
----
- posix/sys/types.h | 3 +++
- sunrpc/rpc/types.h | 3 +++
- 2 files changed, 6 insertions(+)
-
---- a/posix/sys/types.h
-+++ b/posix/sys/types.h
-@@ -114,7 +114,10 @@
- #ifdef __USE_BSD
- # ifndef __daddr_t_defined
- typedef __daddr_t daddr_t;
-+# if ! defined(caddr_t) && ! defined(__caddr_t_defined)
- typedef __caddr_t caddr_t;
-+# define __caddr_t_defined
-+# endif
- # define __daddr_t_defined
- # endif
- #endif
---- a/sunrpc/rpc/types.h
-+++ b/sunrpc/rpc/types.h
-@@ -85,7 +85,10 @@
- #endif
- #ifndef __daddr_t_defined
- typedef __daddr_t daddr_t;
-+# if ! defined(caddr_t) && ! defined(__caddr_t_defined)
- typedef __caddr_t caddr_t;
-+# define __caddr_t_defined
-+# endif
- # define __daddr_t_defined
- #endif
-
diff --git a/packages/glibc/2.12.2/0004-fix-rpc_parse-format.patch b/packages/glibc/2.12.2/0004-fix-rpc_parse-format.patch
deleted file mode 100644
index 906fb70..0000000
--- a/packages/glibc/2.12.2/0004-fix-rpc_parse-format.patch
+++ /dev/null
@@ -1,62 +0,0 @@
-commit 5874510faaf3cbd0bb112aaacab9f225002beed1
-Author: Joseph Myers <joseph@codesourcery.com>
-Date: Tue Nov 8 23:44:51 2016 +0000
-
- Fix rpcgen buffer overrun (bug 20790).
-
- Building with GCC 7 produces an error building rpcgen:
-
- rpc_parse.c: In function 'get_prog_declaration':
- rpc_parse.c:543:25: error: may write a terminating nul past the end of the destination [-Werror=format-length=]
- sprintf (name, "%s%d", ARGNAME, num); /* default name of argument */
- ~~~~^
- rpc_parse.c:543:5: note: format output between 5 and 14 bytes into a destination of size 10
- sprintf (name, "%s%d", ARGNAME, num); /* default name of argument */
- ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- That buffer overrun is for the case where the .x file declares a
- program with a million arguments. The strcpy two lines above can
- generate a buffer overrun much more simply for a long argument name.
-
- The limit on length of line read by rpcgen (MAXLINESIZE == 1024)
- provides a bound on the buffer size needed, so this patch just changes
- the buffer size to MAXLINESIZE to avoid both possible buffer
- overruns. A testcase is added that rpcgen does not crash with a
- 500-character argument name, where it previously crashed.
-
- It would not at all surprise me if there are many other ways of
- crashing rpcgen with either valid or invalid input; fuzz testing would
- likely find various such bugs, though I don't think they are that
- important to fix (rpcgen is not that likely to be used with untrusted
- .x files as input). (As well as fuzz-findable bugs there are probably
- also issues when various int variables get overflowed on very large
- input.) The test infrastructure for rpcgen-not-crashing tests would
- need extending if tests are to be added for cases where rpcgen should
- produce an error, as opposed to cases where it should succeed.
-
- Tested for x86_64 and x86.
-
- [BZ #20790]
- * sunrpc/rpc_parse.c (get_prog_declaration): Increase buffer size
- to MAXLINESIZE.
- * sunrpc/bug20790.x: New file.
- * sunrpc/Makefile [$(run-built-tests) = yes] (rpcgen-tests): New
- variable.
- [$(run-built-tests) = yes] (tests-special): Add $(rpcgen-tests).
- [$(run-built-tests) = yes] ($(rpcgen-tests)): New rule.
-
----
- sunrpc/rpc_parse.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/sunrpc/rpc_parse.c
-+++ b/sunrpc/rpc_parse.c
-@@ -520,7 +520,7 @@
- get_prog_declaration (declaration * dec, defkind dkind, int num /* arg number */ )
- {
- token tok;
-- char name[10]; /* argument name */
-+ char name[MAXLINESIZE]; /* argument name */
-
- if (dkind == DEF_PROGRAM)
- {
diff --git a/packages/glibc/2.12.2/0005-nis-bogus-conditional.patch b/packages/glibc/2.12.2/0005-nis-bogus-conditional.patch
deleted file mode 100644
index 732b859..0000000
--- a/packages/glibc/2.12.2/0005-nis-bogus-conditional.patch
+++ /dev/null
@@ -1,64 +0,0 @@
-commit f88759ea9bd3c8d8fef28f123ba9767cb0e421a3
-Author: Joseph Myers <joseph@codesourcery.com>
-Date: Wed Dec 21 23:44:01 2016 +0000
-
- Fix nss_nisplus build with mainline GCC (bug 20978).
-
- glibc build with current mainline GCC fails because
- nis/nss_nisplus/nisplus-alias.c contains code
-
- if (name != NULL)
- {
- *errnop = EINVAL;
- return NSS_STATUS_UNAVAIL;
- }
-
- char buf[strlen (name) + 9 + tablename_len];
-
- producing an error about strlen being called on a pointer that is
- always NULL (and a subsequent use of that pointer with a %s format in
- snprintf).
-
- As Andreas noted, the bogus conditional comes from a 1997 change:
-
- - if (name == NULL || strlen(name) > 8)
- - return NSS_STATUS_NOTFOUND;
- - else
- + if (name != NULL || strlen(name) <= 8)
-
- So the intention is clearly to return an error for NULL name.
-
- This patch duly inverts the sense of the conditional. It fixes the
- build with GCC mainline, and passes usual glibc testsuite testing for
- x86_64. However, I have not tried any actual substantive nisplus
- testing, do not have an environment for such testing, and do not know
- whether it is possible that strlen (name) or tablename_len might be
- large so that the VLA for buf is actually a security issue. However,
- if it is a security issue, there are plenty of other similar instances
- in the nisplus code (that haven't been hidden by a bogus comparison
- with NULL) - and nis_table.c:__create_ib_request uses strdupa on the
- string passed to nis_list, so a local fix in the caller wouldn't
- suffice anyway (see bug 20987). (Calls to strdupa and other such
- macros that use alloca must be considered equally questionable
- regarding stack overflow issues as direct calls to alloca and VLA
- declarations.)
-
- [BZ #20978]
- * nis/nss_nisplus/nisplus-alias.c (_nss_nisplus_getaliasbyname_r):
- Compare name == NULL, not name != NULL.
-
----
- nis/nss_nisplus/nisplus-alias.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/nis/nss_nisplus/nisplus-alias.c
-+++ b/nis/nss_nisplus/nisplus-alias.c
-@@ -293,7 +293,7 @@
- return status;
- }
-
-- if (name != NULL)
-+ if (name == NULL)
- {
- *errnop = EINVAL;
- return NSS_STATUS_UNAVAIL;
diff --git a/packages/glibc/2.12.2/0006-obstack-common.patch b/packages/glibc/2.12.2/0006-obstack-common.patch
deleted file mode 100644
index 1993be2..0000000
--- a/packages/glibc/2.12.2/0006-obstack-common.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-commit 39b1f6172a2f9ddc74a8f82d6e84dd13b22dbaf2
-Author: Peter Collingbourne <pcc@google.com>
-Date: Wed May 15 20:28:08 2013 +0200
-
- Move _obstack_compat out of common
-
- it is impossible to create an alias of a common symbol (as
- compat_symbol does), because common symbols do not have a section or
- an offset until linked. GNU as tolerates aliases of common symbols by
- simply creating another common symbol, but other assemblers (notably
- LLVM's integrated assembler) are less tolerant.
-
- 2013-05-15 Peter Collingbourne <pcc@google.com>
-
- * malloc/obstack.c (_obstack_compat): Add initializer.
- -
-
----
- malloc/obstack.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/malloc/obstack.c
-+++ b/malloc/obstack.c
-@@ -117,7 +117,7 @@
- /* A looong time ago (before 1994, anyway; we're not sure) this global variable
- was used by non-GNU-C macros to avoid multiple evaluation. The GNU C
- library still exports it because somebody might use it. */
--struct obstack *_obstack_compat;
-+struct obstack *_obstack_compat = 0;
- compat_symbol (libc, _obstack_compat, _obstack, GLIBC_2_0);
- # endif
- # endif
diff --git a/packages/glibc/2.12.2/0007-new-tools.patch b/packages/glibc/2.12.2/0007-new-tools.patch
deleted file mode 100644
index 693c9a1..0000000
--- a/packages/glibc/2.12.2/0007-new-tools.patch
+++ /dev/null
@@ -1,72 +0,0 @@
----
- configure | 8 ++++----
- configure.in | 8 ++++----
- 2 files changed, 8 insertions(+), 8 deletions(-)
-
---- a/configure
-+++ b/configure
-@@ -5189,7 +5189,7 @@
- ac_prog_version=`$CC -v 2>&1 | sed -n 's/^.*version \([egcygnustpi-]*[0-9.]*\).*$/\1/p'`
- case $ac_prog_version in
- '') ac_prog_version="v. ?.??, bad"; ac_verc_fail=yes;;
-- 3.4* | 4.[0-9]* )
-+ 3.4* | [4-9].* | [1-9][0-9]* )
- ac_prog_version="$ac_prog_version, ok"; ac_verc_fail=no;;
- *) ac_prog_version="$ac_prog_version, bad"; ac_verc_fail=yes;;
-
-@@ -5252,7 +5252,7 @@
- ac_prog_version=`$MAKE --version 2>&1 | sed -n 's/^.*GNU Make[^0-9]*\([0-9][0-9.]*\).*$/\1/p'`
- case $ac_prog_version in
- '') ac_prog_version="v. ?.??, bad"; ac_verc_fail=yes;;
-- 3.79* | 3.[89]*)
-+ 3.79* | 3.[89]* | [4-9].* | [1-9][0-9]*)
- ac_prog_version="$ac_prog_version, ok"; ac_verc_fail=no;;
- *) ac_prog_version="$ac_prog_version, bad"; ac_verc_fail=yes;;
-
-@@ -5379,7 +5379,7 @@
- ac_prog_version=`$MAKEINFO --version 2>&1 | sed -n 's/^.*GNU texinfo.* \([0-9][0-9.]*\).*$/\1/p'`
- case $ac_prog_version in
- '') ac_prog_version="v. ?.??, bad"; ac_verc_fail=yes;;
-- 4.*)
-+ [4-9].*)
- ac_prog_version="$ac_prog_version, ok"; ac_verc_fail=no;;
- *) ac_prog_version="$ac_prog_version, bad"; ac_verc_fail=yes;;
-
-@@ -5439,7 +5439,7 @@
- # Found it, now check the version.
- { $as_echo "$as_me:$LINENO: checking version of $SED" >&5
- $as_echo_n "checking version of $SED... " >&6; }
-- ac_prog_version=`$SED --version 2>&1 | sed -n 's/^.*GNU sed version \([0-9]*\.[0-9.]*\).*$/\1/p'`
-+ ac_prog_version=`$SED --version 2>&1 | sed -n 's/^.*GNU sed[^0-9]* \([0-9]*\.[0-9.]*\).*$/\1/p'`
- case $ac_prog_version in
- '') ac_prog_version="v. ?.??, bad"; ac_verc_fail=yes;;
- 3.0[2-9]*|3.[1-9]*|[4-9]*)
---- a/configure.in
-+++ b/configure.in
-@@ -1026,11 +1026,11 @@
- # These programs are version sensitive.
- AC_CHECK_TOOL_PREFIX
- AC_CHECK_PROG_VER(CC, ${ac_tool_prefix}gcc ${ac_tool_prefix}cc, -v,
-- [version \([egcygnustpi-]*[0-9.]*\)], [3.4* | 4.[0-9]* ],
-+ [version \([egcygnustpi-]*[0-9.]*\)], [3.4* | [4-9].* | [1-9][0-9].* ],
- critic_missing="$critic_missing gcc")
- AC_CHECK_PROG_VER(MAKE, gnumake gmake make, --version,
- [GNU Make[^0-9]*\([0-9][0-9.]*\)],
-- [3.79* | 3.[89]*], critic_missing="$critic_missing make")
-+ [3.79* | 3.[89]* | [4-9].* | [1-9][0-9]*], critic_missing="$critic_missing make")
-
- AC_CHECK_PROG_VER(MSGFMT, gnumsgfmt gmsgfmt msgfmt, --version,
- [GNU gettext.* \([0-9]*\.[0-9.]*\)],
-@@ -1038,10 +1038,10 @@
- MSGFMT=: aux_missing="$aux_missing msgfmt")
- AC_CHECK_PROG_VER(MAKEINFO, makeinfo, --version,
- [GNU texinfo.* \([0-9][0-9.]*\)],
-- [4.*],
-+ [[4-9].*],
- MAKEINFO=: aux_missing="$aux_missing makeinfo")
- AC_CHECK_PROG_VER(SED, sed, --version,
-- [GNU sed version \([0-9]*\.[0-9.]*\)],
-+ [GNU sed[^0-9]* \([0-9]*\.[0-9.]*\)],
- [3.0[2-9]*|3.[1-9]*|[4-9]*],
- SED=: aux_missing="$aux_missing sed")
-
diff --git a/packages/glibc/2.12.2/0008-strftime-multiple-stmts.patch b/packages/glibc/2.12.2/0008-strftime-multiple-stmts.patch
deleted file mode 100644
index e544b33..0000000
--- a/packages/glibc/2.12.2/0008-strftime-multiple-stmts.patch
+++ /dev/null
@@ -1,73 +0,0 @@
-commit e4043b84c49e1cf9bcf1e8320233343ecc34f8eb
-Author: Joseph Myers <joseph@codesourcery.com>
-Date: Tue Jun 27 17:12:13 2017 +0000
-
- Fix strftime build with GCC 8.
-
- Building with current GCC mainline fails with:
-
- strftime_l.c: In function '__strftime_internal':
- strftime_l.c:719:4: error: macro expands to multiple statements [-Werror=multistatement-macros]
- digits = d > width ? d : width; \
- ^
- strftime_l.c:1260:6: note: in expansion of macro 'DO_NUMBER'
- DO_NUMBER (1, tp->tm_year + TM_YEAR_BASE);
- ^~~~~~~~~
- strftime_l.c:1259:4: note: some parts of macro expansion are not guarded by this 'else' clause
- else
- ^~~~
-
- In fact this particular instance is harmless; the code looks like:
-
- if (modifier == L_('O'))
- goto bad_format;
- else
- DO_NUMBER (1, tp->tm_year + TM_YEAR_BASE);
-
- and because of the goto, it doesn't matter that part of the expansion
- isn't under the "else" conditional. But it's also clearly bad style
- to rely on that. This patch changes DO_NUMBER and DO_NUMBER_SPACEPAD
- to use do { } while (0) to avoid such problems.
-
- Tested (full testsuite) for x86_64 (GCC 6), and with
- build-many-glibcs.py with GCC mainline, in conjunction with my libgcc
- patch <https://gcc.gnu.org/ml/gcc-patches/2017-06/msg02032.html>.
-
- * time/strftime_l.c (DO_NUMBER): Define using do { } while (0).
- (DO_NUMBER_SPACEPAD): Likewise.
-
----
- time/strftime_l.c | 22 ++++++++++++++++------
- 1 file changed, 16 insertions(+), 6 deletions(-)
-
---- a/time/strftime_l.c
-+++ b/time/strftime_l.c
-@@ -742,12 +742,22 @@
- format_char = *f;
- switch (format_char)
- {
--#define DO_NUMBER(d, v) \
-- digits = d > width ? d : width; \
-- number_value = v; goto do_number
--#define DO_NUMBER_SPACEPAD(d, v) \
-- digits = d > width ? d : width; \
-- number_value = v; goto do_number_spacepad
-+#define DO_NUMBER(d, v) \
-+ do \
-+ { \
-+ digits = d > width ? d : width; \
-+ number_value = v; \
-+ goto do_number; \
-+ } \
-+ while (0)
-+#define DO_NUMBER_SPACEPAD(d, v) \
-+ do \
-+ { \
-+ digits = d > width ? d : width; \
-+ number_value = v; \
-+ goto do_number_spacepad; \
-+ } \
-+ while (0)
-
- case L_('%'):
- if (modifier != 0)
diff --git a/packages/glibc/2.12.2/0009-if_nametoindex-size-check.patch b/packages/glibc/2.12.2/0009-if_nametoindex-size-check.patch
deleted file mode 100644
index 5803db5..0000000
--- a/packages/glibc/2.12.2/0009-if_nametoindex-size-check.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-commit 2180fee114b778515b3f560e5ff1e795282e60b0
-Author: Steve Ellcey <sellcey@caviumnetworks.com>
-Date: Wed Nov 15 08:58:48 2017 -0800
-
- Check length of ifname before copying it into to ifreq structure.
-
- [BZ #22442]
- * sysdeps/unix/sysv/linux/if_index.c (__if_nametoindex):
- Check if ifname is too long.
-
----
- sysdeps/unix/sysv/linux/if_index.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
---- a/sysdeps/unix/sysv/linux/if_index.c
-+++ b/sysdeps/unix/sysv/linux/if_index.c
-@@ -54,6 +54,12 @@
- if (fd < 0)
- return 0;
-
-+ if (strlen (ifname) >= IFNAMSIZ)
-+ {
-+ __set_errno (ENODEV);
-+ return 0;
-+ }
-+
- strncpy (ifr.ifr_name, ifname, sizeof (ifr.ifr_name));
- if (__ioctl (fd, SIOCGIFINDEX, &ifr) < 0)
- {
diff --git a/packages/glibc/2.12.2/0010-utmp-nonstring.patch b/packages/glibc/2.12.2/0010-utmp-nonstring.patch
deleted file mode 100644
index b789724..0000000
--- a/packages/glibc/2.12.2/0010-utmp-nonstring.patch
+++ /dev/null
@@ -1,80 +0,0 @@
-commit 7532837d7b03b3ca5b9a63d77a5bd81dd23f3d9c
-Author: Martin Sebor <msebor@redhat.com>
-Date: Wed Nov 15 17:39:59 2017 -0700
-
- The -Wstringop-truncation option new in GCC 8 detects common misuses
- of the strncat and strncpy function that may result in truncating
- the copied string before the terminating NUL. To avoid false positive
- warnings for correct code that intentionally creates sequences of
- characters that aren't guaranteed to be NUL-terminated, arrays that
- are intended to store such sequences should be decorated with a new
- nonstring attribute. This change add this attribute to Glibc and
- uses it to suppress such false positives.
-
- ChangeLog:
- * misc/sys/cdefs.h (__attribute_nonstring__): New macro.
- * sysdeps/gnu/bits/utmp.h (struct utmp): Use it.
- * sysdeps/unix/sysv/linux/s390/bits/utmp.h (struct utmp): Same.
-
----
- misc/sys/cdefs.h | 9 +++++++++
- sysdeps/gnu/bits/utmp.h | 9 ++++++---
- sysdeps/unix/sysv/linux/s390/bits/utmp.h | 9 ++++++---
- 3 files changed, 21 insertions(+), 6 deletions(-)
-
---- a/misc/sys/cdefs.h
-+++ b/misc/sys/cdefs.h
-@@ -350,6 +350,15 @@
- # endif
- #endif
-
-+#if __GNUC_PREREQ (8, 0)
-+/* Describes a char array whose address can safely be passed as the first
-+ argument to strncpy and strncat, as the char array is not necessarily
-+ a NUL-terminated string. */
-+# define __attribute_nonstring__ __attribute__ ((__nonstring__))
-+#else
-+# define __attribute_nonstring__
-+#endif
-+
- #include <bits/wordsize.h>
-
- #if defined __LONG_DOUBLE_MATH_OPTIONAL && defined __NO_LONG_DOUBLE_MATH
---- a/sysdeps/gnu/bits/utmp.h
-+++ b/sysdeps/gnu/bits/utmp.h
-@@ -61,10 +61,13 @@
- {
- short int ut_type; /* Type of login. */
- pid_t ut_pid; /* Process ID of login process. */
-- char ut_line[UT_LINESIZE]; /* Devicename. */
-+ char ut_line[UT_LINESIZE]
-+ __attribute_nonstring__; /* Devicename. */
- char ut_id[4]; /* Inittab ID. */
-- char ut_user[UT_NAMESIZE]; /* Username. */
-- char ut_host[UT_HOSTSIZE]; /* Hostname for remote login. */
-+ char ut_user[UT_NAMESIZE]
-+ __attribute_nonstring__; /* Username. */
-+ char ut_host[UT_HOSTSIZE]
-+ __attribute_nonstring__; /* Hostname for remote login. */
- struct exit_status ut_exit; /* Exit status of a process marked
- as DEAD_PROCESS. */
- /* The ut_session and ut_tv fields must be the same size when compiled
---- a/sysdeps/unix/sysv/linux/s390/bits/utmp.h
-+++ b/sysdeps/unix/sysv/linux/s390/bits/utmp.h
-@@ -61,10 +61,13 @@
- {
- short int ut_type; /* Type of login. */
- pid_t ut_pid; /* Process ID of login process. */
-- char ut_line[UT_LINESIZE]; /* Devicename. */
-+ char ut_line[UT_LINESIZE]
-+ __attribute_nonstring__; /* Devicename. */
- char ut_id[4]; /* Inittab ID. */
-- char ut_user[UT_NAMESIZE]; /* Username. */
-- char ut_host[UT_HOSTSIZE]; /* Hostname for remote login. */
-+ char ut_user[UT_NAMESIZE]
-+ __attribute_nonstring__; /* Username. */
-+ char ut_host[UT_HOSTSIZE]
-+ __attribute_nonstring__; /* Hostname for remote login. */
- struct exit_status ut_exit; /* Exit status of a process marked
- as DEAD_PROCESS. */
- /* The ut_session and ut_tv fields must be the same size when compiled
diff --git a/packages/glibc/2.12.2/0011-getlogin_r-use-strnlen.patch b/packages/glibc/2.12.2/0011-getlogin_r-use-strnlen.patch
deleted file mode 100644
index 15a16bd..0000000
--- a/packages/glibc/2.12.2/0011-getlogin_r-use-strnlen.patch
+++ /dev/null
@@ -1,47 +0,0 @@
-commit 4bae615022cb5a5da79ccda83cc6c9ba9f2d479c
-Author: Joseph Myers <joseph@codesourcery.com>
-Date: Wed Nov 22 18:44:23 2017 +0000
-
- Avoid use of strlen in getlogin_r (bug 22447).
-
- Building glibc with current mainline GCC fails, among other reasons,
- because of an error for use of strlen on the nonstring ut_user field.
- This patch changes the problem code in getlogin_r to use __strnlen
- instead. It also needs to set the trailing NUL byte of the result
- explicitly, because of the case where ut_user does not have such a
- trailing NUL byte (but the result should always have one).
-
- Tested for x86_64. Also tested that, in conjunction with
- <https://sourceware.org/ml/libc-alpha/2017-11/msg00797.html>, it fixes
- the build for arm with mainline GCC.
-
- [BZ #22447]
- * sysdeps/unix/getlogin_r.c (__getlogin_r): Use __strnlen not
- strlen to compute length of ut_user and set trailing NUL byte of
- result explicitly.
-
----
- sysdeps/unix/getlogin_r.c | 5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
---- a/sysdeps/unix/getlogin_r.c
-+++ b/sysdeps/unix/getlogin_r.c
-@@ -83,7 +83,7 @@
-
- if (result == 0)
- {
-- size_t needed = strlen (ut->ut_user) + 1;
-+ size_t needed = __strnlen (ut->ut_user, UT_NAMESIZE) + 1;
-
- if (needed > name_len)
- {
-@@ -92,7 +92,8 @@
- }
- else
- {
-- memcpy (name, ut->ut_user, needed);
-+ memcpy (name, ut->ut_user, needed - 1);
-+ name[needed - 1] = 0;
- result = 0;
- }
- }
diff --git a/packages/glibc/2.12.2/0012-zic.c-use-memcpy.patch b/packages/glibc/2.12.2/0012-zic.c-use-memcpy.patch
deleted file mode 100644
index 4c89446..0000000
--- a/packages/glibc/2.12.2/0012-zic.c-use-memcpy.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-commit e69897bf202e18034cbef26f363bae64de70a196
-Author: Paul Eggert <eggert@cs.ucla.edu>
-Date: Sun Nov 12 22:00:28 2017 -0800
-
- timezone: pacify GCC -Wstringop-truncation
-
- Problem reported by Martin Sebor in:
- https://sourceware.org/ml/libc-alpha/2017-11/msg00336.html
- * timezone/zic.c (writezone): Use memcpy, not strncpy.
-
----
- timezone/zic.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
---- a/timezone/zic.c
-+++ b/timezone/zic.c
-@@ -1648,7 +1648,7 @@
- #define DO(field) (void) fwrite((void *) tzh.field, \
- (size_t) sizeof tzh.field, (size_t) 1, fp)
- tzh = tzh0;
-- (void) strncpy(tzh.tzh_magic, TZ_MAGIC, sizeof tzh.tzh_magic);
-+ memcpy(tzh.tzh_magic, TZ_MAGIC, sizeof tzh.tzh_magic);
- tzh.tzh_version[0] = ZIC_VERSION;
- convert(eitol(thistypecnt), tzh.tzh_ttisgmtcnt);
- convert(eitol(thistypecnt), tzh.tzh_ttisstdcnt);
diff --git a/packages/glibc/2.12.2/chksum b/packages/glibc/2.12.2/chksum
deleted file mode 100644
index f30fb40..0000000
--- a/packages/glibc/2.12.2/chksum
+++ /dev/null
@@ -1,12 +0,0 @@
-md5 glibc-2.12.2.tar.xz e0043f4f8e1aa61acc62fdf0f4d6133d
-sha1 glibc-2.12.2.tar.xz 1602bb3647e71747595a72fde059fce0a5ba04ec
-sha256 glibc-2.12.2.tar.xz 0eb4fdf7301a59d3822194f20a2782858955291dd93be264b8b8d4d56f87203f
-sha512 glibc-2.12.2.tar.xz efc1c9c3e10bb2d7d7a8529796961bf41406128132b71af2225d327317ea61438f3b19084099e15b4208b35388228640f6c7a21a807abd87ffec795248a6c306
-md5 glibc-2.12.2.tar.bz2 903fcfa547df2f453476800e0838fe52
-sha1 glibc-2.12.2.tar.bz2 3ef6d36eee2dc7c4351f215f689e6a04c161a35e
-sha256 glibc-2.12.2.tar.bz2 22f8eb3c49b9eb5e88fc249daf8670899adef24eb1f74708fb150a6502fa1216
-sha512 glibc-2.12.2.tar.bz2 8197ece913e572ce3f7dfa0a33d520418aea2d8b85ccda3100118bca9f650e21fb7a8d14b1b4a5587a252c07e70c6fe85f84605a0be9dec649e92d6028979c40
-md5 glibc-2.12.2.tar.gz 49a8a5a74b624dcd15ec1689ede7e062
-sha1 glibc-2.12.2.tar.gz 738ac9b88a7e89e2a9a419db13af8ee12a38f192
-sha256 glibc-2.12.2.tar.gz 6b7392a7b339a3f2db6e4bc8d5418cf29116d9e7e36b313e845cb65e449c5346
-sha512 glibc-2.12.2.tar.gz a2e11c9824bf975b0c14c2d48f2bdbfb69a54b6c43760cf19babea187771e8d848d03e54f68be2d22074405d192ff2cc459c09a04db6779ab593ce67854a9ce9
diff --git a/packages/glibc/2.12.2/version.desc b/packages/glibc/2.12.2/version.desc
deleted file mode 100644
index fcfe389..0000000
--- a/packages/glibc/2.12.2/version.desc
+++ /dev/null
@@ -1 +0,0 @@
-obsolete='yes'