[{"id":1769730,"web_url":"http://patchwork.ozlabs.org/comment/1769730/","msgid":"<20170917161731.GF2930@scaer>","list_archive_url":null,"date":"2017-09-17T16:17:31","subject":"Re: [Buildroot] [PATCH v2 02/11] package/gcc: fix build issue with\n\tglibc 2.26","submitter":{"id":13903,"url":"http://patchwork.ozlabs.org/api/people/13903/","name":"Yann E. MORIN","email":"yann.morin.1998@free.fr"},"content":"Romain, All,\n\nOn 2017-09-02 22:54 +0200, Romain Naour spake thusly:\n> ../../../../libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc: In function ‘int __sanitizer::TracerThread(void*)’:\n> ../../../../libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc:241:22: error: aggregate ‘sigaltstack handler_stack’ has incomplete type and cannot be defined\n>    struct sigaltstack handler_stack;\n> \n> ../../../../libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc: In function ‘int __sanitizer::TracerThread(void*)’:\n> ../../../../libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc:276:22: error: aggregate ‘sigaltstack handler_stack’ has incomplete type and cannot be defined\n>    struct sigaltstack handler_stack;\n>                       ^~~~~~~~~~~~~\n> \n> The fix is already included in gcc 7.2 release [1]. We have to backport it to\n> all older gcc release since it's not included in any stable release yet.\n> \n> [1] https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=72edc2c02f8b4768ad660f46a1c7e2400c0a8e06\n> \n> Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> Cc: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>\n> ---\n>  package/gcc/4.9.4/944-sanitizer-linux.patch | 88 +++++++++++++++++++++++++++++\n>  package/gcc/5.4.0/944-sanitizer-linux.patch | 87 ++++++++++++++++++++++++++++\n\nFor gcc-5:\n    https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=833e00c01e96f61e24cd7ec97b93fad212dc914b\n\n>  package/gcc/6.4.0/943-sanitizer-linux.patch | 87 ++++++++++++++++++++++++++++\n\nFor gcc-6:\n    https://gcc.gnu.org/git/?p=gcc.git;a=commitdiff;h=8937b94d1a643fd9760714642296d034a45254a8\n\nAs discused on IRC: for gcc-4.9, either we re-introduce a glibc version\nchoice, or we make glibc depends on gcc_at_least_5, or we keep your\nback-ported patch.\n\nI'm fine with either, as well as also ditching gcc-4.9. ;-)\n\nRegards,\nYann E. MORIN.\n\n>  3 files changed, 262 insertions(+)\n>  create mode 100644 package/gcc/4.9.4/944-sanitizer-linux.patch\n>  create mode 100644 package/gcc/5.4.0/944-sanitizer-linux.patch\n>  create mode 100644 package/gcc/6.4.0/943-sanitizer-linux.patch\n> \n> diff --git a/package/gcc/4.9.4/944-sanitizer-linux.patch b/package/gcc/4.9.4/944-sanitizer-linux.patch\n> new file mode 100644\n> index 0000000..caadf2d\n> --- /dev/null\n> +++ b/package/gcc/4.9.4/944-sanitizer-linux.patch\n> @@ -0,0 +1,88 @@\n> +From f9a35ba5c150da2e381c4cab01f8f12bcd6af5d2 Mon Sep 17 00:00:00 2001\n> +From: jakub <jakub@138bc75d-0d04-0410-961f-82ee72b054a4>\n> +Date: Mon, 17 Jul 2017 19:41:08 +0000\n> +Subject: [PATCH] \tBackported from mainline \t2017-07-14  Jakub\n> + Jelinek  <jakub@redhat.com>\n> +\n> +\tPR sanitizer/81066\n> +\t* sanitizer_common/sanitizer_linux.h: Cherry-pick upstream r307969.\n> +\t* sanitizer_common/sanitizer_linux.cc: Likewise.\n> +\t* sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc: Likewise.\n> +\t* tsan/tsan_platform_linux.cc: Likewise.\n> +\n> +git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/branches/gcc-7-branch@250287 138bc75d-0d04-0410-961f-82ee72b054a4\n> +(cherry picked from commit 72edc2c02f8b4768ad660f46a1c7e2400c0a8e06)\n> +[Romain backport to 4.9.4]\n> +Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> +---\n> + libsanitizer/sanitizer_common/sanitizer_linux.cc                      | 3 +--\n> + libsanitizer/sanitizer_common/sanitizer_linux.h                       | 4 +---\n> + libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc | 2 +-\n> + libsanitizer/tsan/tsan_platform_linux.cc                              | 2 +-\n> + 4 files changed, 4 insertions(+), 7 deletions(-)\n> +\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.cc b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +index 69c9c10..8e53673 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +@@ -599,8 +599,7 @@ uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5) {\n> +   return internal_syscall(__NR_prctl, option, arg2, arg3, arg4, arg5);\n> + }\n> + \n> +-uptr internal_sigaltstack(const struct sigaltstack *ss,\n> +-                         struct sigaltstack *oss) {\n> ++uptr internal_sigaltstack(const void *ss, void *oss) {\n> +   return internal_syscall(__NR_sigaltstack, (uptr)ss, (uptr)oss);\n> + }\n> + \n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.h b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +index 6422df1..8e111d1 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.h\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +@@ -18,7 +18,6 @@\n> + #include \"sanitizer_platform_limits_posix.h\"\n> + \n> + struct link_map;  // Opaque type returned by dlopen().\n> +-struct sigaltstack;\n> + \n> + namespace __sanitizer {\n> + // Dirent structure for getdents(). Note that this structure is different from\n> +@@ -28,8 +27,7 @@ struct linux_dirent;\n> + // Syscall wrappers.\n> + uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count);\n> + uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5);\n> +-uptr internal_sigaltstack(const struct sigaltstack* ss,\n> +-                          struct sigaltstack* oss);\n> ++uptr internal_sigaltstack(const void* ss, void* oss);\n> + uptr internal_sigaction(int signum, const __sanitizer_kernel_sigaction_t *act,\n> +     __sanitizer_kernel_sigaction_t *oldact);\n> + uptr internal_sigprocmask(int how, __sanitizer_kernel_sigset_t *set,\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +index 6ee63ec..50c21a3 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +@@ -238,7 +238,7 @@ static int TracerThread(void* argument) {\n> + \n> +   // Alternate stack for signal handling.\n> +   InternalScopedBuffer<char> handler_stack_memory(kHandlerStackSize);\n> +-  struct sigaltstack handler_stack;\n> ++  stack_t handler_stack;\n> +   internal_memset(&handler_stack, 0, sizeof(handler_stack));\n> +   handler_stack.ss_sp = handler_stack_memory.data();\n> +   handler_stack.ss_size = kHandlerStackSize;\n> +diff --git a/libsanitizer/tsan/tsan_platform_linux.cc b/libsanitizer/tsan/tsan_platform_linux.cc\n> +index fe69430..49f5270 100644\n> +--- a/libsanitizer/tsan/tsan_platform_linux.cc\n> ++++ b/libsanitizer/tsan/tsan_platform_linux.cc\n> +@@ -351,7 +351,7 @@ bool IsGlobalVar(uptr addr) {\n> + // closes within glibc. The code is a pure hack.\n> + int ExtractResolvFDs(void *state, int *fds, int nfd) {\n> +   int cnt = 0;\n> +-  __res_state *statp = (__res_state*)state;\n> ++  struct __res_state *statp = (struct __res_state*)state;\n> +   for (int i = 0; i < MAXNS && cnt < nfd; i++) {\n> +     if (statp->_u._ext.nsaddrs[i] && statp->_u._ext.nssocks[i] != -1)\n> +       fds[cnt++] = statp->_u._ext.nssocks[i];\n> +-- \n> +2.9.5\n> +\n> diff --git a/package/gcc/5.4.0/944-sanitizer-linux.patch b/package/gcc/5.4.0/944-sanitizer-linux.patch\n> new file mode 100644\n> index 0000000..bbeb3c7\n> --- /dev/null\n> +++ b/package/gcc/5.4.0/944-sanitizer-linux.patch\n> @@ -0,0 +1,87 @@\n> +From 659b130df028d6e580c9e7f87ff61f67cfb3e0a3 Mon Sep 17 00:00:00 2001\n> +From: jakub <jakub@138bc75d-0d04-0410-961f-82ee72b054a4>\n> +Date: Mon, 17 Jul 2017 19:41:08 +0000\n> +Subject: [PATCH] \tBackported from mainline \t2017-07-14  Jakub\n> + Jelinek  <jakub@redhat.com>\n> +\n> +\tPR sanitizer/81066\n> +\t* sanitizer_common/sanitizer_linux.h: Cherry-pick upstream r307969.\n> +\t* sanitizer_common/sanitizer_linux.cc: Likewise.\n> +\t* sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc: Likewise.\n> +\t* tsan/tsan_platform_linux.cc: Likewise.\n> +\n> +[Romain cherry-pick on gcc-6-branch from gcc-7-branch]\n> +Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> +git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/branches/gcc-7-branch@250287 138bc75d-0d04-0410-961f-82ee72b054a4\n> +---\n> + libsanitizer/sanitizer_common/sanitizer_linux.cc                      | 3 +--\n> + libsanitizer/sanitizer_common/sanitizer_linux.h                       | 4 +---\n> + libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc | 2 +-\n> + libsanitizer/tsan/tsan_platform_linux.cc                              | 2 +-\n> + 4 files changed, 4 insertions(+), 7 deletions(-)\n> +\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.cc b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +index 9feb307..821b26d 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +@@ -514,8 +514,7 @@ uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5) {\n> + }\n> + #endif\n> + \n> +-uptr internal_sigaltstack(const struct sigaltstack *ss,\n> +-                         struct sigaltstack *oss) {\n> ++uptr internal_sigaltstack(const void *ss, void *oss) {\n> +   return internal_syscall(SYSCALL(sigaltstack), (uptr)ss, (uptr)oss);\n> + }\n> + \n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.h b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +index 086834c..3a6f4cd 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.h\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +@@ -18,7 +18,6 @@\n> + #include \"sanitizer_platform_limits_posix.h\"\n> + \n> + struct link_map;  // Opaque type returned by dlopen().\n> +-struct sigaltstack;\n> + \n> + namespace __sanitizer {\n> + // Dirent structure for getdents(). Note that this structure is different from\n> +@@ -27,8 +26,7 @@ struct linux_dirent;\n> + \n> + // Syscall wrappers.\n> + uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count);\n> +-uptr internal_sigaltstack(const struct sigaltstack* ss,\n> +-                          struct sigaltstack* oss);\n> ++uptr internal_sigaltstack(const void* ss, void* oss);\n> + uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set,\n> +     __sanitizer_sigset_t *oldset);\n> + void internal_sigfillset(__sanitizer_sigset_t *set);\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +index 5881202..c54894d 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +@@ -234,7 +234,7 @@ static int TracerThread(void* argument) {\n> + \n> +   // Alternate stack for signal handling.\n> +   InternalScopedBuffer<char> handler_stack_memory(kHandlerStackSize);\n> +-  struct sigaltstack handler_stack;\n> ++  stack_t handler_stack;\n> +   internal_memset(&handler_stack, 0, sizeof(handler_stack));\n> +   handler_stack.ss_sp = handler_stack_memory.data();\n> +   handler_stack.ss_size = kHandlerStackSize;\n> +diff --git a/libsanitizer/tsan/tsan_platform_linux.cc b/libsanitizer/tsan/tsan_platform_linux.cc\n> +index 3259131..b8e9078 100644\n> +--- a/libsanitizer/tsan/tsan_platform_linux.cc\n> ++++ b/libsanitizer/tsan/tsan_platform_linux.cc\n> +@@ -377,7 +377,7 @@ bool IsGlobalVar(uptr addr) {\n> + int ExtractResolvFDs(void *state, int *fds, int nfd) {\n> + #if SANITIZER_LINUX\n> +   int cnt = 0;\n> +-  __res_state *statp = (__res_state*)state;\n> ++  struct __res_state *statp = (struct __res_state*)state;\n> +   for (int i = 0; i < MAXNS && cnt < nfd; i++) {\n> +     if (statp->_u._ext.nsaddrs[i] && statp->_u._ext.nssocks[i] != -1)\n> +       fds[cnt++] = statp->_u._ext.nssocks[i];\n> +-- \n> +2.9.5\n> +\n> diff --git a/package/gcc/6.4.0/943-sanitizer-linux.patch b/package/gcc/6.4.0/943-sanitizer-linux.patch\n> new file mode 100644\n> index 0000000..8c83f7e\n> --- /dev/null\n> +++ b/package/gcc/6.4.0/943-sanitizer-linux.patch\n> @@ -0,0 +1,87 @@\n> +From 0fa7102d76376b27ae4bbc10848600aac6ed71d2 Mon Sep 17 00:00:00 2001\n> +From: jakub <jakub@138bc75d-0d04-0410-961f-82ee72b054a4>\n> +Date: Mon, 17 Jul 2017 19:41:08 +0000\n> +Subject: [PATCH] \tBackported from mainline \t2017-07-14  Jakub\n> + Jelinek  <jakub@redhat.com>\n> +\n> +\tPR sanitizer/81066\n> +\t* sanitizer_common/sanitizer_linux.h: Cherry-pick upstream r307969.\n> +\t* sanitizer_common/sanitizer_linux.cc: Likewise.\n> +\t* sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc: Likewise.\n> +\t* tsan/tsan_platform_linux.cc: Likewise.\n> +\n> +[Romain cherry-pick on gcc-6-branch from gcc-7-branch]\n> +Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> +git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/branches/gcc-7-branch@250287 138bc75d-0d04-0410-961f-82ee72b054a4\n> +---\n> + libsanitizer/sanitizer_common/sanitizer_linux.cc                      | 3 +--\n> + libsanitizer/sanitizer_common/sanitizer_linux.h                       | 4 +---\n> + libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc | 2 +-\n> + libsanitizer/tsan/tsan_platform_linux.cc                              | 2 +-\n> + 4 files changed, 4 insertions(+), 7 deletions(-)\n> +\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.cc b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +index 2cefa20..223d9c6 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.cc\n> +@@ -546,8 +546,7 @@ uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5) {\n> + }\n> + #endif\n> + \n> +-uptr internal_sigaltstack(const struct sigaltstack *ss,\n> +-                         struct sigaltstack *oss) {\n> ++uptr internal_sigaltstack(const void *ss, void *oss) {\n> +   return internal_syscall(SYSCALL(sigaltstack), (uptr)ss, (uptr)oss);\n> + }\n> + \n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_linux.h b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +index 4497702..1594058 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_linux.h\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_linux.h\n> +@@ -19,7 +19,6 @@\n> + #include \"sanitizer_platform_limits_posix.h\"\n> + \n> + struct link_map;  // Opaque type returned by dlopen().\n> +-struct sigaltstack;\n> + \n> + namespace __sanitizer {\n> + // Dirent structure for getdents(). Note that this structure is different from\n> +@@ -28,8 +27,7 @@ struct linux_dirent;\n> + \n> + // Syscall wrappers.\n> + uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count);\n> +-uptr internal_sigaltstack(const struct sigaltstack* ss,\n> +-                          struct sigaltstack* oss);\n> ++uptr internal_sigaltstack(const void* ss, void* oss);\n> + uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set,\n> +     __sanitizer_sigset_t *oldset);\n> + void internal_sigfillset(__sanitizer_sigset_t *set);\n> +diff --git a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +index c919e4f..014162af 100644\n> +--- a/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> ++++ b/libsanitizer/sanitizer_common/sanitizer_stoptheworld_linux_libcdep.cc\n> +@@ -267,7 +267,7 @@ static int TracerThread(void* argument) {\n> + \n> +   // Alternate stack for signal handling.\n> +   InternalScopedBuffer<char> handler_stack_memory(kHandlerStackSize);\n> +-  struct sigaltstack handler_stack;\n> ++  stack_t handler_stack;\n> +   internal_memset(&handler_stack, 0, sizeof(handler_stack));\n> +   handler_stack.ss_sp = handler_stack_memory.data();\n> +   handler_stack.ss_size = kHandlerStackSize;\n> +diff --git a/libsanitizer/tsan/tsan_platform_linux.cc b/libsanitizer/tsan/tsan_platform_linux.cc\n> +index 09cec5f..908f4fe 100644\n> +--- a/libsanitizer/tsan/tsan_platform_linux.cc\n> ++++ b/libsanitizer/tsan/tsan_platform_linux.cc\n> +@@ -291,7 +291,7 @@ bool IsGlobalVar(uptr addr) {\n> + int ExtractResolvFDs(void *state, int *fds, int nfd) {\n> + #if SANITIZER_LINUX\n> +   int cnt = 0;\n> +-  __res_state *statp = (__res_state*)state;\n> ++  struct __res_state *statp = (struct __res_state*)state;\n> +   for (int i = 0; i < MAXNS && cnt < nfd; i++) {\n> +     if (statp->_u._ext.nsaddrs[i] && statp->_u._ext.nssocks[i] != -1)\n> +       fds[cnt++] = statp->_u._ext.nssocks[i];\n> +-- \n> +2.9.4\n> +\n> -- \n> 2.9.5\n> \n> _______________________________________________\n> buildroot mailing list\n> buildroot@busybox.net\n> http://lists.busybox.net/mailman/listinfo/buildroot","headers":{"Return-Path":"<buildroot-bounces@busybox.net>","X-Original-To":["incoming@patchwork.ozlabs.org","buildroot@lists.busybox.net"],"Delivered-To":["patchwork-incoming@bilbo.ozlabs.org","buildroot@osuosl.org"],"Authentication-Results":["ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=busybox.net\n\t(client-ip=140.211.166.137; helo=fraxinus.osuosl.org;\n\tenvelope-from=buildroot-bounces@busybox.net;\n\treceiver=<UNKNOWN>)","ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"pwV8D1EF\"; dkim-atps=neutral"],"Received":["from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xwDnY2dHgz9s7h\n\tfor <incoming@patchwork.ozlabs.org>;\n\tMon, 18 Sep 2017 02:17:53 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby fraxinus.osuosl.org (Postfix) with ESMTP id C1E58880F1;\n\tSun, 17 Sep 2017 16:17:50 +0000 (UTC)","from fraxinus.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id ev_BRvTIa3on; Sun, 17 Sep 2017 16:17:44 +0000 (UTC)","from ash.osuosl.org (ash.osuosl.org [140.211.166.34])\n\tby fraxinus.osuosl.org (Postfix) with ESMTP id EB8B687FEC;\n\tSun, 17 Sep 2017 16:17:43 +0000 (UTC)","from hemlock.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n\tby ash.osuosl.org (Postfix) with ESMTP id 68A791C22BA\n\tfor <buildroot@lists.busybox.net>;\n\tSun, 17 Sep 2017 16:17:42 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n\tby hemlock.osuosl.org (Postfix) with ESMTP id 62E5A89440\n\tfor <buildroot@lists.busybox.net>;\n\tSun, 17 Sep 2017 16:17:42 +0000 (UTC)","from hemlock.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id oLuCPMWJNWp4 for <buildroot@lists.busybox.net>;\n\tSun, 17 Sep 2017 16:17:36 +0000 (UTC)","from mail-wm0-f66.google.com (mail-wm0-f66.google.com\n\t[74.125.82.66])\n\tby hemlock.osuosl.org (Postfix) with ESMTPS id 75590865AC\n\tfor <buildroot@buildroot.org>; Sun, 17 Sep 2017 16:17:36 +0000 (UTC)","by mail-wm0-f66.google.com with SMTP id x17so6694591wmd.5\n\tfor <buildroot@buildroot.org>; Sun, 17 Sep 2017 09:17:36 -0700 (PDT)","from ymorin.is-a-geek.org\n\t(2a01cb088610730069736d1c9ea064c4.ipv6.abo.wanadoo.fr.\n\t[2a01:cb08:8610:7300:6973:6d1c:9ea0:64c4])\n\tby smtp.gmail.com with ESMTPSA id\n\tw9sm4650134wre.58.2017.09.17.09.17.32\n\t(version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256);\n\tSun, 17 Sep 2017 09:17:33 -0700 (PDT)","by ymorin.is-a-geek.org (sSMTP sendmail emulation);\n\tSun, 17 Sep 2017 18:17:31 +0200"],"X-Virus-Scanned":["amavisd-new at osuosl.org","amavisd-new at osuosl.org"],"X-Greylist":"domain auto-whitelisted by SQLgrey-1.7.6","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n\th=sender:date:from:to:cc:subject:message-id:references:mime-version\n\t:content-disposition:content-transfer-encoding:in-reply-to\n\t:user-agent; bh=bBwk+V8LNgW1gSsF7aaKtPNvLnrOXvaGpNB9Tw74ePo=;\n\tb=pwV8D1EFmyH8zP9IKgyM9eJ4Eln5J/c+ZDzHEPq08nBB8DbOm/yDR6r8PDeFx8YQzd\n\tNxoufN4DXOB0O3wtOC62jM3anTI/4NIFfq2mdRDpLQKK8lPnJu8qGUKLOlJLQXnVVW36\n\tA8nPdFm9fz9DVbJgIKVx1IICGko+qsQgJCcRAFKqq5YPVnREnt+7DweyeGW+6YHN/ux+\n\ty9U/KrXFdAefElq0kPNSF7PtTgAlilIep7DBPgANpZDunRToy46iPWt2MKuXOVUdjqog\n\tiZIfFD3+ey1RMVeL/2LklImhBl+enha9UTYYVzkHH2y2eiV0SqG6ab+AWGAMq1u5iGl2\n\tIbGg==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:sender:date:from:to:cc:subject:message-id\n\t:references:mime-version:content-disposition\n\t:content-transfer-encoding:in-reply-to:user-agent;\n\tbh=bBwk+V8LNgW1gSsF7aaKtPNvLnrOXvaGpNB9Tw74ePo=;\n\tb=KH0XGrdUj2rrwjtCdLxK2kxOYsW3UzEgWstWLfFwdKj9MgbmUk6v/JH9bLfGw/VfTk\n\tTa0RcgEVjMl4sQx6jXBxnAPOYzxbMwjH1QhcHCHDUwtu85lcdKzaj7YbbxqUzEeK29a6\n\tjy13VD0qQ9xpoaYxkvvVWIOkuOdy9dS3S7sq1ShJwvZ3uyzdKUjNZycG8s50lU6ic/6p\n\tYC7b5FnCINb9XSZj2eIVjmcORszFrBIfNQHKjd0tL5196PlGIVHAYYpGZAZWnVs8OHbj\n\tH6Z0mKBUR+4R4jtyb/eRqft/WNcfekrHS3keRum2PmjvEVdO+VwO4rTg4vHCVeRoJrW5\n\tgp4Q==","X-Gm-Message-State":"AHPjjUj+EDtgAie2e8Mtf+2ExryDab2rI5QsxZB1JaiG5TVKi0/nEnEq\n\tCdbRj9PlDcerfQXy1JpSdr0=","X-Google-Smtp-Source":"AOwi7QDruzjfMqmvUm53rjF9cSm4Ua/ToI72uaDw38ijqULbx+PFK6GopvlbiQ5sbVjXAe8jRLv+pg==","X-Received":"by 10.28.149.204 with SMTP id x195mr7227775wmd.78.1505665054658; \n\tSun, 17 Sep 2017 09:17:34 -0700 (PDT)","Date":"Sun, 17 Sep 2017 18:17:31 +0200","From":"\"Yann E. MORIN\" <yann.morin.1998@free.fr>","To":"Romain Naour <romain.naour@gmail.com>","Message-ID":"<20170917161731.GF2930@scaer>","References":"<20170902205423.21288-1-romain.naour@gmail.com>\n\t<20170902205423.21288-3-romain.naour@gmail.com>","MIME-Version":"1.0","Content-Disposition":"inline","In-Reply-To":"<20170902205423.21288-3-romain.naour@gmail.com>","User-Agent":"Mutt/1.5.22 (2013-10-16)","Cc":"Thomas Petazzoni <thomas.petazzoni@free-electrons.com>,\n\tbuildroot@buildroot.org","Subject":"Re: [Buildroot] [PATCH v2 02/11] package/gcc: fix build issue with\n\tglibc 2.26","X-BeenThere":"buildroot@busybox.net","X-Mailman-Version":"2.1.18-1","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.busybox.net>","List-Unsubscribe":"<http://lists.busybox.net/mailman/options/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=unsubscribe>","List-Archive":"<http://lists.busybox.net/pipermail/buildroot/>","List-Post":"<mailto:buildroot@busybox.net>","List-Help":"<mailto:buildroot-request@busybox.net?subject=help>","List-Subscribe":"<http://lists.busybox.net/mailman/listinfo/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=subscribe>","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"base64","Errors-To":"buildroot-bounces@busybox.net","Sender":"\"buildroot\" <buildroot-bounces@busybox.net>"}}]