Gentoo Archives: gentoo-commits

From: Conrad Kostecki <conikost@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: sys-apps/systemd/files/
Date: Sun, 01 Jan 2023 18:16:39
Message-Id: 1672596975.ef3b51926ede813b240e807911eef302ac0c4fdb.conikost@gentoo
1 commit: ef3b51926ede813b240e807911eef302ac0c4fdb
2 Author: Michael Mair-Keimberger <mmk <AT> levelnine <DOT> at>
3 AuthorDate: Sun Jan 1 13:43:19 2023 +0000
4 Commit: Conrad Kostecki <conikost <AT> gentoo <DOT> org>
5 CommitDate: Sun Jan 1 18:16:15 2023 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ef3b5192
7
8 sys-apps/systemd: remove unused patches
9
10 Signed-off-by: Michael Mair-Keimberger <mmk <AT> levelnine.at>
11 Closes: https://github.com/gentoo/gentoo/pull/28917
12 Signed-off-by: Conrad Kostecki <conikost <AT> gentoo.org>
13
14 sys-apps/systemd/files/251-meson-0.64.patch | 26 --------------
15 .../files/251-revert-fortify-source-3-fix.patch | 40 ----------------------
16 2 files changed, 66 deletions(-)
17
18 diff --git a/sys-apps/systemd/files/251-meson-0.64.patch b/sys-apps/systemd/files/251-meson-0.64.patch
19 deleted file mode 100644
20 index 6cc200bbd87d..000000000000
21 --- a/sys-apps/systemd/files/251-meson-0.64.patch
22 +++ /dev/null
23 @@ -1,26 +0,0 @@
24 -From cddbc850270415a818aadabd71fe12dc0dddd508 Mon Sep 17 00:00:00 2001
25 -From: Jan Janssen <medhefgo@×××.de>
26 -Date: Sun, 9 Oct 2022 17:16:12 +0200
27 -Subject: [PATCH] meson: Fix build with --optimization=plain
28 -
29 -Note that -O0 is deliberately filtered out as we have to compile with at
30 -least -O1 due to #24202.
31 -
32 -Fixes: #24323
33 ----
34 - src/boot/efi/meson.build | 2 +-
35 - 1 file changed, 1 insertion(+), 1 deletion(-)
36 -
37 -diff --git a/src/boot/efi/meson.build b/src/boot/efi/meson.build
38 -index e0cd4ebad993..395386d3eda7 100644
39 ---- a/src/boot/efi/meson.build
40 -+++ b/src/boot/efi/meson.build
41 -@@ -223,7 +223,7 @@ endif
42 - if get_option('debug') and get_option('mode') == 'developer'
43 - efi_cflags += ['-ggdb', '-DEFI_DEBUG']
44 - endif
45 --if get_option('optimization') != '0'
46 -+if get_option('optimization') in ['1', '2', '3', 's', 'g']
47 - efi_cflags += ['-O' + get_option('optimization')]
48 - endif
49 - if get_option('b_ndebug') == 'true' or (
50
51 diff --git a/sys-apps/systemd/files/251-revert-fortify-source-3-fix.patch b/sys-apps/systemd/files/251-revert-fortify-source-3-fix.patch
52 deleted file mode 100644
53 index bbe45f85dcf2..000000000000
54 --- a/sys-apps/systemd/files/251-revert-fortify-source-3-fix.patch
55 +++ /dev/null
56 @@ -1,40 +0,0 @@
57 -From: Sam James <sam@g.o>
58 -Date: Tue, 24 May 2022 23:21:50 +0100
59 -Subject: [PATCH] Revert "Support -D_FORTIFY_SOURCE=3 by using
60 - __builtin_dynamic_object_size."
61 -
62 -Breaks Clang (even without F_S=3).
63 -
64 -This reverts commit 0bd292567a543d124cd303f7dd61169a209cae64.
65 -
66 -Bug: https://bugs.gentoo.org/841770
67 -Bug: https://github.com/systemd/systemd/issues/23150
68 ---- a/src/basic/alloc-util.h
69 -+++ b/src/basic/alloc-util.h
70 -@@ -174,23 +174,13 @@ void* greedy_realloc0(void **p, size_t need, size_t size);
71 - * is compatible with _FORTIFY_SOURCES. If _FORTIFY_SOURCES is used many memory operations will take the
72 - * object size as returned by __builtin_object_size() into account. Hence, let's return the smaller size of
73 - * malloc_usable_size() and __builtin_object_size() here, so that we definitely operate in safe territory by
74 -- * both the compiler's and libc's standards. Note that _FORTIFY_SOURCES=3 handles also dynamically allocated
75 -- * objects and thus it's safer using __builtin_dynamic_object_size if _FORTIFY_SOURCES=3 is used (#22801).
76 -- * Moreover, when NULL is passed malloc_usable_size() is documented to return zero, and
77 -+ * both the compiler's and libc's standards. Note that __builtin_object_size() evaluates to SIZE_MAX if the
78 -+ * size cannot be determined, hence the MIN() expression should be safe with dynamically sized memory,
79 -+ * too. Moreover, when NULL is passed malloc_usable_size() is documented to return zero, and
80 - * __builtin_object_size() returns SIZE_MAX too, hence we also return a sensible value of 0 in this corner
81 - * case. */
82 --
83 --#if defined __has_builtin
84 --# if __has_builtin(__builtin_dynamic_object_size)
85 --# define MALLOC_SIZEOF_SAFE(x) \
86 -- MIN(malloc_usable_size(x), __builtin_dynamic_object_size(x, 0))
87 --# endif
88 --#endif
89 --
90 --#ifndef MALLOC_SIZEOF_SAFE
91 - #define MALLOC_SIZEOF_SAFE(x) \
92 - MIN(malloc_usable_size(x), __builtin_object_size(x, 0))
93 --#endif
94 -
95 - /* Inspired by ELEMENTSOF() but operates on malloc()'ed memory areas: typesafely returns the number of items
96 - * that fit into the specified memory block */