[yocto] [PATCH] Fix X server on emenlow when built with gcc 4.7.x

Tom Zanussi tom.zanussi at intel.com
Tue May 22 08:31:25 PDT 2012


On Mon, 2012-05-21 at 21:56 -0500, Christopher Hallinan wrote:
> On Mon, May 21, 2012 at 2:30 PM, Tom Zanussi <tom.zanussi at intel.com> wrote:
> > On Fri, 2012-05-18 at 23:02 -0400, Chris Hallinan wrote:
> >> On Fri, May 18, 2012 at 6:25 PM, Tom Zanussi <tom.zanussi at intel.com> wrote:
> >> > On Fri, 2012-05-18 at 17:38 -0400, Chris Hallinan wrote:
> >> >> Note: this patch has already been submitted against other BSPs,
> >> >> originally submitted to oe-core by Gary Thomas.  I ran into this same
> >> >> issue building MACHINE=emenlow on my own Z530 platform.  There are
> >> >> likely others as well where this needs to be applied.
> >> >>
> >> >> Upstream is here:
> >> >> https://bugs.freedesktop.org/show_bug.cgi?id=18451
> >> >>
> >> >> PR has been bumped.
> >> >>
> >> >
> >> > Hi, thanks for the patch - I see the problem and will pull this in as
> >> > soon as I can build and test it, but am getting a patch failure in the
> >> > build after pulling it in for testing.  I'll fix it up, but just
> >> > mentioning it in case you had any ideas why it might work for you but
> >> > fail here...
> >> >
> >>
> >> Sorry, Tom.
> >> Odd, I generated the patch using git diff, but didn't actually try to
> >> apply it to an unpatched tree.  Looking at it, it isn't obvious why it
> >> fails. Someone with more git/patch foo than me could probably explain
> >> it ;)
> >>
> >> This one works (for me) against current top of tree:
> >>
> >
> > It must be a whitespace problem - I still couldn't apply it, so manually
> > fixed it up here, patch below.
> >
> > I also added an Upstream-status: section to the patch.
> >
> > Also, before pulling it in, I'll need to have you send me your
> > Signed-off-by: line.
> >
> > Unfortunately, the problem now is that although I am getting a sato
> > desktop, it has no icons or mouse/keyboard and I see this in the
> > Xorg.0.log:
> >
> > Backtrace:
> > 0: /usr/bin/Xorg (xorg_backtrace+0x37) [0x80e2e37]
> > 1: /usr/bin/Xorg (0x8047000+0x5bda6) [0x80a2da6]
> > 2: linux-gate.so.1 (__kernel_rt_sigreturn+0x0) [0xffffe40c]
> > 3: /usr/lib/xorg/modules/drivers/psb_drv.so (0xb769b000+0x690c)
> > [0xb76a190c]
> > 4: /usr/lib/xorg/modules/libexa.so (0xb71ab000+0xcd0a) [0xb71b7d0a]
> > 5: /usr/lib/xorg/modules/libexa.so (0xb71ab000+0xd300) [0xb71b8300]
> > 6: /usr/lib/xorg/modules/libexa.so (0xb71ab000+0xb5fd) [0xb71b65fd]
> > 7: /usr/bin/Xorg (0x8047000+0xc60c0) [0x810d0c0]
> > 8: /usr/bin/Xorg (CompositeGlyphs+0xb1) [0x819f131]
> > 9: /usr/bin/Xorg (0x8047000+0xc2e1e) [0x8109e1e]
> > 10: /usr/bin/Xorg (0x8047000+0xbdb2e) [0x8104b2e]
> > 11: /usr/bin/Xorg (0x8047000+0x286cf) [0x806f6cf]
> > 12: /usr/bin/Xorg (0x8047000+0x1bbca) [0x8062bca]
> > 13: /lib/libc.so.6 (__libc_start_main+0xf5) [0x42892ba5]
> > 14: /usr/bin/Xorg (0x8047000+0x1bea1) [0x8062ea1]
> > Segmentation fault at address 0xc
> >
> > Fatal server error:
> > Caught signal 11 (Segmentation fault). Server aborting
> >
> >
> > Can you tell me which poky commit you're using?
> 
> I haven't sync'd lately. I'm using 
> poky: f39ba520d6f2477c99839a92049b1bb279f092cf
> meta-intel: bde31fd7e66faea865d24ff0858a9006b89e4e54
> 
> Third time should be a charm.  With kergoth's help, I think I got this patch format correct!
> 
> Signed-off-by: Christopher Hallinan <challinan at gmail.com>

Yep, third time was the charm - applied cleanly and booted into sato
without problem...

Pulled into meta-intel/master.

Thanks!

Tom

> ---
>  .../files/fix-bogus-stack-variables.patch          |  204 ++++++++++++++++++++
>  .../xorg-xserver/xserver-psb-1.7.99.2.inc          |    5 +-
>  2 files changed, 207 insertions(+), 2 deletions(-)
>  create mode 100644 meta-emenlow/recipes-graphics/xorg-xserver/files/fix-bogus-stack-variables.patch
> 
> diff --git a/meta-emenlow/recipes-graphics/xorg-xserver/files/fix-bogus-stack-variables.patch b/meta-emenlow/recipes-graphics/xorg-xserver/files/fix-bogus-stack-variables.patch
> new file mode 100644
> index 0000000..5c9581a
> --- /dev/null
> +++ b/meta-emenlow/recipes-graphics/xorg-xserver/files/fix-bogus-stack-variables.patch
> @@ -0,0 +1,204 @@
> +diff --git a/Xext/xace.c b/Xext/xace.c
> +index e10d837..c757cad 100644
> +--- a/Xext/xace.c
> ++++ b/Xext/xace.c
> +@@ -87,7 +87,18 @@ void XaceHookAuditEnd(ClientPtr ptr, int result)
> +  */
> + int XaceHook(int hook, ...)
> + {
> +-    pointer calldata;	/* data passed to callback */
> ++    union {
> ++	XaceResourceAccessRec res;
> ++	XaceDeviceAccessRec dev;
> ++	XaceSendAccessRec send;
> ++	XaceReceiveAccessRec recv;
> ++	XaceClientAccessRec client;
> ++	XaceExtAccessRec ext;
> ++	XaceServerAccessRec server;
> ++	XaceScreenAccessRec screen;
> ++	XaceAuthAvailRec auth;
> ++	XaceKeyAvailRec key;
> ++    } u;
> +     int *prv = NULL;	/* points to return value from callback */
> +     va_list ap;		/* argument list */
> +     va_start(ap, hook);
> +@@ -99,117 +110,86 @@ int XaceHook(int hook, ...)
> +      */
> +     switch (hook)
> +     {
> +-	case XACE_RESOURCE_ACCESS: {
> +-	    XaceResourceAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.id = va_arg(ap, XID);
> +-	    rec.rtype = va_arg(ap, RESTYPE);
> +-	    rec.res = va_arg(ap, pointer);
> +-	    rec.ptype = va_arg(ap, RESTYPE);
> +-	    rec.parent = va_arg(ap, pointer);
> +-	    rec.access_mode = va_arg(ap, Mask);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_RESOURCE_ACCESS:
> ++	    u.res.client = va_arg(ap, ClientPtr);
> ++	    u.res.id = va_arg(ap, XID);
> ++	    u.res.rtype = va_arg(ap, RESTYPE);
> ++	    u.res.res = va_arg(ap, pointer);
> ++	    u.res.ptype = va_arg(ap, RESTYPE);
> ++	    u.res.parent = va_arg(ap, pointer);
> ++	    u.res.access_mode = va_arg(ap, Mask);
> ++	    u.res.status = Success; /* default allow */
> ++	    prv = &u.res.status;
> + 	    break;
> +-	}
> +-	case XACE_DEVICE_ACCESS: {
> +-	    XaceDeviceAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.dev = va_arg(ap, DeviceIntPtr);
> +-	    rec.access_mode = va_arg(ap, Mask);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_DEVICE_ACCESS:
> ++	    u.dev.client = va_arg(ap, ClientPtr);
> ++	    u.dev.dev = va_arg(ap, DeviceIntPtr);
> ++	    u.dev.access_mode = va_arg(ap, Mask);
> ++	    u.dev.status = Success; /* default allow */
> ++	    prv = &u.dev.status;
> + 	    break;
> +-	}
> +-	case XACE_SEND_ACCESS: {
> +-	    XaceSendAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.dev = va_arg(ap, DeviceIntPtr);
> +-	    rec.pWin = va_arg(ap, WindowPtr);
> +-	    rec.events = va_arg(ap, xEventPtr);
> +-	    rec.count = va_arg(ap, int);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_SEND_ACCESS:
> ++	    u.send.client = va_arg(ap, ClientPtr);
> ++	    u.send.dev = va_arg(ap, DeviceIntPtr);
> ++	    u.send.pWin = va_arg(ap, WindowPtr);
> ++	    u.send.events = va_arg(ap, xEventPtr);
> ++	    u.send.count = va_arg(ap, int);
> ++	    u.send.status = Success; /* default allow */
> ++	    prv = &u.send.status;
> + 	    break;
> +-	}
> +-	case XACE_RECEIVE_ACCESS: {
> +-	    XaceReceiveAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.pWin = va_arg(ap, WindowPtr);
> +-	    rec.events = va_arg(ap, xEventPtr);
> +-	    rec.count = va_arg(ap, int);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_RECEIVE_ACCESS:
> ++	    u.recv.client = va_arg(ap, ClientPtr);
> ++	    u.recv.pWin = va_arg(ap, WindowPtr);
> ++	    u.recv.events = va_arg(ap, xEventPtr);
> ++	    u.recv.count = va_arg(ap, int);
> ++	    u.recv.status = Success; /* default allow */
> ++	    prv = &u.recv.status;
> + 	    break;
> +-	}
> +-	case XACE_CLIENT_ACCESS: {
> +-	    XaceClientAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.target = va_arg(ap, ClientPtr);
> +-	    rec.access_mode = va_arg(ap, Mask);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_CLIENT_ACCESS:
> ++	    u.client.client = va_arg(ap, ClientPtr);
> ++	    u.client.target = va_arg(ap, ClientPtr);
> ++	    u.client.access_mode = va_arg(ap, Mask);
> ++	    u.client.status = Success; /* default allow */
> ++	    prv = &u.client.status;
> + 	    break;
> +-	}
> +-	case XACE_EXT_ACCESS: {
> +-	    XaceExtAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.ext = va_arg(ap, ExtensionEntry*);
> +-	    rec.access_mode = DixGetAttrAccess;
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_EXT_ACCESS:
> ++	    u.ext.client = va_arg(ap, ClientPtr);
> ++	    u.ext.ext = va_arg(ap, ExtensionEntry*);
> ++	    u.ext.access_mode = DixGetAttrAccess;
> ++	    u.ext.status = Success; /* default allow */
> ++	    prv = &u.ext.status;
> + 	    break;
> +-	}
> +-	case XACE_SERVER_ACCESS: {
> +-	    XaceServerAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.access_mode = va_arg(ap, Mask);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_SERVER_ACCESS:
> ++	    u.server.client = va_arg(ap, ClientPtr);
> ++	    u.server.access_mode = va_arg(ap, Mask);
> ++	    u.server.status = Success; /* default allow */
> ++	    prv = &u.server.status;
> + 	    break;
> +-	}
> + 	case XACE_SCREEN_ACCESS:
> +-	case XACE_SCREENSAVER_ACCESS: {
> +-	    XaceScreenAccessRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.screen = va_arg(ap, ScreenPtr);
> +-	    rec.access_mode = va_arg(ap, Mask);
> +-	    rec.status = Success; /* default allow */
> +-	    calldata = &rec;
> +-	    prv = &rec.status;
> ++	case XACE_SCREENSAVER_ACCESS:
> ++	    u.screen.client = va_arg(ap, ClientPtr);
> ++	    u.screen.screen = va_arg(ap, ScreenPtr);
> ++	    u.screen.access_mode = va_arg(ap, Mask);
> ++	    u.screen.status = Success; /* default allow */
> ++	    prv = &u.screen.status;
> + 	    break;
> +-	}
> +-	case XACE_AUTH_AVAIL: {
> +-	    XaceAuthAvailRec rec;
> +-	    rec.client = va_arg(ap, ClientPtr);
> +-	    rec.authId = va_arg(ap, XID);
> +-	    calldata = &rec;
> ++	case XACE_AUTH_AVAIL:
> ++	    u.auth.client = va_arg(ap, ClientPtr);
> ++	    u.auth.authId = va_arg(ap, XID);
> + 	    break;
> +-	}
> +-	case XACE_KEY_AVAIL: {
> +-	    XaceKeyAvailRec rec;
> +-	    rec.event = va_arg(ap, xEventPtr);
> +-	    rec.keybd = va_arg(ap, DeviceIntPtr);
> +-	    rec.count = va_arg(ap, int);
> +-	    calldata = &rec;
> ++	case XACE_KEY_AVAIL:
> ++	    u.key.event = va_arg(ap, xEventPtr);
> ++	    u.key.keybd = va_arg(ap, DeviceIntPtr);
> ++	    u.key.count = va_arg(ap, int);
> + 	    break;
> +-	}
> +-	default: {
> ++	default:
> + 	    va_end(ap);
> + 	    return 0;	/* unimplemented hook number */
> +-	}
> +     }
> +     va_end(ap);
> +  
> +     /* call callbacks and return result, if any. */
> +-    CallCallbacks(&XaceHooks[hook], calldata);
> ++    CallCallbacks(&XaceHooks[hook], &u);
> +     return prv ? *prv : Success;
> + }
> diff --git a/meta-emenlow/recipes-graphics/xorg-xserver/xserver-psb-1.7.99.2.inc b/meta-emenlow/recipes-graphics/xorg-xserver/xserver-psb-1.7.99.2.inc
> index 9ee9c97..1fe962b 100644
> --- a/meta-emenlow/recipes-graphics/xorg-xserver/xserver-psb-1.7.99.2.inc
> +++ b/meta-emenlow/recipes-graphics/xorg-xserver/xserver-psb-1.7.99.2.inc
> @@ -1,4 +1,4 @@
> -PR = "r5"
> +PR = "r6"
>  
>  PROTO_DEPS += "xf86driproto dri2proto"
>  
> @@ -8,7 +8,8 @@ SRC_URI += "file://nodolt.patch \
>              file://crosscompile.patch \
>  	    file://libdrm-poulsbo.patch \
>  	    file://werror-address-fix.patch \
> -	    file://ptr-to-int-cast-fix.patch"
> +	    file://ptr-to-int-cast-fix.patch \
> +	    file://fix-bogus-stack-variables.patch"
>  
>  # Misc build failure for master HEAD
>  SRC_URI += "file://fix_open_max_preprocessor_error.patch"





More information about the yocto mailing list