summaryrefslogtreecommitdiff
path: root/libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch
diff options
context:
space:
mode:
authorIsaac David <isacdaavid@isacdaavid.info>2017-06-09 15:44:53 -0500
committerIsaac David <isacdaavid@isacdaavid.info>2017-06-09 15:44:53 -0500
commita63182bc739fa2ef86861a939898717e04cb7153 (patch)
tree28812dc1e6d2b13c2df520d1728e206bf2c75a1e /libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch
parent25de18693e983c778578ab569df252911b5445e1 (diff)
downloadabslibre-a63182bc739fa2ef86861a939898717e04cb7153.tar.gz
abslibre-a63182bc739fa2ef86861a939898717e04cb7153.tar.bz2
abslibre-a63182bc739fa2ef86861a939898717e04cb7153.zip
libre-testing/uboot4extlinux-*: new versions and configs
also patch old u-boot tarballs to build with gcc7
Diffstat (limited to 'libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch')
-rw-r--r--libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch68
1 files changed, 68 insertions, 0 deletions
diff --git a/libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch b/libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch
new file mode 100644
index 000000000..ca59b159a
--- /dev/null
+++ b/libre-testing/uboot4extlinux-wandboard/0002-kernel-add-support-for-gcc-7.patch
@@ -0,0 +1,68 @@
+diff --git a/include/linux/compiler-gcc7.h b/include/linux/compiler-gcc7.h
+new file mode 100644
+index 0000000..ba064fa
+--- /dev/null
++++ b/include/linux/compiler-gcc7.h
+@@ -0,0 +1,59 @@
++#ifndef __LINUX_COMPILER_H
++#error "Please don't include <linux/compiler-gcc7.h> directly, include <linux/compiler.h> instead."
++#endif
++
++#define __used __attribute__((__used__))
++#define __must_check __attribute__((warn_unused_result))
++#define __compiler_offsetof(a, b) __builtin_offsetof(a, b)
++
++/* Mark functions as cold. gcc will assume any path leading to a call
++ to them will be unlikely. This means a lot of manual unlikely()s
++ are unnecessary now for any paths leading to the usual suspects
++ like BUG(), printk(), panic() etc. [but let's keep them for now for
++ older compilers]
++
++ gcc also has a __attribute__((__hot__)) to move hot functions into
++ a special section, but I don't see any sense in this right now in
++ the kernel context */
++#define __cold __attribute__((__cold__))
++
++#define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__)
++
++#ifndef __CHECKER__
++# define __compiletime_warning(message) __attribute__((warning(message)))
++# define __compiletime_error(message) __attribute__((error(message)))
++#endif /* __CHECKER__ */
++
++/*
++ * Mark a position in code as unreachable. This can be used to
++ * suppress control flow warnings after asm blocks that transfer
++ * control elsewhere.
++ */
++#define unreachable() __builtin_unreachable()
++
++/* Mark a function definition as prohibited from being cloned. */
++#define __noclone __attribute__((__noclone__))
++
++/*
++ * Tell the optimizer that something else uses this function or variable.
++ */
++#define __visible __attribute__((externally_visible))
++
++/*
++ * GCC 'asm goto' miscompiles certain code sequences:
++ *
++ * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670
++ *
++ * Work it around via a compiler barrier quirk suggested by Jakub Jelinek.
++ *
++ * (asm goto is automatically volatile - the naming reflects this.)
++ */
++#define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0)
++
++#ifdef CONFIG_ARCH_USE_BUILTIN_BSWAP
++#define __HAVE_BUILTIN_BSWAP32__
++#define __HAVE_BUILTIN_BSWAP64__
++#define __HAVE_BUILTIN_BSWAP16__
++#endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP */
++
++#define KASAN_ABI_VERSION 4
+--
+2.1.4
+