diff options
-rw-r--r-- | recipes-kernel/linux/linux-ls1.inc | 1 | ||||
-rw-r--r-- | recipes-kernel/linux/linux-ls1/Fix-the-compile-issue-under-gcc6.patch | 92 |
2 files changed, 93 insertions, 0 deletions
diff --git a/recipes-kernel/linux/linux-ls1.inc b/recipes-kernel/linux/linux-ls1.inc index a1007b8..85b5391 100644 --- a/recipes-kernel/linux/linux-ls1.inc +++ b/recipes-kernel/linux/linux-ls1.inc | |||
@@ -12,6 +12,7 @@ SRC_URI += " \ | |||
12 | file://0001-ARM-8158-LLVMLinux-use-static-inline-in-ARM-ftrace.patch \ | 12 | file://0001-ARM-8158-LLVMLinux-use-static-inline-in-ARM-ftrace.patch \ |
13 | file://0001-ARM-LLVMLinux-Change-extern-inline-to-static-inline.patch \ | 13 | file://0001-ARM-LLVMLinux-Change-extern-inline-to-static-inline.patch \ |
14 | file://0003-use-static-inline-in-ARM-lifeboot.h.patch \ | 14 | file://0003-use-static-inline-in-ARM-lifeboot.h.patch \ |
15 | file://Fix-the-compile-issue-under-gcc6.patch \ | ||
15 | " | 16 | " |
16 | 17 | ||
17 | KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}" | 18 | KERNEL_EXTRA_ARGS += "LOADADDR=${UBOOT_ENTRYPOINT}" |
diff --git a/recipes-kernel/linux/linux-ls1/Fix-the-compile-issue-under-gcc6.patch b/recipes-kernel/linux/linux-ls1/Fix-the-compile-issue-under-gcc6.patch new file mode 100644 index 0000000..3d080b6 --- /dev/null +++ b/recipes-kernel/linux/linux-ls1/Fix-the-compile-issue-under-gcc6.patch | |||
@@ -0,0 +1,92 @@ | |||
1 | From 5d39bd421fc093e2c852316080538cef85a9e1a0 Mon Sep 17 00:00:00 2001 | ||
2 | From: yocto <yocto@yocto.org> | ||
3 | Date: Thu, 2 Jun 2016 00:18:33 -0500 | ||
4 | Subject: [PATCH] Fix the compile issue under gcc6 | ||
5 | |||
6 | Fix the following build error: | ||
7 | | .../include/linux/compiler-gcc.h:106:30: fatal error: linux/compiler-gcc6.h: No such file or directory | ||
8 | | #include gcc_header(__GNUC__) | ||
9 | |||
10 | Signed-off-by: Zhenhua Luo <zhenhua.luo@nxp.com> | ||
11 | |||
12 | Upstream-Status: Pending | ||
13 | --- | ||
14 | include/linux/compiler-gcc6.h | 66 +++++++++++++++++++++++++++++++++++++++++++ | ||
15 | 1 file changed, 66 insertions(+) | ||
16 | create mode 100644 include/linux/compiler-gcc6.h | ||
17 | |||
18 | diff --git a/include/linux/compiler-gcc6.h b/include/linux/compiler-gcc6.h | ||
19 | new file mode 100644 | ||
20 | index 0000000..cdd1cc2 | ||
21 | --- /dev/null | ||
22 | +++ b/include/linux/compiler-gcc6.h | ||
23 | @@ -0,0 +1,66 @@ | ||
24 | +#ifndef __LINUX_COMPILER_H | ||
25 | +#error "Please don't include <linux/compiler-gcc5.h> directly, include <linux/compiler.h> instead." | ||
26 | +#endif | ||
27 | + | ||
28 | +#define __used __attribute__((__used__)) | ||
29 | +#define __must_check __attribute__((warn_unused_result)) | ||
30 | +#define __compiler_offsetof(a, b) __builtin_offsetof(a, b) | ||
31 | + | ||
32 | +/* Mark functions as cold. gcc will assume any path leading to a call | ||
33 | + to them will be unlikely. This means a lot of manual unlikely()s | ||
34 | + are unnecessary now for any paths leading to the usual suspects | ||
35 | + like BUG(), printk(), panic() etc. [but let's keep them for now for | ||
36 | + older compilers] | ||
37 | + | ||
38 | + Early snapshots of gcc 4.3 don't support this and we can't detect this | ||
39 | + in the preprocessor, but we can live with this because they're unreleased. | ||
40 | + Maketime probing would be overkill here. | ||
41 | + | ||
42 | + gcc also has a __attribute__((__hot__)) to move hot functions into | ||
43 | + a special section, but I don't see any sense in this right now in | ||
44 | + the kernel context */ | ||
45 | +#define __cold __attribute__((__cold__)) | ||
46 | + | ||
47 | +#define __UNIQUE_ID(prefix) __PASTE(__PASTE(__UNIQUE_ID_, prefix), __COUNTER__) | ||
48 | + | ||
49 | +#ifndef __CHECKER__ | ||
50 | +# define __compiletime_warning(message) __attribute__((warning(message))) | ||
51 | +# define __compiletime_error(message) __attribute__((error(message))) | ||
52 | +#endif /* __CHECKER__ */ | ||
53 | + | ||
54 | +/* | ||
55 | + * Mark a position in code as unreachable. This can be used to | ||
56 | + * suppress control flow warnings after asm blocks that transfer | ||
57 | + * control elsewhere. | ||
58 | + * | ||
59 | + * Early snapshots of gcc 4.5 don't support this and we can't detect | ||
60 | + * this in the preprocessor, but we can live with this because they're | ||
61 | + * unreleased. Really, we need to have autoconf for the kernel. | ||
62 | + */ | ||
63 | +#define unreachable() __builtin_unreachable() | ||
64 | + | ||
65 | +/* Mark a function definition as prohibited from being cloned. */ | ||
66 | +#define __noclone __attribute__((__noclone__)) | ||
67 | + | ||
68 | +/* | ||
69 | + * Tell the optimizer that something else uses this function or variable. | ||
70 | + */ | ||
71 | +#define __visible __attribute__((externally_visible)) | ||
72 | + | ||
73 | +/* | ||
74 | + * GCC 'asm goto' miscompiles certain code sequences: | ||
75 | + * | ||
76 | + * http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58670 | ||
77 | + * | ||
78 | + * Work it around via a compiler barrier quirk suggested by Jakub Jelinek. | ||
79 | + * Fixed in GCC 4.8.2 and later versions. | ||
80 | + * | ||
81 | + * (asm goto is automatically volatile - the naming reflects this.) | ||
82 | + */ | ||
83 | +#define asm_volatile_goto(x...) do { asm goto(x); asm (""); } while (0) | ||
84 | + | ||
85 | +#ifdef CONFIG_ARCH_USE_BUILTIN_BSWAP | ||
86 | +#define __HAVE_BUILTIN_BSWAP32__ | ||
87 | +#define __HAVE_BUILTIN_BSWAP64__ | ||
88 | +#define __HAVE_BUILTIN_BSWAP16__ | ||
89 | +#endif /* CONFIG_ARCH_USE_BUILTIN_BSWAP */ | ||
90 | -- | ||
91 | 2.5.0 | ||
92 | |||