commit:     8f87452d0bb35730435a53864a58e6332912ec50
Author:     Rasmus Thomsen <rasmus.thomsen <AT> live <DOT> de>
AuthorDate: Wed Mar 29 14:23:46 2017 +0000
Commit:     Aric Belsito <lluixhi <AT> gmail <DOT> com>
CommitDate: Wed Mar 29 16:37:57 2017 +0000
URL:        https://gitweb.gentoo.org/proj/musl.git/commit/?id=8f87452d

net-libs/libtirpc: version bump to 1.0.1

 net-libs/libtirpc/Manifest                         |   5 +-
 net-libs/libtirpc/files/git.patch                  | 842 +++++++++++++++++++++
 ...irpc-0.2.5-r99.ebuild => libtirpc-0.2.5.ebuild} |   7 +-
 ...irpc-0.2.5-r99.ebuild => libtirpc-1.0.1.ebuild} |  31 +-
 4 files changed, 858 insertions(+), 27 deletions(-)

diff --git a/net-libs/libtirpc/Manifest b/net-libs/libtirpc/Manifest
index dd38c56..f6b2a02 100644
--- a/net-libs/libtirpc/Manifest
+++ b/net-libs/libtirpc/Manifest
@@ -5,8 +5,11 @@ AUX 0004-fix_DECLS.patch 29124 SHA256 
bdc844c56cfe2d5b060d59fee009576895504e2df4
 AUX 0005-fix_remaining_issues.patch 373 SHA256 
db061da4e22c4ed9192587a622454e69c6999b5ccfdafa5588957440051277e2 SHA512 
db70a64424904a669534e25c70b13dffb0ddd3437e81f6fee69ac2399e00bdd4e83ee9c65bc0bb789e28c1ac8e030a22461642e699fd371a4f147782a5845912
 WHIRLPOOL 
06e9f643c66867ddf965427e5c874eaa3c4275b961634d3fc669120275e3db8613a9bd997d612976c078584e016234f34e5a4abfeef20eb655997c7825e8cb56
 AUX 0006-fix_queue_h_include.patch 1788 SHA256 
3b8f296eb375052210874ebc3caeadd0cdf689a27e279761e16d76b411e89f8f SHA512 
f5a419d883dc6fc0bc6ebb02c3b1f7ce95aeb2b261eb5a49498b600844a27041b32f146fd8bba3d1769c32a67a15b9e40d9ffe3598d9448ebfc4fde6446e69aa
 WHIRLPOOL 
1e7b71255a11abd45dc88b74d8d8146f60c0a621ebe42f437e45e01f791a0ca020c27f841091f556d33fd284336b2e8cc8fa91fa9ca9ed5dd5904c1a5fe82212
 AUX 0007-no-des.patch 960 SHA256 
12823f030b803045108df782018d04ca253d4439b0e92015ddb140dcd33c1be3 SHA512 
95ad086657d008a01a4072ba7141391cbbe8ac35372b2f063a3f9774eb5dfa12b97bcff0c1b6da2d887001beaa60a8524823df93a8de2fdb73ad2a30340770ba
 WHIRLPOOL 
bd075834fddeff5ae86b90273f5c7b820f88649045e65b63d09dc26c35ada0fd1162dcf8aeb1cd82ad59b9092eceb92e154fa58c9beca540dc31ead7cc96b72e
+AUX git.patch 24736 SHA256 
0a62de190d38660efff0ddbb73b5b6315fdc015c20cf9c235e35c0cf7eeb0e85 SHA512 
4dd540470e9a25b5df0ea2c883dd647f26b71ed82e880c7efa4eed51dd98b898e18964a3ee998ceeadf39caed0a661f110f72157ec70584e33131d0a0f375a00
 WHIRLPOOL 
3b7fe2207ea84b56ce889778c4ef31669afe7dd340270063c1ac09accc3459e4d53bd5d084bfa090ec041fb188cd8bac6aad55d7fd60f43e485c89d53e06b14e
 AUX libtirpc-0.2.5-stdarg.patch 667 SHA256 
2b31b1148af9d96c9a9e6f609c0b5b03424954d6251c18d64b6119afd8afa6f7 SHA512 
2197f8c2ed3b4dbfc54ee37e973a6e275d19c6dde5d066b9ce45beecdbb17c9e620d7c6f0997b7ebfeb2bd1741327028a793b34edd94d59a89c8b36ac102b025
 WHIRLPOOL 
90d4e88c18f0d93ab8dfef4981377c2a6df42ff90b70049d07e203e7b66a5087910fe501cf9e1b93782eb25a8b3a8680c03287ccc563b838f517e5d1524b12c5
 DIST libtirpc-0.2.5.tar.bz2 459094 SHA256 
62f9de7c2c8686c568757730e1fef66502a0e00d6cacf33546d0267984e002db SHA512 
9f8afa1acb04a2c2c558018f2528f8caaa79994a2af2abeed947f914145872ef72988b241e11925c799db0de9ec51fd9baecd2b08150240b22f91e2e55a45194
 WHIRLPOOL 
a2b4f1c4825f2b774c2290cccd9d552bb7566ec9eb5988d3ab619d7870a907600f67e7af39fbc3e245606db8534f114c990145789c383206d3a9cf96cf043d8c
+DIST libtirpc-1.0.1.tar.bz2 495125 SHA256 
5156974f31be7ccbc8ab1de37c4739af6d9d42c87b1d5caf4835dda75fcbb89e SHA512 
c9b449e737bc2bd3d56e31e8352f312e89a7ec2a11b73b5ac314e7d82d3b644c611e422b623912453b67b668f86a6de7bb7f18c9495dd15de8e2798ec2ff41c8
 WHIRLPOOL 
cce6a4e69bd634b40d66594a81c23d2044b63eec16d6c96d6fcfaa7f2ca41fb9af99c8e2b964ec12be82682afa4090b218d7e14399fdfc9b32df6c2234bc3c9e
 DIST libtirpc-glibc-nfs.tar.xz 8948 SHA256 
2677cfedf626f3f5a8f6e507aed5bb8f79a7453b589d684dbbc086e755170d83 SHA512 
90255bf0a27af16164e0710dd940778609925d473f4343093ff19d98cc4f23023788bf4edf0178eae1961afc0ba8b69b273de95b7d7e2afdb706701d8ba6f7ba
 WHIRLPOOL 
06bcf3fd4e424a86071e5c4ddeb89aa571c862e765aae9382d9f9a55ab72cd1c623490555c1a9bd3380a2d04ecb10fb47a75a7dddf449d4368a1a01617226858
-EBUILD libtirpc-0.2.5-r99.ebuild 1911 SHA256 
bde412b1d481fa28be314a0a4403c013b80dda526fba92bb80cdffd9208512f1 SHA512 
c33059986e47d2b90e0544807ef26203346aeb4ccd22d3d680e423a7e5eb20b1d101e0dbb8ecce91b7c4d85ebe2ccc37e7be87dd4a4de3ba99f85a8d6838f43b
 WHIRLPOOL 
523fed87584a6a76e21f4ad1e18ae9f7f0cf392729f927bf80d02ab6c9b6080747e4c4daa42cf4903026c9b91330a8b0577baa9961a4fac65edb376f12f50b38
+EBUILD libtirpc-0.2.5.ebuild 1920 SHA256 
787410d5dfb2794a29c607fd47db15230d42050eabd9ddc57efe86486e31c64b SHA512 
b9fbd63c6356a0d3e5f3a7d3b40727baa5039175d664cb14f49601c845d70767bd2bbd848b50541275e645cf7eb64b4ddab98475c0cf327d41992f92cd588b88
 WHIRLPOOL 
523e39ae954a6477a84382df171cab339e4be5b5dcb8db21150691b0b0cff13484e69d45256c7a15947a09d7f1b7fab9a37b58a8a22857fe3c53115e091af596
+EBUILD libtirpc-1.0.1.ebuild 1406 SHA256 
c2a3172d3c56d7a52c9482e2e49c0ab12689d1902fca8841610f5627dfe8b0d9 SHA512 
9ebd926c82f52d979758be194afeb62c12e36bbd5ab33c92616c1488f27860bce65a93a30513f6ad6ecddd3e2c328e482696c4b7e9884dff6f3802ba904f7388
 WHIRLPOOL 
6acebb4842b8a23397b74ebfa2c470bcca1ef8152f9306f50f3efbda52de97ba157144253b2b3f894010b24a9eab221fa4cc78108bba580cb2365cdeb232d1cf
 MISC metadata.xml 335 SHA256 
02e9487e791e2d6aa99e74025dd90a6c54d86c73d530c96316e93f7552e1439a SHA512 
d6dd857293827907e545dc6e8631d06682d20e13442f8ce6cbd2e2a789d885c8a788f4ed1d062a8c54c4165d22eb096279d4c2f598e462a57faaf8bec1e9777b
 WHIRLPOOL 
6a802fc6b1fdd5bc815c4d2d41de0cba5cff351cdd1fa80021c02233b3facf21674d94ec7b822c2d514e5e1c721cf3ae2b88c885afdce8a7b60d2e63da71183c

diff --git a/net-libs/libtirpc/files/git.patch 
b/net-libs/libtirpc/files/git.patch
new file mode 100644
index 0000000..e458563
--- /dev/null
+++ b/net-libs/libtirpc/files/git.patch
@@ -0,0 +1,842 @@
+diff --git a/.gitignore b/.gitignore
+index b7814a3..ef97e01 100644
+--- a/.gitignore
++++ b/.gitignore
+@@ -34,6 +34,9 @@ libtirpc.pc
+ lib*.a
+ src/libtirpc.la
+ src/libtirpc_la-*.lo
++tirpc/stamp-h2
++tirpc/tirpc-features.h
++
+ # generic editor backup et al
+ *~
+ .stgitmail.txt
+diff --git a/src/Makefile.am b/src/Makefile.am
+index e4ed8aa..fba2aa4 100644
+--- a/src/Makefile.am
++++ b/src/Makefile.am
+@@ -24,7 +24,7 @@ libtirpc_la_SOURCES = auth_none.c auth_unix.c 
authunix_prot.c bindresvport.c cln
+         rpcb_st_xdr.c svc.c svc_auth.c svc_dg.c svc_auth_unix.c 
svc_auth_none.c \
+       svc_auth_des.c \
+         svc_generic.c svc_raw.c svc_run.c svc_simple.c svc_vc.c getpeereid.c \
+-        auth_time.c auth_des.c authdes_prot.c debug.c
++        auth_time.c auth_des.c authdes_prot.c debug.c des_crypt.c des_impl.c
+ 
+ ## XDR
+ libtirpc_la_SOURCES += xdr.c xdr_rec.c xdr_array.c xdr_float.c xdr_mem.c 
xdr_reference.c xdr_stdio.c xdr_sizeof.c
+diff --git a/src/auth_des.c b/src/auth_des.c
+index 4d3639e..af2f61f 100644
+--- a/src/auth_des.c
++++ b/src/auth_des.c
+@@ -46,8 +46,8 @@
+ #include <rpc/clnt.h>
+ #include <rpc/xdr.h>
+ #include <sys/socket.h>
+-#undef NIS
+-#include <rpcsvc/nis.h>
++
++#include "nis.h"
+ 
+ #if defined(LIBC_SCCS) && !defined(lint)
+ #endif
+diff --git a/src/auth_gss.c b/src/auth_gss.c
+index 9b88c38..5959893 100644
+--- a/src/auth_gss.c
++++ b/src/auth_gss.c
+@@ -526,6 +526,14 @@ _rpc_gss_refresh(AUTH *auth, rpc_gss_options_ret_t 
*options_ret)
+                            gr.gr_major != GSS_S_CONTINUE_NEEDED)) {
+                               options_ret->major_status = gr.gr_major;
+                               options_ret->minor_status = gr.gr_minor;
++                              if (call_stat != RPC_SUCCESS) {
++                                      struct rpc_err err;
++                                      clnt_geterr(gd->clnt, &err);
++                                      LIBTIRPC_DEBUG(1, ("authgss_refresh: %s 
errno: %s",
++                                              clnt_sperrno(call_stat), 
strerror(err.re_errno)));
++                              } else
++                                      gss_log_status("authgss_refresh:", 
++                                              gr.gr_major, gr.gr_minor);
+                               return FALSE;
+                       }
+ 
+diff --git a/src/auth_time.c b/src/auth_time.c
+index 10e58eb..7f83ab4 100644
+--- a/src/auth_time.c
++++ b/src/auth_time.c
+@@ -44,8 +44,8 @@
+ #include <rpc/rpcb_prot.h>
+ //#include <clnt_soc.h>
+ #include <sys/select.h>
+-#undef NIS
+-#include <rpcsvc/nis.h>
++
++#include "nis.h"
+ 
+ 
+ #ifdef TESTING
+diff --git a/src/clnt_vc.c b/src/clnt_vc.c
+index a72f9f7..a5fbe2f 100644
+--- a/src/clnt_vc.c
++++ b/src/clnt_vc.c
+@@ -72,6 +72,8 @@
+ #define CMGROUP_MAX    16
+ #define SCM_CREDS      0x03            /* process creds (struct cmsgcred) */
+ 
++#undef rpc_createerr                   /* make it clear it is a thread safe 
variable */
++
+ /*
+  * Credentials structure, used to verify the identity of a peer
+  * process that has sent us a message. This is allocated by the
+@@ -188,10 +190,11 @@ clnt_vc_create(fd, raddr, prog, vers, sendsz, recvsz)
+       cl = (CLIENT *)mem_alloc(sizeof (*cl));
+       ct = (struct ct_data *)mem_alloc(sizeof (*ct));
+       if ((cl == (CLIENT *)NULL) || (ct == (struct ct_data *)NULL)) {
++              struct rpc_createerr *ce = &get_rpc_createerr();
++              ce->cf_stat = RPC_SYSTEMERROR;
++              ce->cf_error.re_errno = errno;
+               (void) syslog(LOG_ERR, clnt_vc_errstr,
+                   clnt_vc_str, __no_mem_str);
+-              rpc_createerr.cf_stat = RPC_SYSTEMERROR;
+-              rpc_createerr.cf_error.re_errno = errno;
+               goto err;
+       }
+       ct->ct_addr.buf = NULL;
+@@ -230,26 +233,29 @@ clnt_vc_create(fd, raddr, prog, vers, sendsz, recvsz)
+               assert(vc_cv != (cond_t *) NULL);
+ 
+       /*
+-       * XXX - fvdl connecting while holding a mutex?
++       * Do not hold mutex during connect
+        */
++      mutex_unlock(&clnt_fd_lock);
++
+       slen = sizeof ss;
+       if (getpeername(fd, (struct sockaddr *)&ss, &slen) < 0) {
+               if (errno != ENOTCONN) {
+-                      rpc_createerr.cf_stat = RPC_SYSTEMERROR;
+-                      rpc_createerr.cf_error.re_errno = errno;
+-                      mutex_unlock(&clnt_fd_lock);
++                      struct rpc_createerr *ce = &get_rpc_createerr();
++                      ce->cf_stat = RPC_SYSTEMERROR;
++                      ce->cf_error.re_errno = errno;
+                       thr_sigsetmask(SIG_SETMASK, &(mask), NULL);
+                       goto err;
+               }
+               if (connect(fd, (struct sockaddr *)raddr->buf, raddr->len) < 0){
+-                      rpc_createerr.cf_stat = RPC_SYSTEMERROR;
+-                      rpc_createerr.cf_error.re_errno = errno;
+-                      mutex_unlock(&clnt_fd_lock);
+-                      thr_sigsetmask(SIG_SETMASK, &(mask), NULL);
+-                      goto err;
++                      if (errno != EISCONN) {
++                              struct rpc_createerr *ce = &get_rpc_createerr();
++                              ce->cf_stat = RPC_SYSTEMERROR;
++                              ce->cf_error.re_errno = errno;
++                              thr_sigsetmask(SIG_SETMASK, &(mask), NULL);
++                              goto err;
++                      }
+               }
+       }
+-      mutex_unlock(&clnt_fd_lock);
+       if (!__rpc_fd2sockinfo(fd, &si))
+               goto err;
+       thr_sigsetmask(SIG_SETMASK, &(mask), NULL);
+diff --git a/src/des_impl.c b/src/des_impl.c
+index c5b7ed6..15bec2a 100644
+--- a/src/des_impl.c
++++ b/src/des_impl.c
+@@ -6,7 +6,8 @@
+ /* see <http://www.gnu.org/licenses/> to obtain a copy.  */
+ #include <string.h>
+ #include <stdint.h>
+-#include <rpc/rpc_des.h>
++#include <sys/types.h>
++#include <rpc/des.h>
+ 
+ 
+ static const uint32_t des_SPtrans[8][64] =
+@@ -587,7 +588,7 @@ _des_crypt (char *buf, unsigned len, struct desparams 
*desp)
+     }
+   tin0 = tin1 = tout0 = tout1 = xor0 = xor1 = 0;
+   tbuf[0] = tbuf[1] = 0;
+-  __bzero (schedule, sizeof (schedule));
++  memset (schedule, 0, sizeof (schedule));
+ 
+   return (1);
+ }
+diff --git a/src/getpublickey.c b/src/getpublickey.c
+index 764a5f9..8cf4dc2 100644
+--- a/src/getpublickey.c
++++ b/src/getpublickey.c
+@@ -38,8 +38,10 @@
+ #include <pwd.h>
+ #include <rpc/rpc.h>
+ #include <rpc/key_prot.h>
++#ifdef YP
+ #include <rpcsvc/yp_prot.h>
+ #include <rpcsvc/ypclnt.h>
++#endif
+ #include <string.h>
+ #include <stdlib.h>
+ 
+diff --git a/src/getrpcport.c b/src/getrpcport.c
+index b452c99..c28cd61 100644
+--- a/src/getrpcport.c
++++ b/src/getrpcport.c
+@@ -57,8 +57,8 @@ getrpcport(host, prognum, versnum, proto)
+       memset(&addr, 0, sizeof(addr));
+       addr.sin_family = AF_INET;
+       addr.sin_port =  0;
+-      if (hp->h_length > sizeof(addr))
+-        hp->h_length = sizeof(addr);
++      if (hp->h_length > sizeof(addr.sin_addr.s_addr))
++              hp->h_length = sizeof(addr.sin_addr.s_addr);
+       memcpy(&addr.sin_addr.s_addr, hp->h_addr, (size_t)hp->h_length);
+       /* Inconsistent interfaces need casts! :-( */
+       return (pmap_getport(&addr, (u_long)prognum, (u_long)versnum, 
+diff --git a/src/nis.h b/src/nis.h
+new file mode 100644
+index 0000000..588c041
+--- /dev/null
++++ b/src/nis.h
+@@ -0,0 +1,70 @@
++/*
++ * Copyright (c) 2010, Oracle America, Inc.
++ *
++ * Redistribution and use in source and binary forms, with or without
++ * modification, are permitted provided that the following conditions are
++ * met:
++ *
++ *     * Redistributions of source code must retain the above copyright
++ *       notice, this list of conditions and the following disclaimer.
++ *     * Redistributions in binary form must reproduce the above
++ *       copyright notice, this list of conditions and the following
++ *       disclaimer in the documentation and/or other materials
++ *       provided with the distribution.
++ *     * Neither the name of the "Oracle America, Inc." nor the names of its
++ *       contributors may be used to endorse or promote products derived
++ *       from this software without specific prior written permission.
++ *
++ *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
++ *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
++ *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
++ *   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
++ *   COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
++ *   INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
++ *   DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
++ *   GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
++ *   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
++ *   WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
++ *   NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
++ *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
++ */
++
++#ifndef _INTERNAL_NIS_H
++#define _INTERNAL_NIS_H 1
++
++/*  This file only contains the definition of nis_server, to be
++    able to compile libtirpc without the need to have a glibc
++    with sunrpc or a libnsl already installed. */
++
++#define NIS_PK_NONE 0
++
++struct nis_attr {
++      char *zattr_ndx;
++      struct {
++              u_int zattr_val_len;
++              char *zattr_val_val;
++      } zattr_val;
++};
++typedef struct nis_attr nis_attr;
++
++typedef char *nis_name;
++
++struct endpoint {
++      char *uaddr;
++      char *family;
++      char *proto;
++};
++typedef struct endpoint endpoint;
++
++struct nis_server {
++      nis_name name;
++      struct {
++              u_int ep_len;
++              endpoint *ep_val;
++      } ep;
++      uint32_t key_type;
++      netobj pkey;
++};
++typedef struct nis_server nis_server;
++
++#endif /* ! _INTERNAL_NIS_H */
+diff --git a/src/rpc_dtablesize.c b/src/rpc_dtablesize.c
+index 13d320c..3fe503a 100644
+--- a/src/rpc_dtablesize.c
++++ b/src/rpc_dtablesize.c
+@@ -27,22 +27,14 @@
+  */
+ 
+ #include <unistd.h>
+-
+ #include <sys/select.h>
+-
+-int _rpc_dtablesize(void);    /* XXX */
++#include <rpc/clnt.h>
++#include <rpc/rpc_com.h>
+ 
+ /*
+  * Cache the result of getdtablesize(), so we don't have to do an
+  * expensive system call every time.
+  */
+-/*
+- * XXX In FreeBSD 2.x, you can have the maximum number of open file
+- * descriptors be greater than FD_SETSIZE (which us 256 by default).
+- *
+- * Since old programs tend to use this call to determine the first arg
+- * for _select(), having this return > FD_SETSIZE is a Bad Idea(TM)!
+- */
+ int
+ _rpc_dtablesize(void)
+ {
+diff --git a/src/rpc_soc.c b/src/rpc_soc.c
+index 1ec7b3f..ed0892a 100644
+--- a/src/rpc_soc.c
++++ b/src/rpc_soc.c
+@@ -61,8 +61,8 @@
+ #include <string.h>
+ #include <unistd.h>
+ #include <fcntl.h>
+-#include <rpcsvc/nis.h>
+ 
++#include "nis.h"
+ #include "rpc_com.h"
+ 
+ extern mutex_t        rpcsoc_lock;
+diff --git a/src/rtime.c b/src/rtime.c
+index c34e0af..b642840 100644
+--- a/src/rtime.c
++++ b/src/rtime.c
+@@ -46,6 +46,7 @@
+ #include <unistd.h>
+ #include <errno.h>
+ #include <sys/types.h>
++#include <sys/poll.h>
+ #include <sys/socket.h>
+ #include <sys/time.h>
+ #include <netinet/in.h>
+@@ -67,7 +68,8 @@ rtime(addrp, timep, timeout)
+       struct timeval *timeout;
+ {
+       int s;
+-      fd_set readfds;
++      struct pollfd fd;
++      int milliseconds;
+       int res;
+       unsigned long thetime;
+       struct sockaddr_in from;
+@@ -94,31 +96,32 @@ rtime(addrp, timep, timeout)
+       addrp->sin_port = serv->s_port;
+ 
+       if (type == SOCK_DGRAM) {
+-              res = sendto(s, (char *)&thetime, sizeof(thetime), 0, 
++              res = sendto(s, (char *)&thetime, sizeof(thetime), 0,
+                            (struct sockaddr *)addrp, sizeof(*addrp));
+               if (res < 0) {
+                       do_close(s);
+-                      return(-1);     
++                      return(-1);
+               }
+-              do {
+-                      FD_ZERO(&readfds);
+-                      FD_SET(s, &readfds);
+-                      res = select(_rpc_dtablesize(), &readfds,
+-                                   (fd_set *)NULL, (fd_set *)NULL, timeout);
+-              } while (res < 0 && errno == EINTR);
++
++              milliseconds = (timeout->tv_sec * 1000) + (timeout->tv_usec / 
1000);
++              fd.fd = s;
++              fd.events = POLLIN;
++              do
++                res = poll (&fd, 1, milliseconds);
++              while (res < 0 && errno == EINTR);
+               if (res <= 0) {
+                       if (res == 0) {
+                               errno = ETIMEDOUT;
+                       }
+                       do_close(s);
+-                      return(-1);     
++                      return(-1);
+               }
+               fromlen = sizeof(from);
+-              res = recvfrom(s, (char *)&thetime, sizeof(thetime), 0, 
++              res = recvfrom(s, (char *)&thetime, sizeof(thetime), 0,
+                              (struct sockaddr *)&from, &fromlen);
+               do_close(s);
+               if (res < 0) {
+-                      return(-1);     
++                      return(-1);
+               }
+       } else {
+               if (connect(s, (struct sockaddr *)addrp, sizeof(*addrp)) < 0) {
+diff --git a/src/svc.c b/src/svc.c
+index 9c41445..b59467b 100644
+--- a/src/svc.c
++++ b/src/svc.c
+@@ -99,7 +99,7 @@ xprt_register (xprt)
+     {
+       __svc_xports = (SVCXPRT **) calloc (_rpc_dtablesize(), sizeof (SVCXPRT 
*));
+       if (__svc_xports == NULL)
+-      return;
++            goto unlock;
+     }
+   if (sock < _rpc_dtablesize())
+     {
+@@ -120,14 +120,14 @@ xprt_register (xprt)
+             svc_pollfd[i].fd = sock;
+             svc_pollfd[i].events = (POLLIN | POLLPRI |
+                                     POLLRDNORM | POLLRDBAND);
+-            return;
++            goto unlock;
+           }
+ 
+       new_svc_pollfd = (struct pollfd *) realloc (svc_pollfd,
+                                                   sizeof (struct pollfd)
+                                                   * (svc_max_pollfd + 1));
+       if (new_svc_pollfd == NULL) /* Out of memory */
+-        return;
++        goto unlock;
+       svc_pollfd = new_svc_pollfd;
+       ++svc_max_pollfd;
+ 
+@@ -135,6 +135,7 @@ xprt_register (xprt)
+       svc_pollfd[svc_max_pollfd - 1].events = (POLLIN | POLLPRI |
+                                                POLLRDNORM | POLLRDBAND);
+     }
++unlock:
+   rwlock_unlock (&svc_fd_lock);
+ }
+ 
+diff --git a/src/svc_auth_des.c b/src/svc_auth_des.c
+index 5bc264c..2e90146 100644
+--- a/src/svc_auth_des.c
++++ b/src/svc_auth_des.c
+@@ -86,13 +86,13 @@ static struct cache_entry *authdes_cache/* 
[AUTHDES_CACHESZ] */;
+ static short *authdes_lru/* [AUTHDES_CACHESZ] */;
+ 
+ static void cache_init();     /* initialize the cache */
+-static short cache_spot();    /* find an entry in the cache */
+-static void cache_ref(/*short sid*/); /* note that sid was ref'd */
++static short cache_spot(des_block *key, char *name, struct timeval 
*timestamp);  /* find an entry in the cache */
++static void cache_ref(short sid);     /* note that sid was ref'd */
+ 
+-static void invalidate();     /* invalidate entry in cache */
++static void invalidate(char *cred);   /* invalidate entry in cache */
+ 
+ /*
+- * cache statistics 
++ * cache statistics
+  */
+ static struct {
+       u_long ncachehits;      /* times cache hit, and is not replay */
+diff --git a/src/svc_auth_gss.c b/src/svc_auth_gss.c
+index b6aa407..bece46a 100644
+--- a/src/svc_auth_gss.c
++++ b/src/svc_auth_gss.c
+@@ -129,6 +129,8 @@ struct svc_rpc_gss_data {
+       ((struct svc_rpc_gss_data *)(auth)->svc_ah_private)
+ 
+ /* Global server credentials. */
++static u_int          _svcauth_req_time = 0;
++static gss_OID_set_desc       _svcauth_oid_set = {1, GSS_C_NULL_OID };
+ static gss_cred_id_t  _svcauth_gss_creds;
+ static gss_name_t     _svcauth_gss_name = GSS_C_NO_NAME;
+ static char *         _svcauth_svc_name = NULL;
+@@ -167,6 +169,7 @@ svcauth_gss_import_name(char *service)
+       gss_name_t      name;
+       gss_buffer_desc namebuf;
+       OM_uint32       maj_stat, min_stat;
++      bool_t          result;
+ 
+       gss_log_debug("in svcauth_gss_import_name()");
+ 
+@@ -181,22 +184,21 @@ svcauth_gss_import_name(char *service)
+                       maj_stat, min_stat);
+               return (FALSE);
+       }
+-      if (svcauth_gss_set_svc_name(name) != TRUE) {
+-              gss_release_name(&min_stat, &name);
+-              return (FALSE);
+-      }
+-      return (TRUE);
++      result = svcauth_gss_set_svc_name(name);
++      gss_release_name(&min_stat, &name);
++      return result;
+ }
+ 
+ static bool_t
+-svcauth_gss_acquire_cred(u_int req_time, gss_OID_set_desc *oid_set)
++svcauth_gss_acquire_cred(void)
+ {
+       OM_uint32       maj_stat, min_stat;
+ 
+       gss_log_debug("in svcauth_gss_acquire_cred()");
+ 
+-      maj_stat = gss_acquire_cred(&min_stat, _svcauth_gss_name, req_time,
+-                                  oid_set, GSS_C_ACCEPT,
++      maj_stat = gss_acquire_cred(&min_stat, _svcauth_gss_name,
++                                  _svcauth_req_time, &_svcauth_oid_set,
++                                  GSS_C_ACCEPT,
+                                   &_svcauth_gss_creds, NULL, NULL);
+ 
+       if (maj_stat != GSS_S_COMPLETE) {
+@@ -300,6 +302,8 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
+                                             NULL,
+                                             &gd->deleg);
+ 
++      xdr_free((xdrproc_t)xdr_rpc_gss_init_args, (caddr_t)&recv_tok);
++
+       if (gr->gr_major != GSS_S_COMPLETE &&
+           gr->gr_major != GSS_S_CONTINUE_NEEDED) {
+               gss_log_status("svcauth_gss_accept_sec_context: 
accept_sec_context",
+@@ -352,8 +356,11 @@ svcauth_gss_accept_sec_context(struct svc_req *rqst,
+                       return (FALSE);
+ 
+               rqst->rq_xprt->xp_verf.oa_flavor = RPCSEC_GSS;
+-              rqst->rq_xprt->xp_verf.oa_base = checksum.value;
++              memcpy(rqst->rq_xprt->xp_verf.oa_base, checksum.value,
++                      checksum.length);
+               rqst->rq_xprt->xp_verf.oa_length = checksum.length;
++
++              gss_release_buffer(&min_stat, &checksum);
+       }
+       return (TRUE);
+ }
+@@ -435,10 +442,13 @@ svcauth_gss_nextverf(struct svc_req *rqst, u_int num)
+                       maj_stat, min_stat);
+               return (FALSE);
+       }
++
+       rqst->rq_xprt->xp_verf.oa_flavor = RPCSEC_GSS;
+-      rqst->rq_xprt->xp_verf.oa_base = (caddr_t)checksum.value;
++      memcpy(rqst->rq_xprt->xp_verf.oa_base, checksum.value, checksum.length);
+       rqst->rq_xprt->xp_verf.oa_length = (u_int)checksum.length;
+ 
++      gss_release_buffer(&min_stat, &checksum);
++
+       return (TRUE);
+ }
+ 
+@@ -568,6 +578,8 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+       gss_qop_t                qop;
+       struct svcauth_gss_cache_entry **ce;
+       time_t                   now;
++      enum auth_stat           result = AUTH_OK;
++      OM_uint32                min_stat;
+ 
+       gss_log_debug("in svcauth_gss()");
+ 
+@@ -621,19 +633,25 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+       XDR_DESTROY(&xdrs);
+ 
+       /* Check version. */
+-      if (gc->gc_v != RPCSEC_GSS_VERSION)
+-              return (AUTH_BADCRED);
++      if (gc->gc_v != RPCSEC_GSS_VERSION) {
++              result = AUTH_BADCRED;
++              goto out;
++      }
+ 
+       /* Check RPCSEC_GSS service. */
+       if (gc->gc_svc != RPCSEC_GSS_SVC_NONE &&
+           gc->gc_svc != RPCSEC_GSS_SVC_INTEGRITY &&
+-          gc->gc_svc != RPCSEC_GSS_SVC_PRIVACY)
+-              return (AUTH_BADCRED);
++          gc->gc_svc != RPCSEC_GSS_SVC_PRIVACY) {
++              result = AUTH_BADCRED;
++              goto out;
++      }
+ 
+       /* Check sequence number. */
+       if (gd->established) {
+-              if (gc->gc_seq > MAXSEQ)
+-                      return (RPCSEC_GSS_CTXPROBLEM);
++              if (gc->gc_seq > MAXSEQ) {
++                      result = RPCSEC_GSS_CTXPROBLEM;
++                      goto out;
++              }
+ 
+               if ((offset = gd->seqlast - gc->gc_seq) < 0) {
+                       gd->seqlast = gc->gc_seq;
+@@ -643,7 +661,8 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+               }
+               else if (offset >= gd->win || (gd->seqmask & (1 << offset))) {
+                       *no_dispatch = 1;
+-                      return (RPCSEC_GSS_CTXPROBLEM);
++                      result = RPCSEC_GSS_CTXPROBLEM;
++                      goto out;
+               }
+               gd->seq = gc->gc_seq;
+               gd->seqmask |= (1 << offset);
+@@ -654,35 +673,52 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+               rqst->rq_svcname = (char *)gd->ctx;
+       }
+ 
++      rqst->rq_xprt->xp_verf.oa_base = msg->rm_call.cb_verf.oa_base;
++
+       /* Handle RPCSEC_GSS control procedure. */
+       switch (gc->gc_proc) {
+ 
+       case RPCSEC_GSS_INIT:
+       case RPCSEC_GSS_CONTINUE_INIT:
+-              if (rqst->rq_proc != NULLPROC)
+-                      return (AUTH_FAILED);           /* XXX ? */
++              if (rqst->rq_proc != NULLPROC) {
++                      result = AUTH_FAILED;           /* XXX ? */
++                      break;
++              }
+ 
+               if (_svcauth_gss_name == GSS_C_NO_NAME) {
+-                      if (!svcauth_gss_import_name("nfs"))
+-                              return (AUTH_FAILED);
++                      if (!svcauth_gss_import_name("nfs")) {
++                              result = AUTH_FAILED;
++                              break;
++                      }
+               }
+ 
+-              if (!svcauth_gss_acquire_cred(0, GSS_C_NULL_OID_SET))
+-                      return (AUTH_FAILED);
++              if (!svcauth_gss_acquire_cred()) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+-              if (!svcauth_gss_accept_sec_context(rqst, &gr))
+-                      return (AUTH_REJECTEDCRED);
++              if (!svcauth_gss_accept_sec_context(rqst, &gr)) {
++                      result = AUTH_REJECTEDCRED;
++                      break;
++              }
+ 
+-              if (!svcauth_gss_nextverf(rqst, htonl(gr.gr_win)))
+-                      return (AUTH_FAILED);
++              if (!svcauth_gss_nextverf(rqst, htonl(gr.gr_win))) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+               *no_dispatch = TRUE;
+ 
+               call_stat = svc_sendreply(rqst->rq_xprt, 
+                       (xdrproc_t)xdr_rpc_gss_init_res, (caddr_t)&gr);
+ 
+-              if (!call_stat)
+-                      return (AUTH_FAILED);
++              gss_release_buffer(&min_stat, &gr.gr_token);
++              free(gr.gr_ctx.value);
++
++              if (!call_stat) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+               if (gr.gr_major == GSS_S_COMPLETE)
+                       gd->established = TRUE;
+@@ -690,27 +726,37 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+               break;
+ 
+       case RPCSEC_GSS_DATA:
+-              if (!svcauth_gss_validate(gd, msg, &qop))
+-                      return (RPCSEC_GSS_CREDPROBLEM);
++              if (!svcauth_gss_validate(gd, msg, &qop)) {
++                      result = RPCSEC_GSS_CREDPROBLEM;
++                      break;
++              }
+ 
+-              if (!svcauth_gss_nextverf(rqst, htonl(gc->gc_seq)))
+-                      return (AUTH_FAILED);
++              if (!svcauth_gss_nextverf(rqst, htonl(gc->gc_seq))) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+               if (!gd->callback_done) {
+                       gd->callback_done = TRUE;
+                       gd->sec.qop = qop;
+                       (void)rpc_gss_num_to_qop(gd->rcred.mechanism,
+                                               gd->sec.qop, &gd->rcred.qop);
+-                      if (!svcauth_gss_callback(rqst, gd))
+-                              return (AUTH_REJECTEDCRED);
++                      if (!svcauth_gss_callback(rqst, gd)) {
++                              result = AUTH_REJECTEDCRED;
++                              break;
++                      }
+               }
+ 
+               if (gd->locked) {
+                       if (gd->rcred.service !=
+-                                      _rpc_gss_svc_to_service(gc->gc_svc))
+-                              return (AUTH_FAILED);
+-                      if (gd->sec.qop != qop)
+-                              return (AUTH_BADVERF);
++                                      _rpc_gss_svc_to_service(gc->gc_svc)) {
++                              result = AUTH_FAILED;
++                              break;
++                      }
++                      if (gd->sec.qop != qop) {
++                              result = AUTH_BADVERF;
++                              break;
++                      }
+               }
+ 
+               if (gd->sec.qop != qop) {
+@@ -724,17 +770,25 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+               break;
+ 
+       case RPCSEC_GSS_DESTROY:
+-              if (rqst->rq_proc != NULLPROC)
+-                      return (AUTH_FAILED);           /* XXX ? */
++              if (rqst->rq_proc != NULLPROC) {
++                      result = AUTH_FAILED;           /* XXX ? */
++                      break;
++              }
+ 
+-              if (!svcauth_gss_validate(gd, msg, &qop))
+-                      return (RPCSEC_GSS_CREDPROBLEM);
++              if (!svcauth_gss_validate(gd, msg, &qop)) {
++                      result = RPCSEC_GSS_CREDPROBLEM;
++                      break;
++              }
+ 
+-              if (!svcauth_gss_nextverf(rqst, htonl(gc->gc_seq)))
+-                      return (AUTH_FAILED);
++              if (!svcauth_gss_nextverf(rqst, htonl(gc->gc_seq))) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+-              if (!svcauth_gss_release_cred())
+-                      return (AUTH_FAILED);
++              if (!svcauth_gss_release_cred()) {
++                      result = AUTH_FAILED;
++                      break;
++              }
+ 
+               SVCAUTH_DESTROY(&SVC_XP_AUTH(rqst->rq_xprt));
+               SVC_XP_AUTH(rqst->rq_xprt).svc_ah_ops = 
svc_auth_none.svc_ah_ops;
+@@ -743,10 +797,12 @@ _svcauth_gss(struct svc_req *rqst, struct rpc_msg *msg, 
bool_t *no_dispatch)
+               break;
+ 
+       default:
+-              return (AUTH_REJECTEDCRED);
++              result = AUTH_REJECTEDCRED;
+               break;
+       }
+-      return (AUTH_OK);
++out:
++      xdr_free((xdrproc_t)xdr_rpc_gss_cred, (caddr_t)gc);
++      return result;
+ }
+ 
+ static bool_t
+@@ -890,7 +946,6 @@ bool_t
+ rpc_gss_set_svc_name(char *principal, char *mechanism, u_int req_time,
+               u_int UNUSED(program), u_int UNUSED(version))
+ {
+-      gss_OID_set_desc oid_set;
+       rpc_gss_OID oid;
+       char *save;
+ 
+@@ -902,14 +957,13 @@ rpc_gss_set_svc_name(char *principal, char *mechanism, 
u_int req_time,
+ 
+       if (!rpc_gss_mech_to_oid(mechanism, &oid))
+               goto out_err;
+-      oid_set.count = 1;
+-      oid_set.elements = (gss_OID)oid;
+ 
+       if (!svcauth_gss_import_name(principal))
+               goto out_err;
+-      if (!svcauth_gss_acquire_cred(req_time, &oid_set))
+-              goto out_err;
+ 
++      _svcauth_req_time = req_time;
++      _svcauth_oid_set.count = 1;
++      _svcauth_oid_set.elements = (gss_OID)oid;
+       free(_svcauth_svc_name);
+       _svcauth_svc_name = save;
+       return TRUE;
+diff --git a/src/svc_vc.c b/src/svc_vc.c
+index 6ae613d..97a76a3 100644
+--- a/src/svc_vc.c
++++ b/src/svc_vc.c
+@@ -270,14 +270,8 @@ makefd_xprt(fd, sendsize, recvsize)
+       struct cf_conn *cd;
+       const char *netid;
+       struct __rpc_sockinfo si;
+- 
+-      assert(fd != -1);
+ 
+-        if (fd >= FD_SETSIZE) {
+-                warnx("svc_vc: makefd_xprt: fd too high\n");
+-                xprt = NULL;
+-                goto done;
+-        }
++      assert(fd != -1);
+ 
+       xprt = mem_alloc(sizeof(SVCXPRT));
+       if (xprt == NULL) {
+@@ -338,22 +332,10 @@ rendezvous_request(xprt, msg)
+       r = (struct cf_rendezvous *)xprt->xp_p1;
+ again:
+       len = sizeof addr;
+-      if ((sock = accept(xprt->xp_fd, (struct sockaddr *)(void *)&addr,
+-          &len)) < 0) {
++      sock = accept(xprt->xp_fd, (struct sockaddr *)(void *)&addr, &len);
++      if (sock < 0) {
+               if (errno == EINTR)
+                       goto again;
+-
+-              if (errno == EMFILE || errno == ENFILE) {
+-                /* If there are no file descriptors available, then accept 
will fail.
+-                   We want to delay here so the connection request can be 
dequeued;
+-                   otherwise we can bounce between polling and accepting, 
never
+-                   giving the request a chance to dequeue and eating an 
enormous
+-                   amount of cpu time in svc_run if we're polling on many file
+-                   descriptors.  */
+-                      struct timespec ts = { .tv_sec = 0, .tv_nsec = 50000000 
};
+-                        nanosleep (&ts, NULL);
+-                      goto again;
+-              }
+               return (FALSE);
+       }
+       /*
+diff --git a/tirpc/rpc/des.h b/tirpc/rpc/des.h
+index d2881ad..018aa48 100644
+--- a/tirpc/rpc/des.h
++++ b/tirpc/rpc/des.h
+@@ -82,6 +82,6 @@ struct desparams {
+ /*
+  * Software DES.
+  */
+-extern int _des_crypt( char *, int, struct desparams * );
++extern int _des_crypt( char *, unsigned, struct desparams * );
+ 
+ #endif
+diff --git a/tirpc/rpc/rpcent.h b/tirpc/rpc/rpcent.h
+index 147f909..e07503c 100644
+--- a/tirpc/rpc/rpcent.h
++++ b/tirpc/rpc/rpcent.h
+@@ -60,10 +60,11 @@ struct rpcent {
+ extern struct rpcent *getrpcbyname(const char *);
+ extern struct rpcent *getrpcbynumber(int);
+ extern struct rpcent *getrpcent(void);
+-#endif
+ 
+ extern void setrpcent(int);
+ extern void endrpcent(void);
++#endif
++
+ #ifdef __cplusplus
+ }
+ #endif

diff --git a/net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild 
b/net-libs/libtirpc/libtirpc-0.2.5.ebuild
similarity index 92%
copy from net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild
copy to net-libs/libtirpc/libtirpc-0.2.5.ebuild
index c053676..2e825c4 100644
--- a/net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild
+++ b/net-libs/libtirpc/libtirpc-0.2.5.ebuild
@@ -1,6 +1,5 @@
-# Copyright 1999-2016 Gentoo Foundation
+# Copyright 1999-2015 Gentoo Foundation
 # Distributed under the terms of the GNU General Public License v2
-# $Id$
 
 EAPI="4"
 
@@ -13,7 +12,7 @@ SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2
 
 LICENSE="GPL-2"
 SLOT="0"
-KEYWORDS="amd64 arm ~mips ppc x86"
+KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~mips ppc ppc64 s390 sh sparc x86"
 IUSE="ipv6 kerberos static-libs"
 
 RDEPEND="kerberos? ( >=virtual/krb5-0-r1[${MULTILIB_USEDEP}] )"
@@ -56,7 +55,7 @@ multilib_src_install() {
        default
 
        # libtirpc replaces rpc support in glibc, so we need it in /
-       multilib_is_native_abi && gen_usr_ldscript -a tirpc
+       gen_usr_ldscript -a tirpc
 }
 
 multilib_src_install_all() {

diff --git a/net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild 
b/net-libs/libtirpc/libtirpc-1.0.1.ebuild
similarity index 58%
rename from net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild
rename to net-libs/libtirpc/libtirpc-1.0.1.ebuild
index c053676..ea2fc47 100644
--- a/net-libs/libtirpc/libtirpc-0.2.5-r99.ebuild
+++ b/net-libs/libtirpc/libtirpc-1.0.1.ebuild
@@ -1,10 +1,9 @@
-# Copyright 1999-2016 Gentoo Foundation
+# Copyright 1999-2017 Gentoo Foundation
 # Distributed under the terms of the GNU General Public License v2
-# $Id$
 
-EAPI="4"
+EAPI="5"
 
-inherit multilib-minimal toolchain-funcs autotools
+inherit multilib-minimal toolchain-funcs
 
 DESCRIPTION="Transport Independent RPC library (SunRPC replacement)"
 HOMEPAGE="http://libtirpc.sourceforge.net/";
@@ -12,19 +11,14 @@ SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2
        mirror://gentoo/${PN}-glibc-nfs.tar.xz"
 
 LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 arm ~mips ppc x86"
+SLOT="0/3" # subslot matches SONAME major
+KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 ~s390 ~sh sparc x86"
 IUSE="ipv6 kerberos static-libs"
 
 RDEPEND="kerberos? ( >=virtual/krb5-0-r1[${MULTILIB_USEDEP}] )"
 DEPEND="${RDEPEND}
        app-arch/xz-utils
        >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}]"
-RDEPEND="${RDEPEND}
-       abi_x86_32? (
-               !<=app-emulation/emul-linux-x86-baselibs-20140508-r7
-               !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)]
-       )"
 
 src_unpack() {
        unpack ${A}
@@ -32,16 +26,9 @@ src_unpack() {
 }
 
 src_prepare() {
-       epatch "${FILESDIR}"/${P}-stdarg.patch
-       epatch 
"${FILESDIR}"/0001-Provide-getrpcbynumber-and-getrpcbyname-if-those-are.patch
-       epatch "${FILESDIR}"/0002-Misc-header-fixes.patch
-       epatch "${FILESDIR}"/0003-fix_cdefs_h_include.patch
-       epatch "${FILESDIR}"/0004-fix_DECLS.patch
-       epatch "${FILESDIR}"/0005-fix_remaining_issues.patch
-       epatch "${FILESDIR}"/0006-fix_queue_h_include.patch
-       epatch "${FILESDIR}"/0007-no-des.patch
-       eautoconf
-       eautoreconf
+       default
+       # Musl fixes
+       epatch "${FILESDIR}"/git.patch
 }
 
 multilib_src_configure() {
@@ -56,7 +43,7 @@ multilib_src_install() {
        default
 
        # libtirpc replaces rpc support in glibc, so we need it in /
-       multilib_is_native_abi && gen_usr_ldscript -a tirpc
+       gen_usr_ldscript -a tirpc
 }
 
 multilib_src_install_all() {

Reply via email to