* [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k)
@ 2022-01-02 21:04 Giulio Benetti
2022-01-02 21:04 ` [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464 Giulio Benetti
2022-01-07 18:16 ` [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Thomas Petazzoni
0 siblings, 2 replies; 4+ messages in thread
From: Giulio Benetti @ 2022-01-02 21:04 UTC (permalink / raw)
To: buildroot
Cc: Maxim Kochetkov, Giulio Benetti, Romain Naour, Thomas Petazzoni,
Thomas De Schampheleire
After fixing binutils bug 21464, bug 28735 showed up. It got fixed very
soon after my request:
https://sourceware.org/pipermail/binutils/2022-January/119078.html
So let's add patch and backported patches to all binutils versions to make
Buildroot free from bug 28735. Unfortunately Bootlin toolchains have just
been rebuilt and will fail for this bug. This happened because libgeos
has been bumped few time ago and was masked by bug 21464 dependency that
prevented to build.
Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
---
...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
4 files changed, 300 insertions(+)
create mode 100644 package/binutils/2.32/0016-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
create mode 100644 package/binutils/2.35.2/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
create mode 100644 package/binutils/2.36.1/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
create mode 100644 package/binutils/2.37/0005-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
diff --git a/package/binutils/2.32/0016-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch b/package/binutils/2.32/0016-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
new file mode 100644
index 0000000000..7e92e2bfd8
--- /dev/null
+++ b/package/binutils/2.32/0016-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
@@ -0,0 +1,75 @@
+From 51def3dc6a168d03d28e0d4e2935d9ddb2929192 Mon Sep 17 00:00:00 2001
+From: Stafford Horne <shorne@gmail.com>
+Date: Sun, 2 Jan 2022 09:03:28 +0900
+Subject: [PATCH] or1k: Avoid R_OR1K_GOT16 signed overflow by using special
+ howto
+
+Previously when fixing PR 21464 we masked out upper bits of the
+relocation value in order to avoid overflow complaints when acceptable.
+It turns out this does not work when the relocation value ends up being
+signed.
+
+To fix this this patch introduces a special howto with
+complain_on_overflow set to complain_overflow_dont. This is used in
+place of the normal R_OR1K_GOT16 howto when we detect R_OR1K_GOT_AHI16
+relocations.
+
+bfd/ChangeLog:
+
+ PR 28735
+ * elf32-or1k.c (or1k_elf_got16_no_overflow_howto): Define.
+ (or1k_elf_relocate_section): Use new howto instead of trying to
+ mask out relocation bits.
+
+Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
+---
+ bfd/elf32-or1k.c | 24 ++++++++++++++++++++----
+ 1 file changed, 20 insertions(+), 4 deletions(-)
+
+diff --git a/bfd/elf32-or1k.c b/bfd/elf32-or1k.c
+index cfa292f0032..ecb70753b6a 100644
+--- a/bfd/elf32-or1k.c
++++ b/bfd/elf32-or1k.c
+@@ -828,6 +828,23 @@ static reloc_howto_type or1k_elf_howto_table[] =
+ FALSE), /* pcrel_offset */
+ };
+
++/* A copy of the R_OR1K_GOT16 used in the presense of R_OR1K_GOT_AHI16
++ relocations when we know we can ignore overflows. */
++static reloc_howto_type or1k_elf_got16_no_overflow_howto =
++ HOWTO (R_OR1K_GOT16, /* type */
++ 0, /* rightshift */
++ 2, /* size (0 = byte, 1 = short, 2 = long) */
++ 16, /* bitsize */
++ FALSE, /* pc_relative */
++ 0, /* bitpos */
++ complain_overflow_dont, /* complain_on_overflow */
++ bfd_elf_generic_reloc, /* special_function */
++ "R_OR1K_GOT16", /* name */
++ FALSE, /* partial_inplace */
++ 0, /* src_mask */
++ 0xffff, /* dst_mask */
++ FALSE); /* pcrel_offset */
++
+ /* Map BFD reloc types to Or1k ELF reloc types. */
+
+ struct or1k_reloc_map
+@@ -1477,12 +1494,11 @@ or1k_elf_relocate_section (bfd *output_bfd,
+ if (r_type == R_OR1K_GOT_AHI16)
+ saw_gotha = TRUE;
+
+- /* If we have a R_OR1K_GOT16 followed by a R_OR1K_GOT_AHI16
++ /* If we have a R_OR1K_GOT16 following a R_OR1K_GOT_AHI16
+ relocation we assume the code is doing the right thing to avoid
+- overflows. Here we mask the lower 16-bit of the relocation to
+- avoid overflow validation failures. */
++ overflows. */
+ if (r_type == R_OR1K_GOT16 && saw_gotha)
+- relocation &= 0xffff;
++ howto = &or1k_elf_got16_no_overflow_howto;
+
+ /* Addend should be zero. */
+ if (rel->r_addend != 0)
+--
+2.25.1
+
diff --git a/package/binutils/2.35.2/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch b/package/binutils/2.35.2/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
new file mode 100644
index 0000000000..e96d49122a
--- /dev/null
+++ b/package/binutils/2.35.2/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
@@ -0,0 +1,75 @@
+From fbab8933bca6b7dba2aa19190a71f799a370c3d4 Mon Sep 17 00:00:00 2001
+From: Stafford Horne <shorne@gmail.com>
+Date: Sun, 2 Jan 2022 09:03:28 +0900
+Subject: [PATCH] or1k: Avoid R_OR1K_GOT16 signed overflow by using special
+ howto
+
+Previously when fixing PR 21464 we masked out upper bits of the
+relocation value in order to avoid overflow complaints when acceptable.
+It turns out this does not work when the relocation value ends up being
+signed.
+
+To fix this this patch introduces a special howto with
+complain_on_overflow set to complain_overflow_dont. This is used in
+place of the normal R_OR1K_GOT16 howto when we detect R_OR1K_GOT_AHI16
+relocations.
+
+bfd/ChangeLog:
+
+ PR 28735
+ * elf32-or1k.c (or1k_elf_got16_no_overflow_howto): Define.
+ (or1k_elf_relocate_section): Use new howto instead of trying to
+ mask out relocation bits.
+
+Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
+---
+ bfd/elf32-or1k.c | 24 ++++++++++++++++++++----
+ 1 file changed, 20 insertions(+), 4 deletions(-)
+
+diff --git a/bfd/elf32-or1k.c b/bfd/elf32-or1k.c
+index 2ff998066a8..3df31172fcb 100644
+--- a/bfd/elf32-or1k.c
++++ b/bfd/elf32-or1k.c
+@@ -828,6 +828,23 @@ static reloc_howto_type or1k_elf_howto_table[] =
+ FALSE), /* pcrel_offset */
+ };
+
++/* A copy of the R_OR1K_GOT16 used in the presense of R_OR1K_GOT_AHI16
++ relocations when we know we can ignore overflows. */
++static reloc_howto_type or1k_elf_got16_no_overflow_howto =
++ HOWTO (R_OR1K_GOT16, /* type */
++ 0, /* rightshift */
++ 2, /* size (0 = byte, 1 = short, 2 = long) */
++ 16, /* bitsize */
++ FALSE, /* pc_relative */
++ 0, /* bitpos */
++ complain_overflow_dont, /* complain_on_overflow */
++ bfd_elf_generic_reloc, /* special_function */
++ "R_OR1K_GOT16", /* name */
++ FALSE, /* partial_inplace */
++ 0, /* src_mask */
++ 0xffff, /* dst_mask */
++ FALSE); /* pcrel_offset */
++
+ /* Map BFD reloc types to Or1k ELF reloc types. */
+
+ struct or1k_reloc_map
+@@ -1508,12 +1525,11 @@ or1k_elf_relocate_section (bfd *output_bfd,
+ if (r_type == R_OR1K_GOT_AHI16)
+ saw_gotha = TRUE;
+
+- /* If we have a R_OR1K_GOT16 followed by a R_OR1K_GOT_AHI16
++ /* If we have a R_OR1K_GOT16 following a R_OR1K_GOT_AHI16
+ relocation we assume the code is doing the right thing to avoid
+- overflows. Here we mask the lower 16-bit of the relocation to
+- avoid overflow validation failures. */
++ overflows. */
+ if (r_type == R_OR1K_GOT16 && saw_gotha)
+- relocation &= 0xffff;
++ howto = &or1k_elf_got16_no_overflow_howto;
+
+ /* Addend should be zero. */
+ if (rel->r_addend != 0)
+--
+2.25.1
+
diff --git a/package/binutils/2.36.1/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch b/package/binutils/2.36.1/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
new file mode 100644
index 0000000000..c4fedb719a
--- /dev/null
+++ b/package/binutils/2.36.1/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
@@ -0,0 +1,75 @@
+From 190091f9c1ec4cb80f8106e45ab4125eefa4114b Mon Sep 17 00:00:00 2001
+From: Stafford Horne <shorne@gmail.com>
+Date: Sun, 2 Jan 2022 09:03:28 +0900
+Subject: [PATCH] or1k: Avoid R_OR1K_GOT16 signed overflow by using special
+ howto
+
+Previously when fixing PR 21464 we masked out upper bits of the
+relocation value in order to avoid overflow complaints when acceptable.
+It turns out this does not work when the relocation value ends up being
+signed.
+
+To fix this this patch introduces a special howto with
+complain_on_overflow set to complain_overflow_dont. This is used in
+place of the normal R_OR1K_GOT16 howto when we detect R_OR1K_GOT_AHI16
+relocations.
+
+bfd/ChangeLog:
+
+ PR 28735
+ * elf32-or1k.c (or1k_elf_got16_no_overflow_howto): Define.
+ (or1k_elf_relocate_section): Use new howto instead of trying to
+ mask out relocation bits.
+
+Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
+---
+ bfd/elf32-or1k.c | 24 ++++++++++++++++++++----
+ 1 file changed, 20 insertions(+), 4 deletions(-)
+
+diff --git a/bfd/elf32-or1k.c b/bfd/elf32-or1k.c
+index 431a8ee479f..ea26cdf1033 100644
+--- a/bfd/elf32-or1k.c
++++ b/bfd/elf32-or1k.c
+@@ -828,6 +828,23 @@ static reloc_howto_type or1k_elf_howto_table[] =
+ FALSE), /* pcrel_offset */
+ };
+
++/* A copy of the R_OR1K_GOT16 used in the presense of R_OR1K_GOT_AHI16
++ relocations when we know we can ignore overflows. */
++static reloc_howto_type or1k_elf_got16_no_overflow_howto =
++ HOWTO (R_OR1K_GOT16, /* type */
++ 0, /* rightshift */
++ 2, /* size (0 = byte, 1 = short, 2 = long) */
++ 16, /* bitsize */
++ FALSE, /* pc_relative */
++ 0, /* bitpos */
++ complain_overflow_dont, /* complain_on_overflow */
++ bfd_elf_generic_reloc, /* special_function */
++ "R_OR1K_GOT16", /* name */
++ FALSE, /* partial_inplace */
++ 0, /* src_mask */
++ 0xffff, /* dst_mask */
++ FALSE); /* pcrel_offset */
++
+ /* Map BFD reloc types to Or1k ELF reloc types. */
+
+ struct or1k_reloc_map
+@@ -1506,12 +1523,11 @@ or1k_elf_relocate_section (bfd *output_bfd,
+ if (r_type == R_OR1K_GOT_AHI16)
+ saw_gotha = TRUE;
+
+- /* If we have a R_OR1K_GOT16 followed by a R_OR1K_GOT_AHI16
++ /* If we have a R_OR1K_GOT16 following a R_OR1K_GOT_AHI16
+ relocation we assume the code is doing the right thing to avoid
+- overflows. Here we mask the lower 16-bit of the relocation to
+- avoid overflow validation failures. */
++ overflows. */
+ if (r_type == R_OR1K_GOT16 && saw_gotha)
+- relocation &= 0xffff;
++ howto = &or1k_elf_got16_no_overflow_howto;
+
+ /* Addend should be zero. */
+ if (rel->r_addend != 0)
+--
+2.25.1
+
diff --git a/package/binutils/2.37/0005-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch b/package/binutils/2.37/0005-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
new file mode 100644
index 0000000000..8609db95b7
--- /dev/null
+++ b/package/binutils/2.37/0005-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
@@ -0,0 +1,75 @@
+From 362a20108782b87cd780a989c0dbd014fc2def8b Mon Sep 17 00:00:00 2001
+From: Stafford Horne <shorne@gmail.com>
+Date: Sun, 2 Jan 2022 09:03:28 +0900
+Subject: [PATCH] or1k: Avoid R_OR1K_GOT16 signed overflow by using special
+ howto
+
+Previously when fixing PR 21464 we masked out upper bits of the
+relocation value in order to avoid overflow complaints when acceptable.
+It turns out this does not work when the relocation value ends up being
+signed.
+
+To fix this this patch introduces a special howto with
+complain_on_overflow set to complain_overflow_dont. This is used in
+place of the normal R_OR1K_GOT16 howto when we detect R_OR1K_GOT_AHI16
+relocations.
+
+bfd/ChangeLog:
+
+ PR 28735
+ * elf32-or1k.c (or1k_elf_got16_no_overflow_howto): Define.
+ (or1k_elf_relocate_section): Use new howto instead of trying to
+ mask out relocation bits.
+
+Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
+---
+ bfd/elf32-or1k.c | 24 ++++++++++++++++++++----
+ 1 file changed, 20 insertions(+), 4 deletions(-)
+
+diff --git a/bfd/elf32-or1k.c b/bfd/elf32-or1k.c
+index 4ae7f324d33..7fd88d72442 100644
+--- a/bfd/elf32-or1k.c
++++ b/bfd/elf32-or1k.c
+@@ -828,6 +828,23 @@ static reloc_howto_type or1k_elf_howto_table[] =
+ false), /* pcrel_offset */
+ };
+
++/* A copy of the R_OR1K_GOT16 used in the presense of R_OR1K_GOT_AHI16
++ relocations when we know we can ignore overflows. */
++static reloc_howto_type or1k_elf_got16_no_overflow_howto =
++ HOWTO (R_OR1K_GOT16, /* type */
++ 0, /* rightshift */
++ 2, /* size (0 = byte, 1 = short, 2 = long) */
++ 16, /* bitsize */
++ false, /* pc_relative */
++ 0, /* bitpos */
++ complain_overflow_dont, /* complain_on_overflow */
++ bfd_elf_generic_reloc, /* special_function */
++ "R_OR1K_GOT16", /* name */
++ false, /* partial_inplace */
++ 0, /* src_mask */
++ 0xffff, /* dst_mask */
++ false); /* pcrel_offset */
++
+ /* Map BFD reloc types to Or1k ELF reloc types. */
+
+ struct or1k_reloc_map
+@@ -1506,12 +1523,11 @@ or1k_elf_relocate_section (bfd *output_bfd,
+ if (r_type == R_OR1K_GOT_AHI16)
+ saw_gotha = true;
+
+- /* If we have a R_OR1K_GOT16 followed by a R_OR1K_GOT_AHI16
++ /* If we have a R_OR1K_GOT16 following a R_OR1K_GOT_AHI16
+ relocation we assume the code is doing the right thing to avoid
+- overflows. Here we mask the lower 16-bit of the relocation to
+- avoid overflow validation failures. */
++ overflows. */
+ if (r_type == R_OR1K_GOT16 && saw_gotha)
+- relocation &= 0xffff;
++ howto = &or1k_elf_got16_no_overflow_howto;
+
+ /* Addend should be zero. */
+ if (rel->r_addend != 0)
+--
+2.25.1
+
--
2.25.1
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 4+ messages in thread
* [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464
2022-01-02 21:04 [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Giulio Benetti
@ 2022-01-02 21:04 ` Giulio Benetti
2022-01-03 4:33 ` Maxim Kochetkov via buildroot
2022-01-07 18:16 ` [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Thomas Petazzoni
1 sibling, 1 reply; 4+ messages in thread
From: Giulio Benetti @ 2022-01-02 21:04 UTC (permalink / raw)
To: buildroot
Cc: Maxim Kochetkov, Giulio Benetti, Romain Naour, Thomas Petazzoni,
Thomas De Schampheleire
Binutils bug 21464 is not present anymore in Buildroot so let's remove it
and its depends on in libgeos and postgis packages.
Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
---
package/libgeos/Config.in | 4 +---
package/postgis/Config.in | 4 +---
toolchain/Config.in | 6 ------
3 files changed, 2 insertions(+), 12 deletions(-)
diff --git a/package/libgeos/Config.in b/package/libgeos/Config.in
index 5e861ab010..8411627d43 100644
--- a/package/libgeos/Config.in
+++ b/package/libgeos/Config.in
@@ -3,7 +3,6 @@ config BR2_PACKAGE_LIBGEOS
depends on BR2_INSTALL_LIBSTDCPP
depends on BR2_USE_WCHAR
depends on BR2_TOOLCHAIN_HAS_THREADS
- depends on !BR2_TOOLCHAIN_HAS_BINUTILS_BUG_21464
depends on !BR2_TOOLCHAIN_HAS_BINUTILS_BUG_27597
help
GEOS (Geometry Engine - Open Source) is a C++ port of the
@@ -14,8 +13,7 @@ config BR2_PACKAGE_LIBGEOS
https://trac.osgeo.org/geos
-comment "libgeos needs a toolchain w/ C++, wchar, threads not binutils bug 21464, 27597"
+comment "libgeos needs a toolchain w/ C++, wchar, threads not binutils bug 27597"
depends on !BR2_INSTALL_LIBSTDCPP || !BR2_USE_WCHAR || \
!BR2_TOOLCHAIN_HAS_THREADS || \
- BR2_TOOLCHAIN_HAS_BINUTILS_BUG_21464 || \
BR2_TOOLCHAIN_HAS_BINUTILS_BUG_27597
diff --git a/package/postgis/Config.in b/package/postgis/Config.in
index f4d913ece7..405c5c723a 100644
--- a/package/postgis/Config.in
+++ b/package/postgis/Config.in
@@ -5,7 +5,6 @@ config BR2_PACKAGE_POSTGIS
depends on BR2_TOOLCHAIN_GCC_AT_LEAST_4_7 # C++11, proj
depends on BR2_TOOLCHAIN_HAS_THREADS # libgeos, proj
depends on BR2_USE_WCHAR # libgeos, proj
- depends on !BR2_TOOLCHAIN_HAS_BINUTILS_BUG_21464 # libgeos
depends on !BR2_TOOLCHAIN_HAS_BINUTILS_BUG_27597 # libgeos
select BR2_PACKAGE_LIBGEOS
select BR2_PACKAGE_PROJ
@@ -19,8 +18,7 @@ config BR2_PACKAGE_POSTGIS
https://postgis.net/
-comment "postgis needs a toolchain w/ C++, threads, wchar, gcc >= 4.7, not binutils bug 21464, 27597"
+comment "postgis needs a toolchain w/ C++, threads, wchar, gcc >= 4.7, not binutils bug 27597"
depends on !BR2_INSTALL_LIBSTDCPP || !BR2_TOOLCHAIN_GCC_AT_LEAST_4_7 || \
!BR2_TOOLCHAIN_HAS_THREADS || !BR2_USE_WCHAR || \
- BR2_TOOLCHAIN_HAS_BINUTILS_BUG_21464 || \
BR2_TOOLCHAIN_HAS_BINUTILS_BUG_27597
diff --git a/toolchain/Config.in b/toolchain/Config.in
index 140d07ca38..fd005f4740 100644
--- a/toolchain/Config.in
+++ b/toolchain/Config.in
@@ -71,12 +71,6 @@ source "package/gdb/Config.in.host"
comment "Toolchain Generic Options"
-# https://sourceware.org/bugzilla/show_bug.cgi?id=21464
-# Affect toolchains built with binutils 2.31.1, still not fixed.
-config BR2_TOOLCHAIN_HAS_BINUTILS_BUG_21464
- bool
- default y if BR2_or1k
-
# https://sourceware.org/bugzilla/show_bug.cgi?id=27597
# Affect toolchains built with binutils 2.36.1, still not fixed.
config BR2_TOOLCHAIN_HAS_BINUTILS_BUG_27597
--
2.25.1
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464
2022-01-02 21:04 ` [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464 Giulio Benetti
@ 2022-01-03 4:33 ` Maxim Kochetkov via buildroot
0 siblings, 0 replies; 4+ messages in thread
From: Maxim Kochetkov via buildroot @ 2022-01-03 4:33 UTC (permalink / raw)
To: Giulio Benetti, buildroot
Cc: Romain Naour, Thomas Petazzoni, Thomas De Schampheleire
On 03.01.2022 00:04, Giulio Benetti wrote:
> Binutils bug 21464 is not present anymore in Buildroot so let's remove it
> and its depends on in libgeos and postgis packages.
>
> Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
Reviewed-by: Maxim Kochetkov <fido_max@inbox.ru>
> ---
> package/libgeos/Config.in | 4 +---
> package/postgis/Config.in | 4 +---
> toolchain/Config.in | 6 ------
> 3 files changed, 2 insertions(+), 12 deletions(-)
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k)
2022-01-02 21:04 [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Giulio Benetti
2022-01-02 21:04 ` [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464 Giulio Benetti
@ 2022-01-07 18:16 ` Thomas Petazzoni
1 sibling, 0 replies; 4+ messages in thread
From: Thomas Petazzoni @ 2022-01-07 18:16 UTC (permalink / raw)
To: Giulio Benetti
Cc: Maxim Kochetkov, Romain Naour, Thomas De Schampheleire, buildroot
On Sun, 2 Jan 2022 22:04:07 +0100
Giulio Benetti <giulio.benetti@benettiengineering.com> wrote:
> After fixing binutils bug 21464, bug 28735 showed up. It got fixed very
> soon after my request:
> https://sourceware.org/pipermail/binutils/2022-January/119078.html
>
> So let's add patch and backported patches to all binutils versions to make
> Buildroot free from bug 28735. Unfortunately Bootlin toolchains have just
> been rebuilt and will fail for this bug. This happened because libgeos
> has been bumped few time ago and was masked by bug 21464 dependency that
> prevented to build.
>
> Signed-off-by: Giulio Benetti <giulio.benetti@benettiengineering.com>
> ---
> ...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
> ...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
> ...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
> ...K_GOT16-signed-overflow-by-using-spe.patch | 75 +++++++++++++++++++
> 4 files changed, 300 insertions(+)
> create mode 100644 package/binutils/2.32/0016-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
> create mode 100644 package/binutils/2.35.2/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
> create mode 100644 package/binutils/2.36.1/0009-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
> create mode 100644 package/binutils/2.37/0005-or1k-Avoid-R_OR1K_GOT16-signed-overflow-by-using-spe.patch
Both applied, thanks!
Thomas
--
Thomas Petazzoni, CTO, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com
_______________________________________________
buildroot mailing list
buildroot@buildroot.org
https://lists.buildroot.org/mailman/listinfo/buildroot
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2022-01-07 18:16 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-01-02 21:04 [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Giulio Benetti
2022-01-02 21:04 ` [Buildroot] [PATCH 2/2] toolchain: remove binutils bug 21464 Giulio Benetti
2022-01-03 4:33 ` Maxim Kochetkov via buildroot
2022-01-07 18:16 ` [Buildroot] [PATCH 1/2] package/binutils: add patches to fix binutils bug 28735(or1k) Thomas Petazzoni
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.