get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2196628/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2196628,
    "url": "http://patchwork.ozlabs.org/api/patches/2196628/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260215163440.483386-1-bernd@kuhls.net/",
    "project": {
        "id": 27,
        "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api",
        "name": "Buildroot development",
        "link_name": "buildroot",
        "list_id": "buildroot.buildroot.org",
        "list_email": "buildroot@buildroot.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260215163440.483386-1-bernd@kuhls.net>",
    "list_archive_url": null,
    "date": "2026-02-15T16:34:37",
    "name": "[1/3] package/binutils: add support for binutils 2.46.0",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "38cc8815c739cd815957929e029f1bb14f10f428",
    "submitter": {
        "id": 86624,
        "url": "http://patchwork.ozlabs.org/api/people/86624/?format=api",
        "name": "Bernd Kuhls",
        "email": "bernd@kuhls.net"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260215163440.483386-1-bernd@kuhls.net/mbox/",
    "series": [
        {
            "id": 492226,
            "url": "http://patchwork.ozlabs.org/api/series/492226/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=492226",
            "date": "2026-02-15T16:34:38",
            "name": "[1/3] package/binutils: add support for binutils 2.46.0",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/492226/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2196628/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2196628/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<buildroot-bounces@buildroot.org>",
        "X-Original-To": [
            "incoming-buildroot@patchwork.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Delivered-To": [
            "patchwork-incoming-buildroot@legolas.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=J7PsbjXt;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=140.211.166.137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from smtp4.osuosl.org (smtp4.osuosl.org [140.211.166.137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fDWj43wqGz1xpl\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Mon, 16 Feb 2026 03:35:04 +1100 (AEDT)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id DD371408E4;\n\tSun, 15 Feb 2026 16:35:01 +0000 (UTC)",
            "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id CkL67Empx8qM; Sun, 15 Feb 2026 16:35:00 +0000 (UTC)",
            "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id 72C6440A8C;\n\tSun, 15 Feb 2026 16:35:00 +0000 (UTC)",
            "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 9C1CA270\n for <buildroot@buildroot.org>; Sun, 15 Feb 2026 16:34:58 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 7E50D608A9\n for <buildroot@buildroot.org>; Sun, 15 Feb 2026 16:34:58 +0000 (UTC)",
            "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id oz-4jv6LYtXc for <buildroot@buildroot.org>;\n Sun, 15 Feb 2026 16:34:56 +0000 (UTC)",
            "from dd20012.kasserver.com (dd20012.kasserver.com [85.13.140.57])\n by smtp3.osuosl.org (Postfix) with ESMTPS id DD5A960708\n for <buildroot@buildroot.org>; Sun, 15 Feb 2026 16:34:55 +0000 (UTC)",
            "from fli4l.lan.fli4l (p4fd6c3ec.dip0.t-ipconnect.de\n [79.214.195.236])\n by dd20012.kasserver.com (Postfix) with ESMTPSA id D3444A4C03E6;\n Sun, 15 Feb 2026 17:34:40 +0100 (CET)",
            "from bruckner.lan.fli4l ([192.168.1.1]:44318)\n by fli4l.lan.fli4l with esmtp (Exim 4.99.1)\n (envelope-from <bernd@kuhls.net>) id 1vrf4x-000000005P1-403f;\n Sun, 15 Feb 2026 16:34:40 +0000"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp4.osuosl.org 72C6440A8C",
            "OpenDKIM Filter v2.11.0 smtp3.osuosl.org DD5A960708"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1771173300;\n\tbh=hbjU/A7N6L9/UF8ABUW3Kyq9vOonsVU/n1q/B58TvqU=;\n\th=From:To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From;\n\tb=J7PsbjXtNAeMGGiTDVq4uRJxH+6rcMAJReQBOREdilXOnDrYzDbqXvGnteyNyVtL1\n\t C/tkC7SXFDdCHqOFVC25hP/sOCi+93f796+GeENs5DLRXd1wAn5Sj4nnYcNL98fJnz\n\t yLPhJcrM9Sf90EqawDjryXoRVTMW8AZvGBjiZqGYPrHz7q0oXFK4xT1VmAEuo8JrnW\n\t ETSAaJryA5WSufNlVgcp9lGh+kwH9FdZVNNNqzO3Gg4SYstZX8dMQz8Bq2Xxh8jDLk\n\t MgZNMw3TIhfmeYv+Pg9x4nhyLuQOrrHBOr8y9s0SQObEDNw3zbOd1mKu8hFtROLn22\n\t OXvJshig+sJVg==",
        "Received-SPF": "Pass (mailfrom) identity=mailfrom; client-ip=85.13.140.57;\n helo=dd20012.kasserver.com; envelope-from=bernd@kuhls.net;\n receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp3.osuosl.org DD5A960708",
        "From": "Bernd Kuhls <bernd@kuhls.net>",
        "To": "buildroot@buildroot.org",
        "Cc": "Giulio Benetti <giulio.benetti@benettiengineering.com>,\n Romain Naour <romain.naour@gmail.com>",
        "Date": "Sun, 15 Feb 2026 17:34:37 +0100",
        "Message-ID": "<20260215163440.483386-1-bernd@kuhls.net>",
        "X-Mailer": "git-send-email 2.47.3",
        "MIME-Version": "1.0",
        "X-Spamd-Bar": "+",
        "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=kuhls.net;\n s=kas202511301023; t=1771173280;\n bh=QsJZtow3JzhPJ0S7dAhitzFNMb+qtFz094IkXVETvgE=;\n h=From:To:Cc:Subject:Date:From;\n b=kQjF/cgQVfFage71YABiT79eWe7zjvbsyRvA40MPSGmhvY10YbXKMTk0XZfDv/YLY\n LpGHb5NkKE2ZTVm7VKe6GhQDR6fwbRHXdr6ro2nVqaDibH/NwG0oZDDn7fEQgrYv1d\n lc1U3kJ7YWJoF0vMv+LJxlh+E+TFahKaVoVpX/ZgTvWViXymRHGoJwLPoH368TG+oE\n SlDW8Ve955Lj7HlN4BzO2brcuvYExCuWd2LFYByp9O6sWm8IR3CVaCqMeVA101qSxV\n yuOmMl/kHfboWPDAi7bno5K46wvz13ckMT0ixInAIdfEVALElYSuucOpl8gbH9XH6m\n VJOH8oNiKVDrQ==",
        "X-Mailman-Original-Authentication-Results": [
            "smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=kuhls.net",
            "smtp3.osuosl.org;\n dkim=pass (2048-bit key) header.d=kuhls.net header.i=@kuhls.net\n header.a=rsa-sha256 header.s=kas202511301023 header.b=kQjF/cgQ"
        ],
        "Subject": "[Buildroot] [PATCH 1/3] package/binutils: add support for binutils\n 2.46.0",
        "X-BeenThere": "buildroot@buildroot.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>",
        "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>",
        "List-Post": "<mailto:buildroot@buildroot.org>",
        "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>",
        "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "buildroot-bounces@buildroot.org",
        "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>"
    },
    "content": "https://sourceware.org/pipermail/binutils/2026-February/148149.html\n\n\" This release contains numerous bug fixes, and also the following new\n  features:\n\n    * Support for new instructions added to AMD, ARM and RISC-V\n      architectures.\n\n    * Support for version 3 of the SFrame standard.\n\n    * The readelf program can now display the contents of Global Offset\n      Tables.\n\n    * Improved linker tagging support.\"\n\nWe bring and rebased patches 0001 and 0002 that we carry for binutils\n2.45.\n\nSigned-off-by: Bernd Kuhls <bernd@kuhls.net>\n---\n package/binutils/2.46.0/0001-sh-conf.patch    |  52 +++\n .../0002-poison-system-directories.patch      | 312 ++++++++++++++++++\n package/binutils/Config.in.host               |   4 +\n package/binutils/binutils.hash                |   1 +\n 4 files changed, 369 insertions(+)\n create mode 100644 package/binutils/2.46.0/0001-sh-conf.patch\n create mode 100644 package/binutils/2.46.0/0002-poison-system-directories.patch",
    "diff": "diff --git a/package/binutils/2.46.0/0001-sh-conf.patch b/package/binutils/2.46.0/0001-sh-conf.patch\nnew file mode 100644\nindex 0000000000..e24afb0850\n--- /dev/null\n+++ b/package/binutils/2.46.0/0001-sh-conf.patch\n@@ -0,0 +1,52 @@\n+From 0bf75276c392cac7794e78e1572abcd793d99e4e Mon Sep 17 00:00:00 2001\n+From: Romain Naour <romain.naour@gmail.com>\n+Date: Fri, 25 Dec 2015 11:38:13 +0100\n+Subject: [PATCH] sh-conf\n+\n+Likewise, binutils has no idea about any of these new targets either, so we\n+fix that up too.. now we're able to actually build a real toolchain for\n+sh2a_nofpu- and other more ineptly named toolchains (and yes, there are more\n+inept targets than that one, really. Go look, I promise).\n+\n+Upstream: N/A [Buildroot specific]\n+\n+[Romain: rebase on top of 2.32]\n+Signed-off-by: Romain Naour <romain.naour@gmail.com>\n+[Thomas: rebase on top of 2.29, in which sh64 support was removed.]\n+Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>\n+[Bernd: rebased for version 2.46.0]\n+Signed-off-by: Bernd Kuhls <bernd@kuhls.net>\n+---\n+ configure    | 2 +-\n+ configure.ac | 2 +-\n+ 2 files changed, 2 insertions(+), 2 deletions(-)\n+\n+diff --git a/configure b/configure\n+index bbfb5979546..bcd95684ae1 100755\n+--- a/configure\n++++ b/configure\n+@@ -4196,7 +4196,7 @@\n+   nvptx*-*-*)\n+     noconfigdirs=\"$noconfigdirs target-libssp\"\n+     ;;\n+-  sh-*-*)\n++  sh*-*-*)\n+     case \"${target}\" in\n+       sh*-*-elf)\n+          ;;\n+diff --git a/configure.ac b/configure.ac\n+index f9694cdf901..d6a3623ba50 100644\n+--- a/configure.ac\n++++ b/configure.ac\n+@@ -1365,7 +1365,7 @@\n+   nvptx*-*-*)\n+     noconfigdirs=\"$noconfigdirs target-libssp\"\n+     ;;\n+-  sh-*-*)\n++  sh*-*-*)\n+     case \"${target}\" in\n+       sh*-*-elf)\n+          ;;\n+-- \n+2.51.1\n+\ndiff --git a/package/binutils/2.46.0/0002-poison-system-directories.patch b/package/binutils/2.46.0/0002-poison-system-directories.patch\nnew file mode 100644\nindex 0000000000..584fa9498a\n--- /dev/null\n+++ b/package/binutils/2.46.0/0002-poison-system-directories.patch\n@@ -0,0 +1,312 @@\n+From 92f4bd0e1713577e30491e99a0226088eaeae740 Mon Sep 17 00:00:00 2001\n+From: Romain Naour <romain.naour@gmail.com>\n+Date: Fri, 25 Dec 2015 11:45:38 +0100\n+Subject: [PATCH] poison-system-directories\n+\n+Patch adapted to binutils 2.23.2 and extended to use\n+BR_COMPILER_PARANOID_UNSAFE_PATH by Thomas Petazzoni.\n+\n+[Waldemar: rebase on top of 2.43]\n+Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>\n+[Waldemar: rebase on top of 2.39]\n+Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>\n+[Romain: rebase on top of 2.33.1]\n+Signed-off-by: Romain Naour <romain.naour@gmail.com>\n+[Gustavo: adapt to binutils 2.25]\n+Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>\n+Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>\n+[Bernd: rebased for version 2.46.0]\n+Signed-off-by: Bernd Kuhls <bernd@kuhls.net>\n+\n+Upstream-Status: Inappropriate [distribution: codesourcery]\n+Upstream: N/A [Buildroot specific]\n+\n+Patch originally created by Mark Hatle, forward-ported to\n+binutils 2.21 by Scott Garman.\n+\n+purpose:  warn for uses of system directories when cross linking\n+\n+Code Merged from Sourcery G++ binutils 2.19 - 4.4-277\n+\n+2008-07-02  Joseph Myers  <joseph@codesourcery.com>\n+\n+    ld/\n+    * ld.h (args_type): Add error_poison_system_directories.\n+    * ld.texinfo (--error-poison-system-directories): Document.\n+    * ldfile.c (ldfile_add_library_path): Check\n+    command_line.error_poison_system_directories.\n+    * ldmain.c (main): Initialize\n+    command_line.error_poison_system_directories.\n+    * lexsup.c (enum option_values): Add\n+    OPTION_ERROR_POISON_SYSTEM_DIRECTORIES.\n+    (ld_options): Add --error-poison-system-directories.\n+    (parse_args): Handle new option.\n+\n+2007-06-13  Joseph Myers  <joseph@codesourcery.com>\n+\n+    ld/\n+    * config.in: Regenerate.\n+    * ld.h (args_type): Add poison_system_directories.\n+    * ld.texinfo (--no-poison-system-directories): Document.\n+    * ldfile.c (ldfile_add_library_path): Check\n+    command_line.poison_system_directories.\n+    * ldmain.c (main): Initialize\n+    command_line.poison_system_directories.\n+    * lexsup.c (enum option_values): Add\n+    OPTION_NO_POISON_SYSTEM_DIRECTORIES.\n+    (ld_options): Add --no-poison-system-directories.\n+    (parse_args): Handle new option.\n+\n+2007-04-20  Joseph Myers  <joseph@codesourcery.com>\n+\n+    Merge from Sourcery G++ binutils 2.17:\n+\n+    2007-03-20  Joseph Myers  <joseph@codesourcery.com>\n+    Based on patch by Mark Hatle <mark.hatle@windriver.com>.\n+    ld/\n+    * configure.ac (--enable-poison-system-directories): New option.\n+    * configure, config.in: Regenerate.\n+    * ldfile.c (ldfile_add_library_path): If\n+    ENABLE_POISON_SYSTEM_DIRECTORIES defined, warn for use of /lib,\n+    /usr/lib, /usr/local/lib or /usr/X11R6/lib.\n+\n+Signed-off-by: Mark Hatle <mark.hatle@windriver.com>\n+Signed-off-by: Scott Garman <scott.a.garman@intel.com>\n+---\n+ ld/config.in    |  3 +++\n+ ld/configure    | 14 ++++++++++++++\n+ ld/configure.ac | 10 ++++++++++\n+ ld/ld.h         |  8 ++++++++\n+ ld/ld.texi      | 12 ++++++++++++\n+ ld/ldfile.c     | 16 ++++++++++++++++\n+ ld/ldlex.h      |  2 ++\n+ ld/ldmain.c     |  2 ++\n+ ld/lexsup.c     | 21 +++++++++++++++++++++\n+ 9 files changed, 88 insertions(+)\n+\n+diff --git a/ld/config.in b/ld/config.in\n+index 790efd336be..2b237bcda5e 100644\n+--- a/ld/config.in\n++++ b/ld/config.in\n+@@ -86,6 +86,9 @@\n+    language is requested. */\n+ #undef ENABLE_NLS\n+ \n++/* Define to warn for use of native system library directories */\n++#undef ENABLE_POISON_SYSTEM_DIRECTORIES\n++\n+ /* Additional extension a shared object might have. */\n+ #undef EXTRA_SHLIB_EXTENSION\n+ \n+diff --git a/ld/configure b/ld/configure\n+index cd410bd64d1..7e9913949d4 100755\n+--- a/ld/configure\n++++ b/ld/configure\n+@@ -843,6 +843,7 @@ enable_checking\n+ with_lib_path\n+ enable_targets\n+ with_sysroot\n++enable_poison_system_directories\n+ enable_gold\n+ enable_got\n+ enable_compressed_debug_sections\n+@@ -1537,6 +1538,8 @@ Optional Features:\n+   --disable-largefile     omit support for large files\n+   --enable-checking       enable run-time checks\n+   --enable-targets        alternative target configurations\n++  --enable-poison-system-directories\n++                          warn for use of native system library directories\n+   --enable-gold[=ARG]     build gold [ARG={default,yes,no}]\n+   --enable-got=<type>     GOT handling scheme (target, single, negative,\n+                           multigot)\n+@@ -15768,7 +15771,18 @@ else\n+ fi\n+ \n+ \n++# Check whether --enable-poison-system-directories was given.\n++if test \"${enable_poison_system_directories+set}\" = set; then :\n++  enableval=$enable_poison_system_directories;\n++else\n++  enable_poison_system_directories=no\n++fi\n++\n++if test \"x${enable_poison_system_directories}\" = \"xyes\"; then\n+ \n++$as_echo \"#define ENABLE_POISON_SYSTEM_DIRECTORIES 1\" >>confdefs.h\n++\n++fi\n+ \n+ # Check whether --enable-got was given.\n+ if test \"${enable_got+set}\" = set; then :\n+diff --git a/ld/configure.ac b/ld/configure.ac\n+index f528ae42ef7..dcf1e17fae6 100644\n+--- a/ld/configure.ac\n++++ b/ld/configure.ac\n+@@ -115,6 +115,16 @@ AC_SUBST(use_sysroot)\n+ AC_SUBST(TARGET_SYSTEM_ROOT)\n+ AC_SUBST(TARGET_SYSTEM_ROOT_DEFINE)\n+ \n++AC_ARG_ENABLE([poison-system-directories],\n++         AS_HELP_STRING([--enable-poison-system-directories],\n++                [warn for use of native system library directories]),,\n++         [enable_poison_system_directories=no])\n++if test \"x${enable_poison_system_directories}\" = \"xyes\"; then\n++  AC_DEFINE([ENABLE_POISON_SYSTEM_DIRECTORIES],\n++       [1],\n++       [Define to warn for use of native system library directories])\n++fi\n++\n+ dnl Use --enable-gold to decide if this linker should be the default.\n+ dnl \"install_as_default\" is set to false if gold is the default linker.\n+ dnl \"installed_linker\" is the installed BFD linker name.\n+diff --git a/ld/ld.h b/ld/ld.h\n+index c8688153bd4..0b16caf347a 100644\n+--- a/ld/ld.h\n++++ b/ld/ld.h\n+@@ -166,6 +166,14 @@ typedef struct\n+      in the linker script.  */\n+   bool force_group_allocation;\n+ \n++  /* If TRUE (the default) warn for uses of system directories when\n++     cross linking.  */\n++  bool poison_system_directories;\n++\n++  /* If TRUE (default FALSE) give an error for uses of system\n++     directories when cross linking instead of a warning.  */\n++  bool error_poison_system_directories;\n++\n+   /* Big or little endian as set on command line.  */\n+   enum endian_enum endian;\n+ \n+diff --git a/ld/ld.texi b/ld/ld.texi\n+index cf750d15259..1acaa26f107 100644\n+--- a/ld/ld.texi\n++++ b/ld/ld.texi\n+@@ -3375,6 +3375,18 @@ bit string identifying the original linked file does not change.\n+ Passing @code{none} for @var{style} disables the setting from any\n+ @code{--build-id} options earlier on the command line.\n+ \n++@kindex --no-poison-system-directories\n++@item --no-poison-system-directories\n++Do not warn for @option{-L} options using system directories such as\n++@file{/usr/lib} when cross linking.  This option is intended for use\n++in chroot environments when such directories contain the correct\n++libraries for the target system rather than the host.\n++\n++@kindex --error-poison-system-directories\n++@item --error-poison-system-directories\n++Give an error instead of a warning for @option{-L} options using\n++system directories when cross linking.\n++\n+ @kindex --package-metadata=@var{JSON}\n+ @item --package-metadata=@var{JSON}\n+ Request the creation of a @code{.note.package} ELF note section.  The\n+diff --git a/ld/ldfile.c b/ld/ldfile.c\n+index 75fd360d5e3..3526ea8146c 100644\n+--- a/ld/ldfile.c\n++++ b/ld/ldfile.c\n+@@ -326,6 +326,22 @@ ldfile_add_library_path (const char *name, bool cmdline)\n+     new_dirs->name = concat (ld_sysroot, name + strlen (\"$SYSROOT\"), (const char *) NULL);\n+   else\n+     new_dirs->name = xstrdup (name);\n++\n++#ifdef ENABLE_POISON_SYSTEM_DIRECTORIES\n++  if (command_line.poison_system_directories\n++  && ((!strncmp (name, \"/lib\", 4))\n++      || (!strncmp (name, \"/usr/lib\", 8))\n++      || (!strncmp (name, \"/usr/local/lib\", 14))\n++      || (!strncmp (name, \"/usr/X11R6/lib\", 14))))\n++   {\n++     if (command_line.error_poison_system_directories)\n++       einfo (_(\"%X%P: error: library search path \\\"%s\\\" is unsafe for \"\n++            \"cross-compilation\\n\"), name);\n++     else\n++       einfo (_(\"%P: warning: library search path \\\"%s\\\" is unsafe for \"\n++            \"cross-compilation\\n\"), name);\n++   }\n++#endif\n+ }\n+ \n+ static void\n+diff --git a/ld/ldlex.h b/ld/ldlex.h\n+index c8d61478c60..4b175dca108 100644\n+--- a/ld/ldlex.h\n++++ b/ld/ldlex.h\n+@@ -170,6 +170,8 @@ enum option_values\n+   OPTION_CTF_VARIABLES,\n+   OPTION_NO_CTF_VARIABLES,\n+   OPTION_CTF_SHARE_TYPES,\n++  OPTION_NO_POISON_SYSTEM_DIRECTORIES,\n++  OPTION_ERROR_POISON_SYSTEM_DIRECTORIES,\n+   OPTION_ERROR_EXECSTACK,\n+   OPTION_NO_ERROR_EXECSTACK,\n+   OPTION_WARN_EXECSTACK_OBJECTS,\n+diff --git a/ld/ldmain.c b/ld/ldmain.c\n+index 67c60c3f80d..c2365e4006c 100644\n+--- a/ld/ldmain.c\n++++ b/ld/ldmain.c\n+@@ -749,6 +749,8 @@ main (int argc, char **argv)\n+   command_line.warn_mismatch = true;\n+   command_line.warn_search_mismatch = true;\n+   command_line.check_section_addresses = -1;\n++  command_line.poison_system_directories = true;\n++  command_line.error_poison_system_directories = false;\n+ \n+   /* We initialize DEMANGLING based on the environment variable\n+      COLLECT_NO_DEMANGLE.  The gcc collect2 program will demangle the\n+diff --git a/ld/lexsup.c b/ld/lexsup.c\n+index bde20465835..422866f4ea9 100644\n+--- a/ld/lexsup.c\n++++ b/ld/lexsup.c\n+@@ -643,6 +643,14 @@ static const struct ld_option ld_options[] =\n+ \t\t   \"                                <method> is: share-unconflicted (default),\\n\"\n+ \t\t   \"                                             share-duplicated\"),\n+     TWO_DASHES },\n++  { {\"no-poison-system-directories\", no_argument, NULL,\n++    OPTION_NO_POISON_SYSTEM_DIRECTORIES},\n++    '\\0', NULL, N_(\"Do not warn for -L options using system directories\"),\n++    TWO_DASHES },\n++  { {\"error-poison-system-directories\", no_argument, NULL,\n++    OPTION_ERROR_POISON_SYSTEM_DIRECTORIES},\n++    '\\0', NULL, N_(\"Give an error for -L options using system directories\"),\n++    TWO_DASHES },\n+ };\n+ \n+ #define OPTION_COUNT ARRAY_SIZE (ld_options)\n+@@ -655,6 +663,7 @@ parse_args (unsigned argc, char **argv)\n+   int ingroup = 0;\n+   char *default_dirlist = NULL;\n+   char *shortopts;\n++  char *BR_paranoid_env;\n+   struct option *longopts;\n+   struct option *really_longopts;\n+   int last_optind;\n+@@ -1789,6 +1798,14 @@ parse_args (unsigned argc, char **argv)\n+ \t  }\n+ \t  break;\n+ \n++\tcase OPTION_NO_POISON_SYSTEM_DIRECTORIES:\n++\t  command_line.poison_system_directories = false;\n++\t  break;\n++\n++\tcase OPTION_ERROR_POISON_SYSTEM_DIRECTORIES:\n++\t  command_line.error_poison_system_directories = true;\n++\t  break;\n++\n+ \tcase OPTION_PUSH_STATE:\n+ \t  input_flags.pushed = xmemdup (&input_flags,\n+ \t\t\t\t\tsizeof (input_flags),\n+@@ -1933,6 +1950,10 @@ parse_args (unsigned argc, char **argv)\n+       command_line.soname = NULL;\n+     }\n+ \n++  BR_paranoid_env = getenv(\"BR_COMPILER_PARANOID_UNSAFE_PATH\");\n++  if (BR_paranoid_env && strlen(BR_paranoid_env) > 0)\n++    command_line.error_poison_system_directories = true;\n++\n+   while (ingroup)\n+     {\n+       einfo (_(\"%P: missing --end-group; added as last command line option\\n\"));\n+-- \n+2.51.1\n+\ndiff --git a/package/binutils/Config.in.host b/package/binutils/Config.in.host\nindex a043771339..db17df70bc 100644\n--- a/package/binutils/Config.in.host\n+++ b/package/binutils/Config.in.host\n@@ -25,6 +25,9 @@ config BR2_BINUTILS_VERSION_2_44_X\n config BR2_BINUTILS_VERSION_2_45_X\n \tbool \"binutils 2.45.1\"\n \n+config BR2_BINUTILS_VERSION_2_46_X\n+\tbool \"binutils 2.46.0\"\n+\n endchoice\n \n config BR2_BINUTILS_VERSION\n@@ -33,6 +36,7 @@ config BR2_BINUTILS_VERSION\n \tdefault \"2.43.1\"\tif BR2_BINUTILS_VERSION_2_43_X\n \tdefault \"2.44\"\t\tif BR2_BINUTILS_VERSION_2_44_X\n \tdefault \"2.45.1\"\tif BR2_BINUTILS_VERSION_2_45_X\n+\tdefault \"2.46.0\"\tif BR2_BINUTILS_VERSION_2_46_X\n \n config BR2_BINUTILS_GPROFNG\n \tbool \"gprofng support\"\ndiff --git a/package/binutils/binutils.hash b/package/binutils/binutils.hash\nindex 183b7c1f4e..45668d88ed 100644\n--- a/package/binutils/binutils.hash\n+++ b/package/binutils/binutils.hash\n@@ -2,6 +2,7 @@\n sha512  20977ad17729141a2c26d358628f44a0944b84dcfefdec2ba029c2d02f40dfc41cc91c0631044560d2bd6f9a51e1f15846b4b311befbe14f1239f14ff7d57824  binutils-2.43.1.tar.xz\n sha512  b85d3bbc0e334cf67a96219d3c7c65fbf3e832b2c98a7417bf131f3645a0307057ec81cd2b29ff2563cec53e3d42f73e2c60cc5708e80d4a730efdcc6ae14ad7  binutils-2.44.tar.xz\n sha512  ea030419eba387579ab717be7e3223fc99e93b586860b06003c12489f93441640d4082736f76aa5e98233db4f46e232f536a45e471486de1f5b64e1b827c167e  binutils-2.45.1.tar.xz\n+sha512  32f880bb4f69351f4ae54a5d00359625c6c49d8e76624fb5cffdf174c79c8d3212f66225b81c12933c6ed59604ab652560773dd92fab384b930c97a9d4e1fdf2  binutils-2.46.0.tar.xz\n \n # Locally calculated (fetched from Github)\n sha512  46c336a16bde7b73dc4ceac0986887d47d542a1452e1936ef871b5e76afdb6cad4b18ccb4d93341358e7bb92c2ef74781e1fb72935d527d15251ac9f9daa8305  binutils-gdb-arc-2024.12-release.tar.gz\n",
    "prefixes": [
        "1/3"
    ]
}