Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/810314/?format=api
{ "id": 810314, "url": "http://patchwork.ozlabs.org/api/patches/810314/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/1504651289-10525-1-git-send-email-jcmvbkbc@gmail.com/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1504651289-10525-1-git-send-email-jcmvbkbc@gmail.com>", "list_archive_url": null, "date": "2017-09-05T22:41:29", "name": "[for,2017.02.x] package/binutils: fix crash caused by buggy xtensa overlay", "commit_ref": "c357dd607b403c2b016e51d8fc4609f854e41fee", "pull_url": null, "state": "accepted", "archived": false, "hash": "9a55dc6f33452edecbb38e9d6789ea8035b7bded", "submitter": { "id": 2793, "url": "http://patchwork.ozlabs.org/api/people/2793/?format=api", "name": "Max Filippov", "email": "jcmvbkbc@gmail.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/1504651289-10525-1-git-send-email-jcmvbkbc@gmail.com/mbox/", "series": [ { "id": 1662, "url": "http://patchwork.ozlabs.org/api/series/1662/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=1662", "date": "2017-09-05T22:41:29", "name": "[for,2017.02.x] package/binutils: fix crash caused by buggy xtensa overlay", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/1662/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/810314/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/810314/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@busybox.net>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "buildroot@lists.busybox.net" ], "Delivered-To": [ "patchwork-incoming@bilbo.ozlabs.org", "buildroot@osuosl.org" ], "Authentication-Results": [ "ozlabs.org;\n\tspf=pass (mailfrom) smtp.mailfrom=busybox.net\n\t(client-ip=140.211.166.136; helo=silver.osuosl.org;\n\tenvelope-from=buildroot-bounces@busybox.net;\n\treceiver=<UNKNOWN>)", "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"lmrmNMQ9\"; dkim-atps=neutral" ], "Received": [ "from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xn1v82MXtz9sR9\n\tfor <incoming@patchwork.ozlabs.org>;\n\tWed, 6 Sep 2017 08:42:44 +1000 (AEST)", "from localhost (localhost [127.0.0.1])\n\tby silver.osuosl.org (Postfix) with ESMTP id ADDCA30A6A;\n\tTue, 5 Sep 2017 22:42:41 +0000 (UTC)", "from silver.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id jt4xZVMRbjiD; Tue, 5 Sep 2017 22:42:40 +0000 (UTC)", "from ash.osuosl.org (ash.osuosl.org [140.211.166.34])\n\tby silver.osuosl.org (Postfix) with ESMTP id 5B5A930A67;\n\tTue, 5 Sep 2017 22:42:40 +0000 (UTC)", "from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136])\n\tby ash.osuosl.org (Postfix) with ESMTP id DBC3E1C3F91\n\tfor <buildroot@lists.busybox.net>;\n\tTue, 5 Sep 2017 22:42:38 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n\tby silver.osuosl.org (Postfix) with ESMTP id D53DE30A67\n\tfor <buildroot@lists.busybox.net>;\n\tTue, 5 Sep 2017 22:42:38 +0000 (UTC)", "from silver.osuosl.org ([127.0.0.1])\n\tby localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)\n\twith ESMTP id yrSCbzi1Ixk1 for <buildroot@lists.busybox.net>;\n\tTue, 5 Sep 2017 22:42:38 +0000 (UTC)", "from mail-lf0-f68.google.com (mail-lf0-f68.google.com\n\t[209.85.215.68])\n\tby silver.osuosl.org (Postfix) with ESMTPS id EBCCA30A62\n\tfor <buildroot@uclibc.org>; Tue, 5 Sep 2017 22:42:37 +0000 (UTC)", "by mail-lf0-f68.google.com with SMTP id c8so2340903lfe.2\n\tfor <buildroot@uclibc.org>; Tue, 05 Sep 2017 15:42:37 -0700 (PDT)", "from octofox.metropolis\n\t(jcmvbkbc-1-pt.tunnel.tserv24.sto1.ipv6.he.net. [2001:470:27:1fa::2])\n\tby smtp.gmail.com with ESMTPSA id\n\ti137sm162908lfe.43.2017.09.05.15.42.33\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tTue, 05 Sep 2017 15:42:35 -0700 (PDT)" ], "X-Virus-Scanned": [ "amavisd-new at osuosl.org", "amavisd-new at osuosl.org" ], "X-Greylist": "domain auto-whitelisted by SQLgrey-1.7.6", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n\th=from:to:cc:subject:date:message-id;\n\tbh=goRhO+XvZ3SZTHGwV72Y/bKHysaVEDwpq3cF0Gbexm8=;\n\tb=lmrmNMQ9nqC0UpcRpk00xtglH6we8nUH/FBQu6+h6pPsNW1SdPEfiNxwUaks71q5z6\n\tnx3Mo9qU/xJIvoTRic1L8Z975u2p9rKEVmQPr0NZEhkj0X5P8iKbOVtxqPkgYMPfWgGk\n\t6viTl2v6oW0z+n8hkbg9yTSgyjC1TX0lgVFlJk/Y46DqJn66mErolZYxRvnkuH6b88bp\n\tQevS+QV+iyALi13fYy8eBQb5cBFB5lsVBhfHnbfcZo9+ACCDqeIi2bH4ZGnLT3lVMDGO\n\tNVd2FkyPpP7Tstb+1DJnREBC/6kGI04PanEzezaU+zKhsssbTPLVwwcQz5MOIRS9vkhZ\n\t8NgA==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=goRhO+XvZ3SZTHGwV72Y/bKHysaVEDwpq3cF0Gbexm8=;\n\tb=cNEG8GeTxHkTsv25x+NSV3JeePuo8i0sZB0xtTnUG5CA6JnHbHwXAzUhe0xF7YIRzy\n\t3zj4z+7aNz+ArRFQecL6AOjzoF0RIi0phg9K3vX4Rv/y85JVHU32n4lx/44eKh13GRld\n\tVkBSMwD6lCNL5G8uIuAwlwmi6QUa2pYNtWO+Z3jPXejB/E+cDncFrvb9z7Xn5xBaEf1H\n\tTV9h0ykFtUyFYgtyO6VMFdIfBFQhR3zRAZA2UaYwyR3IS2CDgVza87aFqkQB4xq1ZZxz\n\t6wt66NMVCGsC0fgm2FvxhCw/6vguX8IHJRvb6sVrG+wp579aEVPQ7ZzLAZA/f40kbF7D\n\tbAGw==", "X-Gm-Message-State": "AHPjjUjJ1WdIge92KrHiRqd3svbBfshRhLgZNw8JV1CVmv6EWfm/Ebcg\n\tkDcyeSPir4QDciDV9Q97ig==", "X-Google-Smtp-Source": "ADKCNb7MvH9t18IjbyPzlfdvPVuJJfL+yvn1NbJraY0CGo/cEoxu8qP523tLl0JUejPNI8/N/q4Hgg==", "X-Received": "by 10.25.211.205 with SMTP id k196mr159730lfg.210.1504651355673; \n\tTue, 05 Sep 2017 15:42:35 -0700 (PDT)", "From": "Max Filippov <jcmvbkbc@gmail.com>", "To": "buildroot@uclibc.org", "Date": "Tue, 5 Sep 2017 15:41:29 -0700", "Message-Id": "<1504651289-10525-1-git-send-email-jcmvbkbc@gmail.com>", "X-Mailer": "git-send-email 2.1.4", "Cc": "Thomas Petazzoni <thomas.petazzoni@free-electrons.com>", "Subject": "[Buildroot] [PATCH for 2017.02.x] package/binutils: fix crash\n\tcaused by buggy xtensa overlay", "X-BeenThere": "buildroot@busybox.net", "X-Mailman-Version": "2.1.18-1", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.busybox.net>", "List-Unsubscribe": "<http://lists.busybox.net/mailman/options/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=unsubscribe>", "List-Archive": "<http://lists.busybox.net/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@busybox.net>", "List-Help": "<mailto:buildroot-request@busybox.net?subject=help>", "List-Subscribe": "<http://lists.busybox.net/mailman/listinfo/buildroot>,\n\t<mailto:buildroot-request@busybox.net?subject=subscribe>", "MIME-Version": "1.0", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Errors-To": "buildroot-bounces@busybox.net", "Sender": "\"buildroot\" <buildroot-bounces@busybox.net>" }, "content": "In some xtensa configurations there may be system/user registers in\nxtensa-modules with negative index. ISA initialization for such config\nmay clobber heap and result in program termination.\nDon't update lookup table entries for register with negative indices.\n\nSigned-off-by: Max Filippov <jcmvbkbc@gmail.com>\n---\n ...a-fix-memory-corruption-by-broken-sysregs.patch | 42 ++++++++++++++++++++++\n ...a-fix-memory-corruption-by-broken-sysregs.patch | 42 ++++++++++++++++++++++\n 2 files changed, 84 insertions(+)\n create mode 100644 package/binutils/2.25.1/131-xtensa-fix-memory-corruption-by-broken-sysregs.patch\n create mode 100644 package/binutils/2.26.1/0131-xtensa-fix-memory-corruption-by-broken-sysregs.patch", "diff": "diff --git a/package/binutils/2.25.1/131-xtensa-fix-memory-corruption-by-broken-sysregs.patch b/package/binutils/2.25.1/131-xtensa-fix-memory-corruption-by-broken-sysregs.patch\nnew file mode 100644\nindex 000000000000..30103ee05eca\n--- /dev/null\n+++ b/package/binutils/2.25.1/131-xtensa-fix-memory-corruption-by-broken-sysregs.patch\n@@ -0,0 +1,42 @@\n+From 3c8788dbb70b40e737d4b8e30cab81406e5c5091 Mon Sep 17 00:00:00 2001\n+From: Max Filippov <jcmvbkbc@gmail.com>\n+Date: Wed, 2 Aug 2017 00:36:05 -0700\n+Subject: [PATCH] xtensa: fix memory corruption by broken sysregs\n+\n+In some xtensa configurations there may be system/user registers in\n+xtensa-modules with negative index. ISA initialization for such config\n+may clobber heap and result in program termination.\n+Don't update lookup table entries for register with negative indices.\n+They are not directly accessible via RSR/WSR/XSR or RUR/WUR, so this\n+change should not affect processing of valid assembly/binary code.\n+\n+bfd/\n+2017-08-02 Max Filippov <jcmvbkbc@gmail.com>\n+\n+\t* xtensa-isa.c (xtensa_isa_init): Don't update lookup table\n+\tentries for sysregs with negative indices.\n+\n+Signed-off-by: Max Filippov <jcmvbkbc@gmail.com>\n+---\n+Backported from: d84ed528d4817b0ff854006b65a9f6ec75f0407a\n+\n+ bfd/xtensa-isa.c | 3 ++-\n+ 1 file changed, 2 insertions(+), 1 deletion(-)\n+\n+diff --git a/bfd/xtensa-isa.c b/bfd/xtensa-isa.c\n+index 8da75bea8109..8c6ee88fdeae 100644\n+--- a/bfd/xtensa-isa.c\n++++ b/bfd/xtensa-isa.c\n+@@ -292,7 +292,8 @@ xtensa_isa_init (xtensa_isa_status *errno_p, char **error_msg_p)\n+ xtensa_sysreg_internal *sreg = &isa->sysregs[n];\n+ is_user = sreg->is_user;\n+ \n+- isa->sysreg_table[is_user][sreg->number] = n;\n++ if (sreg->number >= 0)\n++\tisa->sysreg_table[is_user][sreg->number] = n;\n+ }\n+ \n+ /* Set up the interface lookup table. */\n+-- \n+2.1.4\n+\ndiff --git a/package/binutils/2.26.1/0131-xtensa-fix-memory-corruption-by-broken-sysregs.patch b/package/binutils/2.26.1/0131-xtensa-fix-memory-corruption-by-broken-sysregs.patch\nnew file mode 100644\nindex 000000000000..30103ee05eca\n--- /dev/null\n+++ b/package/binutils/2.26.1/0131-xtensa-fix-memory-corruption-by-broken-sysregs.patch\n@@ -0,0 +1,42 @@\n+From 3c8788dbb70b40e737d4b8e30cab81406e5c5091 Mon Sep 17 00:00:00 2001\n+From: Max Filippov <jcmvbkbc@gmail.com>\n+Date: Wed, 2 Aug 2017 00:36:05 -0700\n+Subject: [PATCH] xtensa: fix memory corruption by broken sysregs\n+\n+In some xtensa configurations there may be system/user registers in\n+xtensa-modules with negative index. ISA initialization for such config\n+may clobber heap and result in program termination.\n+Don't update lookup table entries for register with negative indices.\n+They are not directly accessible via RSR/WSR/XSR or RUR/WUR, so this\n+change should not affect processing of valid assembly/binary code.\n+\n+bfd/\n+2017-08-02 Max Filippov <jcmvbkbc@gmail.com>\n+\n+\t* xtensa-isa.c (xtensa_isa_init): Don't update lookup table\n+\tentries for sysregs with negative indices.\n+\n+Signed-off-by: Max Filippov <jcmvbkbc@gmail.com>\n+---\n+Backported from: d84ed528d4817b0ff854006b65a9f6ec75f0407a\n+\n+ bfd/xtensa-isa.c | 3 ++-\n+ 1 file changed, 2 insertions(+), 1 deletion(-)\n+\n+diff --git a/bfd/xtensa-isa.c b/bfd/xtensa-isa.c\n+index 8da75bea8109..8c6ee88fdeae 100644\n+--- a/bfd/xtensa-isa.c\n++++ b/bfd/xtensa-isa.c\n+@@ -292,7 +292,8 @@ xtensa_isa_init (xtensa_isa_status *errno_p, char **error_msg_p)\n+ xtensa_sysreg_internal *sreg = &isa->sysregs[n];\n+ is_user = sreg->is_user;\n+ \n+- isa->sysreg_table[is_user][sreg->number] = n;\n++ if (sreg->number >= 0)\n++\tisa->sysreg_table[is_user][sreg->number] = n;\n+ }\n+ \n+ /* Set up the interface lookup table. */\n+-- \n+2.1.4\n+\n", "prefixes": [ "for", "2017.02.x" ] }