From patchwork Fri Jan 24 15:11:19 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Ruder X-Patchwork-Id: 313928 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from silver.osuosl.org (silver.osuosl.org [140.211.166.136]) by ozlabs.org (Postfix) with ESMTP id BA49B2C0097 for ; Sat, 25 Jan 2014 02:14:22 +1100 (EST) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id 2E6962F684; Fri, 24 Jan 2014 15:14:21 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y2UfKx74aaBQ; Fri, 24 Jan 2014 15:14:19 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by silver.osuosl.org (Postfix) with ESMTP id 9D9962F720; Fri, 24 Jan 2014 15:14:19 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from whitealder.osuosl.org (whitealder.osuosl.org [140.211.166.138]) by ash.osuosl.org (Postfix) with ESMTP id 1EB271BF9D3 for ; Fri, 24 Jan 2014 15:14:18 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by whitealder.osuosl.org (Postfix) with ESMTP id 168908B7D8 for ; Fri, 24 Jan 2014 15:14:18 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from whitealder.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id npaD6RDrhCCx for ; Fri, 24 Jan 2014 15:14:17 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from mail-ie0-f171.google.com (mail-ie0-f171.google.com [209.85.223.171]) by whitealder.osuosl.org (Postfix) with ESMTPS id 024FC8B7BF for ; Fri, 24 Jan 2014 15:14:16 +0000 (UTC) Received: by mail-ie0-f171.google.com with SMTP id as1so2941079iec.16 for ; Fri, 24 Jan 2014 07:14:16 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:sender:date:from:to:subject:message-id :mime-version:content-type:content-disposition:user-agent; bh=HqXhR0UanevS9go5zYj9cxAWcpLJqLK/CwLs91S1XIU=; b=iAtS6uPdyKjc7SoJ4pQkOMqvgRCzUIBiBKPuTDftuZN48zhmWQYmpC0BpGnu3MOhDs 8Pj3pLHcbbG+E5tFG2hJewDP7FzLOpXN6JtKUUGMrnX6yPV1REo88YdOgq2z/FVYi8aA oB4HMRzsj8U09o8Ii9lL8sjn8W6ZnEMzxlLzsjVlp4BuxhbhnxC1H/klfJJPtE5HILsQ n5Wqr5MsfvswbI6f1Zs3a/rM++OfIgA8J7MAmMvxYlyhxZ0DShixMGdb1S19KnjRxeyU klnYcDoaFuIo8VhnWowaxfk753eDJGoofi67ze/wxCOI0iDuivCiqhPjaPux9d3xW1mh qLsQ== X-Gm-Message-State: ALoCoQlFlCs7iHjtnBFW9KyX1wTH9GtDNOcfQsZPMz2q6TWZOTiWzDSTzkeYc7RfBRXJMojDqaFs X-Received: by 10.50.55.65 with SMTP id q1mr5226096igp.4.1390576455682; Fri, 24 Jan 2014 07:14:15 -0800 (PST) Received: from gmail.com (64-198-156-98.ip.mcleodusa.net. [64.198.156.98]) by mx.google.com with ESMTPSA id x6sm10844009igb.3.2014.01.24.07.14.14 for (version=TLSv1.2 cipher=RC4-SHA bits=128/128); Fri, 24 Jan 2014 07:14:14 -0800 (PST) Date: Fri, 24 Jan 2014 09:11:19 -0600 From: Andrew Ruder To: buildroot@busybox.net Message-ID: <20140124151119.GA27232@gmail.com> MIME-Version: 1.0 Content-Disposition: inline User-Agent: Mutt/1.5.21+155 (d3096e8796e7) (2012-12-30) Subject: [Buildroot] [PATCH] gcc 4.8.2: arm fixes for stack corruption X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.14 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: buildroot-bounces@busybox.net Sender: buildroot-bounces@busybox.net This seems to especially affect the kernel, but in an interrupt-heavy system, this fixes a bug that can cause frequent NULL pointer dereference crashes on ARM systems. --- .../4.8.2/842-gcc-4.8.2-Fix-PR-target-58854.patch | 32 ++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 package/gcc/4.8.2/842-gcc-4.8.2-Fix-PR-target-58854.patch diff --git a/package/gcc/4.8.2/842-gcc-4.8.2-Fix-PR-target-58854.patch b/package/gcc/4.8.2/842-gcc-4.8.2-Fix-PR-target-58854.patch new file mode 100644 index 0000000..4927930 --- /dev/null +++ b/package/gcc/4.8.2/842-gcc-4.8.2-Fix-PR-target-58854.patch @@ -0,0 +1,32 @@ +From 9a228f68817f79bbd1d295b8e6fcaed25c47ee8f Mon Sep 17 00:00:00 2001 +From: ramana +Date: Wed, 30 Oct 2013 10:54:04 +0000 +Subject: [PATCH] Fix PR target/58854 + +2013-10-30 Ramana Radhakrishnan + + PR target/58854 + * config/arm/arm.c (arm_expand_epilogue_apcs_frame): Emit blockage. + + +git-svn-id: svn+ssh://gcc.gnu.org/svn/gcc/trunk@204203 138bc75d-0d04-0410-961f-82ee72b054a4 +--- + (omitted from this patch) gcc/ChangeLog | 5 +++++ + gcc/config/arm/arm.c | 1 + + 2 files changed, 6 insertions(+), 0 deletions(-) + +diff --git a/gcc/config/arm/arm.c b/gcc/config/arm/arm.c +index 212a4bc..23dfc0e 100644 +--- a/gcc/config/arm/arm.c ++++ b/gcc/config/arm/arm.c +@@ -26547,6 +26547,7 @@ arm_expand_epilogue_apcs_frame (bool really_return) + num_regs = bit_count (saved_regs_mask); + if ((offsets->outgoing_args != (1 + num_regs)) || cfun->calls_alloca) + { ++ emit_insn (gen_blockage ()); + /* Unwind the stack to just below the saved registers. */ + emit_insn (gen_addsi3 (stack_pointer_rtx, + hard_frame_pointer_rtx, +-- +1.7.1 +