diff options
-rw-r--r-- | meta/recipes-devtools/elfutils/elfutils-0.158/fixheadercheck.patch | 24 | ||||
-rw-r--r-- | meta/recipes-devtools/elfutils/elfutils_0.158.bb | 12 |
2 files changed, 29 insertions, 7 deletions
diff --git a/meta/recipes-devtools/elfutils/elfutils-0.158/fixheadercheck.patch b/meta/recipes-devtools/elfutils/elfutils-0.158/fixheadercheck.patch new file mode 100644 index 0000000000..8796e9a394 --- /dev/null +++ b/meta/recipes-devtools/elfutils/elfutils-0.158/fixheadercheck.patch | |||
@@ -0,0 +1,24 @@ | |||
1 | For some binaries we can get a invalid section alignment, for example if | ||
2 | sh_align = 1 and sh_addralign is 0. In the case of a zero size section like | ||
3 | ".note.GNU-stack", this is irrelavent as far as I can tell and we shouldn't | ||
4 | error in this case. | ||
5 | |||
6 | RP 2014/6/11 | ||
7 | |||
8 | Upstream-Status: Pending | ||
9 | |||
10 | Index: elfutils-0.158/libelf/elf32_updatenull.c | ||
11 | =================================================================== | ||
12 | --- elfutils-0.158.orig/libelf/elf32_updatenull.c 2012-12-14 22:40:48.000000000 +0000 | ||
13 | +++ elfutils-0.158/libelf/elf32_updatenull.c 2014-06-11 16:35:43.417386291 +0000 | ||
14 | @@ -327,8 +327,8 @@ | ||
15 | we test for the alignment of the section being large | ||
16 | enough for the largest alignment required by a data | ||
17 | block. */ | ||
18 | - if (unlikely (! powerof2 (shdr->sh_addralign)) | ||
19 | - || unlikely (shdr->sh_addralign < sh_align)) | ||
20 | + if (shdr->sh_size && (unlikely (! powerof2 (shdr->sh_addralign)) | ||
21 | + || unlikely (shdr->sh_addralign < sh_align))) | ||
22 | { | ||
23 | __libelf_seterrno (ELF_E_INVALID_ALIGN); | ||
24 | return -1; | ||
diff --git a/meta/recipes-devtools/elfutils/elfutils_0.158.bb b/meta/recipes-devtools/elfutils/elfutils_0.158.bb index e4253645bf..ef3dd0bb40 100644 --- a/meta/recipes-devtools/elfutils/elfutils_0.158.bb +++ b/meta/recipes-devtools/elfutils/elfutils_0.158.bb | |||
@@ -25,13 +25,11 @@ SRC_URI += "\ | |||
25 | file://core_filename.patch \ | 25 | file://core_filename.patch \ |
26 | file://CVE-2014-0172.patch \ | 26 | file://CVE-2014-0172.patch \ |
27 | file://unwind_non_linux.patch \ | 27 | file://unwind_non_linux.patch \ |
28 | " | 28 | file://elf_additions.diff \ |
29 | 29 | file://mempcpy.patch \ | |
30 | SRC_URI += " \ | 30 | file://dso-link-change.patch \ |
31 | file://elf_additions.diff \ | 31 | file://m4-biarch.m4-tweak-AC_RUN_IFELSE-for-cross-compiling.patch \ |
32 | file://mempcpy.patch \ | 32 | file://fixheadercheck.patch \ |
33 | file://dso-link-change.patch \ | ||
34 | file://m4-biarch.m4-tweak-AC_RUN_IFELSE-for-cross-compiling.patch \ | ||
35 | " | 33 | " |
36 | 34 | ||
37 | # Only apply when building uclibc based target recipe | 35 | # Only apply when building uclibc based target recipe |