diff options
author | Chris Packham <judge.packham@gmail.com> | 2021-09-21 19:56:07 +1200 |
---|---|---|
committer | Chris Packham <judge.packham@gmail.com> | 2021-09-21 21:24:31 +1200 |
commit | 3d2b48fb7a7b958575714d1d3ca180c53aeb8604 (patch) | |
tree | 6b0a8cd4a87d4912e4fc0d8dc7286ec7dc820a9b /packages/glibc/2.13/0005-dl-open-array-bounds.patch | |
parent | 793b2503458b874e58c9d7fafc68686ecb9fd071 (diff) | |
download | crosstool-ng-3d2b48fb7a7b958575714d1d3ca180c53aeb8604.tar.gz crosstool-ng-3d2b48fb7a7b958575714d1d3ca180c53aeb8604.tar.bz2 crosstool-ng-3d2b48fb7a7b958575714d1d3ca180c53aeb8604.zip |
glibc: Remove obsolete versions
The following versions were marked obsolete in crosstool-ng-1.24.0,
remove them.
- glibc-linaro-2.20-2014.11
- glibc-2.12.2
- glibc-2.13
- glibc-2.14.1
- glibc-2.15
- glibc-2.16.0
- glibc-2.18
- glibc-2.20
- glibc-2.21
- glibc-2.22
Signed-off-by: Chris Packham <judge.packham@gmail.com>
Diffstat (limited to 'packages/glibc/2.13/0005-dl-open-array-bounds.patch')
-rw-r--r-- | packages/glibc/2.13/0005-dl-open-array-bounds.patch | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/packages/glibc/2.13/0005-dl-open-array-bounds.patch b/packages/glibc/2.13/0005-dl-open-array-bounds.patch deleted file mode 100644 index 0bedbc06..00000000 --- a/packages/glibc/2.13/0005-dl-open-array-bounds.patch +++ /dev/null @@ -1,29 +0,0 @@ -commit 328c44c3670ebf6c1bd790acddce65a12998cd6c -Author: Roland McGrath <roland@hack.frob.com> -Date: Fri Apr 17 12:11:58 2015 -0700 - - Fuller check for invalid NSID in _dl_open. - ---- - elf/dl-open.c | 10 ++++++++-- - 1 file changed, 8 insertions(+), 2 deletions(-) - ---- a/elf/dl-open.c -+++ b/elf/dl-open.c -@@ -526,8 +526,14 @@ - /* Never allow loading a DSO in a namespace which is empty. Such - direct placements is only causing problems. Also don't allow - loading into a namespace used for auditing. */ -- else if (__builtin_expect (nsid != LM_ID_BASE && nsid != __LM_ID_CALLER, 0) -- && (GL(dl_ns)[nsid]._ns_nloaded == 0 -+ else if ((nsid != LM_ID_BASE && nsid != __LM_ID_CALLER) -+ && ((nsid < 0 || nsid >= GL(dl_nns)) -+ /* This prevents the [NSID] index expressions from being -+ evaluated, so the compiler won't think that we are -+ accessing an invalid index here in the !SHARED case where -+ DL_NNS is 1 and so any NSID != 0 is invalid. */ -+ || DL_NNS == 1 -+ || GL(dl_ns)[nsid]._ns_nloaded == 0 - || GL(dl_ns)[nsid]._ns_loaded->l_auditing)) - _dl_signal_error (EINVAL, file, NULL, - N_("invalid target namespace in dlmopen()")); |