[LEDE-DEV] [PATCH] musl: update to 1.1.17

Syrone Wong wong.syrone at gmail.com
Fri Oct 20 22:03:36 PDT 2017


Hi,

I tested commits between 39db00afadc9d8d0456c46eab42b8cb8ff9f375c and
c10bc61508dc52b8315084e628f36a6c3c2dabb1.

Finally, I find 8c4be3e is causing the problem. 565dbee is the last one working.


Commands below for every libc ipk.

```
make toolchain/musl/{clean,compile} V=99
make package/toolchain/{clean,compile} V=99
cp libc_*.ipk /tmp
tar zxf libc_*.ipk
tar zxf data.tar.gz
cd lib
mv ld-musl-armhf.so.1  libc.so /lib
reboot
```

Best Regards,
Syrone Wong


On Sat, Oct 21, 2017 at 8:10 AM, Syrone Wong <wong.syrone at gmail.com> wrote:
> Tested this on mvebu/WRT3200ACM, the same issue as I reported before[1].
>
> hostapd and pppd won't start, kernel boots without problems.
>
> I'm sure 39db00afadc9d8d0456c46eab42b8cb8ff9f375c works well.
>
> something wrong between 39db00afadc9d8d0456c46eab42b8cb8ff9f375c and
> c10bc61508dc52b8315084e628f36a6c3c2dabb1(last time I tested this
> commit, it doesn't work, 1.1.17 neither)
>
>
> [1]: https://www.mail-archive.com/lede-dev@lists.infradead.org/msg09180.html
>
>
> Best Regards,
> Syrone Wong
>
>
> On Fri, Oct 20, 2017 at 5:41 AM, Christian Lamparter <chunkeey at gmail.com> wrote:
>> This patch updates musl to the latest 1.1.17 release.
>>
>> Rick Felker stated in his release note: "
>> This release fixes numerous bugs affecting visible behavior and
>> safety/internal consistency, including a stack-based buffer overflow
>> in dns parsing and multiple sources of invalid memory accesses that
>> may lead to crashes. See the release notes in WHATSNEW for details.
>>
>> Many new features have also been added, including deferred symbol
>> binding in the dynamic linker (RTLD_LAZY emulation), an option to
>> overrid argv[0] when running ldso to execute a program, support for
>> starting new sessions via posix_spawn (POSIX_SPAWN_SETSID, accepted
>> for standardization), and ability to query the active thread-local
>> locale (via _NL_LOCALE_NAME extension). Improvements in compatibility
>> with applications, build tools, and platforms have also been made.
>> " <http://www.openwall.com/lists/musl/2017/10/19/1>
>>
>> The stack-based buffer overflow in dns parsing can be mitigated by:
>> "running a caching nameserver on localhost and pointing resolv.conf
>> to 127.0.0.1." <http://www.openwall.com/lists/musl/2017/10/19/2>
>> Which is the case on the default LEDE installation (dnsmasq).
>>
>> Signed-off-by: Christian Lamparter <chunkeey at gmail.com>
>> ---
>>  toolchain/musl/common.mk                         | 6 +++---
>>  toolchain/musl/patches/900-iconv_size_hack.patch | 4 ++--
>>  2 files changed, 5 insertions(+), 5 deletions(-)
>>
>> diff --git a/toolchain/musl/common.mk b/toolchain/musl/common.mk
>> index 0a45828f79..4c4e5b47ae 100644
>> --- a/toolchain/musl/common.mk
>> +++ b/toolchain/musl/common.mk
>> @@ -8,13 +8,13 @@ include $(TOPDIR)/rules.mk
>>  include $(INCLUDE_DIR)/target.mk
>>
>>  PKG_NAME:=musl
>> -PKG_VERSION:=1.1.16
>> +PKG_VERSION:=1.1.17
>>  PKG_RELEASE=1
>>
>>  PKG_SOURCE_PROTO:=git
>>  PKG_SOURCE_SUBDIR:=$(PKG_NAME)-$(PKG_VERSION)
>> -PKG_SOURCE_VERSION:=5f7efb87a28a311ad377dd26adf53715dedb096d
>> -PKG_MIRROR_HASH:=da18ef24f270e5cae6bc4c440479da17bec1949ae5a1bc990352ca04f24c4378
>> +PKG_SOURCE_VERSION:=2cd663fb2d576d590a08c1e40386c07b378d5ad6
>> +PKG_MIRROR_HASH:=e3140faaa9aff51c4f56f36c15d677265a5bed39aa6d9ab5d252f1c49b7c13ca
>>  PKG_SOURCE_URL:=git://git.musl-libc.org/musl
>>  PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION)-$(PKG_SOURCE_VERSION).tar.xz
>>
>> diff --git a/toolchain/musl/patches/900-iconv_size_hack.patch b/toolchain/musl/patches/900-iconv_size_hack.patch
>> index 343915fb06..cfbb7ee5f7 100644
>> --- a/toolchain/musl/patches/900-iconv_size_hack.patch
>> +++ b/toolchain/musl/patches/900-iconv_size_hack.patch
>> @@ -32,7 +32,7 @@
>>
>>   static int fuzzycmp(const unsigned char *a, const unsigned char *b)
>>   {
>> -@@ -216,6 +220,7 @@ size_t iconv(iconv_t cd0, char **restric
>> +@@ -224,6 +228,7 @@ size_t iconv(iconv_t cd0, char **restric
>>                                 c = ((c-0xd7c0)<<10) + (d-0xdc00);
>>                         }
>>                         break;
>> @@ -47,7 +47,7 @@
>>  +#endif
>>                 default:
>>                         if (c < 128+type) break;
>> -                       c -= 128+type;
>> +                       c = legacy_map(map, c);
>>  --- a/src/locale/codepages.h
>>  +++ b/src/locale/codepages.h
>>  @@ -118,6 +118,7 @@
>> --
>> 2.15.0.rc1
>>
>>
>> _______________________________________________
>> Lede-dev mailing list
>> Lede-dev at lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/lede-dev



More information about the Lede-dev mailing list