RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1928936 - RPMDiff failing on annocheck with glibc-2.28-148.el8.ppc64le
Summary: RPMDiff failing on annocheck with glibc-2.28-148.el8.ppc64le
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: binutils
Version: 8.4
Hardware: ppc64le
OS: Unspecified
high
high
Target Milestone: rc
: ---
Assignee: Nick Clifton
QA Contact: Miloš Prchlík
URL:
Whiteboard:
: 1929635 (view as bug list)
Depends On:
Blocks: 1931305
TreeView+ depends on / blocked
 
Reported: 2021-02-15 20:07 UTC by Than Ngo
Modified: 2021-09-17 14:30 UTC (History)
15 users (show)

Fixed In Version: binutils-2.30-93.el8
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-05-18 13:28:07 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
crt1.o from glibc-devel-2.28-140.el8.ppc64le (9.44 KB, application/x-object)
2021-02-16 09:39 UTC, Florian Weimer
no flags Details
crt1.o from glibc-devel-2.28-148.el8.ppc64le (12.19 KB, application/x-object)
2021-02-16 09:40 UTC, Florian Weimer
no flags Details
Unstripped /usr/sbin/p11sak (from opencryptoki-3.15.1-5.el8.ppc64le rebuild) (241.38 KB, application/x-sharedlib)
2021-02-16 09:46 UTC, Florian Weimer
no flags Details
Stripped /usr/sbin/p11sak (from opencryptoki-3.15.1-5.el8.ppc64le rebuild) (68.45 KB, application/x-sharedlib)
2021-02-16 09:49 UTC, Florian Weimer
no flags Details
Scrt1.o from glibc-devel-2.28-140.el8.ppc64le (6.03 KB, application/x-object)
2021-02-16 09:59 UTC, Florian Weimer
no flags Details
Scrt1.o from glibc-devel-2.28-148.el8.ppc64le (7.41 KB, application/x-object)
2021-02-16 10:00 UTC, Florian Weimer
no flags Details

Description Than Ngo 2021-02-15 20:07:43 UTC
Description of problem:

i have RPMDiff failing on annocheck with glibc-2.28-148.el8.ppc64le, at 
https://rpmdiff.engineering.redhat.com/run/486429/7/


Version-Release number of selected component (if applicable):
gcc-8.4.1-1.el8.ppc64le
glibc-2.28-148.el8.ppc64le
binutils-2.30-90.el8.ppc64le
annobin-9.50-1.el8.ppc64le

How reproducible:
1. rebuild opencryptoki-3.15.1-5.el8.src.rpm in rhel-8.4.0 with glibc-2.28-148.el8.
2. annocheck -v opencryptoki-icsftok-3.15.1-5.pc64le.rpm opencryptoki-3.15.1-5.el8.ppc64le.rpm | grep FAIL

Actual results:
Hardened: ./usr/sbin/p11sak: FAIL: (addr range: 0x1144..0x489c): No stack protection enabled.
Hardened: ./usr/sbin/p11sak: FAIL: (addr range: 0x1144..0x489c): compiled without -fPIC/-fPIE.
Hardened: ./usr/sbin/p11sak: FAIL: Some parts of the binary were not compiled with -D_FORTIFY_SOURCE=2.
Hardened: ./usr/sbin/p11sak: FAIL: Parts of the binary were compiled without the proper PIC/PIE option.
Hardened: ./usr/sbin/p11sak: FAIL: Parts of the binary were compiled without a suffcient -fstack-protector setting.
Hardened: ./usr/sbin/pkcsconf: FAIL: (addr range: 0x2ea4..0x3b38): No stack protection enabled.
Hardened: ./usr/sbin/pkcsconf: FAIL: (addr range: 0x2ea4..0x3b38): compiled without -fPIC/-fPIE.
Hardened: ./usr/sbin/pkcsconf: FAIL: Some parts of the binary were not compiled with -D_FORTIFY_SOURCE=2.
Hardened: ./usr/sbin/pkcsconf: FAIL: Parts of the binary were compiled without the proper PIC/PIE option.
Hardened: ./usr/sbin/pkcsconf: FAIL: Parts of the binary were compiled without a suffcient -fstack-protector setting.
Hardened: ./usr/sbin/pkcsslotd: FAIL: (addr range: 0x5c84..0x618c): No stack protection enabled.
Hardened: ./usr/sbin/pkcsslotd: FAIL: (addr range: 0x5c84..0x618c): compiled without -fPIC/-fPIE.
Hardened: ./usr/sbin/pkcsslotd: FAIL: Some parts of the binary were not compiled with -D_FORTIFY_SOURCE=2.
Hardened: ./usr/sbin/pkcsslotd: FAIL: Parts of the binary were compiled without the proper PIC/PIE option.
Hardened: ./usr/sbin/pkcsslotd: FAIL: Parts of the binary were compiled without a suffcient -fstack-protector setting.
Hardened: ./usr/sbin/pkcstok_migrate: FAIL: (addr range: 0x39c4..0x6a14): No stack protection enabled.
Hardened: ./usr/sbin/pkcstok_migrate: FAIL: (addr range: 0x39c4..0x6a14): compiled without -fPIC/-fPIE.
Hardened: ./usr/sbin/pkcstok_migrate: FAIL: Some parts of the binary were not compiled with -D_FORTIFY_SOURCE=2.
Hardened: ./usr/sbin/pkcstok_migrate: FAIL: Parts of the binary were compiled without the proper PIC/PIE option.
Hardened: ./usr/sbin/pkcstok_migrate: FAIL: Parts of the binary were compiled without a suffcient -fstack-protector setting.
Hardened: ./usr/sbin/pkcsicsf: FAIL: (addr range: 0x3024..0x3904): No stack protection enabled.
Hardened: ./usr/sbin/pkcsicsf: FAIL: (addr range: 0x3024..0x3904): compiled without -fPIC/-fPIE.
Hardened: ./usr/sbin/pkcsicsf: FAIL: Some parts of the binary were not compiled with -D_FORTIFY_SOURCE=2.
Hardened: ./usr/sbin/pkcsicsf: FAIL: Parts of the binary were compiled without the proper PIC/PIE option.
Hardened: ./usr/sbin/pkcsicsf: FAIL: Parts of the binary were compiled without a suffcient -fstack-protector setting.

Expected results:
annocheck should not show any FAILs.

Additional info:
- this issue only appears on ppc64le.
- rebuild opencryptoki with glibc-2.28-140.el8.ppc64le in rhel-8.4.0, check the output of "annocheck -v opencryptoki-icsftok-3.15.1-5.pc64le.rpm opencryptoki-3.15.1-5.el8.ppc64le.rpm | grep FAIL". It does not display any FAIL.
  it looks like regression in glibc-2.28-148.el8 on ppc64le

Comment 1 Florian Weimer 2021-02-16 09:39:42 UTC
Created attachment 1757206 [details]
crt1.o from glibc-devel-2.28-140.el8.ppc64le

Comment 2 Florian Weimer 2021-02-16 09:40:41 UTC
Created attachment 1757207 [details]
crt1.o from glibc-devel-2.28-148.el8.ppc64le

Comment 3 Florian Weimer 2021-02-16 09:44:21 UTC
The old file had these notes (ignoring sections with only annobin version information):

Displaying notes found in: .gnu.build.attributes
  Owner                 Data size       Description
  GA$<version>3p935            0x00000010       OPEN        Applies to region from 0x48 to 0x44
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA*GOW:0x452a                0x00000000       OPEN        Applies to region from 0x48
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x48
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x48
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x48
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x48
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x48
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x48
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x48

Displaying notes found in: .gnu.build.attributes
  Owner                 Data size       Description
  GA$<version>3p935            0x00000010       OPEN        Applies to region from 0x48 to 0x44
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA*GOW:0x452a                0x00000000       OPEN        Applies to region from 0x48
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x48
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x48
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x48
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x48
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x48
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x48
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x48

The new file has more section annotations:

Displaying notes found in: .gnu.build.attributes
  Owner                 Data size       Description
  GA$<version>3p950            0x00000010       OPEN        Applies to region from 0x48 to 0x44
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x48
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x48
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x48
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x48
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x48
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x48
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x48
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x48
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x48
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x48

Displaying notes found in: .gnu.build.attributes.hot
  Owner                 Data size       Description
  GA$<version>3h950            0x00000010       OPEN        Applies to region from 0x4
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x4 to 0x44

Displaying notes found in: .gnu.build.attributes.unlikely
  Owner                 Data size       Description
  GA$<version>3c950            0x00000010       OPEN        Applies to region from 0x4
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x4 to 0x44

Displaying notes found in: .gnu.build.attributes.startup
  Owner                 Data size       Description
  GA$<version>3s950            0x00000010       OPEN        Applies to region from 0x4
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x4 to 0x44

Displaying notes found in: .gnu.build.attributes.exit
  Owner                 Data size       Description
  GA$<version>3e950            0x00000010       OPEN        Applies to region from 0x4
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x4 to 0x44
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<stack prot>off           0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x4 to 0x44
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x4 to 0x44

This seems to cause an open-ended GA*FORTIFY:0xff note in opencryptoki.

Comment 4 Florian Weimer 2021-02-16 09:46:37 UTC
Created attachment 1757208 [details]
Unstripped /usr/sbin/p11sak (from opencryptoki-3.15.1-5.el8.ppc64le rebuild)

Comment 5 Florian Weimer 2021-02-16 09:49:22 UTC
Created attachment 1757209 [details]
Stripped /usr/sbin/p11sak (from opencryptoki-3.15.1-5.el8.ppc64le rebuild)

This is after the RPM build process (after note merging etc.). These notes are left:

Displaying notes found in: .gnu.build.attributes
  Owner                 Data size       Description
  GA$<version>3a1              0x00000010       OPEN        Applies to region from 0xd40 to 0x489c
  GA*<stack prot>strong        0x00000010       OPEN        Applies to region from 0x1144 to 0x93c4
  GA$<tool>annobin gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x1144 to 0x93c4
  GA$<tool>running gcc 8.4.1 20200928 0x00000000        OPEN        Applies to region from 0x1144 to 0x93c4
  GA*<ABI>0x20                 0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA*<PIC>PIC                  0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA!<short enum>false         0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA*FORTIFY:0x2               0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA*GOW:0x2452a               0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA*cf_protection:0x1         0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA+omit_frame_pointer:true   0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA+stack_clash:true          0x00000000       OPEN        Applies to region from 0x1144 to 0x93c4
  GA*<PIC>PIE                  0x00000010       OPEN        Applies to region from 0x1144 to 0x929c
  GA*GOW:0x2c52a               0x00000000       OPEN        Applies to region from 0x1144 to 0x929c
  GA*<stack prot>off           0x00000010       OPEN        Applies to region from 0x1144 to 0x489c
  GA*<PIC>static               0x00000000       OPEN        Applies to region from 0x1144 to 0x489c
  GA*FORTIFY:0xff              0x00000000       OPEN        Applies to region from 0x1144 to 0x489c
  GA$<version>3s950            0x00000010       OPEN        Applies to region from 0x1144 to 0x4858
  GA$<version>3c950            0x00000010       OPEN        Applies to region from 0x1144 to 0x1140
  GA$<version>3e950            0x00000000       OPEN        Applies to region from 0x1144
  GA$<version>3h950            0x00000010       OPEN        Applies to region from 0x485c to 0x4858
  GA$<version>3a1              0x00000010       OPEN        Applies to region from 0x48a0 to 0x94a8
  GA$<version>3p950            0x00000010       OPEN        Applies to region from 0x48a0 to 0x93c4
  GA*FORTIFY:0x2               0x00000010       func        Applies to region from 0x1140 to 0x929c
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       func        Applies to region from 0x1140 to 0x929c
  GA*GOW:0x2c52a               0x00000010       func        Applies to region from 0x1140 to 0x4858
  GA*cf_protection:0x1         0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA+omit_frame_pointer:true   0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA+stack_clash:true          0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA*<stack prot>strong        0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA*<ABI>0x20                 0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA*<PIC>PIE                  0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA!<short enum>false         0x00000000       func        Applies to region from 0x1140 to 0x4858
  GA*FORTIFY:0x2               0x00000010       func        Applies to region from 0x92a0 to 0x93c4
  GA+GLIBCXX_ASSERTIONS:true   0x00000000       func        Applies to region from 0x92a0 to 0x93c4

Comment 6 Florian Weimer 2021-02-16 09:59:47 UTC
Created attachment 1757224 [details]
Scrt1.o from glibc-devel-2.28-140.el8.ppc64le

Comment 7 Florian Weimer 2021-02-16 10:00:32 UTC
Created attachment 1757226 [details]
Scrt1.o from glibc-devel-2.28-148.el8.ppc64le

Comment 8 Florian Weimer 2021-02-16 10:02:35 UTC
I forgot that Scrt1.o is actually used during linking due to PIE. Copying Scrt1.o from -140 glibc to /usr/lib64 makes the annocheck result for p11sak pass even if the rest of glibc is the -148 version.

Comment 9 Florian Weimer 2021-02-16 10:22:13 UTC
And rebuild -140 with the current toolchain (annobin-9.50-1.el8.ppc64le, binutils-2.30-90.el8.ppc64le, gcc-8.4.1-1.el8.ppc64le) produces exactly the same Scrt1.o file as we in the -148 version of glibc. It's not a glibc source change that is causing this.

Comment 10 Nick Clifton 2021-02-17 15:41:33 UTC
Darn - this is another bug in objcopy's note merging code.

In this case the problem is that ppc64le binaries can have empty note ranges that are actually encoded with a start address that is higher than the end address.  The merge algorithm was not expecting this and goes a little bit haywire when it happens.  I have a local patch which I am testing now...

Comment 20 Nick Clifton 2021-02-19 10:49:46 UTC
(In reply to RHEL Program Management from comment #15)

> ======= Impact Statement ======= 
> 
> What is the benefit of making this change after the deadline? What is the
> impact on customer satisfaction, and on the business?

The fix will prevent spurious failure results in the RPMDiff process run by
QE when builds are submitted for attachment to an errata.  This will reduce
the load on package maintainers, and QE, thus helping to streamline the
delivery of RHEL-8.4.0 to customers.


> a. For bugfixes, there must be support from someone in Customer Support, a
> Partner Manager, Product Manager, and/or a Business Unit rep. (e.g.,
> potentially from a layered product BU). 

Brian Gollaher supports this request.


> What is the risk to the release schedule, quality, and the impact of
> diverting resources from other efforts?

There should be negligible impact to the release schedule since the
fix is already developed and testing by QE should be simple.
Accepting the change however is likely to have a positive impact on
the quality and timeliness of the release as it will avoid wasting
developer and QE time.


> Will there be enough time to do the
> necessary large-scale, cross-function, regression, stress, or
> fault-insertion testing that may be required to verify this change? 

None of that kind of testing will be necessary fir this particular
change.  Simply verifying that opencryptoki package builds and passes
the rpmdiff tests will be sufficient.


> 4. Prepare a RHEL rpm scratch build and have this change validated on the
> latest RHEL milestone compose by someone other than the developer. A comment
> must be added to the Bugzilla indicating the validation is successful and
> there were no observed regressions.

See comment #18.

Comment 21 Michal Domonkos 2021-02-22 09:44:42 UTC
*** Bug 1929635 has been marked as a duplicate of this bug. ***

Comment 26 Miloš Prchlík 2021-03-08 08:22:49 UTC
Verified with binutils-2.30-93.el8.

Comment 30 errata-xmlrpc 2021-05-18 13:28:07 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (binutils bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:1572


Note You need to log in before you can comment on or make changes to this bug.