Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

mips/mipsel: overflow of int #123

Closed
powersj opened this issue Jun 30, 2023 · 2 comments · Fixed by #124
Closed

mips/mipsel: overflow of int #123

powersj opened this issue Jun 30, 2023 · 2 comments · Fixed by #124

Comments

@powersj
Copy link

powersj commented Jun 30, 2023

Describe the bug

Similar to #53, during a cross-build on mips and mipsel the following failure occurs:

/go/pkg/mod/github.com/microsoft/[email protected]/ucs22str.go:23:20: 0xFFFFFFF8 (untyped int constant 4294967288) overflows int

To Reproduce

Import the library and cross-build for mips and mipsel

Expected behavior

Successfully build

@shueybubbles
Copy link
Collaborator

the build matrix is rather complex to detect breaks.
Should we build and release github.com/microsoft/go-sqlcmd on mips/mipsel too?

@powersj
Copy link
Author

powersj commented Jun 30, 2023

For some background as to how I ran across this: I discovered this when converting Telegraf, which supports a large number of architectures, from the original https://github.com/denisenkom/go-mssqldb project to this fork.

shueybubbles pushed a commit that referenced this issue Jun 30, 2023
* fix: mips and mipsel builds

fixes: #123

* swap el or le
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants