https://sourceware.org/bugzilla/show_bug.cgi?id=31208
--- Comment #3 from Alan Modra <amodra at gmail dot com> --- (In reply to Matt Wozniski from comment #0) > The issue appears to be caused by segment 8 (0-based, as reported by > `readelf -eW`). For the original shared library, that segment is reported as: > > Type Offset VirtAddr PhysAddr FileSiz > MemSiz Flg Align > LOAD 0x878000 0x00000000002ff000 0x00000000002ff000 0x00d498 > 0x00d498 RW 0x1000 So how did that load segment get there? It doesn't correspond to any sections, but will be loading something into memory (a bunch of 'X's ie. 0x58 bytes by the look of it). Is that used by the .so? Perhaps the correct fix for strip is to refuse to edit this file. -- You are receiving this mail because: You are on the CC list for the bug.