https://sourceware.org/bugzilla/show_bug.cgi?id=31208

--- Comment #3 from Alan Modra <amodra at gmail dot com> ---
(In reply to Matt Wozniski from comment #0)
> The issue appears to be caused by segment 8 (0-based, as reported by
> `readelf -eW`). For the original shared library, that segment is reported as:
> 
>   Type           Offset   VirtAddr           PhysAddr           FileSiz 
> MemSiz   Flg Align
>   LOAD           0x878000 0x00000000002ff000 0x00000000002ff000 0x00d498
> 0x00d498 RW  0x1000

So how did that load segment get there?  It doesn't correspond to any sections,
but will be loading something into memory (a bunch of 'X's ie. 0x58 bytes by
the look of it).  Is that used by the .so?  Perhaps the correct fix for strip
is to refuse to edit this file.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to