[Bug ld/25861] xtensa ld error: (.debug_line+0x3b12): dangerous relocation: overflow after relaxation

2020-04-25 Thread jcmvbkbc at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=25861

jcmvbkbc at gcc dot gnu.org changed:

   What|Removed |Added

 Resolution|FIXED   |---
 Status|RESOLVED|REOPENED

--- Comment #6 from jcmvbkbc at gcc dot gnu.org ---
XTENSA_NDIFF relocations are handled incorrectly: they should not change value
sign, only add stripped ones at the top.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25876] New: Demangling support for "spaceship operator"

2020-04-25 Thread matt at godbolt dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=25876

Bug ID: 25876
   Summary: Demangling support for "spaceship operator"
   Product: binutils
   Version: 2.35 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: matt at godbolt dot org
  Target Milestone: ---

c++filt does not support the new C++ `operator <=>`, instead showing mangled
names like "_ZNK3FoossERKS_".

(Example at https://github.com/mattgodbolt/compiler-explorer/issues/1942 )


I just tried with HEAD cxxfilt too:

~/d/b/binutils (master|…) $ ./cxxfilt _ZNK3FoossERKS_
_ZNK3FoossERKS_
~/d/b/binutils (master|…) $ ./cxxfilt --version
GNU c++filt (GNU Binutils) 2.34.50.20200425
Copyright (C) 2020 Free Software Foundation, Inc.
This program is free software; you may redistribute it under the terms of
the GNU General Public License version 3 or (at your option) any later version.
This program has absolutely no warranty.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/25873] ar segfaults when liblto_plugin.so.0.0.0 is a symlink in /usr/lib/bfd-plugins

2020-04-25 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=25873

H.J. Lu  changed:

   What|Removed |Added

 CC||hjl.tools at gmail dot com
 Status|NEW |WAITING

--- Comment #2 from H.J. Lu  ---
Please try binutils 2.34 branch.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Issue 21372 in oss-fuzz: binutils:fuzz_readelf: Timeout in fuzz_readelf

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #2 on issue 21372 by sheriffbot: binutils:fuzz_readelf: Timeout in 
fuzz_readelf
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21372#c2

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 21359 in oss-fuzz: binutils:fuzz_disassemble: Use-of-uninitialized-value in suffix

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #4 on issue 21359 by sheriffbot: binutils:fuzz_disassemble: 
Use-of-uninitialized-value in suffix
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21359#c4

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 21342 in oss-fuzz: binutils:fuzz_bfd: Heap-buffer-overflow in bfd_getb32

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 21342 by sheriffbot: binutils:fuzz_bfd: 
Heap-buffer-overflow in bfd_getb32
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21342#c3

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 21352 in oss-fuzz: binutils:fuzz_readelf: Direct-leak in xmalloc

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #4 on issue 21352 by sheriffbot: binutils:fuzz_readelf: Direct-leak in 
xmalloc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21352#c4

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 21354 in oss-fuzz: binutils:fuzz_bfd: Use-of-uninitialized-value in bfd_bread

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #5 on issue 21354 by sheriffbot: binutils:fuzz_bfd: 
Use-of-uninitialized-value in bfd_bread
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21354#c5

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 21379 in oss-fuzz: binutils:fuzz_bfd: Out-of-memory in fuzz_bfd

2020-04-25 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #2 on issue 21379 by sheriffbot: binutils:fuzz_bfd: Out-of-memory in 
fuzz_bfd
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21379#c2

This bug has been fixed for 30 days. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.