[Bug ld/26404] ld: INSERT [AFTER|BEFORE] variant for extension purposes

2021-09-03 Thread dwenceri484 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=26404

ceri dwen  changed:

   What|Removed |Added

 CC||dwenceri484 at gmail dot com

--- Comment #12 from ceri dwen  ---
You've developed a strong interest in the game geometry dash. As you are aware,
you must use a frame and leap on various platforms to keep the lens from
falling into the traps you have set up. There are so many different levels to
choose from that you will never get bored.

Click on the link to see more new games: https://geometry-dash.co

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28303] New: objdump crashes in riscv_elf_add_sub_reloc

2021-09-03 Thread shaohua.li at inf dot ethz.ch
https://sourceware.org/bugzilla/show_bug.cgi?id=28303

Bug ID: 28303
   Summary: objdump crashes in riscv_elf_add_sub_reloc
   Product: binutils
   Version: 2.38 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: shaohua.li at inf dot ethz.ch
  Target Milestone: ---

Created attachment 13647
  --> https://sourceware.org/bugzilla/attachment.cgi?id=13647&action=edit
poc

Hi there,

I crashed `objdump -S` with a fuzzer.

- Compiler: clang12
- Platform: Ubuntu 18.04.5 LTS, x86_64
- Reproduce: run `objdump -S poc`

AddressSanitizer report:

==2784==ERROR: AddressSanitizer: SEGV on unknown address 0x60e1003f (pc
0x0113c315 bp 0x7ffe695a69f0 sp 0x7ffe695a6700 T0)
==2784==The signal is caused by a READ memory access.
#0 0x113c315 in riscv_elf_add_sub_reloc
/binutils_latest/repo/bfd/elfxx-riscv.c:1005:23
#1 0x1b4bae7 in bfd_perform_relocation
/binutils_latest/repo/bfd/reloc.c:711:14
#2 0x1b4fa9f in bfd_generic_get_relocated_section_contents
/binutils_latest/repo/bfd/reloc.c:8463:10
#3 0xae85cf in bfd_get_relocated_section_contents
/binutils_latest/repo/bfd/bfd.c:2166:10
#4 0xb11ef8 in bfd_simple_get_relocated_section_contents
/binutils_latest/repo/bfd/simple.c:298:14
#5 0xca6ba7 in _bfd_dwarf1_find_nearest_line
/binutils_latest/repo/bfd/dwarf1.c:523:4
#6 0xbd3447 in _bfd_elf_find_nearest_line
/binutils_latest/repo/bfd/elf.c:9199:7
#7 0x4e49ea in show_line /binutils_latest/repo/binutils/./objdump.c:1784:9
#8 0x4e0b9f in disassemble_bytes
/binutils_latest/repo/binutils/./objdump.c:2770:6
#9 0x4daf10 in disassemble_section
/binutils_latest/repo/binutils/./objdump.c:3455:4
#10 0xb100da in bfd_map_over_sections
/binutils_latest/repo/bfd/section.c:1383:5
#11 0x4d1ae0 in disassemble_data
/binutils_latest/repo/binutils/./objdump.c:3599:3
#12 0x4cda84 in dump_bfd /binutils_latest/repo/binutils/./objdump.c:5006:5
#13 0x4ccb9f in display_object_bfd
/binutils_latest/repo/binutils/./objdump.c:5068:7
#14 0x4ccaa9 in display_any_bfd
/binutils_latest/repo/binutils/./objdump.c:5158:5
#15 0x4cc65c in display_file
/binutils_latest/repo/binutils/./objdump.c:5179:3
#16 0x4cb063 in main /binutils_latest/repo/binutils/./objdump.c:5529:6
#17 0x7f26086320b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#18 0x41c61d in _start (/out_bin/objdump+0x41c61d)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /binutils_latest/repo/bfd/elfxx-riscv.c:1005:23
in riscv_elf_add_sub_reloc
==2784==ABORTING

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28304] New: objdump crashes in bfd_get_symcount

2021-09-03 Thread shaohua.li at inf dot ethz.ch
https://sourceware.org/bugzilla/show_bug.cgi?id=28304

Bug ID: 28304
   Summary: objdump crashes in bfd_get_symcount
   Product: binutils
   Version: 2.38 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: shaohua.li at inf dot ethz.ch
  Target Milestone: ---

Created attachment 13648
  --> https://sourceware.org/bugzilla/attachment.cgi?id=13648&action=edit
poc

Hi there,

I crashed `objdump -S` with a fuzzer.

- Compiler: clang12
- Platform: Ubuntu 18.04.5 LTS, x86_64
- Reproduce: run `objdump -S poc`

AddressSanitizer report:

==2797==ERROR: AddressSanitizer: SEGV on unknown address 0x00c8 (pc
0x00f07bf3 bp 0x7ffc74b438d0 sp 0x7ffc74b438b0 T0)
==2797==The signal is caused by a READ memory access.
==2797==Hint: address points to the zero page.
#0 0xf07bf3 in bfd_get_symcount /binutils_latest/repo/bfd/./bfd.h:6847:16
#1 0xf07925 in score_elf_assign_gp
/binutils_latest/repo/bfd/elf32-score7.c:265:11
#2 0xf07256 in score_elf_final_gp
/binutils_latest/repo/bfd/elf32-score7.c:330:17
#3 0xf064a9 in score_elf_gprel15_reloc
/binutils_latest/repo/bfd/elf32-score7.c:446:9
#4 0x1b4bae7 in bfd_perform_relocation
/binutils_latest/repo/bfd/reloc.c:711:14
#5 0x1b4fa9f in bfd_generic_get_relocated_section_contents
/binutils_latest/repo/bfd/reloc.c:8463:10
#6 0xae85cf in bfd_get_relocated_section_contents
/binutils_latest/repo/bfd/bfd.c:2166:10
#7 0xb11ef8 in bfd_simple_get_relocated_section_contents
/binutils_latest/repo/bfd/simple.c:298:14
#8 0xcaddac in read_section /binutils_latest/repo/bfd/./dwarf2.c:582:7
#9 0xcaaa47 in _bfd_dwarf2_slurp_debug_info
/binutils_latest/repo/bfd/./dwarf2.c:4737:13
#10 0xcaefd1 in _bfd_dwarf2_find_nearest_line
/binutils_latest/repo/bfd/./dwarf2.c:4985:9
#11 0xbd33e9 in _bfd_elf_find_nearest_line
/binutils_latest/repo/bfd/elf.c:9192:7
#12 0x4e49ea in show_line /binutils_latest/repo/binutils/./objdump.c:1784:9
#13 0x4e0b9f in disassemble_bytes
/binutils_latest/repo/binutils/./objdump.c:2770:6
#14 0x4daf10 in disassemble_section
/binutils_latest/repo/binutils/./objdump.c:3455:4
#15 0xb100da in bfd_map_over_sections
/binutils_latest/repo/bfd/section.c:1383:5
#16 0x4d1ae0 in disassemble_data
/binutils_latest/repo/binutils/./objdump.c:3599:3
#17 0x4cda84 in dump_bfd /binutils_latest/repo/binutils/./objdump.c:5006:5
#18 0x4ccb9f in display_object_bfd
/binutils_latest/repo/binutils/./objdump.c:5068:7
#19 0x4ccaa9 in display_any_bfd
/binutils_latest/repo/binutils/./objdump.c:5158:5
#20 0x4cc65c in display_file
/binutils_latest/repo/binutils/./objdump.c:5179:3
#21 0x4cb063 in main /binutils_latest/repo/binutils/./objdump.c:5529:6
#22 0x7fc60e97f0b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#23 0x41c61d in _start (/out_bin/objdump+0x41c61d)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /binutils_latest/repo/bfd/./bfd.h:6847:16 in
bfd_get_symcount
==2797==ABORTING

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28305] New: ojbjdump: heap-buffer-overflow in xtensa_insnbuf_from_chars

2021-09-03 Thread shaohua.li at inf dot ethz.ch
https://sourceware.org/bugzilla/show_bug.cgi?id=28305

Bug ID: 28305
   Summary: ojbjdump: heap-buffer-overflow in
xtensa_insnbuf_from_chars
   Product: binutils
   Version: 2.38 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: shaohua.li at inf dot ethz.ch
  Target Milestone: ---

Created attachment 13649
  --> https://sourceware.org/bugzilla/attachment.cgi?id=13649&action=edit
heap_poc

Hi there,

I found a heap-buffer-overflow in xtensa_insnbuf_from_chars in
xtensa-isa.c:226.

- Compiler: clang12
- Platform: Ubuntu 18.04.5 LTS, x86_64
- Reproduce: run `objdump -S heap_poc`

AddressSanitizer report:

==2811==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020007d
at pc 0x01ae6740 bp 0x7ffe45a77070 sp 0x7ffe45a77068
READ of size 1 at 0x6020007d thread T0
#0 0x1ae673f in xtensa_insnbuf_from_chars
/binutils_latest/repo/bfd/xtensa-isa.c:226:37
#1 0x1819c75 in elf_xtensa_do_reloc
/binutils_latest/repo/bfd/elf32-xtensa.c:1972:3
#2 0x1819218 in bfd_elf_xtensa_reloc
/binutils_latest/repo/bfd/elf32-xtensa.c:2235:10
#3 0x1b4bae7 in bfd_perform_relocation
/binutils_latest/repo/bfd/reloc.c:711:14
#4 0x1b4fa9f in bfd_generic_get_relocated_section_contents
/binutils_latest/repo/bfd/reloc.c:8463:10
#5 0xae85cf in bfd_get_relocated_section_contents
/binutils_latest/repo/bfd/bfd.c:2166:10
#6 0xb11ef8 in bfd_simple_get_relocated_section_contents
/binutils_latest/repo/bfd/simple.c:298:14
#7 0xcaddac in read_section /binutils_latest/repo/bfd/./dwarf2.c:582:7
#8 0xcaaa47 in _bfd_dwarf2_slurp_debug_info
/binutils_latest/repo/bfd/./dwarf2.c:4737:13
#9 0xcaefd1 in _bfd_dwarf2_find_nearest_line
/binutils_latest/repo/bfd/./dwarf2.c:4985:9
#10 0xbd33e9 in _bfd_elf_find_nearest_line
/binutils_latest/repo/bfd/elf.c:9192:7
#11 0x4e49ea in show_line /binutils_latest/repo/binutils/./objdump.c:1784:9
#12 0x4e0b9f in disassemble_bytes
/binutils_latest/repo/binutils/./objdump.c:2770:6
#13 0x4daf10 in disassemble_section
/binutils_latest/repo/binutils/./objdump.c:3455:4
#14 0xb100da in bfd_map_over_sections
/binutils_latest/repo/bfd/section.c:1383:5
#15 0x4d1ae0 in disassemble_data
/binutils_latest/repo/binutils/./objdump.c:3599:3
#16 0x4cda84 in dump_bfd /binutils_latest/repo/binutils/./objdump.c:5006:5
#17 0x4ccb9f in display_object_bfd
/binutils_latest/repo/binutils/./objdump.c:5068:7
#18 0x4ccaa9 in display_any_bfd
/binutils_latest/repo/binutils/./objdump.c:5158:5
#19 0x4cc65c in display_file
/binutils_latest/repo/binutils/./objdump.c:5179:3
#20 0x4cb063 in main /binutils_latest/repo/binutils/./objdump.c:5529:6
#21 0x7f29a2bdf0b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#22 0x41c61d in _start (/out_bin/objdump+0x41c61d)

0x6020007d is located 0 bytes to the right of 13-byte region
[0x60200070,0x6020007d)
allocated by thread T0 here:
#0 0x4974dd in malloc (/out_bin/objdump+0x4974dd)
#1 0xb044e2 in bfd_malloc /binutils_latest/repo/bfd/libbfd.c:289:9
#2 0xcadd6d in read_section /binutils_latest/repo/bfd/./dwarf2.c:578:31
#3 0xcaaa47 in _bfd_dwarf2_slurp_debug_info
/binutils_latest/repo/bfd/./dwarf2.c:4737:13
#4 0xcaefd1 in _bfd_dwarf2_find_nearest_line
/binutils_latest/repo/bfd/./dwarf2.c:4985:9
#5 0xbd33e9 in _bfd_elf_find_nearest_line
/binutils_latest/repo/bfd/elf.c:9192:7
#6 0x4e49ea in show_line /binutils_latest/repo/binutils/./objdump.c:1784:9
#7 0x4e0b9f in disassemble_bytes
/binutils_latest/repo/binutils/./objdump.c:2770:6
#8 0x4daf10 in disassemble_section
/binutils_latest/repo/binutils/./objdump.c:3455:4
#9 0xb100da in bfd_map_over_sections
/binutils_latest/repo/bfd/section.c:1383:5
#10 0x4d1ae0 in disassemble_data
/binutils_latest/repo/binutils/./objdump.c:3599:3
#11 0x4cda84 in dump_bfd /binutils_latest/repo/binutils/./objdump.c:5006:5
#12 0x4ccb9f in display_object_bfd
/binutils_latest/repo/binutils/./objdump.c:5068:7
#13 0x4ccaa9 in display_any_bfd
/binutils_latest/repo/binutils/./objdump.c:5158:5
#14 0x4cc65c in display_file
/binutils_latest/repo/binutils/./objdump.c:5179:3
#15 0x4cb063 in main /binutils_latest/repo/binutils/./objdump.c:5529:6
#16 0x7f29a2bdf0b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)

SUMMARY: AddressSanitizer: heap-buffer-overflow
/binutils_latest/repo/bfd/xtensa-isa.c:226:37 in xtensa_insnbuf_from_chars
Shadow bytes around the buggy address:
  0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c047

[Bug ld/26869] ld: assertion fail ../../bfd/elflink.c:14806 on i686-linux-gnu since 382aae06322799a25ea52fe61b243cbca4db8d66

2021-09-03 Thread ovilewade9 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=26869

ovile009988  changed:

   What|Removed |Added

 CC||ovilewade9 at gmail dot com

--- Comment #11 from ovile009988  ---
Great fun forever visit https://solitaire-klondike.net and see some amazing
game card here.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28306] New: nm-new: null pointer dereference in bfd_getl16

2021-09-03 Thread shaohua.li at inf dot ethz.ch
https://sourceware.org/bugzilla/show_bug.cgi?id=28306

Bug ID: 28306
   Summary: nm-new: null pointer dereference in bfd_getl16
   Product: binutils
   Version: 2.38 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: shaohua.li at inf dot ethz.ch
  Target Milestone: ---

Created attachment 13650
  --> https://sourceware.org/bugzilla/attachment.cgi?id=13650&action=edit
dereference_poc

Hi there,

I found a dereference error when fuzzing `nm-new -l`.

- Compiler: clang12
- Platform: Ubuntu 18.04.5 LTS, x86_64
- Reproduce: run `nm-new -l dereference_poc`

AddressSanitizer report:
==2940==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x00503094 bp
0x7ffe3d636ff0 sp 0x7ffe3d636fb0 T0)
==2940==The signal is caused by a READ memory access.
==2940==Hint: this fault was caused by a dereference of a high value address
(see register values below).  Disassemble the provided pc to learn which
register was used.
#0 0x503094 in bfd_getl16 /binutils_latest/repo/bfd/libbfd.c:633:11
#1 0x9c15a1 in _bfd_mips_elf_reloc_unshuffle
/binutils_latest/repo/bfd/elfxx-mips.c:2359:11
#2 0x9aec04 in mips16_gprel_reloc
/binutils_latest/repo/bfd/elf64-mips.c:3666:3
#3 0x154b6b7 in bfd_perform_relocation
/binutils_latest/repo/bfd/reloc.c:711:14
#4 0xa142f9 in _bfd_elf_mips_get_relocated_section_contents
/binutils_latest/repo/bfd/elfxx-mips.c:13362:10
#5 0x4eaa6f in bfd_get_relocated_section_contents
/binutils_latest/repo/bfd/bfd.c:2166:10
#6 0x1551708 in bfd_simple_get_relocated_section_contents
/binutils_latest/repo/bfd/simple.c:298:14
#7 0x6aa68c in read_section /binutils_latest/repo/bfd/./dwarf2.c:582:7
#8 0x6a7327 in _bfd_dwarf2_slurp_debug_info
/binutils_latest/repo/bfd/./dwarf2.c:4737:13
#9 0x6ab8b1 in _bfd_dwarf2_find_nearest_line
/binutils_latest/repo/bfd/./dwarf2.c:4985:9
#10 0x5d0226 in _bfd_elf_find_line /binutils_latest/repo/bfd/elf.c:9234:10
#11 0x4d1ba0 in print_symbol /binutils_latest/repo/binutils/nm.c:1071:9
#12 0x4ceaeb in print_symbols /binutils_latest/repo/binutils/nm.c:1152:7
#13 0x4cd23c in display_rel_file /binutils_latest/repo/binutils/nm.c:1279:5
#14 0x4c97dd in display_file /binutils_latest/repo/binutils/nm.c:1446:7
#15 0x4c90db in main /binutils_latest/repo/binutils/nm.c:1965:12
#16 0x7f94667460b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#17 0x41c55d in _start (/out_bin/nm-new+0x41c55d)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /binutils_latest/repo/bfd/libbfd.c:633:11 in
bfd_getl16
==2940==ABORTING

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28307] New: nm-new: SEGV caused by a WRITE memory access

2021-09-03 Thread shaohua.li at inf dot ethz.ch
https://sourceware.org/bugzilla/show_bug.cgi?id=28307

Bug ID: 28307
   Summary: nm-new: SEGV caused by a WRITE memory access
   Product: binutils
   Version: 2.38 (HEAD)
Status: UNCONFIRMED
  Severity: normal
  Priority: P2
 Component: binutils
  Assignee: unassigned at sourceware dot org
  Reporter: shaohua.li at inf dot ethz.ch
  Target Milestone: ---

Created attachment 13651
  --> https://sourceware.org/bugzilla/attachment.cgi?id=13651&action=edit
poc

Hi there,

I crashed `nm-new -l` with a fuzzer.

- Compiler: clang12
- Platform: Ubuntu 18.04.5 LTS, x86_64
- Reproduce: run `nm-new -l poc`

AddressSanitizer report:
==2960==ERROR: AddressSanitizer: SEGV on unknown address 0x60b303e0 (pc
0x00504f40 bp 0x7ffebd457c30 sp 0x7ffebd457b90 T0)
==2960==The signal is caused by a WRITE memory access.
#0 0x504f40 in bfd_putl64 /binutils_latest/repo/bfd/libbfd.c:896:11
#1 0xaa3f3f in ppc64_elf_toc64_reloc
/binutils_latest/repo/bfd/elf64-ppc.c:1663:3
#2 0x154b6b7 in bfd_perform_relocation
/binutils_latest/repo/bfd/reloc.c:711:14
#3 0x154f66f in bfd_generic_get_relocated_section_contents
/binutils_latest/repo/bfd/reloc.c:8463:10
#4 0x4eaa6f in bfd_get_relocated_section_contents
/binutils_latest/repo/bfd/bfd.c:2166:10
#5 0x1551708 in bfd_simple_get_relocated_section_contents
/binutils_latest/repo/bfd/simple.c:298:14
#6 0x6aa68c in read_section /binutils_latest/repo/bfd/./dwarf2.c:582:7
#7 0x6a7327 in _bfd_dwarf2_slurp_debug_info
/binutils_latest/repo/bfd/./dwarf2.c:4737:13
#8 0x6ab8b1 in _bfd_dwarf2_find_nearest_line
/binutils_latest/repo/bfd/./dwarf2.c:4985:9
#9 0x5d0226 in _bfd_elf_find_line /binutils_latest/repo/bfd/elf.c:9234:10
#10 0x4d1ba0 in print_symbol /binutils_latest/repo/binutils/nm.c:1071:9
#11 0x4ceaeb in print_symbols /binutils_latest/repo/binutils/nm.c:1152:7
#12 0x4cd23c in display_rel_file /binutils_latest/repo/binutils/nm.c:1279:5
#13 0x4c97dd in display_file /binutils_latest/repo/binutils/nm.c:1446:7
#14 0x4c90db in main /binutils_latest/repo/binutils/nm.c:1965:12
#15 0x7f25b583f0b2 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#16 0x41c55d in _start (/out_bin/nm-new+0x41c55d)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /binutils_latest/repo/bfd/libbfd.c:896:11 in
bfd_putl64
==2960==ABORTING

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug binutils/28307] nm-new: SEGV caused by a WRITE memory access

2021-09-03 Thread amodra at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=28307

Alan Modra  changed:

   What|Removed |Added

   Target Milestone|--- |2.38
   Last reconfirmed||2021-09-04
 Status|UNCONFIRMED |ASSIGNED
   Assignee|unassigned at sourceware dot org   |amodra at gmail dot com
 Ever confirmed|0   |1

-- 
You are receiving this mail because:
You are on the CC list for the bug.