[Bug gas/27217] aarch64 as Internal error in md_apply_fix at ....../gas/config/tc-aarch64.c:8330.

2023-03-22 Thread jbeulich at suse dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=27217

Jan Beulich  changed:

   What|Removed |Added

 Resolution|FIXED   |---
 Status|RESOLVED|REOPENED

--- Comment #24 from Jan Beulich  ---
(In reply to Kinsey Moore from comment #22)
> To be clear, the "no symbol" error has returned.

Since the testcase that was originally added doesn't cover this case (which is
why it wasn't noticed), can you please supply an example code fragment where
the bad behavior is observed?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug gas/27217] aarch64 as Internal error in md_apply_fix at ....../gas/config/tc-aarch64.c:8330.

2023-03-22 Thread nyphbl8d+sourceware at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=27217

--- Comment #25 from Kinsey Moore  ---
The original test case should show it provided that you also attempt to link it
as per Nick's comment: https://sourceware.org/bugzilla/show_bug.cgi?id=27217#c4

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug gas/27217] aarch64 as Internal error in md_apply_fix at ....../gas/config/tc-aarch64.c:8330.

2023-03-22 Thread jbeulich at suse dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=27217

--- Comment #26 from Jan Beulich  ---
(In reply to Kinsey Moore from comment #25)
> The original test case should show it provided that you also attempt to link
> it as per Nick's comment:
> https://sourceware.org/bugzilla/show_bug.cgi?id=27217#c4

Oh, I'm sorry for not paying attention. I can indeed observe the issue there.

Quoting from the description of r_info in the ELF spec: "If the index is
STN_UNDEF, the undefined symbol index, the relocation uses 0 as the ``symbol
value''." Which makes me think we're dealing with a linker issue here, as this
is precisely the situation we're in. I'll see to find time to go hunt, but I'm
far less familiar with ld than with gas. (If others agree this is a separate
issue, I guess this would better be handled in a fresh bug report.)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug gas/27217] aarch64 as Internal error in md_apply_fix at ....../gas/config/tc-aarch64.c:8330.

2023-03-22 Thread jbeulich at suse dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=27217

--- Comment #27 from Jan Beulich  ---
Another question is: Can't we suppress emitting of relocations when the value
is absolute? (Of course really the relocation in the testcase should reference
"bar", but as we've seen arranging for that by simply avoiding to evaluate
expressions produces other fallout. In the corresponding email conversation I
did suggest yet another expression evaluation mode as a possible route. But
that would look more like another hack than a solution, to me at least.)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/27565] ld: Support input section description keyword: REVERSE

2023-03-22 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=27565

Nick Clifton  changed:

   What|Removed |Added

 Status|UNCONFIRMED |ASSIGNED
   Last reconfirmed||2023-03-22
   Assignee|unassigned at sourceware dot org   |nickc at redhat dot com
 Ever confirmed|0   |1
 CC||nickc at redhat dot com

--- Comment #2 from Nick Clifton  ---
Created attachment 14772
  --> https://sourceware.org/bugzilla/attachment.cgi?id=14772&action=edit
Proposed patch

Hi Fanguri,

  What do you think of this patch ?  Does it do what you need ?

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Issue 57025 in oss-fuzz: binutils:fuzz_objdump_safe: Use-of-uninitialized-value in sanitize_string

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 57025 by sheriffbot: binutils:fuzz_objdump_safe: 
Use-of-uninitialized-value in sanitize_string
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57025#c3

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57047 in oss-fuzz: binutils:fuzz_addr2line: Direct-leak in htab_create_alloc

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 57047 by sheriffbot: binutils:fuzz_addr2line: Direct-leak 
in htab_create_alloc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57047#c3

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57156 in oss-fuzz: binutils:fuzz_objdump_safe: Null-dereference READ in bfd_getb32

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 57156 by sheriffbot: binutils:fuzz_objdump_safe: 
Null-dereference READ in bfd_getb32
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57156#c3

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57258 in oss-fuzz: binutils:fuzz_as: Unexpected-exit in xexit

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #2 on issue 57258 by sheriffbot: binutils:fuzz_as: Unexpected-exit in 
xexit
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57258#c2

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57186 in oss-fuzz: binutils:fuzz_objcopy: Out-of-memory in fuzz_objcopy

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 57186 by sheriffbot: binutils:fuzz_objcopy: Out-of-memory 
in fuzz_objcopy
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57186#c3

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57274 in oss-fuzz: binutils:fuzz_objdump_safe: Null-dereference READ in bfd_getl32

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #2 on issue 57274 by sheriffbot: binutils:fuzz_objdump_safe: 
Null-dereference READ in bfd_getl32
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57274#c2

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57279 in oss-fuzz: binutils:fuzz_as: Direct-leak in xrealloc

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #2 on issue 57279 by sheriffbot: binutils:fuzz_as: Direct-leak in 
xrealloc
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57279#c2

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

Issue 57159 in oss-fuzz: binutils:fuzz_nm: Timeout in fuzz_nm

2023-03-22 Thread sheriffbot via monorail
Updates:
Labels: -restrict-view-commit

Comment #3 on issue 57159 by sheriffbot: binutils:fuzz_nm: Timeout in fuzz_nm
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=57159#c3

This bug has been fixed. It has been opened to the public.

- Your friendly Sheriffbot

-- 
You received this message because:
  1. You were specifically CC'd on the issue

You may adjust your notification preferences at:
https://bugs.chromium.org/hosting/settings

Reply to this email to add a comment.

[Bug libctf/30264] New: offsets of fields in unnamed structures/unions are wrong

2023-03-22 Thread nick.alcock at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=30264

Bug ID: 30264
   Summary: offsets of fields in unnamed structures/unions are
wrong
   Product: binutils
   Version: 2.36
Status: NEW
  Severity: normal
  Priority: P2
 Component: libctf
  Assignee: unassigned at sourceware dot org
  Reporter: nick.alcock at oracle dot com
  Target Milestone: ---

In e.g.

struct A
{
  int a;
  char *b;
  struct
  {
struct
{
  char *one;
  int two;
};
  };
};

offsetof (struct A, one) is most unlikely to be zero; but
ctf_member_info (CTF_type_corresponding_to_A, "one") returns zero every time.

This is obviously wrong: ctf_member_info() recurses to anonymous struct
children but does not add the offset of the anonymous struct to the offset it
returns.

(A secondary but much less significant problem is that ctf_add_member() of
fields to such structures should return ECTF_DUPLICATE if the name exists in
any of the containing structures or in any underlying anonymous ones. Of course
this is only likely to happen if the compiler is buggy or something very
strange is being hand-built using the ctf_add*() functions.)

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug libctf/30264] offsets of fields in unnamed structures/unions are wrong

2023-03-22 Thread nick.alcock at oracle dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=30264

Nick Alcock  changed:

   What|Removed |Added

   Assignee|unassigned at sourceware dot org   |nick.alcock at oracle 
dot com
 Status|NEW |ASSIGNED

--- Comment #1 from Nick Alcock  ---
Testing a fix.

-- 
You are receiving this mail because:
You are on the CC list for the bug.