[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 --- Comment #6 from H.J. Lu --- Please provide pre-processed dpmi.c from gcc -E and command-line options to generate dpmi.s -- You are receiving this mail because: You are on the CC list for the bug. _

[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread stsp at users dot sourceforge.net
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 --- Comment #5 from Stas Sergeev --- Basically this code calculates the distance between "DPMI_return_from_realmode" and "DPMI_dummy_start", and puts the result into a 16bit variable. That explains the use of %ax. Its possible because those fu

[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread stsp at users dot sourceforge.net
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 --- Comment #4 from Stas Sergeev --- (In reply to H.J. Lu from comment #3) > do_dpmi_int has Ah, I see now what you mean. > 8f69: 8b 83 00 00 00 00 mov0x0(%ebx),%eax 8f6b: > R_386_GOT32X DPMI_return_from_realmode >

[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 --- Comment #3 from H.J. Lu --- (In reply to Stas Sergeev from comment #2) > (In reply to H.J. Lu from comment #1) > > dpmi.o has: > > > > 8f69: 8b 83 00 00 00 00 mov0x0(%ebx),%eax 8f6b: > > R_386_GOT32X DPMI_return

[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread stsp at users dot sourceforge.net
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 --- Comment #2 from Stas Sergeev --- (In reply to H.J. Lu from comment #1) > dpmi.o has: > > 8f69: 8b 83 00 00 00 00 mov0x0(%ebx),%eax 8f6b: > R_386_GOT32X DPMI_return_from_realmode > 8f6f: 66 05 00 48

[Bug ld/23854] -no-pie -export-dynamic corrupts binary

2018-11-04 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=23854 H.J. Lu changed: What|Removed |Added Status|UNCONFIRMED |WAITING Last reconfirmed|

[Bug gas/23840] .symver fails with multiple versions [...] for symbol `...'

2018-11-04 Thread fweimer at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=23840 Florian Weimer changed: What|Removed |Added CC||fweimer at redhat dot com -- You ar

[Bug gold/23856] Executables linked with gold against musl segfault at startup

2018-11-04 Thread mail at nh2 dot me
https://sourceware.org/bugzilla/show_bug.cgi?id=23856 mail at nh2 dot me changed: What|Removed |Added CC||mail at nh2 dot me -- You are re

[Bug gold/23856] Executables linked with gold against musl segfault at startup

2018-11-04 Thread mail at nh2 dot me
https://sourceware.org/bugzilla/show_bug.cgi?id=23856 --- Comment #1 from mail at nh2 dot me --- This was found as part of https://github.com/NixOS/nixpkgs/issues/49071 -- You are receiving this mail because: You are on the CC list for the bug. ___ bug

[Bug gold/23856] New: Executables linked with gold against musl segfault at startup

2018-11-04 Thread mail at nh2 dot me
https://sourceware.org/bugzilla/show_bug.cgi?id=23856 Bug ID: 23856 Summary: Executables linked with gold against musl segfault at startup Product: binutils Version: 2.30 Status: UNCONFIRMED Severity: normal