https://sourceware.org/bugzilla/show_bug.cgi?id=24125
--- Comment #3 from Christer Solskogen ---
Created attachment 11566
--> https://sourceware.org/bugzilla/attachment.cgi?id=11566&action=edit
not working .S file
--
You are receiving this mail because:
You are on the CC list for the bug.
___
https://sourceware.org/bugzilla/show_bug.cgi?id=24125
Christer Solskogen changed:
What|Removed |Added
Attachment #11564|0 |1
is obsolete|
https://sourceware.org/bugzilla/show_bug.cgi?id=24125
Alan Modra changed:
What|Removed |Added
CC||amodra at gmail dot com
--- Comment #2 f
Hi There
Peng Li and Shengjian Guo at Baidu XLab found a suspicious unsigned integer
overflow which may bypass a check unintentionally. The bug is found in function
get_data of readelf.c of version 2.31.51.20190117.
static void *
get_data (void * var,
Filedata * fileda
On 23.01.2019 05:35, Alan Modra wrote:
On Wed, Jan 23, 2019 at 10:26:06AM +0800, Liu Hao wrote:
在 2019/1/22 上午4:20, Christer Solskogen 写道:
I've successfully built a multilib compiler on linux targeting both
x86_64-w64-mingw32 and i686-w64-mingw32. Using that compiler to compile
a native Windows