[Bug libctf/29856] libsframe asan: load misaligned at sframe.c:516

2022-12-05 Thread amodra at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29856 Alan Modra changed: What|Removed |Added CC||indu.bhagat at oracle dot com -- You ar

[Bug libctf/29856] New: libsframe asan: load misaligned at sframe.c:516

2022-12-05 Thread amodra at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29856 Bug ID: 29856 Summary: libsframe asan: load misaligned at sframe.c:516 Product: binutils Version: 2.40 (HEAD) Status: NEW Severity: normal Priority: P2 Compon

[Bug binutils/29855] Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized.

2022-12-05 Thread amodra at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29855 Alan Modra changed: What|Removed |Added Status|UNCONFIRMED |RESOLVED Resolution|---

[Bug binutils/29855] Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized.

2022-12-05 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29855 --- Comment #1 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Alan Modra : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502 commit 5830876a0cca17bef3b2d54908928

[Bug binutils/29855] Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized.

2022-12-05 Thread r3tr0spect2019 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29855 2019 changed: What|Removed |Added Target||addr2line Build|

[Bug binutils/29855] New: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized.

2022-12-05 Thread r3tr0spect2019 at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29855 Bug ID: 29855 Summary: Local variable `ch_type` in function `bfd_init_section_decompress_status` can be uninitialized. Product: binutils Version: 2.40 (HEAD)

[Bug ld/29851] -Wl,-z,ibtplt emits MPX jumps

2022-12-05 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29851 --- Comment #1 from H.J. Lu --- We should remove MPX from the x86-64 psABI first. -- You are receiving this mail because: You are on the CC list for the bug.

[Bug gas/29844] [2.40 Regression] arch/x86/kernel/signal_64.c:31: Error: register type mismatch for `lar'

2022-12-05 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29844 H.J. Lu changed: What|Removed |Added CC||manuel.lauss at gmail dot com --- Comment #

[Bug gas/29827] gas: build failure in linux x86/kernel/signal.c:60: Error: register type mismatch for `lar'

2022-12-05 Thread hjl.tools at gmail dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29827 H.J. Lu changed: What|Removed |Added Resolution|FIXED |DUPLICATE --- Comment #3 from H.J. Lu ---

Re: linking an assembler object creates an executable stack

2022-12-05 Thread Nick Clifton
Hi Alexander, During development of a project I noticed that linking a object created from assembler to another object created from C code results in a binary with executable stack. Blowing my own trumpet slightly, I wrote a blog about this kind of problem which might be of help: https://www.

[Bug ld/29852] New: segmentation fault in ld when using --just-sybols option with some executables

2022-12-05 Thread christian.maude...@embedded-brains.de
https://sourceware.org/bugzilla/show_bug.cgi?id=29852 Bug ID: 29852 Summary: segmentation fault in ld when using --just-sybols option with some executables Product: binutils Version: 2.40 (HEAD) Status: UNCONFIRMED

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 Nick Clifton changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

Re: linking an assembler object creates an executable stack

2022-12-05 Thread Andreas Schwab
2.39 -- Andreas Schwab, SUSE Labs, sch...@suse.de GPG Key fingerprint = 0196 BAD8 1CE9 1970 F4BE 1748 E4D4 88E3 0EEA B9D7 "And now for something completely different."

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #4 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Nick Clifton : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=3bf5bf547a2ffdbd702804b95b3218040ac470dc commit 3bf5bf547a2ffdbd702804b95b3

Re: linking an assembler object creates an executable stack

2022-12-05 Thread Alexander Pick
Thanks for the email. Is this a recent change, which ld version is this? I use 2.38 which is current Ubuntu one on 22.04 LTS. On Mon, 2022-12-05 at 15:43 +0100, Andreas Schwab wrote: > On Dez 05 2022, Alexander Pick wrote: > > > There is also no warning that the stack is executable during the > >

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread matz at suse dot de
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #3 from Michael Matz --- Thanks Nick for cleaning up after me. FWIW I was just testing an equivalent patch on most targets without regressions, so it's good to go. -- You are receiving this mail because: You are on the CC list f

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread mliska at suse dot cz
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #2 from Martin Liska --- Thanks Nick, the patch helps, please commit it. -- You are receiving this mail because: You are on the CC list for the bug.

Re: linking an assembler object creates an executable stack

2022-12-05 Thread Andreas Schwab
On Dez 05 2022, Alexander Pick wrote: > There is also no warning that the stack is executable during the > process. /usr/lib64/gcc/x86_64-suse-linux/7/../../../../x86_64-suse-linux/bin/ld: warning: test2.o: missing .note.GNU-stack section implies executable stack /usr/lib64/gcc/x86_64-suse-linux

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 --- Comment #1 from Nick Clifton --- Created attachment 14480 --> https://sourceware.org/bugzilla/attachment.cgi?id=14480&action=edit Proposed patch Hi Martin, Testing an obsolete target seems slightly suspicious, but I was able to repro

linking an assembler object creates an executable stack

2022-12-05 Thread Alexander Pick
I reported this behaviour to the gcc team, but they told me it's rather related to binutils. So I wanted to leave a note here. Reference to the gcc ticket: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=107971 During development of a project I noticed that linking a object created from assembler to

[Bug ld/29849] ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 Nick Clifton changed: What|Removed |Added Status|NEW |ASSIGNED Assignee|unassigned

[Bug ld/29851] New: -Wl,-z,ibtplt emits MPX jumps

2022-12-05 Thread mliska at suse dot cz
https://sourceware.org/bugzilla/show_bug.cgi?id=29851 Bug ID: 29851 Summary: -Wl,-z,ibtplt emits MPX jumps Product: binutils Version: 2.40 (HEAD) Status: NEW Severity: normal Priority: P2 Component: ld

[Bug binutils/29848] Out-of-bound read in function `parse_module`

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29848 Nick Clifton changed: What|Removed |Added Status|ASSIGNED|RESOLVED Resolution|---

[Bug binutils/29848] Out-of-bound read in function `parse_module`

2022-12-05 Thread cvs-commit at gcc dot gnu.org
https://sourceware.org/bugzilla/show_bug.cgi?id=29848 --- Comment #1 from cvs-commit at gcc dot gnu.org --- The master branch has been updated by Nick Clifton : https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=942fa4fb32738ecbb447546d54f1e5f0312d2ed4 commit 942fa4fb32738ecbb447546d54f

[Bug binutils/29848] Out-of-bound read in function `parse_module`

2022-12-05 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29848 Nick Clifton changed: What|Removed |Added Ever confirmed|0 |1 Assignee|unassigned at sou

[Bug ld/29849] New: ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9

2022-12-05 Thread mliska at suse dot cz
https://sourceware.org/bugzilla/show_bug.cgi?id=29849 Bug ID: 29849 Summary: ERROR: AddressSanitizer: global-buffer-overflow on address in spec_match ../../ld/ldlang.c:223 since 049522cae9798e51dd0c58566a9a2c61ba9100a9 Produ