Re: Overloading ld linker script is not working after 2_36

2023-02-14 Thread Alan Modra
On Tue, Feb 14, 2023 at 07:54:29PM +0100, Phil Wiggum wrote: > I can't get NOLOAD working any more. > This used to work before binutils_2_36. > > Default linker script 'cc430f5137.ld' is overloaded with a script file > (without -T) > > SECTIONS > { > .infoA (NOLOAD) : {} > INFOA > .infoB

Issue 55933 in oss-fuzz: binutils:fuzz_nm: Heap-buffer-overflow in _bfd_ecoff_slurp_symbol_table

2023-02-14 Thread sheriffbot via monorail
Updates: Labels: -restrict-view-commit Comment #3 on issue 55933 by sheriffbot: binutils:fuzz_nm: Heap-buffer-overflow in _bfd_ecoff_slurp_symbol_table https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55933#c3 This bug has been fixed. It has been opened to the public. - Your friend

Issue 55870 in oss-fuzz: binutils:fuzz_as: Heap-use-after-free in s_stab_generic

2023-02-14 Thread sheriffbot via monorail
Updates: Labels: -restrict-view-commit Comment #3 on issue 55870 by sheriffbot: binutils:fuzz_as: Heap-use-after-free in s_stab_generic https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=55870#c3 This bug has been fixed. It has been opened to the public. - Your friendly Sheriffbot -

[Bug ld/30078] FAIL: merge4

2023-02-14 Thread dave.anglin at bell dot net
https://sourceware.org/bugzilla/show_bug.cgi?id=30078 --- Comment #2 from dave.anglin at bell dot net --- Hi Nick, Yes, the behavior of .string on hppa is a bug/feature intended to match the behavior of HP as. UsingĀ  .asciz instead of .string fixes the test on hppa. Dave -- You are receiving

Overloading ld linker script is not working after 2_36

2023-02-14 Thread Phil Wiggum
I can't get NOLOAD working any more. This used to work before binutils_2_36. Default linker script 'cc430f5137.ld' is overloaded with a script file (without -T) SECTIONS { .infoA (NOLOAD) : {} > INFOA .infoB (NOLOAD) : {} > INFOB .infoC (NOLOAD) : {} > INFOC .infoD (NOLOAD) :

[Bug ld/30078] FAIL: merge4

2023-02-14 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=30078 Nick Clifton changed: What|Removed |Added CC||nickc at redhat dot com St

[Bug ld/29973] x86_64-w64-mingw32-g++ ld: helloworld.exe:.rdata_r: section below image base for windows

2023-02-14 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29973 --- Comment #31 from Nick Clifton --- I am investigating. But without any way to run newly linked executables, finding out what is wrong is proving to be quite difficult. -- You are receiving this mail because: You are on the CC list for th

[Bug gold/23856] Executables linked with gold against musl segfault at startup

2023-02-14 Thread sam at gentoo dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=23856 Sam James changed: What|Removed |Added CC||sam at gentoo dot org -- You are receivi