-
-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix Issue 20421 - Exceptions don't work when linking through lld-link #433
Conversation
patch LLD to not set IMAGE_DLL_CHARACTERISTICS_NO_SEH, the MS linker also doesn't do this.
|
Should this target stable? |
|
The beta for 2.091 should be tagged in five days... |
This doesn't automatically go into the releaase, needs another change to the create_release script. @wilzbach Can you upload the lld-artifacts to downloads.dlang.org? Thanks. |
Gentle Ping :) I hope to get the follow-up into the next release. BTW: it might also need a change to dmd (pass /SAFESEH:NO to lld). |
Sorry. They both should be up now: downloads.dlang.org/other/lld-link-9.0.0-seh-x64.zip |
|
BTW I don't think that we have to upload the artifacts to this bucket. We could also just use GitHub's releases here. Even manually dropping them in via e.g. https://github.com/dlang/installer/releases/new this could be faster (and if we have to do this more often, we could automate further). That being said I don't mind your pings, just thinking about how to decrease the overall workload. |
Thanks. For some reason I don't see it on the download page (probably needs to be regenerated, too), but it's used by your PR.
Sounds good to me. I'll try to remember next time. |
We would have to change the URL in the build script, but this might be easier as anyone with write permissions to this repo can "upload" (aka tag a new release) and bump the URL path. |
@wilzbach it seems the signature file is broken as the buildkite release build fails to verify it. |
Ah I didn't realize that we were actually checking for those and thus I didn't upload them for this once. I uploaded them now and restarted your PR. |
Thanks. Unfortunately the signature that I created will probably also not be accepted, because I got it from gpgsm, not gpg (the latter wouldn't let me import the certificate).
Probably simpler to handle, but depends on what the actual goal of these checks are. If we want to avoid that external sources change without notice, the sha256 hashes should be good enough. If we want the sources to come from trusted parties, the signature is safer. Both ways we assume that the git repository isn't tampered with. Considering github releases are as safe as the repository itself, the checks seem rather gratuitous to begin with. |
They are available now, but gpg doesn't like them: |
patch LLD to not set IMAGE_DLL_CHARACTERISTICS_NO_SEH, the MS linker also doesn't do this.