From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on ip-172-31-91-241.ec2.internal X-Spam-Level: X-Spam-Status: No, score=0.0 required=3.0 tests=none autolearn=ham autolearn_force=no version=3.4.6 Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Simon Wright Newsgroups: comp.lang.ada Subject: Re: macOS Ventura 13.6 update problem Date: Sun, 24 Sep 2023 12:55:56 +0100 Organization: A noiseless patient Spider Message-ID: References: <31950cc1-cddc-b734-12c0-ec8520c7fdc0@monash.edu> MIME-Version: 1.0 Content-Type: text/plain Injection-Info: dont-email.me; posting-host="25c1caf3f7b20f77c27a640c89215cc1"; logging-data="1418558"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19sF/RfmNoPPJ6Q97/v14UV1FkVziXuKXg=" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (darwin) Cancel-Lock: sha1:YaMbvcIiwXh5eGqb/qcFSCyRICE= sha1:NrWM+uKWGBw0Jn0y6XDy1vELpwo= Xref: news.eternal-september.org comp.lang.ada:65711 List-Id: Leo Brewin writes: > Hmm, this is odd. I'm having no problems. > I'm running mac OS Ventura 13.6 (with the security update), CLT 15.0 > and gnat based on gcc 13.1. I was under the impression that 13.6 _was_ a security update! Investigation so far shows that linking against the static Ada runtime (the default, -bargs -static) crashes, against the shared runtime (-bargs -shared) is OK. With 12.2.0, 13.1.0, 14.0.0. I occurs to me that it might be _any_ static library? ... later