Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 58185 Details for
Bug 91398
sys-devel/binutils: heap overflow
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
execstack-prelink-debug.txt
execstack-prelink-debug.txt (text/plain), 7.45 KB, created by
solar (RETIRED)
on 2005-05-05 23:45:32 UTC
(
hide
)
Description:
execstack-prelink-debug.txt
Filename:
MIME Type:
Creator:
solar (RETIRED)
Created:
2005-05-05 23:45:32 UTC
Size:
7.45 KB
patch
obsolete
>Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `execstack -q /dev/shm/t/a.out'. >Program terminated with signal 11, Segmentation fault. >#0 0x4002f608 in file_read_elf (fildes=0x8075fe0, map_address=0x0, offset=0x0, maxsize=0x1, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:313 > in elf_begin.c >backtrace full >#0 0x4002f608 in file_read_elf (fildes=0x8075fe0, map_address=0x0, offset=0x0, maxsize=0x1, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:313 > cnt = 0x491 > e_ident = (unsigned char *) 0xbfffe420 "\177ELF\001\001\001" > scncnt = 0x40000000 > elf = (Elf *) 0x8075fe0 > __PRETTY_FUNCTION__ = "file_read_elf" >#1 0x4002fd16 in read_unmmaped_file (fildes=0x3, offset=0x0, maxsize=0xffffffff, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:483 > header = "\177ELF\001\001\001\000\000\000\000\000\000\000\000" > nread = 0x8095f50 >#2 0x4002ff29 in read_file (fildes=0x3, offset=0x0, maxsize=0xffffffff, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:566 > map_address = (void *) 0x0 > use_mmap = 0x8095f50 > __PRETTY_FUNCTION__ = "read_file" >#3 0x40030919 in elf_begin (fildes=0x3, cmd=ELF_C_READ, ref=0x0) at elf_begin.c:1025 > retval = (Elf *) 0x8095f50 >#4 0x0804c5b8 in fdopen_dso (fd=0x3, name=0xbfffe9c6 "/dev/shm/t/a.out") at dso.c:261 > elf = (Elf *) 0x0 > ehdr = {e_ident = "Åéÿ¿´O\001@\224\003\000\000ðT\001@", e_type = 0xe780, e_machine = 0xbfff, e_version = 0x40009da3, e_entry = 0x4003f3204001569c, e_phoff = 0x100000001, e_shoff = 0x0, e_flags = 0x80487a4, e_ehsize = 0x5328, e_phentsize = 0x807, e_phnum = 0x3a, e_shentsize = 0x0, e_shnum = 0x8d38, e_shstrndx = 0x804} > last_off = 0x1bfffe9c6 > i = 0x0 > j = 0x1 > k = 0x2 > last = 0x807607c > sections = (int *) 0x807612c > invsections = (int *) 0x40015b88 > dso = (DSO *) 0x0 > plarch = (struct PLArch *) 0xbfffe6a0 > __PRETTY_FUNCTION__ = "fdopen_dso" >#5 0x0804c472 in open_dso (name=0xbfffe9c6 "/dev/shm/t/a.out") at dso.c:222 > fd = 0x3 >#6 0x0804aa88 in main (argc=0x3, argv=0xbfffe854) at execstack.c:414 > dso = (DSO *) 0x401302a0 > ret = 0xbfffe808 > remaining = 0x3 > failures = 0x0 > >x/16i0x4002f608 <file_read_elf+962>: mov %edx,0xf8(%eax) >0x4002f60e <file_read_elf+968>: mov %esi,0xfc(%eax) >0x4002f614 <file_read_elf+974>: mov %ecx,0x114(%eax) >0x4002f61a <file_read_elf+980>: inc %edx >0x4002f61b <file_read_elf+981>: cmp 0xffffffe8(%ebp),%edx >0x4002f61e <file_read_elf+984>: jb 0x4002f5fa <file_read_elf+948> >0x4002f620 <file_read_elf+986>: lea 0x9c(%esi),%eax >0x4002f626 <file_read_elf+992>: mov %eax,0x4c(%esi) >0x4002f629 <file_read_elf+995>: jmp 0x4002f8d2 <file_read_elf+1676> >0x4002f62e <file_read_elf+1000>: mov 0xffffffe8(%ebp),%ecx >0x4002f631 <file_read_elf+1003>: mov %ecx,0xa0(%esi) >0x4002f637 <file_read_elf+1009>: mov %ecx,0x9c(%esi) >0x4002f63d <file_read_elf+1015>: cmpl $0x0,0xc(%ebp) >0x4002f641 <file_read_elf+1019>: je 0x4002f6f1 <file_read_elf+1195> >0x4002f647 <file_read_elf+1025>: mov 0xffffffec(%ebp),%eax >0x4002f64a <file_read_elf+1028>: cmpb $0x1,0x5(%eax) > >info registers > >eax 0x8095f50 0x8095f50 >ecx 0x807607c 0x807607c >edx 0x491 0x491 >ebx 0x4003e7fc 0x4003e7fc >esp 0xbfffe400 0xbfffe400 >ebp 0xbfffe4b8 0xbfffe4b8 >esi 0x8075fe0 0x8075fe0 >edi 0x1 0x1 >eip 0x4002f608 0x4002f608 >eflags 0x10206 0x10206 >cs 0x23 0x23 >ss 0x2b 0x2b >ds 0x2b 0x2b >es 0x2b 0x2b >fs 0x2b 0x2b >gs 0x2b 0x2b > > > >-------------------------------------------------------------------- > >Using host libthread_db library "/lib/libthread_db.so.1". >Core was generated by `prelink -n /dev/shm/t/a.out'. >Program terminated with signal 11, Segmentation fault. >#0 file_read_elf (fildes=0x85b6340, map_address=0x0, offset=0x0, maxsize=0x1, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:315 > in elf_begin.c >backtrace full >#0 file_read_elf (fildes=0x85b6340, map_address=0x0, offset=0x0, maxsize=0x1, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:315 > cnt = 0xb64 > e_ident = (unsigned char *) 0xbfffe780 "\177ELF\001\001\001" > scncnt = 0x40000000 > elf = (Elf *) 0x85b6340 > __PRETTY_FUNCTION__ = "file_read_elf" >#1 0x080931a2 in read_unmmaped_file (fildes=0x3, offset=0x0, maxsize=0xffffffff, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:483 > header = "\177ELF\001\001\001\000\000\000\000\000\000\000\000" > nread = 0x8605f00 >#2 0x08093389 in read_file (fildes=0x3, offset=0x0, maxsize=0xffffffff, cmd=ELF_C_READ, parent=0x0) at elf_begin.c:566 > map_address = (void *) 0x0 > use_mmap = 0x8605f00 > __PRETTY_FUNCTION__ = "read_file" >#3 0x08093cf5 in elf_begin (fildes=0x3, cmd=ELF_C_READ, ref=0x0) at elf_begin.c:1025 > retval = (Elf *) 0x8605f00 >#4 0x08070ce8 in fdopen_dso (fd=0x3, name=0xbfffefe4 "/dev/shm/t/a.out") at dso.c:261 > elf = (Elf *) 0x0 > ehdr = {e_ident = '\0' <repeats 15 times>, e_type = 0x0, e_machine = 0x0, e_version = 0x0, e_entry = 0x9, e_phoff = 0x34ce06, e_shoff = 0x4000000000000003, e_flags = 0x1000, e_ehsize = 0xff18, e_phentsize = 0x811, e_phnum = 0x0, e_shentsize = 0x0, e_shnum = 0xeae0, e_shstrndx = 0xbfff} > last_off = 0x2000000000 > i = 0x0 > j = 0x0 > k = 0x0 > last = 0x0 > sections = (int *) 0x900 > invsections = (int *) 0xbfffefe4 > dso = (DSO *) 0x0 > plarch = (struct PLArch *) 0x83de9d0 > __PRETTY_FUNCTION__ = "fdopen_dso" >#5 0x08059d3e in gather_binlib (name=0xbfffefe4 "/dev/shm/t/a.out", st=0xbfffeb60) at gather.c:930 > e_ident = "\177ELF\001\001\001\000\000\000\000\000\000\000\000\000\002" > fd = 0x3 > type = 0x2 > dso = (DSO *) 0x80ac08b > ent = (struct prelink_entry *) 0x0 > __PRETTY_FUNCTION__ = "gather_binlib" >#6 0x08059fd8 in gather_object (name=0xbfffefe4 "/dev/shm/t/a.out", deref=0x0, onefs=0x0) at gather.c:1003 > st = {st_dev = 0x9, __pad1 = 0x0, __st_ino = 0x34ce06, st_mode = 0x81a4, st_nlink = 0x1, st_uid = 0xa28, st_gid = 0xa28, st_rdev = 0x0, __pad2 = 0x0, st_size = 0x200, st_blksize = 0x1000, st_blocks = 0x8, st_atim = {tv_sec = 0x427b0fcb, tv_nsec = 0x0}, st_mtim = {tv_sec = 0x427878da, tv_nsec = 0x0}, st_ctim = {tv_sec = 0x42787fc9, tv_nsec = 0x0}, st_ino = 0x34ce06} >#7 0x0805e1db in main (argc=0x3, argv=0xbfffee74) at main.c:421 > remaining = 0x3 > failures = 0x0 > >x/16i0x8092ae2 <file_read_elf+942>: mov %ecx,0x114(%eax) >0x8092ae8 <file_read_elf+948>: inc %edx >0x8092ae9 <file_read_elf+949>: cmp 0xffffffec(%ebp),%edx >0x8092aec <file_read_elf+952>: jb 0x8092ac8 <file_read_elf+916> >0x8092aee <file_read_elf+954>: lea 0x9c(%ebx),%eax >0x8092af4 <file_read_elf+960>: mov %eax,0x4c(%ebx) >0x8092af7 <file_read_elf+963>: jmp 0x8092d9b <file_read_elf+1639> >0x8092afc <file_read_elf+968>: mov 0xffffffec(%ebp),%edx >0x8092aff <file_read_elf+971>: mov %edx,0xa0(%ebx) >0x8092b05 <file_read_elf+977>: mov %edx,0x9c(%ebx) >0x8092b0b <file_read_elf+983>: cmpl $0x0,0xc(%ebp) >0x8092b0f <file_read_elf+987>: je 0x8092bbd <file_read_elf+1161> >0x8092b15 <file_read_elf+993>: cmpb $0x1,0x5(%edi) >0x8092b19 <file_read_elf+997>: jne 0x8092bbd <file_read_elf+1161> >0x8092b1f <file_read_elf+1003>: mov 0xc(%ebp),%edx >0x8092b22 <file_read_elf+1006>: add 0x10(%ebp),%edx > >info registers > >eax 0x8605f00 0x8605f00 >ecx 0x85b63dc 0x85b63dc >edx 0xb64 0xb64 >ebx 0x85b6340 0x85b6340 >esp 0xbfffe760 0xbfffe760 >ebp 0xbfffe818 0xbfffe818 >esi 0x1 0x1 >edi 0xbfffe780 0xbfffe780 >eip 0x8092ae2 0x8092ae2 >eflags 0x10206 0x10206 >cs 0x23 0x23 >ss 0x2b 0x2b >ds 0x2b 0x2b >es 0x2b 0x2b >fs 0x2b 0x2b >gs 0x2b 0x2b >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 91398
:
57996
|
58057
|
58185
|
58471
|
58472
|
58473
|
58474
|
58482