On Mon, 14 Nov 2005, Eric Christopher wrote:

> >
> > this should also influence the -fstack-protector behaviour, but  
> > that seems
> > to be OK.
> > __builtin_trap is used as I can see only if a vulnerability is  
> > found, this
> > happens though on a simple hello world.
> 
> Aaah. You'll probably need to step through the program in a debugger  
> then and find out where and why it segfaults.

app:
#include <stdio.h>

int main() {
        printf("Hello\n");
        return 0;
}

I don't really know gdb how to use, but
gdb run:
Program received signal SIGSEGV, Segmentation fault.
main () at tes.c:3
3       int main () {
>bt
#0 main () at tes.c:3

allowing it to core dump and running gdb against the core
#... 0x0000000 in ?? ()
finally
Error accessing memory address 0xc0000000: No such file or directory

The same built only w/ -fstack-protector is OK.

What else can I do to help finding the problem?

Apropos: there is another bug probably related to libssp.so use (does not 
influence the case here, due to __stack_chk_guard being in libc), it 
should write %{fstack-protector|fstack-protector-all: -lssp ....}, else for 
-fstack-protector-all it won't link against libssp.so

Thanks, Peter

-- 
Peter S. Mazinger <ps dot m at gmx dot net>           ID: 0xA5F059F2
Key fingerprint = 92A4 31E1 56BC 3D5A 2D08  BB6E C389 975E A5F0 59F2

Reply via email to