Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87lijiw8mp.fsf@rho.meyering.net>
Date: Wed, 20 Jun 2012 13:00:30 +0200
From: Jim Meyering <jim@...ering.net>
To: Bruno Haible <bruno@...sp.org>
Cc: Rich Felker <dalias@...ifal.cx>,  musl@...ts.openwall.com,  bug-gnulib@....org
Subject: Re: musl, printf out-of-memory test

Bruno Haible wrote:
> Rich Felker wrote:
>> The problem was an obscure pointer-arithmetic overflow ...
>> where the stack pointer is near the 4GB boundary.
>
> This explains also why it occurred only with a certain probability
> outside gdb, but with 100% probability from within gdb: Apparently gdb
> runs the program without address space layout randomization.

That is correct.  It is a feature of gdb-7.0 and newer.
You can inspect (watch/break-at/etc.) the same address and expect it
to refer to the same memory location in multiple invocations.
This makes gdb's command-line history even more useful.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.