https://bugs.kde.org/show_bug.cgi?id=445032

--- Comment #6 from Paul Floyd <pjfl...@wanadoo.fr> ---
paulf@freebsd:~/scratch/sigreturn $ valgrind ./pthread_sigreturn_clang
==866== Memcheck, a memory error detector
==866== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==866== Using Valgrind-3.17.0 and LibVEX; rerun with -h for copyright info
==866== Command: ./pthread_sigreturn_clang
==866== 
==866== Invalid read of size 4
==866==    at 0x720526B: ??? (in /lib/libthr.so.3)
==866==    by 0x72048BD: ??? (in /lib/libthr.so.3)
==866==    by 0x381A64F3: ??? (in
/usr/local/libexec/valgrind/memcheck-x86-freebsd)
==866==    by 0x72B973E: sleep (in /lib/libc.so.7)
==866==    by 0x4018F2: main (in
/usr/home/paulf/scratch/sigreturn/pthread_sigreturn_clang)
==866==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
==866== 
==866== 
==866== Process terminating with default action of signal 11 (SIGSEGV): dumping
core
==866==  Access not within mapped region at address 0x0
==866==    at 0x720526B: ??? (in /lib/libthr.so.3)
==866==    by 0x72048BD: ??? (in /lib/libthr.so.3)
==866==    by 0x381A64F3: ??? (in
/usr/local/libexec/valgrind/memcheck-x86-freebsd)
==866==    by 0x72B973E: sleep (in /lib/libc.so.7)
==866==    by 0x4018F2: main (in
/usr/home/paulf/scratch/sigreturn/pthread_sigreturn_clang)
==866==  If you believe this happened as a result of a stack
==866==  overflow in your program's main thread (unlikely but
==866==  possible), you can try to increase the size of the
==866==  main thread stack using the --main-stacksize= flag.
==866==  The main thread stack size used in this run was 16777216.


To get this I changed the ASLR sysctls
paulf@freebsd:~/scratch/sigreturn $ sysctl -a | grep -i aslr
kern.elf32.aslr.stack_gap: 0 (default is 3)
kern.elf32.aslr.honor_sbrk: 1
kern.elf32.aslr.pie_enable: 1 (default is 0)
kern.elf32.aslr.enable: 1 (default is 0)
vm.aslr_restarts: 0

Are yoiu using ASLR as above?

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to