On Sat, May 11, 2019 at 12:30 PM Florian Weimer wrote:
> Can you capture register contents at the point of the crash?
>
> Does this reproduce in a chroot? Maybe you can trace the whole thing
> with a debugger. Does the crash reproduce if you single-step through
> the whole function?
Florian,
* tedheadster:
> Here is the full disassembly with a few comments:
>
> (gdb) disassemble
> Dump of assembler code for function rdrand:
>0xb7e21440 <+0>: push %esi
>0xb7e21441 <+1>: push %ebx
>0xb7e21442 <+2>: call 0xb7e0af5d <__x86.get_pc_thunk.si>
>0xb7e21447 <+7
Hello folks.
Thank you for being pioneers in the field!
I am trying to get responses from the login1 system bus, but I get
Access Denied messages.
I am calling it as normal user (the user of the session - as root it
works). SELinux is disabled.
The methods in question are TakeControl/ReleaseCont