Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Jun 2022 13:57:13 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 264669] sysutils/wmmemload fails with stack overrun after build with stack-protector-strong
Message-ID:  <bug-264669-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D264669

            Bug ID: 264669
           Summary: sysutils/wmmemload fails with stack overrun after
                    build with stack-protector-strong
           Product: Ports & Packages
           Version: Latest
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-bugs@FreeBSD.org
          Reporter: src-2016@bikker.homeunix.net
                CC: mbeis@xs4all.nl
                CC: mbeis@xs4all.nl
             Flags: maintainer-feedback?(mbeis@xs4all.nl)

Created attachment 234678
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D234678&action=
=3Dedit
Patch arraysize receiving argument sysctl

both binary package and ports compiled version fail

$ wmmemload
Abort

leaving line in /var/log/messages:

Jun 14 15:35:33 azd wmmemload[55487]: stack overflow detected; terminated
Jun 14 15:35:33 azd kernel: pid 55487 (wmmemload), jid 0, uid 1001: exited =
on
signal 6

Problem seems to be fixed size of mib array in src/mem_freebsd.c
For descendants of "vm.swap_info" array size should be 3

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-264669-7788>