[Bug 264669] sysutils/wmmemload fails with stack overrun after build with stack-protector-strong
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload: fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload: fails with stack overflow after build with stack-protector-strong"
- Reply: bugzilla-noreply_a_freebsd.org: "[Bug 264669] sysutils/wmmemload: fails with stack overflow after build with stack-protector-strong"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 14 Jun 2022 13:57:13 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=264669 Bug ID: 264669 Summary: sysutils/wmmemload fails with stack overrun after build with stack-protector-strong Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: src-2016@bikker.homeunix.net CC: mbeis@xs4all.nl CC: mbeis@xs4all.nl Flags: maintainer-feedback?(mbeis@xs4all.nl) Created attachment 234678 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=234678&action=edit Patch arraysize receiving argument sysctl both binary package and ports compiled version fail $ wmmemload Abort leaving line in /var/log/messages: Jun 14 15:35:33 azd wmmemload[55487]: stack overflow detected; terminated Jun 14 15:35:33 azd kernel: pid 55487 (wmmemload), jid 0, uid 1001: exited on signal 6 Problem seems to be fixed size of mib array in src/mem_freebsd.c For descendants of "vm.swap_info" array size should be 3 -- You are receiving this mail because: You are the assignee for the bug.