From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id AAE0C3858D35; Wed, 26 Jul 2023 19:15:09 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org AAE0C3858D35 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1690398909; bh=7W33zIE+4sgltrXJAFJEm9RYr6cWAK14h2dlp1Vs27E=; h=From:To:Subject:Date:In-Reply-To:References:From; b=r45ei6PJbX8eCcVtyUF+jPIk7BBwCH6SvnnLh7Xl9oXhQNnOfOu0nmnjS2h6mNSLd 1uSm9cgbvX06rok/QdC2q4719ieWHfBouVjMLFfUmiF4wjs1wZYbc+nzrkaK2WbaYh k+/C+uKC1g+5S/IrMlaMd+IW9WRga9co2rntVnyA= From: "keiths at redhat dot com" To: gdb-prs@sourceware.org Subject: [Bug gdb/30639] AddressSanitizer: dynamic-stack-buffer-overflow /home/root/sp/Dataset/Binutils/binutils_aflpp/gdb/ada-lang.c:1388:16 in ada_decode[abi:cxx11](char const*, bool, bool) Date: Wed, 26 Jul 2023 19:15:09 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gdb X-Bugzilla-Component: gdb X-Bugzilla-Version: 13.1 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: keiths at redhat dot com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: unassigned at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: https://sourceware.org/bugzilla/show_bug.cgi?id=3D30639 Keith Seitz changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |keiths at redhat dot com --- Comment #2 from Keith Seitz --- The supplied executable does not segfault gdb in the reported location: $ ./gdb -nx -q --data-directory data-directory UAF_2 Reading symbols from UAF_2... Fatal signal: Segmentation fault ----- Backtrace ----- 0x599064 gdb_internal_backtrace_1 ../../src/gdb/bt-utils.c:122 0x599107 _Z22gdb_internal_backtracev ../../src/gdb/bt-utils.c:168 0x782fd4 handle_fatal_signal ../../src/gdb/event-top.c:889 0x783140 handle_sigsegv ../../src/gdb/event-top.c:962 0x7fe5a7d7eb6f ??? 0x6107a5 process_coff_symbol ../../src/gdb/coffread.c:1572 0x60f847 coff_symtab_read ../../src/gdb/coffread.c:1190 0x60e0dd coff_read_minsyms ../../src/gdb/coffread.c:549 0x60e629 coff_symfile_read ../../src/gdb/coffread.c:698 0xbd975e read_symbols ../../src/gdb/symfile.c:772 0xbd9e0b syms_from_objfile_1 ../../src/gdb/symfile.c:966 0xbd9ecf syms_from_objfile ../../src/gdb/symfile.c:983 0xbda3aa symbol_file_add_with_addrs ../../src/gdb/symfile.c:1086 0xbda6eb _Z24symbol_file_add_from_bfdRKN3gdb7ref_ptrI3bfd18gdb_bfd_ref_policyEEPKc10= enum_flagsI16symfile_add_flagEPSt6vectorI14other_sectionsSaISC_EES8_I12objf= ile_flagEP7objfile ../../src/gdb/symfile.c:1166 0xbda73a _Z15symbol_file_addPKc10enum_flagsI16symfile_add_flagEPSt6vectorI14other_se= ctionsSaIS5_EES1_I12objfile_flagE ../../src/gdb/symfile.c:1179 0xbda7ff symbol_file_add_main_1 ../../src/gdb/symfile.c:1203 0xbda7a6 _Z20symbol_file_add_mainPKc10enum_flagsI16symfile_add_flagE ../../src/gdb/symfile.c:1194 0x90b1d7 symbol_file_add_main_adapter ../../src/gdb/main.c:549 0x90b0ed catch_command_errors ../../src/gdb/main.c:518 0x90c20e captured_main_1 ../../src/gdb/main.c:1203 0x90c820 captured_main ../../src/gdb/main.c:1310 0x90c8bf _Z8gdb_mainP18captured_main_args ../../src/gdb/main.c:1339 0x418c3c main ../../src/gdb/gdb.c:32 --------------------- A fatal error internal to GDB has been detected, further debugging is not possible. GDB will now terminate. This is a bug, please report it. For instructions, see: . Segmentation fault (core dumped) Did you attach the correct binary to this bug? --=20 You are receiving this mail because: You are on the CC list for the bug.=