From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 94596 invoked by alias); 24 Jul 2017 17:07:20 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Received: (qmail 94581 invoked by uid 89); 24 Jul 2017 17:07:19 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.0 required=5.0 tests=AWL,BAYES_00,KAM_LAZY_DOMAIN_SECURITY,RCVD_IN_DNSWL_NONE,RP_MATCHES_RCVD autolearn=no version=3.3.2 spammy=Hx-languages-length:300, H*r:TLS1.2 X-HELO: albireo.enyo.de From: Florian Weimer To: "H.J. Lu" Cc: GNU C Library Subject: Re: [PATCH] Avoid accessing corrupted stack from __stack_chk_fail [BZ #21752] References: <20170719185036.GA32763@gmail.com> Date: Mon, 24 Jul 2017 17:10:00 -0000 In-Reply-To: (H. J. Lu's message of "Mon, 24 Jul 2017 05:50:48 -0700") Message-ID: <87d18p3gsb.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain X-SW-Source: 2017-07/txt/msg00821.txt.bz2 * H. J. Lu: > Glibc should avoid accessing corrupted stack from __fortify_fail_abort, > which somewhat defeats the purpose of -fstack-protector. Patch is reasonable (but more work on bug 21752 is unfortunately needed).